diff --git a/CVE-2018/CVE-2018-88xx/CVE-2018-8822.json b/CVE-2018/CVE-2018-88xx/CVE-2018-8822.json index 92044795d2c..554fcefef43 100644 --- a/CVE-2018/CVE-2018-88xx/CVE-2018-8822.json +++ b/CVE-2018/CVE-2018-88xx/CVE-2018-8822.json @@ -2,8 +2,8 @@ "id": "CVE-2018-8822", "sourceIdentifier": "cve@mitre.org", "published": "2018-03-20T17:29:00.423", - "lastModified": "2023-11-07T03:01:30.420", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-03-28T16:08:31.410", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -85,8 +85,58 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndIncluding": "4.15.11", - "matchCriteriaId": "8597EB3B-58A3-4950-9663-BB64895BDE67" + "versionStartIncluding": "2.6.12", + "versionEndExcluding": "3.2.102", + "matchCriteriaId": "9002FDD9-8A8C-4E06-8DE5-7CF6C79B117A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.3", + "versionEndExcluding": "3.16.57", + "matchCriteriaId": "0786B96E-E04C-4D2B-B358-CCE006BAED46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.17", + "versionEndExcluding": "3.18.103", + "matchCriteriaId": "F9906D89-2D98-4380-9A65-798B12332FC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.19", + "versionEndExcluding": "4.1.52", + "matchCriteriaId": "DC20C495-C297-4CEE-9034-4FE81754FE98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.2", + "versionEndExcluding": "4.4.125", + "matchCriteriaId": "BB766B8A-0C15-4949-BC7E-C624A8FB122A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "4.9.91", + "matchCriteriaId": "086C29F5-DF5E-43B2-8E7D-EBA453B571D8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.31", + "matchCriteriaId": "9E6E5A35-1967-44F6-9D8F-83A08D60DB2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.15.14", + "matchCriteriaId": "A8ED8E8A-0A8C-4F47-9BFF-69DB613F2C35" }, { "vulnerable": true, @@ -281,7 +331,11 @@ }, { "url": "https://www.mail-archive.com/netdev%40vger.kernel.org/msg223373.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-291xx/CVE-2023-29162.json b/CVE-2023/CVE-2023-291xx/CVE-2023-29162.json index 62fe85f099d..b733e5af7f1 100644 --- a/CVE-2023/CVE-2023-291xx/CVE-2023-29162.json +++ b/CVE-2023/CVE-2023-291xx/CVE-2023-29162.json @@ -2,12 +2,16 @@ "id": "CVE-2023-29162", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:49.777", - "lastModified": "2024-02-14T15:01:51.137", + "lastModified": "2024-03-28T16:15:07.657", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "Improper buffer restrictions in some Intel(R) C++ Compiler Classic before version 2021.8 may allow authenticated user to potentially enable escalation of privilege via local access." + "value": "Improper buffer restrictions the Intel(R) C++ Compiler Classic before version 2021.8 for Intel(R) oneAPI Toolkits before version 2022.3.1 may allow a privileged user to potentially enable escalation of privilege via local access.\n\n" + }, + { + "lang": "es", + "value": "Las restricciones inadecuadas del b\u00fafer en algunos compiladores Intel(R) C++ Classic anteriores a la versi\u00f3n 2021.8 pueden permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { @@ -34,18 +38,6 @@ } ] }, - "weaknesses": [ - { - "source": "secure@intel.com", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-92" - } - ] - } - ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00988.html", diff --git a/CVE-2023/CVE-2023-351xx/CVE-2023-35121.json b/CVE-2023/CVE-2023-351xx/CVE-2023-35121.json index a2ba2e66820..8e9f7c68f68 100644 --- a/CVE-2023/CVE-2023-351xx/CVE-2023-35121.json +++ b/CVE-2023/CVE-2023-351xx/CVE-2023-35121.json @@ -2,12 +2,16 @@ "id": "CVE-2023-35121", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:16:00.123", - "lastModified": "2024-02-14T15:01:46.050", + "lastModified": "2024-03-28T15:15:45.453", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "Improper access control in some Intel(R) oneAPI DPC++/C++ Compiler software before version 2023.2.1 may allow authenticated user to potentially enable escalation of privilege via local access." + "value": "Improper access control in the Intel(R) oneAPI DPC++/C++ Compiler before version 2022.2.1 for some Intel(R) oneAPI Toolkits before version 2022.3.1 may allow authenticated user to potentially enable escalation of privilege via local access.\n\n" + }, + { + "lang": "es", + "value": "El control de acceso inadecuado en algunos software del compilador Intel(R) oneAPI DPC++/C++ anterior a la versi\u00f3n 2023.2.1 puede permitir que el usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { @@ -34,18 +38,6 @@ } ] }, - "weaknesses": [ - { - "source": "secure@intel.com", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-284" - } - ] - } - ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00988.html", diff --git a/CVE-2023/CVE-2023-403xx/CVE-2023-40390.json b/CVE-2023/CVE-2023-403xx/CVE-2023-40390.json new file mode 100644 index 00000000000..0d7e2e300e4 --- /dev/null +++ b/CVE-2023/CVE-2023-403xx/CVE-2023-40390.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-40390", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-03-28T16:15:07.773", + "lastModified": "2024-03-28T16:15:07.773", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A privacy issue was addressed by moving sensitive data to a protected location. This issue is fixed in macOS Sonoma 14.2. An app may be able to access user-sensitive data." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214036", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42892.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42892.json new file mode 100644 index 00000000000..c45ca29590a --- /dev/null +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42892.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-42892", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-03-28T16:15:07.843", + "lastModified": "2024-03-28T16:15:07.843", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.6.3, macOS Sonoma 14.2, macOS Monterey 12.7.2. A local attacker may be able to elevate their privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214036", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214037", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214038", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42893.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42893.json new file mode 100644 index 00000000000..7fbb379aa3b --- /dev/null +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42893.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2023-42893", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-03-28T16:15:07.903", + "lastModified": "2024-03-28T16:15:07.903", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A permissions issue was addressed by removing vulnerable code and adding additional checks. This issue is fixed in macOS Monterey 12.7.2, macOS Ventura 13.6.3, iOS 17.2 and iPadOS 17.2, iOS 16.7.3 and iPadOS 16.7.3, tvOS 17.2, watchOS 10.2, macOS Sonoma 14.2. An app may be able to access protected user data." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214034", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214035", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214036", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214037", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214038", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214040", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214041", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42896.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42896.json new file mode 100644 index 00000000000..39548ebda0f --- /dev/null +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42896.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2023-42896", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-03-28T16:15:07.970", + "lastModified": "2024-03-28T16:15:07.970", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was addressed with improved handling of temporary files. This issue is fixed in macOS Monterey 12.7.2, macOS Ventura 13.6.3, iOS 17.2 and iPadOS 17.2, iOS 16.7.3 and iPadOS 16.7.3, macOS Sonoma 14.2. An app may be able to modify protected parts of the file system." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214034", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214035", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214036", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214037", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214038", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42913.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42913.json new file mode 100644 index 00000000000..d929ce2eb06 --- /dev/null +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42913.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42913", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-03-28T16:15:08.023", + "lastModified": "2024-03-28T16:15:08.023", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed through improved state management. This issue is fixed in macOS Sonoma 14.2. Remote Login sessions may be able to obtain full disk access permissions." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214036", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42930.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42930.json new file mode 100644 index 00000000000..fb1034d99a1 --- /dev/null +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42930.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-42930", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-03-28T16:15:08.090", + "lastModified": "2024-03-28T16:15:08.090", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.6.3, macOS Sonoma 14.2, macOS Monterey 12.7.2. An app may be able to modify protected parts of the file system." