From 58168b052a7aeaaa6d2d14de5d9d2111dec49866 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 11 Mar 2024 17:03:41 +0000 Subject: [PATCH] Auto-Update: 2024-03-11T17:00:53.042690+00:00 --- CVE-2023/CVE-2023-525xx/CVE-2023-52514.json | 21 ++------ CVE-2024/CVE-2024-06xx/CVE-2024-0670.json | 55 +++++++++++++++++++++ CVE-2024/CVE-2024-236xx/CVE-2024-23608.json | 55 +++++++++++++++++++++ CVE-2024/CVE-2024-236xx/CVE-2024-23609.json | 55 +++++++++++++++++++++ CVE-2024/CVE-2024-236xx/CVE-2024-23610.json | 55 +++++++++++++++++++++ CVE-2024/CVE-2024-236xx/CVE-2024-23611.json | 55 +++++++++++++++++++++ CVE-2024/CVE-2024-236xx/CVE-2024-23612.json | 55 +++++++++++++++++++++ CVE-2024/CVE-2024-271xx/CVE-2024-27198.json | 8 ++- CVE-2024/CVE-2024-271xx/CVE-2024-27199.json | 10 +++- README.md | 23 +++++---- _state.csv | 20 +++++--- 11 files changed, 376 insertions(+), 36 deletions(-) create mode 100644 CVE-2024/CVE-2024-06xx/CVE-2024-0670.json create mode 100644 CVE-2024/CVE-2024-236xx/CVE-2024-23608.json create mode 100644 CVE-2024/CVE-2024-236xx/CVE-2024-23609.json create mode 100644 CVE-2024/CVE-2024-236xx/CVE-2024-23610.json create mode 100644 CVE-2024/CVE-2024-236xx/CVE-2024-23611.json create mode 100644 CVE-2024/CVE-2024-236xx/CVE-2024-23612.json diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52514.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52514.json index fafae84d61c..6e5fa35b6c4 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52514.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52514.json @@ -2,27 +2,14 @@ "id": "CVE-2023-52514", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:47.777", - "lastModified": "2024-03-04T13:58:23.447", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-03-11T16:15:07.720", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/reboot: VMCLEAR active VMCSes before emergency reboot\n\nVMCLEAR active VMCSes before any emergency reboot, not just if the kernel\nmay kexec into a new kernel after a crash. Per Intel's SDM, the VMX\narchitecture doesn't require the CPU to flush the VMCS cache on INIT. If\nan emergency reboot doesn't RESET CPUs, cached VMCSes could theoretically\nbe kept and only be written back to memory after the new kernel is booted,\ni.e. could effectively corrupt memory after reboot.\n\nOpportunistically remove the setting of the global pointer to NULL to make\ncheckpatch happy." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "metrics": {}, - "references": [ - { - "url": "https://git.kernel.org/stable/c/1375d9600c38c231163de584656b07aef9a27b0d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/65edea77d7006140c6290e7f46009d75e02d3273", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/b23c83ad2c638420ec0608a9de354507c41bec29", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - } - ] + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0670.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0670.json new file mode 100644 index 00000000000..9dfa2acc033 --- /dev/null +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0670.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-0670", + "sourceIdentifier": "security@checkmk.com", + "published": "2024-03-11T15:15:47.267", + "lastModified": "2024-03-11T15:15:47.267", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Privilege escalation in windows agent plugin in Checkmk before 2.2.0p23, 2.1.0p40 and 2.0.0 (EOL) allows local user to escalate privileges" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@checkmk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security@checkmk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://checkmk.com/werk/16361", + "source": "security@checkmk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23608.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23608.json new file mode 100644 index 00000000000..9e16056c004 --- /dev/null +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23608.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-23608", + "sourceIdentifier": "security@ni.com", + "published": "2024-03-11T16:15:07.897", + "lastModified": "2024-03-11T16:15:07.897", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An out of bounds write due to a missing bounds check in LabVIEW may result in remote code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects LabVIEW 2024 Q1 and prior versions.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@ni.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@ni.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-write-due-to-missing-bounds-check-in-labview.html", + "source": "security@ni.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23609.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23609.json new file mode 100644 index 00000000000..0f4a6cedd0e --- /dev/null +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23609.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-23609", + "sourceIdentifier": "security@ni.com", + "published": "2024-03-11T16:15:08.157", + "lastModified": "2024-03-11T16:15:08.157", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An improper error handling vulnerability in LabVIEW may result in remote code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects LabVIEW 2024 Q1 and prior versions.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@ni.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@ni.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-755" + } + ] + } + ], + "references": [ + { + "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/improper-error-handling-issues-in-labview.html", + "source": "security@ni.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23610.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23610.json new file mode 100644 index 00000000000..d66dfc1b44