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214036", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214037", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214038", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42931.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42931.json new file mode 100644 index 00000000000..7ae52d14e18 --- /dev/null +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42931.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-42931", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-03-28T16:15:08.153", + "lastModified": "2024-03-28T16:15:08.153", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.6.3, macOS Sonoma 14.2, macOS Monterey 12.7.2. A process may gain admin privileges without proper authentication." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214036", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214037", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214038", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42936.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42936.json new file mode 100644 index 00000000000..ef4a3db6b02 --- /dev/null +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42936.json @@ -0,0 +1,40 @@ +{ + "id": "CVE-2023-42936", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-03-28T16:15:08.200", + "lastModified": "2024-03-28T16:15:08.200", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Monterey 12.7.2, macOS Ventura 13.6.3, iOS 17.2 and iPadOS 17.2, tvOS 17.2, watchOS 10.2, macOS Sonoma 14.2. An app may be able to access user-sensitive data." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214035", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214036", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214037", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214038", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214040", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214041", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42947.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42947.json new file mode 100644 index 00000000000..463ed7d8ced --- /dev/null +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42947.json @@ -0,0 +1,40 @@ +{ + "id": "CVE-2023-42947", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-03-28T16:15:08.250", + "lastModified": "2024-03-28T16:15:08.250", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A path handling issue was addressed with improved validation. This issue is fixed in macOS Monterey 12.7.2, macOS Ventura 13.6.3, iOS 17.2 and iPadOS 17.2, tvOS 17.2, watchOS 10.2, macOS Sonoma 14.2. An app may be able to break out of its sandbox." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214035", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214036", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214037", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214038", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214040", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214041", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42950.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42950.json new file mode 100644 index 00000000000..d9c94b4799b --- /dev/null +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42950.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2023-42950", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-03-28T16:15:08.313", + "lastModified": "2024-03-28T16:15:08.313", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A use after free issue was addressed with improved memory management. This issue is fixed in Safari 17.2, iOS 17.2 and iPadOS 17.2, tvOS 17.2, watchOS 10.2, macOS Sonoma 14.2. Processing maliciously crafted web content may lead to arbitrary code execution." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214035", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214036", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214039", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214040", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214041", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42956.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42956.json new file mode 100644 index 00000000000..2f59e519c2a --- /dev/null +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42956.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-42956", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-03-28T16:15:08.377", + "lastModified": "2024-03-28T16:15:08.377", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved memory handling. This issue is fixed in Safari 17.2, iOS 17.2 and iPadOS 17.2, macOS Sonoma 14.2. Processing web content may lead to a denial-of-service." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214035", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214036", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214039", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42962.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42962.json new file mode 100644 index 00000000000..dec0193bd6b --- /dev/null +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42962.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-42962", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-03-28T16:15:08.430", + "lastModified": "2024-03-28T16:15:08.430", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed with improved checks This issue is fixed in iOS 17.2 and iPadOS 17.2, iOS 16.7.3 and iPadOS 16.7.3. A remote attacker may be able to cause a denial-of-service." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214034", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214035", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42974.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42974.json new file mode 100644 index 00000000000..5a6081fdbf9 --- /dev/null +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42974.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2023-42974", + "sourceIdentifier": "product-security@apple.com", + "published": "2024-03-28T16:15:08.480", + "lastModified": "2024-03-28T16:15:08.480", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A race condition was addressed with improved state handling. This issue is fixed in macOS Monterey 12.7.2, macOS Ventura 13.6.3, iOS 17.2 and iPadOS 17.2, iOS 16.7.3 and iPadOS 16.7.3, macOS Sonoma 14.2. An app may be able to execute arbitrary code with kernel privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT214034", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214035", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214036", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214037", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT214038", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45705.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45705.json new file mode 100644 index 00000000000..137270da6c0 --- /dev/null +++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45705.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-45705", + "sourceIdentifier": "psirt@hcl.com", + "published": "2024-03-28T15:15:45.590", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An administrative user of WebReports may perform a Server Side Request Forgery (SSRF) exploit through SMTP configuration options.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@hcl.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 2.5 + } + ] + }, + "references": [ + { + "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0111972", + "source": "psirt@hcl.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45706.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45706.json new file mode 100644 index 00000000000..ae89e548a3e --- /dev/null +++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45706.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-45706", + "sourceIdentifier": "psirt@hcl.com", + "published": "2024-03-28T15:15:45.797", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An administrative user of WebReports may perform a Cross Site Scripting (XSS) and/or Man in the Middle (MITM) exploit through SAML configuration.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@hcl.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.0, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.5, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0111972", + "source": "psirt@hcl.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45715.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45715.json new file mode 100644 index 00000000000..c7774daca52 --- /dev/null +++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45715.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-45715", + "sourceIdentifier": "psirt@hcl.com", + "published": "2024-03-28T15:15:45.983", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "The console may experience a service interruption when processing file names with invalid characters.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@hcl.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0111972", + "source": "psirt@hcl.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6437.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6437.json index 26c728f5d54..f3dc22b02d3 100644 --- a/CVE-2023/CVE-2023-64xx/CVE-2023-6437.json +++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6437.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6437", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-03-28T14:15:13.600", - "lastModified": "2024-03-28T14:15:13.600", - "vulnStatus": "Received", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0259.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0259.json new file mode 100644 index 00000000000..bc4f5444979 --- /dev/null +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0259.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-0259", + "sourceIdentifier": "df4dee71-de3a-4139-9588-11b62fe6c0ff", + "published": "2024-03-28T15:15:46.180", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Fortra's Robot Schedule Enterprise Agent for Windows prior to version 3.04 is susceptible to privilege escalation. A low-privileged user can overwrite the service executable. When the service is restarted, the replaced binary runs with local system privileges, allowing a low-privileged user to gain elevated privileges.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "df4dee71-de3a-4139-9588-11b62fe6c0ff", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "df4dee71-de3a-4139-9588-11b62fe6c0ff", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "references": [ + { + "url": "https://hstechdocs.helpsystems.com/releasenotes/Content/_ProductPages/Robot/RobotScheduleEnterprise.htm", + "source": "df4dee71-de3a-4139-9588-11b62fe6c0ff" + }, + { + "url": "https://www.fortra.com/security/advisory/fi-2024-005", + "source": "df4dee71-de3a-4139-9588-11b62fe6c0ff" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27775.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27775.json index dad52606a55..7bede857520 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27775.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27775.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27775", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-03-28T13:15:47.340", - "lastModified": "2024-03-28T13:15:47.340", - "vulnStatus": "Received", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28109.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28109.json index d8e25ca8556..92489bdf5e0 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28109.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28109.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28109", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-28T14:15:13.863", - "lastModified": "2024-03-28T14:15:13.863", - "vulnStatus": "Received", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29200.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29200.json index 7141a501740..a273b11e332 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29200.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29200.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29200", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-28T14:15:14.100", - "lastModified": "2024-03-28T14:15:14.100", - "vulnStatus": "Received", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29882.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29882.json index 859b172eb26..f379b0b56c1 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29882.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29882.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29882", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-28T14:15:14.337", - "lastModified": "2024-03-28T14:15:14.337", - "vulnStatus": "Received", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29896.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29896.json index 6a3f03537d6..e55c70186e0 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29896.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29896.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29896", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-28T13:15:47.717", - "lastModified": "2024-03-28T13:15:47.717", - "vulnStatus": "Received", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29897.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29897.json index 1792dd6567f..d87d0d02ee2 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29897.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29897.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29897", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-28T14:15:14.557", - "lastModified": "2024-03-28T14:15:14.557", - "vulnStatus": "Received", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29898.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29898.json index 3e60f82261c..8055c5977c0 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29898.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29898.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29898", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-28T14:15:14.783", - "lastModified": "2024-03-28T14:15:14.783", - "vulnStatus": "Received", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30583.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30583.json index b59c6702dfd..e66999d0e26 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30583.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30583.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30583", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T14:15:14.997", - "lastModified": "2024-03-28T14:15:14.997", - "vulnStatus": "Received", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30584.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30584.json index 1c6d8ad6603..84398631720 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30584.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30584.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30584", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T14:15:15.047", - "lastModified": "2024-03-28T14:15:15.047", - "vulnStatus": "Received", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30585.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30585.json index b676c6b422c..b0cae875c37 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30585.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30585.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30585", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T14:15:15.090", - "lastModified": "2024-03-28T14:15:15.090", - "vulnStatus": "Received", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30586.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30586.json index f0d7337d6f1..25a3af83ff5 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30586.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30586.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30586", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T14:15:15.137", - "lastModified": "2024-03-28T14:15:15.137", - "vulnStatus": "Received", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30587.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30587.json index 76f8bf56333..40b4091d6fc 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30587.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30587.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30587", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T14:15:15.183", - "lastModified": "2024-03-28T14:15:15.183", - "vulnStatus": "Received", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30588.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30588.json index 81a6ba10d5f..16c324942f5 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30588.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30588.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30588", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T14:15:15.233", - "lastModified": "2024-03-28T14:15:15.233", - "vulnStatus": "Received", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30589.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30589.json index a6c4c118447..966e9c6de82 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30589.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30589.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30589", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T14:15:15.293", - "lastModified": "2024-03-28T14:15:15.293", - "vulnStatus": "Received", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30590.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30590.json index 32b699ea043..f4fc4868751 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30590.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30590.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30590", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T14:15:15.347", - "lastModified": "2024-03-28T14:15:15.347", - "vulnStatus": "Received", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30591.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30591.json index fd50836df58..c649a8180dd 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30591.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30591.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30591", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T14:15:15.390", - "lastModified": "2024-03-28T14:15:15.390", - "vulnStatus": "Received", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30592.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30592.json index da500896ed8..d6b1c8de410 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30592.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30592.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30592", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T14:15:15.437", - "lastModified": "2024-03-28T14:15:15.437", - "vulnStatus": "Received", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30593.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30593.json index 98adc34356f..ef08ec31f37 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30593.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30593.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30593", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T13:15:47.950", - "lastModified": "2024-03-28T13:15:47.950", - "vulnStatus": "Received", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30594.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30594.json index 444cef6faf6..711f9f63573 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30594.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30594.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30594", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T13:15:48.007", - "lastModified": "2024-03-28T13:15:48.007", - "vulnStatus": "Received", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30596.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30596.json index 5484ec3db29..67b53a6b4a5 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30596.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30596.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30596", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T13:15:48.063", - "lastModified": "2024-03-28T13:15:48.063", - "vulnStatus": "Received", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30597.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30597.json new file mode 100644 index 00000000000..a89adb27dac --- /dev/null +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30597.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-30597", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-28T15:15:46.407", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1203 v2.0.1.6 firmware has a stack overflow vulnerability in the security parameter of the formWifiBasicSet function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formWifiBasicSet_security.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30598.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30598.json new file mode 100644 index 00000000000..b948d24f36a --- /dev/null +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30598.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-30598", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-28T15:15:46.467", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1203 v2.0.1.6 firmware has a stack overflow vulnerability in the security_5g parameter of the formWifiBasicSet function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formWifiBasicSet_security_5g.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30599.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30599.json new file mode 100644 index 00000000000..76bcaca09cf --- /dev/null +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30599.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-30599", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-28T15:15:46.527", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the deviceMac parameter of the addWifiMacFilter function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/addWifiMacFilter_deviceMac.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30600.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30600.json new file mode 100644 index 00000000000..a8ae90a6237 --- /dev/null +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30600.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-30600", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-28T15:15:46.603", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the schedEndTime parameter of the setSchedWifi function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/setSchedWifi_end.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30601.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30601.json new file mode 100644 index 00000000000..ef4b28f54c3 --- /dev/null +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30601.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-30601", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-28T15:15:46.660", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the time parameter of the saveParentControlInfo function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/saveParentControlInfo_time.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30602.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30602.json new file mode 100644 index 00000000000..73ae4320589 --- /dev/null +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30602.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-30602", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-28T15:15:46.723", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the schedStartTime parameter of the setSchedWifi function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/setSchedWifi_start.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30603.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30603.json new file mode 100644 index 00000000000..21d29a1a2e8 --- /dev/null +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30603.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-30603", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-28T15:15:46.787", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the urls parameter of the saveParentControlInfo function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/saveParentControlInfo_urls.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30604.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30604.json new file mode 100644 index 00000000000..5659e6f7211 --- /dev/null +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30604.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-30604", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-28T15:15:46.850", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the list1 parameter of the fromDhcpListClient function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromDhcpListClient_list1.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30606.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30606.json index d0e5fede842..5a00fd8f1af 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30606.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30606.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30606", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T14:15:15.480", - "lastModified": "2024-03-28T14:15:15.480", - "vulnStatus": "Received", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30607.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30607.json index 99667e8fd95..f9419a4d8fe 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30607.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30607.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30607", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T14:15:15.530", - "lastModified": "2024-03-28T14:15:15.530", - "vulnStatus": "Received", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30612.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30612.json new file mode 100644 index 00000000000..9e268b50e36 --- /dev/null +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30612.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-30612", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-28T15:15:46.907", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Tenda AC10U v15.03.06.48 has a stack overflow vulnerability in the deviceId, limitSpeed, limitSpeedUp parameter from formSetClientState function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetClientState.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3039.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3039.json new file mode 100644 index 00000000000..160c5e41667 --- /dev/null +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3039.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-3039", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-28T15:15:48.473", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in Shanghai Brad Technology BladeX 3.4.0. Affected is an unknown function of the file /api/blade-user/export-user of the component API. The manipulation with the input updatexml(1,concat(0x3f,md5(123456),0x3f),1)=1 leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-258426 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://spoofer.cn/bladex_sqli/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.258426", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.258426", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.301469", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3040.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3040.json new file mode 100644 index 00000000000..72541f26870 --- /dev/null +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3040.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-3040", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-28T15:15:48.773", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in Netentsec NS-ASG Application Security Gateway 6.3. This affects an unknown part of the file /admin/list_crl_conf. The manipulation of the argument CRLId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258429 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-list_crl_conf.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.258429", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.258429", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.302340", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3041.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3041.json new file mode 100644 index 00000000000..10dc2c05d1f --- /dev/null +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3041.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-3041", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-28T15:15:49.027", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in Netentsec NS-ASG Application Security Gateway 6.3 and classified as critical. This vulnerability affects unknown code of the file /protocol/log/listloginfo.php. The manipulation leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-258430 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-listloginfo.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.258430", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.258430", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.302342", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3042.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3042.json new file mode 100644 index 00000000000..f67a67097b9 --- /dev/null +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3042.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-3042", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-28T15:15:49.287", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Simple Subscription Website 1.0 and classified as critical. This issue affects some unknown processing of the file manage_user.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258431." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/maxmvp666/planCve/blob/main/Simple%20Subscription%20Website%20with%20Admin%20System%20manage_user.php%20has%20Sqlinjection.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.258431", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.258431", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.306119", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-311xx/CVE-2024-31134.json b/CVE-2024/CVE-2024-311xx/CVE-2024-31134.json new file mode 100644 index 00000000000..a9a3b350be3 --- /dev/null +++ b/CVE-2024/CVE-2024-311xx/CVE-2024-31134.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-31134", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2024-03-28T15:15:46.973", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2024.03 authenticated users without administrative permissions could register other users when self-registration was disabled" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-311xx/CVE-2024-31135.json b/CVE-2024/CVE-2024-311xx/CVE-2024-31135.json new file mode 100644 index 00000000000..a6d6ab69969 --- /dev/null +++ b/CVE-2024/CVE-2024-311xx/CVE-2024-31135.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-31135", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2024-03-28T15:15:47.200", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2024.03 open redirect was possible on the login page" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-311xx/CVE-2024-31136.json b/CVE-2024/CVE-2024-311xx/CVE-2024-31136.json new file mode 100644 index 00000000000..0b8cef5c81a --- /dev/null +++ b/CVE-2024/CVE-2024-311xx/CVE-2024-31136.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-31136", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2024-03-28T15:15:47.413", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2024.03 2FA could be bypassed by providing a special URL parameter" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1288" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-311xx/CVE-2024-31137.json b/CVE-2024/CVE-2024-311xx/CVE-2024-31137.json new file mode 100644 index 00000000000..1e122aa350d --- /dev/null +++ b/CVE-2024/CVE-2024-311xx/CVE-2024-31137.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-31137", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2024-03-28T15:15:47.640", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2024.03 reflected XSS was possible via Space connection configuration" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-311xx/CVE-2024-31138.json b/CVE-2024/CVE-2024-311xx/CVE-2024-31138.json new file mode 100644 index 00000000000..bc0246c0836 --- /dev/null +++ b/CVE-2024/CVE-2024-311xx/CVE-2024-31138.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-31138", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2024-03-28T15:15:47.853", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2024.03 xSS was possible via Agent Distribution settings" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-311xx/CVE-2024-31139.json b/CVE-2024/CVE-2024-311xx/CVE-2024-31139.json new file mode 100644 index 00000000000..03253ddb3a9 --- /dev/null +++ b/CVE-2024/CVE-2024-311xx/CVE-2024-31139.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-31139", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2024-03-28T15:15:48.060", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2024.03 xXE was possible in the Maven build steps detector" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-311xx/CVE-2024-31140.json b/CVE-2024/CVE-2024-311xx/CVE-2024-31140.json new file mode 100644 index 00000000000..397121b9726 --- /dev/null +++ b/CVE-2024/CVE-2024-311xx/CVE-2024-31140.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-31140", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2024-03-28T15:15:48.273", + "lastModified": "2024-03-28T16:07:30.893", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2024.03 server administrators could remove arbitrary files from the server by installing tools" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1288" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index b16141845f8..e0e82e4bfdf 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-03-28T15:00:38.745608+00:00 +2024-03-28T17:00:37.993611+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-03-28T14:15:15.530000+00:00 +2024-03-28T16:15:08.480000+00:00 ``` ### Last Data Feed Release @@ -33,45 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -243192 +243229 ``` ### CVEs added in the last Commit -Recently added CVEs: `23` +Recently added CVEs: `37` -- [CVE-2023-6437](CVE-2023/CVE-2023-64xx/CVE-2023-6437.json) (`2024-03-28T14:15:13.600`) -- [CVE-2024-27775](CVE-2024/CVE-2024-277xx/CVE-2024-27775.json) (`2024-03-28T13:15:47.340`) -- [CVE-2024-28109](CVE-2024/CVE-2024-281xx/CVE-2024-28109.json) (`2024-03-28T14:15:13.863`) -- [CVE-2024-29200](CVE-2024/CVE-2024-292xx/CVE-2024-29200.json) (`2024-03-28T14:15:14.100`) -- [CVE-2024-29882](CVE-2024/CVE-2024-298xx/CVE-2024-29882.json) (`2024-03-28T14:15:14.337`) -- [CVE-2024-29896](CVE-2024/CVE-2024-298xx/CVE-2024-29896.json) (`2024-03-28T13:15:47.717`) -- [CVE-2024-29897](CVE-2024/CVE-2024-298xx/CVE-2024-29897.json) (`2024-03-28T14:15:14.557`) -- [CVE-2024-29898](CVE-2024/CVE-2024-298xx/CVE-2024-29898.json) (`2024-03-28T14:15:14.783`) -- [CVE-2024-30583](CVE-2024/CVE-2024-305xx/CVE-2024-30583.json) (`2024-03-28T14:15:14.997`) -- [CVE-2024-30584](CVE-2024/CVE-2024-305xx/CVE-2024-30584.json) (`2024-03-28T14:15:15.047`) -- [CVE-2024-30585](CVE-2024/CVE-2024-305xx/CVE-2024-30585.json) (`2024-03-28T14:15:15.090`) -- [CVE-2024-30586](CVE-2024/CVE-2024-305xx/CVE-2024-30586.json) (`2024-03-28T14:15:15.137`) -- [CVE-2024-30587](CVE-2024/CVE-2024-305xx/CVE-2024-30587.json) (`2024-03-28T14:15:15.183`) -- [CVE-2024-30588](CVE-2024/CVE-2024-305xx/CVE-2024-30588.json) (`2024-03-28T14:15:15.233`) -- [CVE-2024-30589](CVE-2024/CVE-2024-305xx/CVE-2024-30589.json) (`2024-03-28T14:15:15.293`) -- [CVE-2024-30590](CVE-2024/CVE-2024-305xx/CVE-2024-30590.json) (`2024-03-28T14:15:15.347`) -- [CVE-2024-30591](CVE-2024/CVE-2024-305xx/CVE-2024-30591.json) (`2024-03-28T14:15:15.390`) -- [CVE-2024-30592](CVE-2024/CVE-2024-305xx/CVE-2024-30592.json) (`2024-03-28T14:15:15.437`) -- [CVE-2024-30593](CVE-2024/CVE-2024-305xx/CVE-2024-30593.json) (`2024-03-28T13:15:47.950`) -- [CVE-2024-30594](CVE-2024/CVE-2024-305xx/CVE-2024-30594.json) (`2024-03-28T13:15:48.007`) -- [CVE-2024-30596](CVE-2024/CVE-2024-305xx/CVE-2024-30596.json) (`2024-03-28T13:15:48.063`) -- [CVE-2024-30606](CVE-2024/CVE-2024-306xx/CVE-2024-30606.json) (`2024-03-28T14:15:15.480`) -- [CVE-2024-30607](CVE-2024/CVE-2024-306xx/CVE-2024-30607.json) (`2024-03-28T14:15:15.530`) +- [CVE-2023-42974](CVE-2023/CVE-2023-429xx/CVE-2023-42974.json) (`2024-03-28T16:15:08.480`) +- [CVE-2023-45705](CVE-2023/CVE-2023-457xx/CVE-2023-45705.json) (`2024-03-28T15:15:45.590`) +- [CVE-2023-45706](CVE-2023/CVE-2023-457xx/CVE-2023-45706.json) (`2024-03-28T15:15:45.797`) +- [CVE-2023-45715](CVE-2023/CVE-2023-457xx/CVE-2023-45715.json) (`2024-03-28T15:15:45.983`) +- [CVE-2024-0259](CVE-2024/CVE-2024-02xx/CVE-2024-0259.json) (`2024-03-28T15:15:46.180`) +- [CVE-2024-3039](CVE-2024/CVE-2024-30xx/CVE-2024-3039.json) (`2024-03-28T15:15:48.473`) +- [CVE-2024-3040](CVE-2024/CVE-2024-30xx/CVE-2024-3040.json) (`2024-03-28T15:15:48.773`) +- [CVE-2024-3041](CVE-2024/CVE-2024-30xx/CVE-2024-3041.json) (`2024-03-28T15:15:49.027`) +- [CVE-2024-3042](CVE-2024/CVE-2024-30xx/CVE-2024-3042.json) (`2024-03-28T15:15:49.287`) +- [CVE-2024-30597](CVE-2024/CVE-2024-305xx/CVE-2024-30597.json) (`2024-03-28T15:15:46.407`) +- [CVE-2024-30598](CVE-2024/CVE-2024-305xx/CVE-2024-30598.json) (`2024-03-28T15:15:46.467`) +- [CVE-2024-30599](CVE-2024/CVE-2024-305xx/CVE-2024-30599.json) (`2024-03-28T15:15:46.527`) +- [CVE-2024-30600](CVE-2024/CVE-2024-306xx/CVE-2024-30600.json) (`2024-03-28T15:15:46.603`) +- [CVE-2024-30601](CVE-2024/CVE-2024-306xx/CVE-2024-30601.json) (`2024-03-28T15:15:46.660`) +- [CVE-2024-30602](CVE-2024/CVE-2024-306xx/CVE-2024-30602.json) (`2024-03-28T15:15:46.723`) +- [CVE-2024-30603](CVE-2024/CVE-2024-306xx/CVE-2024-30603.json) (`2024-03-28T15:15:46.787`) +- [CVE-2024-30604](CVE-2024/CVE-2024-306xx/CVE-2024-30604.json) (`2024-03-28T15:15:46.850`) +- [CVE-2024-30612](CVE-2024/CVE-2024-306xx/CVE-2024-30612.json) (`2024-03-28T15:15:46.907`) +- [CVE-2024-31134](CVE-2024/CVE-2024-311xx/CVE-2024-31134.json) (`2024-03-28T15:15:46.973`) +- [CVE-2024-31135](CVE-2024/CVE-2024-311xx/CVE-2024-31135.json) (`2024-03-28T15:15:47.200`) +- [CVE-2024-31136](CVE-2024/CVE-2024-311xx/CVE-2024-31136.json) (`2024-03-28T15:15:47.413`) +- [CVE-2024-31137](CVE-2024/CVE-2024-311xx/CVE-2024-31137.json) (`2024-03-28T15:15:47.640`) +- [CVE-2024-31138](CVE-2024/CVE-2024-311xx/CVE-2024-31138.json) (`2024-03-28T15:15:47.853`) +- [CVE-2024-31139](CVE-2024/CVE-2024-311xx/CVE-2024-31139.json) (`2024-03-28T15:15:48.060`) +- [CVE-2024-31140](CVE-2024/CVE-2024-311xx/CVE-2024-31140.json) (`2024-03-28T15:15:48.273`) ### CVEs modified in the last Commit -Recently modified CVEs: `3` +Recently modified CVEs: `26` -- [CVE-2013-4558](CVE-2013/CVE-2013-45xx/CVE-2013-4558.json) (`2024-03-28T14:15:13.023`) -- [CVE-2023-47038](CVE-2023/CVE-2023-470xx/CVE-2023-47038.json) (`2024-03-28T14:15:13.310`) -- [CVE-2023-47039](CVE-2023/CVE-2023-470xx/CVE-2023-47039.json) (`2024-03-28T14:15:13.467`) +- [CVE-2023-29162](CVE-2023/CVE-2023-291xx/CVE-2023-29162.json) (`2024-03-28T16:15:07.657`) +- [CVE-2023-35121](CVE-2023/CVE-2023-351xx/CVE-2023-35121.json) (`2024-03-28T15:15:45.453`) +- [CVE-2023-6437](CVE-2023/CVE-2023-64xx/CVE-2023-6437.json) (`2024-03-28T16:07:30.893`) +- [CVE-2024-27775](CVE-2024/CVE-2024-277xx/CVE-2024-27775.json) (`2024-03-28T16:07:30.893`) +- [CVE-2024-28109](CVE-2024/CVE-2024-281xx/CVE-2024-28109.json) (`2024-03-28T16:07:30.893`) +- [CVE-2024-29200](CVE-2024/CVE-2024-292xx/CVE-2024-29200.json) (`2024-03-28T16:07:30.893`) +- [CVE-2024-29882](CVE-2024/CVE-2024-298xx/CVE-2024-29882.json) (`2024-03-28T16:07:30.893`) +- [CVE-2024-29896](CVE-2024/CVE-2024-298xx/CVE-2024-29896.json) (`2024-03-28T16:07:30.893`) +- [CVE-2024-29897](CVE-2024/CVE-2024-298xx/CVE-2024-29897.json) (`2024-03-28T16:07:30.893`) +- [CVE-2024-29898](CVE-2024/CVE-2024-298xx/CVE-2024-29898.json) (`2024-03-28T16:07:30.893`) +- [CVE-2024-30583](CVE-2024/CVE-2024-305xx/CVE-2024-30583.json) (`2024-03-28T16:07:30.893`) +- [CVE-2024-30584](CVE-2024/CVE-2024-305xx/CVE-2024-30584.json) (`2024-03-28T16:07:30.893`) +- [CVE-2024-30585](CVE-2024/CVE-2024-305xx/CVE-2024-30585.json) (`2024-03-28T16:07:30.893`) +- [CVE-2024-30586](CVE-2024/CVE-2024-305xx/CVE-2024-30586.json) (`2024-03-28T16:07:30.893`) +- [CVE-2024-30587](CVE-2024/CVE-2024-305xx/CVE-2024-30587.json) (`2024-03-28T16:07:30.893`) +- [CVE-2024-30588](CVE-2024/CVE-2024-305xx/CVE-2024-30588.json) (`2024-03-28T16:07:30.893`) +- [CVE-2024-30589](CVE-2024/CVE-2024-305xx/CVE-2024-30589.json) (`2024-03-28T16:07:30.893`) +- [CVE-2024-30590](CVE-2024/CVE-2024-305xx/CVE-2024-30590.json) (`2024-03-28T16:07:30.893`) +- [CVE-2024-30591](CVE-2024/CVE-2024-305xx/CVE-2024-30591.json) (`2024-03-28T16:07:30.893`) +- [CVE-2024-30592](CVE-2024/CVE-2024-305xx/CVE-2024-30592.json) (`2024-03-28T16:07:30.893`) +- [CVE-2024-30593](CVE-2024/CVE-2024-305xx/CVE-2024-30593.json) (`2024-03-28T16:07:30.893`) +- [CVE-2024-30594](CVE-2024/CVE-2024-305xx/CVE-2024-30594.json) (`2024-03-28T16:07:30.893`) +- [CVE-2024-30596](CVE-2024/CVE-2024-305xx/CVE-2024-30596.json) (`2024-03-28T16:07:30.893`) +- [CVE-2024-30606](CVE-2024/CVE-2024-306xx/CVE-2024-30606.json) (`2024-03-28T16:07:30.893`) +- [CVE-2024-30607](CVE-2024/CVE-2024-306xx/CVE-2024-30607.json) (`2024-03-28T16:07:30.893`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 7b98c40c38a..b663d170c8c 100644 --- a/_state.csv +++ b/_state.csv @@ -61932,7 +61932,7 @@ CVE-2013-4554,0,0,bbab516aa5e7a550eebfd7ce02c1c282b2d508192c05dd9298cba536b50101 CVE-2013-4555,0,0,668aef73396036110ec0cef3914cbf29adbbc51c39d71f48854d17e4fe86fb55,2016-12-08T03:03:38.963000 CVE-2013-4556,0,0,204723cb215c9dd4b7db2601ac690a4bd5c30deda407608d977ffdab4ed3330b,2016-12-08T03:03:40.027000 CVE-2013-4557,0,0,bb721ddbe3c4d440ffa76214cdc869398625ad0eac7d7ed666f3d9f00f31e702,2016-12-08T03:03:41.353000 -CVE-2013-4558,0,1,10860f542629e29c0dbabd986f5e7bab016977e3d75f0b1042f30be9d7cc2f0d,2024-03-28T14:15:13.023000 +CVE-2013-4558,0,0,10860f542629e29c0dbabd986f5e7bab016977e3d75f0b1042f30be9d7cc2f0d,2024-03-28T14:15:13.023000 CVE-2013-4559,0,0,0d6d5c0b62d1252c9734ea49ce47a69e5c683a969324320af84ba514ed6c2706,2021-02-26T15:14:05.913000 CVE-2013-4560,0,0,d5cd2715ab5c4be24d372c66de2dbdf979f6ea6ec3dd2deffd5de26bddb2ba56,2021-03-04T20:12:22.093000 CVE-2013-4561,0,0,57716a9acbe975f52927d1a6e812b2d9d559f7b335849fabbfcb59bff1d4eca1,2022-07-11T17:41:59.077000 @@ -126441,7 +126441,7 @@ CVE-2018-8817,0,0,297fddc21d6fa42179bd71e88af4eb44611960639cc3a1de055acd8a7e4b25 CVE-2018-8819,0,0,2971a9bdccb45a4daba3cc05bab4cbfd0f807867779e3d7861b87d5b3f9f550f,2021-07-27T19:25:54.587000 CVE-2018-8820,0,0,5dd8123958ee4479b9544a2695ce0f8ba28aa3f69a29744255a0f532b698677d,2018-04-23T13:03:57.053000 CVE-2018-8821,0,0,22b7847ce7def24a65c494acb9698397f36b421e4cc30204fafdb32b330cba56,2018-10-17T17:12:14.487000 -CVE-2018-8822,0,0,fc642e1948a2a71a821a15d37b1bd222567263828408b9ccc5be4e0a2d11a3dc,2023-11-07T03:01:30.420000 +CVE-2018-8822,0,1,f0701efffeb3d8341ee93c6a6343411ae5a032a7876def5e5e59efb2587a39d6,2024-03-28T16:08:31.410000 CVE-2018-8823,0,0,cade7e0ab27d18823afc3990f16da976b81081ab95be44c6e4ece0702b9f6564,2018-04-24T12:54:53.840000 CVE-2018-8824,0,0,d2db6a4430a7c7b1a757abc3efb8d8f9e71a49a81699250898b36ee056b554b1,2018-06-13T12:50:31.863000 CVE-2018-8825,0,0,e6ed0fa8ba30fc40fa56ed6a5a8bcd704e7670201148920f2d13a614bc6e4431,2019-04-25T15:05:08.410000 @@ -220854,7 +220854,7 @@ CVE-2023-29159,0,0,3530aeb323cc6b274b9fbf00886d84d85a8664196228c99c668412dcb4da2 CVE-2023-2916,0,0,91bb6a6a4feffa7671e9beb6a5a4b79a5e6aab4e671c0677a43f134a14592d7f,2023-11-07T04:13:32.660000 CVE-2023-29160,0,0,8d762a8bda12c63159a8f102e32920c3dafc59836188f2c0c0f98c6370c1f22d,2023-06-21T18:57:51.187000 CVE-2023-29161,0,0,c62935c727903372e1dcc762cd9261a190231ebb89c3972da743594de4efbb59,2023-11-21T01:59:16.600000 -CVE-2023-29162,0,0,f57f1fed8154893ee9acd062fd888003ccc81d4f771e20708cc6863971320eae,2024-02-14T15:01:51.137000 +CVE-2023-29162,0,1,743ca69a30b7a19aa26a5ded83f1c2fb350d5181b45d75f048e7be4d2d452c68,2024-03-28T16:15:07.657000 CVE-2023-29163,0,0,3d6ed3c9ec134bb0e0a6fa27ad6822836d432cefde306db8b29cc039802a0f95,2023-05-10T18:47:29.897000 CVE-2023-29165,0,0,54258be05c2c70612fce26e841441395eba8358d9896577407b4743b56c7dd47,2023-11-30T02:19:41.003000 CVE-2023-29166,0,0,e0cf60a56c61b0baa05989268e1074ef73353fbe443e5381d6d2a68e7c6e8901,2023-09-08T15:44:32.397000 @@ -225064,7 +225064,7 @@ CVE-2023-35110,0,0,6c46b92039a347d6b65042ab739d78be945b3320df2f8079905d3703dca6a CVE-2023-35116,0,0,f76c81cc5cb5e3c4a74e52501480ae0572c4d7b01e66ada562d4030823c55fd3,2024-03-21T02:47:55.440000 CVE-2023-3512,0,0,46069bca6a2a9235e9558d2eb33faec2498fe8f2dff26081a19acf558edc1def,2023-10-05T17:04:39.053000 CVE-2023-35120,0,0,b5ead04261c0831b10c7100bbfb912d1f4ffac784f89b136f0369f049a9d5485,2023-07-13T22:50:44.740000 -CVE-2023-35121,0,0,55dd92f416ad91d5e95cf6179c593af4578bf74794def53546aaf74f70f047ea,2024-02-14T15:01:46.050000 +CVE-2023-35121,0,1,658412d32bae0f13ceea6a575a15ba5fb0e139437d99f76b128fe1745a942dd1,2024-03-28T15:15:45.453000 CVE-2023-35124,0,0,9073e57a452fb41225dae20c634f4517700dcc89e0ef010a593ba5e1961f8505,2023-09-08T17:28:28.417000 CVE-2023-35126,0,0,97f0154eb5275146dbfc2ffbbae614c0d14ef1944447f84a1e8624649a99eb12,2023-10-25T14:48:30.890000 CVE-2023-35127,0,0,4e70fc11d19f5b80d804e1144229095caa26940cbb99aa03fa172591d7878ea1,2023-11-30T17:24:26.147000 @@ -228721,6 +228721,7 @@ CVE-2023-40385,0,0,d87186e65fbe11c963d9f2ac49a37bea6de8f4a87feb525e072522d577fee CVE-2023-40386,0,0,98b5b9164e51a67fec2b119151c92fd2d9bb1d8d51de82443b681e79ce2c9a34,2023-10-12T01:59:56.563000 CVE-2023-40388,0,0,0669c38434b1494ed261fd2860ebba321deabd42233fd11611759d0565888e20,2023-10-12T01:59:05.793000 CVE-2023-4039,0,0,0accd3adc8756cc7a927b7c908e91237d32e08c68f471a1067012290c829eea2,2024-02-19T23:15:07.680000 +CVE-2023-40390,1,1,e18c91ac234234bac8ee50fda94885373a01c59b413ad7540ec6153df61ac1ff,2024-03-28T16:15:07.773000 CVE-2023-40391,0,0,674710606efc5e20f3b4d034fd6151d2f994f0410f8a773be4faafb0e10f357d,2023-11-07T04:20:12.943000 CVE-2023-40392,0,0,84bd7104c6189c2c6e9b4ab3e6ad9d972f95c392c1e5bd1a44d7d7f201861784,2023-12-22T15:18:01.370000 CVE-2023-40393,0,0,4bc719fe5b2c101665c569bf2c331dc4a53294b75d2f5d545fba8e39b8e680a7,2024-01-17T18:30:39.897000 @@ -230346,7 +230347,10 @@ CVE-2023-42889,0,0,42361d7a844de9570556985cb5c26fe399cae2c49e9ac17e150405bc9bd14 CVE-2023-4289,0,0,f449244f705f291b0d7ddbc329d46d68ae72f3f405646fb1709b45473269b907,2023-11-07T04:22:25.410000 CVE-2023-42890,0,0,eacabcc2a4af39632e6d4228761680fb329094370499894080f37a6035d56207,2024-02-02T03:11:18.417000 CVE-2023-42891,0,0,7846fe25f210e0b0608521c50c1b1f15957f2513ef89a3c83e589c7bed8db2b2,2023-12-13T17:46:10.560000 +CVE-2023-42892,1,1,b7c4592fa05996f6346f24cbe4a9ca6f36a1f628133e1c4ae7e546ab9f1a758d,2024-03-28T16:15:07.843000 +CVE-2023-42893,1,1,94280ad2f20deddf83a75f34e124496389675f68f69eafa676a6dcab0d88c83a,2024-03-28T16:15:07.903000 CVE-2023-42894,0,0,675f93d1b0d4296c714bb851c1c8cebe1d109e20fbe5c2802462dd05c7607dcc,2024-02-02T03:11:25.083000 +CVE-2023-42896,1,1,23f534f3866e78796cc0880285efe3bbd83f40fc182d7ca46bb35d6115ba298e,2024-03-28T16:15:07.970000 CVE-2023-42897,0,0,b9f50f6e7bf2b37ee8bcc879a04d31e42b1e46ab101c921014af1dae5762efc0,2023-12-13T20:57:23.147000 CVE-2023-42898,0,0,dcd63d2da25631e7b1de0a508c17683086fe149cd68524397b9248e14b5c0a13,2023-12-13T23:15:29.030000 CVE-2023-42899,0,0,a3799d4a021bbd53e7e95b764e09f7a56ae66d67b39322f34aee128999f61553,2023-12-14T14:07:42.957000 @@ -230365,6 +230369,7 @@ CVE-2023-4291,0,0,820c0ef5909fcefa01c2a721d589920b63994852e7a069d42cd163e7b56171 CVE-2023-42910,0,0,71a54e7b7fb5706098fa51027de526083f12c7f45c9c197df68e4ac606502e93,2023-12-13T19:14:00.170000 CVE-2023-42911,0,0,867b92b373d754d783128b4f56f24fc6b647c44603b483046d9505c18745d73b,2023-12-13T19:12:48.780000 CVE-2023-42912,0,0,c098e394dc0a67e07f9df04c549c33226f6d9ce3b3c9000a8422b2e740c1e1ce,2023-12-13T19:20:21.287000 +CVE-2023-42913,1,1,1705d34bff4d62f3aa81940b5bd1a2136fc486b2d04239bab25876cdc8426435,2024-03-28T16:15:08.023000 CVE-2023-42914,0,0,d136deea7639edb129a4f43389dd9bd60f947fe20e61b8abbaafea8d30a38f33,2023-12-14T14:54:10.347000 CVE-2023-42915,0,0,1be85ce6fa0cfc0bf8e379977bec0d27fb6c9ccbc4c64c6fe4121e3a8a02c76e,2024-02-14T03:15:13.210000 CVE-2023-42916,0,0,1069f61a27a7fa77970bbb0175ce8643cfc992d30189fcf5adedb4c6bed028c3,2024-01-26T17:15:10.007000 @@ -230380,10 +230385,13 @@ CVE-2023-42927,0,0,c9a9ed650bc0549f85d7705bd9d3466edcaeed91950814aa06162a7b15f57 CVE-2023-42928,0,0,4d575fc7bee0ddbdac6cb470d5d7d4a1a9c0adf90a31f047e6f305ee0485dd5a,2024-02-22T19:07:27.197000 CVE-2023-42929,0,0,eb3f00ec709ba2f7760fb72343fbc272118a213ac02cb710d8fda7bd7caee235,2024-01-12T14:42:35.277000 CVE-2023-4293,0,0,1d2ed52d59da409192b197524a27c7d014bb0b1abf5d88d5a31553547b2ae6e6,2023-11-07T04:22:25.750000 +CVE-2023-42930,1,1,f9f47861462e626db83bf0dffe814333448c9b9460975b2f5e2c448052191c4f,2024-03-28T16:15:08.090000 +CVE-2023-42931,1,1,ff51729569e9de3d56d9f0e3498681bfc941dbb93638a83bacabe47683289553,2024-03-28T16:15:08.153000 CVE-2023-42932,0,0,d72ebc99606ff88b5196fb92ba085a234d9bb36deaf43aae627023bac3f8f5fa,2023-12-13T21:15:31.733000 CVE-2023-42933,0,0,4515d35610e674bb40f9ac6898c27078c01d4ce90705902554e59c696decfa5a,2024-01-12T14:42:31.583000 CVE-2023-42934,0,0,9bbd832bbd99920d5b4e7783d7815e5b4e4bfb6335bc1932425966a175c8c3cb,2024-01-16T23:52:48.783000 CVE-2023-42935,0,0,606ee85ca40462fb734cd978403d80127f0d12edae5212a236ef5fd51294018c,2024-01-29T18:38:29.587000 +CVE-2023-42936,1,1,1db32558db6660253e6ae3ca3ea32ceddfd608c7422ab9151211e015e4f21ab5,2024-03-28T16:15:08.200000 CVE-2023-42937,0,0,c2539e1b6a362c132317285010348324c513a5269588c97c8989267a27c3c96b,2024-01-29T18:33:19.387000 CVE-2023-42938,0,0,462788774e20545d65b9d3f478cd23a7f498f5f04c53cff4fca3aa9542319994,2024-03-14T20:15:07.040000 CVE-2023-42939,0,0,4b0304a240b255af54a2d16f83934322490b0bc4310fde824596ed206eb1503c,2024-02-22T19:07:27.197000 @@ -230393,13 +230401,18 @@ CVE-2023-42941,0,0,be8c2f55cce80031919c17cdf6118cd30bd6c8016a8d2c844474b450e95b7 CVE-2023-42942,0,0,07ba94131ee2af175813b684a3418fba2b1cb10f8bf4794024c3c777fccf87a6,2024-02-22T19:07:27.197000 CVE-2023-42945,0,0,8965ecb696fbb6d1dfc191b5b241cb2dbad9c4594ab7548615100be2688c334d,2024-02-22T19:07:27.197000 CVE-2023-42946,0,0,6e687d6a54184ed98b48ec9994a691a9f653d38c2a6ab147b69be8a3c35af011,2024-02-22T19:07:27.197000 +CVE-2023-42947,1,1,c4bcb78a9a73b67b24adaec721354e27621da16c3a123357503f8aabdc0ada9c,2024-03-28T16:15:08.250000 CVE-2023-4295,0,0,ec56fb9406b5889c47288aaf0ca0b50df9da68e8409e0f183bd2d96adf912d6b,2023-12-28T17:14:36.030000 +CVE-2023-42950,1,1,c248f2a713c5108c4c2c084d01bbd8549106842819209c597ee099da10ffc9b4,2024-03-28T16:15:08.313000 CVE-2023-42951,0,0,f47d9d53b96327a99c3cf9d9b6178395ac7e4f6ffb9fc1067e40ded2ecc60fdb,2024-02-22T19:07:27.197000 CVE-2023-42952,0,0,f7dadd56b6a68a714e4e042690efb1e01d718cc903255fad9804058d56088666,2024-02-22T19:07:27.197000 CVE-2023-42953,0,0,0ea855ba33bbd4297f25ae9925400ebda739241895a723a394f07f9bd3e18595,2024-02-22T19:07:27.197000 CVE-2023-42954,0,0,4ff84847c56efbc3f637425a9807eb7b381f4c2cedb6bf16f12c3ca640d4fba3,2024-03-22T12:45:36.130000 +CVE-2023-42956,1,1,1338ed64550ccd6adb9923c68f78faf628c18bb60ee8d87e550a1d7e2b2df241,2024-03-28T16:15:08.377000 CVE-2023-4296,0,0,d2ae4b9dc4bd1f62bf026bddbb5b57fabef675b1476686b487fb198d6eb084a6,2023-11-07T04:22:26.050000 +CVE-2023-42962,1,1,d388850f0f3319f89ab7f64ff1ff9565fa311d37446e8f374d7ad0cf5b34da0e,2024-03-28T16:15:08.430000 CVE-2023-4297,0,0,2c1c4e8e16b8093dbd67367ad04a33c7dee7987a75a3f105a73f15afb0fc121e,2023-11-30T05:15:24.520000 +CVE-2023-42974,1,1,8393c0a703ee2b0e33897e1921a49df59619119d54de7c41b02f17deeb2ee478,2024-03-28T16:15:08.480000 CVE-2023-4298,0,0,8d44cb3045014d8716e0dbcd1489dfd2b845690c0f9918da8a0ecf5aeaadb4f7,2023-11-07T04:22:26.147000 CVE-2023-4299,0,0,d299dee9e9e09a75920752d626eddd98b20a641756e2cb4231c35d64b6040ce2,2023-09-06T20:13:32.917000 CVE-2023-4300,0,0,f62dc368b46b9404d8645d11cb5b2bfc1bd54a409b445b1d76533aa142e1aefa,2023-11-07T04:22:26.350000 @@ -231954,7 +231967,10 @@ CVE-2023-45700,0,0,52e392d90576964820ffa552cbf503545fe1df48543ea52f5f404cef046e1 CVE-2023-45701,0,0,4c15012e1d51ec39f5feb89c87578a81573faeafac8042c349d979cdd1101145,2024-01-04T20:25:30.933000 CVE-2023-45702,0,0,82ce4409940218ec08fecc4ed05a8e24983c4d04841dd1b013b28319a780c3b0,2024-01-04T20:14:34.343000 CVE-2023-45703,0,0,dea19aa7d6a8a6afd2ee4037f85223b782d0f4c3a590d34c9d227990e4e23cff,2024-01-02T16:18:39.287000 +CVE-2023-45705,1,1,d23d43767e7189e1ef994a1336b8af2f70207dbd8fb0b88c4292061566472e43,2024-03-28T16:07:30.893000 +CVE-2023-45706,1,1,0af7bc7c8de7e9189f51b43b9ec4a80f653024128db7b6b665bdbde7eafed6fd,2024-03-28T16:07:30.893000 CVE-2023-4571,0,0,4543f43b5b806b7ab0b407fab2a9976430e8638413c248a7ed786869bace6996,2024-02-16T15:56:59.350000 +CVE-2023-45715,1,1,50b8f6532a40dad28413df591023a26e3e5b087932dba29d48cc5a1c57b86496,2024-03-28T16:07:30.893000 CVE-2023-45716,0,0,0a00a1625e10fd10c315dd94d684f341e834c086570f2f1b11bcfdbaa4c3a720,2024-02-26T21:22:54.537000 CVE-2023-45718,0,0,71dc0819c79bc4f634af5fc4a33e73e03a4350f0ee57c5cc8392683d3aee2df0,2024-02-11T22:29:15.837000 CVE-2023-4572,0,0,1f54579490b8fcc0cce08f781af19b969e5114ab6ccc87ec2998be324173b104,2024-01-31T17:15:16.437000 @@ -232891,8 +232907,8 @@ CVE-2023-47033,0,0,9f64afaaad6656e35f51a7e5c20ba55e9da6ae915e60dc5ef4045963b8f11 CVE-2023-47034,0,0,5e669df5a7ad32eb8b097886efddff48819f84fb4b955cc5aca9e920a6102637,2024-01-30T16:48:28.163000 CVE-2023-47035,0,0,770b2e98d600ebf26f2028e8928b35898574cd25900dfff88aadc984966168b6,2024-01-30T14:46:19.023000 CVE-2023-47037,0,0,41a8074073da30fee421b63710b020a304c67d01acb6cb001f13ad89df88a01d,2023-11-20T19:31:24.707000 -CVE-2023-47038,0,1,c7b4366edd0f1d49522736dc3630add75bced8a997cc470d2143d96df0856b14,2024-03-28T14:15:13.310000 -CVE-2023-47039,0,1,437d789d3a627731735caace9623309c9997b0d4bbe85d9712e8d1e5008fe7f0,2024-03-28T14:15:13.467000 +CVE-2023-47038,0,0,c7b4366edd0f1d49522736dc3630add75bced8a997cc470d2143d96df0856b14,2024-03-28T14:15:13.310000 +CVE-2023-47039,0,0,437d789d3a627731735caace9623309c9997b0d4bbe85d9712e8d1e5008fe7f0,2024-03-28T14:15:13.467000 CVE-2023-4704,0,0,77ebf42b59920524121a8b02a25671c48b0f1350a3a8f8e2939f2392f9e7437a,2023-09-07T17:36:22.737000 CVE-2023-47040,0,0,6322864e829babbb65f45703f53197ba4d7f038dfd8500f6b071b64d87a2c81c,2023-11-22T15:19:16.977000 CVE-2023-47041,0,0,0d98c37438ebfb3a525e52b4e9abb4b52abb56b45e2fe2da422b09a566f0e9a4,2023-11-22T15:19:08.407000 @@ -237299,7 +237315,7 @@ CVE-2023-6433,0,0,0242e6d4de0a12c4774282886b58eedeb17d73e3db75f77593dc21ff1bd0a1 CVE-2023-6434,0,0,9f35d2af1c67b934d28d1bc4b998a61a5a5be9bedef49a9a9e04db7f4c260358,2023-12-02T04:37:56.790000 CVE-2023-6435,0,0,4505ba10fcc8aa6b8ff0c0716deec9c72a837bf913de36c614dc0992acd9599a,2023-12-02T04:37:54.727000 CVE-2023-6436,0,0,75eb96dbffde560c8577d4e38af8f94e4d2ad1618e885a11eba0c0c2420c59cc,2024-01-08T19:40:27.743000 -CVE-2023-6437,1,1,68604463d26259635a3027bab30da732c4fec13b193e58a7eb4d5a25d03f395e,2024-03-28T14:15:13.600000 +CVE-2023-6437,0,1,fc7b7ef120c1cd74068344e1742d8125095e6e5378c129cf5ee180a60aac63f8,2024-03-28T16:07:30.893000 CVE-2023-6438,0,0,6e298808843bf5b7095c9c9c0ac99fa07dda226b820b821799b1942a288243fe,2024-03-21T02:50:36.630000 CVE-2023-6439,0,0,34fec7b01443ba1f65bae9722432800576490571288914b58a6027dfc6998c41,2024-03-21T02:50:36.733000 CVE-2023-6440,0,0,41f9bd837c0c4f9bfac9f0eda9f132ad965a1f73e00124290fda773307f7f5b0,2024-03-21T02:50:36.823000 @@ -238060,6 +238076,7 @@ CVE-2024-0254,0,0,e5eae8b11bfbdda0720ecba88e72e29efdd7b42117ba1a4582cfd62b02acbd CVE-2024-0255,0,0,541867be2e415931a41832092b931a9f6ed85b86ce138a5f77d6aa8f5909e5ad,2024-02-07T23:31:10.567000 CVE-2024-0256,0,0,49de163342e5ba45f12c2cbfe0a11fce418d24b9f8f242901a15605875a38ffa,2024-02-14T19:17:28.387000 CVE-2024-0258,0,0,da926b444685fcbac9be2b2403a8d6738d09992d6c11f2b5b1d93a114519bfef,2024-03-13T22:15:08.970000 +CVE-2024-0259,1,1,81c286a300947c75bec1d2c83f224330c6c85d9501b7f6f61b4ee09cf52b92ab,2024-03-28T16:07:30.893000 CVE-2024-0260,0,0,2779dbdedaac297e872da9c4df94fb4f41548ecabca4e84dd2cb7a84b44ae4c4,2024-03-21T02:51:03.110000 CVE-2024-0261,0,0,c7ebebf9ba9dbc5389c04e823357440854b7688f8b5aa275c4c69ab35df44c81,2024-03-21T02:51:03.190000 CVE-2024-0262,0,0,cfeabed15067ff1fb4d3b57dc6829768d130e7f8cef2d663a7958b8c4721a024,2024-03-21T02:51:03.270000 @@ -242416,7 +242433,7 @@ CVE-2024-27771,0,0,0aee7dce542e3846fc61fcb0b334acd3d3866184b33df64f8377358b3bfec CVE-2024-27772,0,0,a17826d9a0874c3f3ffc19dd6a14e32a35c360a62820ef43132537b66b4def32,2024-03-18T19:40:00.173000 CVE-2024-27773,0,0,2024b60af24687a3b3ee666dada367802136074a0282a48cfcb9d5e3649d7c7f,2024-03-18T19:40:00.173000 CVE-2024-27774,0,0,faaf7adce2033b4161afd1d606bbef075c5b779f6cc928fc6a617e115b9369f0,2024-03-18T19:40:00.173000 -CVE-2024-27775,1,1,8944a7eae79c04f73db7ba8431c2c0de7fdefc9147e8673700dac0096e36cb6b,2024-03-28T13:15:47.340000 +CVE-2024-27775,0,1,51c4d69c962e89cdfef488f862c194d6eae5ffb312024f7f2ebc0cf2d2d00e09,2024-03-28T16:07:30.893000 CVE-2024-2778,0,0,606da7002eecf8b4a69d2bd07186555e4fbaaa2eba41bedbde660e768d517807,2024-03-22T12:45:36.130000 CVE-2024-2779,0,0,a46cbcced54f990ec3ab00dcc310828877345eeeff0a3332adcf6734f8a63516,2024-03-22T12:45:36.130000 CVE-2024-2780,0,0,bdcceeee0c00953c03148d72ca9c4da28e2649db6e5c4d572065a841b8ee9aa9,2024-03-22T12:45:36.130000 @@ -242528,7 +242545,7 @@ CVE-2024-28105,0,0,fcc764ac1e5fa24a7cdc91807ca008992de501a32669f46e1eff534ca8e7d CVE-2024-28106,0,0,a89dc0ca5c060b8348ae8f0c0d823137664e9265682cb4445ed694e0c7db5aff,2024-03-26T12:55:05.010000 CVE-2024-28107,0,0,67b11d5219b0b9f786e274d36c6219cc6a62e589b1f556fced90abc2232753f8,2024-03-26T12:55:05.010000 CVE-2024-28108,0,0,1751fd9e7c1a575d99388404f19dbe254b5bb178f28831b3f691526133af985d,2024-03-26T12:55:05.010000 -CVE-2024-28109,1,1,574d5d4fd2d839d54da9223314064889394f80fe42444ea1f5ff94b12b2367b4,2024-03-28T14:15:13.863000 +CVE-2024-28109,0,1,d30f3230bb606227658d0f277b6bad62648a2e7e9f7feb695a5057cfb1ffca7e,2024-03-28T16:07:30.893000 CVE-2024-2811,0,0,cd6568d4253dfb36f9b79c1a6cefb0971039231a0ac66a212abf5e2fb6a72887,2024-03-26T03:14:03.240000 CVE-2024-28110,0,0,0aa63c709bee34101fee09332c67840fa8b7d5aea01ed58b7f238cd7f26f2f87,2024-03-07T13:52:27.110000 CVE-2024-28111,0,0,ef109000cb681b8950a504435d888106cd334990070bd9ca1f33bba165c1974a,2024-03-07T13:52:27.110000 @@ -242894,7 +242911,7 @@ CVE-2024-29195,0,0,12b6fcead703f320c2faaa3dbf933701901e834c51cbd479cd70a3447afc3 CVE-2024-29196,0,0,e02aa4919ed0d6b8af5e1fbc5257465a64fdae2f23d9b9aaabfbc3da2c0d39fa,2024-03-26T12:55:05.010000 CVE-2024-29197,0,0,48cfe2d0e00e1d6e9f018548b8b920adc8f1c35c8c8d2a08e4bc3b3e003f90af,2024-03-26T17:09:53.043000 CVE-2024-29199,0,0,78313b772930e0d3c119e70c910c05a3509fc574028745b1b9c80a0f992c34f5,2024-03-26T12:55:05.010000 -CVE-2024-29200,1,1,64cc3f0d0f34f9302b722a3cebee5577a4cf54e0fe4ac2f4b6db379a488c19d3,2024-03-28T14:15:14.100000 +CVE-2024-29200,0,1,ef9326193a74c86371ac9fbb2b6f7f9808127955b4bd7d8d0622423f8b799c06,2024-03-28T16:07:30.893000 CVE-2024-29203,0,0,85853d1d6c0b7cff8ded9ca779662219e1e7d461c7c9aed96ad32295a032c6f6,2024-03-26T17:09:53.043000 CVE-2024-2921,0,0,a7048ceb487f73059844764517da213b04f370019c5cc0c6fe2153431d1dd6cb,2024-03-26T17:09:53.043000 CVE-2024-29216,0,0,59c06798795d05e391cdd301154441d31362295e800c3b46a2b7bd83a3e2dbc0,2024-03-25T13:47:14.087000 @@ -243049,7 +243066,7 @@ CVE-2024-29879,0,0,f281e5565c18f62981e30c243c39ad05583d9bbab1631a620c93b3c78846e CVE-2024-2988,0,0,095fa6458e008f6f7d69334248969b0501d37383db72dc8bee93560edc741f88,2024-03-28T02:01:21.693000 CVE-2024-29880,0,0,e4ba47a3336aba44b26bc2b767c682c9997cfe6f0e16a9457e7fe50a3abeaa1c,2024-03-21T15:24:35.093000 CVE-2024-29881,0,0,7eaff78a6eecd508372203508f2ecab97ebc62cfd94b7af6101b5d7b6ca209b2,2024-03-26T17:09:53.043000 -CVE-2024-29882,1,1,dacd1d188eec04753f0fa763740af8ff42bfc4a2b784a620bad0689784c8766a,2024-03-28T14:15:14.337000 +CVE-2024-29882,0,1,4165d20253960416cd183b974438d8dac4fe88260bfe5e0d52449ad6b72b673f,2024-03-28T16:07:30.893000 CVE-2024-29883,0,0,2444d321a867d6f4cdf63bf8a1bc6af3b407752f2134c1f64a1d02545242c426,2024-03-26T17:09:53.043000 CVE-2024-29886,0,0,3f88cfdb4cfb88186dd10b00ca51e7380d7eb2a0a458754ea1dfe21c4512300e,2024-03-28T02:01:21.693000 CVE-2024-29887,0,0,f387f1fcc31e0714aa90eb378be59a2d52ee246f68fe9dafd34624693c2abecd,2024-03-28T02:01:13.303000 @@ -243057,9 +243074,9 @@ CVE-2024-29888,0,0,e6980a084f851bc0c8ffe0d4edac384e7194ab82af737faf570a62d329543 CVE-2024-2989,0,0,7bf7e9a03ba8c5d37e74d436f6afb4547ab8035499b1c3a92009f461628a8bf5,2024-03-28T02:01:21.693000 CVE-2024-29891,0,0,8db13a694d94d9c0ea356374520c4ec758a3562c2da8a21f831daea1cc8fa44b,2024-03-28T02:01:13.303000 CVE-2024-29892,0,0,59c6b24496fc40dcb3fc7fa651d54d9a835514ae28a8bca0877d6fdd02e37f42,2024-03-28T02:01:13.303000 -CVE-2024-29896,1,1,105cbaa5e7650be199e3cc1881d3e9ee68dcfa8baf64f79a7108821cffd17c34,2024-03-28T13:15:47.717000 -CVE-2024-29897,1,1,67e8706eb03989eaa5985eba7a3114a19ea44583ca18d1bd6e7b992ec3a3ff41,2024-03-28T14:15:14.557000 -CVE-2024-29898,1,1,05bbed3526cdcfc5a9d1af36083d792c8435ff23df04da8e0a0a82f8bd014126,2024-03-28T14:15:14.783000 +CVE-2024-29896,0,1,9a48e50ad0f2c459cff25077d20f0d1435afab76d715677e89b40a04e8f727c2,2024-03-28T16:07:30.893000 +CVE-2024-29897,0,1,111bc9aedafa055633df3c49dfa610aa7a9dd3a7d49c3bf5a40bedf55347a260,2024-03-28T16:07:30.893000 +CVE-2024-29898,0,1,eab054cfc704fab3df338b9c3296e7b0707c4a3ea6ce4f0e8582baf99d69e79f,2024-03-28T16:07:30.893000 CVE-2024-2990,0,0,7b8bc4275f049749984166beead5725a3bf23799e4803482e7e47aaa1bac7e25,2024-03-28T02:01:13.303000 CVE-2024-29906,0,0,5e6afa8dbe77b2ceaee29629c66d8bdf273caddf4f38f955d682aeefe9beab4c,2024-03-27T12:29:30.307000 CVE-2024-29907,0,0,95ebf1e66704307f93559559f18923b10f644f7f3c6486fedede31060b34f004,2024-03-27T12:29:30.307000 @@ -243173,21 +243190,41 @@ CVE-2024-30242,0,0,b28005a560b57a7a7ae9969109e7f870b899e43349d9d677c38181c99febc CVE-2024-30243,0,0,dce2f0605d44bfa3b81cf0e14bdfd0fae98270908d0c04fcccbda1832d2d9684,2024-03-28T12:42:56.150000 CVE-2024-30244,0,0,58cbe82eb6a3315167a8e6bb0cccea64e33ba08dd30670c3060eede01da84f20,2024-03-28T12:42:56.150000 CVE-2024-30245,0,0,69f8d0e8e9820bbde2e6705ffa51df6c4056c193c50f3f74b4878ddc0c1739df,2024-03-28T12:42:56.150000 +CVE-2024-3039,1,1,78eee57f82e030cc18475a85cdac1c12567dfe02603d629b2fbdbce1920e64dd,2024-03-28T16:07:30.893000 +CVE-2024-3040,1,1,6f474eb89904d3ef26a1f99830c4f7e6fe42c974c3600ac0c482bf259f0da50d,2024-03-28T16:07:30.893000 +CVE-2024-3041,1,1,3dadac99e88a79c62df6899f0fad147e3340516f2236f4e3cf8c259f2e06d9f0,2024-03-28T16:07:30.893000 +CVE-2024-3042,1,1,bbb201bb8af54b84ea33f47457d61d2db4be63190911d6f2d2de2d7f6ef14959,2024-03-28T16:07:30.893000 CVE-2024-30421,0,0,b8b8cb07a3b21c6533c687c46600fcd77c1dde4165706436ec8a960aad3329a9,2024-03-28T12:42:56.150000 CVE-2024-30422,0,0,4428c80482e6497556bbd0fd5fc18b1b3811a4ae5bf0c8713af97deb1a151ca3,2024-03-28T12:42:56.150000 -CVE-2024-30583,1,1,80ec8dac2df697f6d97dce3d414f3f40db802c8a05001d59322248887dd494a3,2024-03-28T14:15:14.997000 -CVE-2024-30584,1,1,8f9baee3cb43c9905ec86b9ceafcc9fa1c1744ff634c603f52c4c6f51a696b11,2024-03-28T14:15:15.047000 -CVE-2024-30585,1,1,d28878d4514beae5f4a8ab14bb774cd280bd05289eeacb0c71c85485f44bd725,2024-03-28T14:15:15.090000 -CVE-2024-30586,1,1,e994d08daae11886e164c06c955244b9508623834040b22157b01f787dbc0950,2024-03-28T14:15:15.137000 -CVE-2024-30587,1,1,6274e509df3fa70da36dfdbc664d4ccf17dd7d0e67c39af2dd11068017b323da,2024-03-28T14:15:15.183000 -CVE-2024-30588,1,1,01803a8f1753441e295114a835437c23858ff4e45ee9b4f2ae8687fa72d06f88,2024-03-28T14:15:15.233000 -CVE-2024-30589,1,1,509d4c85012c03904de4c0dd93b476cdd601d8081e5166323a7c4d0cc68d0bf8,2024-03-28T14:15:15.293000 -CVE-2024-30590,1,1,eaa76954b414a6fa9537869c2507880f04b22a0c4738d8ed5fce5ed85a50bc26,2024-03-28T14:15:15.347000 -CVE-2024-30591,1,1,3d0921e40ab66acd2d6afca0d71ac066255ff86efc26a848649ab19d4a298c35,2024-03-28T14:15:15.390000 -CVE-2024-30592,1,1,56f8d7aa5e3af7129e1c164e2430cfa563ea1b6bcf42ee4f9c8560f78563b56c,2024-03-28T14:15:15.437000 -CVE-2024-30593,1,1,1a36095e535cda1e55aecd9fb09089f1887b6aafd29dda7f3d3fee7ec07f4b6f,2024-03-28T13:15:47.950000 -CVE-2024-30594,1,1,349d76c77d7160b339e99949df685f81a71499788b00110b42a5b560440a2d4b,2024-03-28T13:15:48.007000 +CVE-2024-30583,0,1,90e06b2d765278ac0f3bc4028344fdf483d30ea530d1cc273b94886fa84d52bd,2024-03-28T16:07:30.893000 +CVE-2024-30584,0,1,35ddda2305ed50d97f06df7df7b733486405aa80385b935162c6180d1fe62320,2024-03-28T16:07:30.893000 +CVE-2024-30585,0,1,7e78a86bcf687f746816842e948af254246fdc173fd94674915f1ec2e6a3c749,2024-03-28T16:07:30.893000 +CVE-2024-30586,0,1,37eaa44de9abeff4b259d4ed391e0ff9c819a61001d2eac97ecd8afa2c7273db,2024-03-28T16:07:30.893000 +CVE-2024-30587,0,1,36e8b51eabfd3120c57ca2b9ecc6c1c35cdd81a5088a83b8b20788614eb5a7e8,2024-03-28T16:07:30.893000 +CVE-2024-30588,0,1,41fbf2b74842eb4c396bb4c1c4040e0694e963250cd064f663ff6032e697716f,2024-03-28T16:07:30.893000 +CVE-2024-30589,0,1,e9d9137ef12bc250b28edd5e7aff25a313c5cfed6eedf3dad714362460745e1a,2024-03-28T16:07:30.893000 +CVE-2024-30590,0,1,3d0a6627c184857af247d36c652f53828d799379ea6555c5b8736fdc0d082922,2024-03-28T16:07:30.893000 +CVE-2024-30591,0,1,7243d7a5ad9c869750e307cf51f223f43ed20090c1bd6ca7e74e1811f2659010,2024-03-28T16:07:30.893000 +CVE-2024-30592,0,1,7416c528eb6e2aad55e80c4e8e1aedf8486a9b72141c06c8af2ede72c1f3191f,2024-03-28T16:07:30.893000 +CVE-2024-30593,0,1,94ab7a5984b6ddc252d1cdc2f34439ed1580ac9af1936ee93bbba2660c1249a3,2024-03-28T16:07:30.893000 +CVE-2024-30594,0,1,e81eac41dc729dcec40ebd4665832f8438a8120b7ca71f2ebf8d0b3df752f1a0,2024-03-28T16:07:30.893000 CVE-2024-30595,0,0,6aa498550452e6e0962fd2990a6e5e6c3fabf1525b07b0c0d8d4a86186d62bd0,2024-03-28T12:42:56.150000 -CVE-2024-30596,1,1,43753038bc0c6cb32f8afe83ca38303283af18f31ff0098b72eccf9d4e8ea0c7,2024-03-28T13:15:48.063000 -CVE-2024-30606,1,1,dfd803ea1066cf172a4052f2a7c89b2bd278c40a080580e0501fda9a343989b4,2024-03-28T14:15:15.480000 -CVE-2024-30607,1,1,87d7e602d72e1b362abff8f8c3bb280cddb9ea39946314134ccd5009ef5f6586,2024-03-28T14:15:15.530000 +CVE-2024-30596,0,1,2569c687f2940ac0d88e916cd94674c848765bf3fedcdc711fe23428698d17a4,2024-03-28T16:07:30.893000 +CVE-2024-30597,1,1,8e8ddf7d3ddaa265c224af912aad6d13caad6e0c7c88c7526acce543e24b5edb,2024-03-28T16:07:30.893000 +CVE-2024-30598,1,1,3a7ea9a3efa8546fd0dec3d3c6b57941058965e3f62fe86c99ed3cb5baf9cc5d,2024-03-28T16:07:30.893000 +CVE-2024-30599,1,1,e938c961b1cb862df4fec504278e52c24332661448e062cdde8a90682e3d845d,2024-03-28T16:07:30.893000 +CVE-2024-30600,1,1,254f25cec976db4ffcc0fa92ae085c76321dff8ce02554e5e23c55074246d930,2024-03-28T16:07:30.893000 +CVE-2024-30601,1,1,8cbcfd4348b64670745c0a04c2b7893df4ec9010f153bdc2a346c7e363af768e,2024-03-28T16:07:30.893000 +CVE-2024-30602,1,1,cbf7a67f765f1f53d53a177d50860c17b2506f7d2eff77157b6caf5805b96f3d,2024-03-28T16:07:30.893000 +CVE-2024-30603,1,1,805955af0f76a6aff14d4d8657eb4617aa1abebda94861f40184bae76ff156e9,2024-03-28T16:07:30.893000 +CVE-2024-30604,1,1,379ff116825a9c982ba26e38c8ebb37d23fed335cc024c085abb3d522f133a07,2024-03-28T16:07:30.893000 +CVE-2024-30606,0,1,d30eafb06d1ec022e8e4fe319a9270ad8e86b26be51c841d3c4f1eb77a918df3,2024-03-28T16:07:30.893000 +CVE-2024-30607,0,1,19ebdeee2836d102fa7844242f3af516e5bcea9289df539c7f7941939342ded1,2024-03-28T16:07:30.893000 +CVE-2024-30612,1,1,36049a6b27beee3de405fd177d0fa174f7a08d58b111f9900a25b925f6e97e9e,2024-03-28T16:07:30.893000 +CVE-2024-31134,1,1,f3dcd63eca4514e6339c3ec7aeb83c2b308295cdf8ae154e5d9cd1a9c2c8a369,2024-03-28T16:07:30.893000 +CVE-2024-31135,1,1,479d4c1f65df6314842af6b85097457f245568f09c6620b6a18268f61c31c90a,2024-03-28T16:07:30.893000 +CVE-2024-31136,1,1,59d127dfb07acd2c4587c1beda8f1deaf424906c9b7034466a77403adfd40752,2024-03-28T16:07:30.893000 +CVE-2024-31137,1,1,449ac74d89f8a92f177d1d77ee28ed4c10488cbb05e1f09ccbde9d94a1737274,2024-03-28T16:07:30.893000 +CVE-2024-31138,1,1,7951d56a99dbfcb87972373932c19c3399e083ef12fc541bc18f929442b04b18,2024-03-28T16:07:30.893000 +CVE-2024-31139,1,1,cf8c25425780f1d36f604f7c3d037b16544eea3ab0908ce694956183986a8d87,2024-03-28T16:07:30.893000 +CVE-2024-31140,1,1,a7e2204480cd3644823842970dd746ee5c020bc95b54375f7cfa679b79796cd1,2024-03-28T16:07:30.893000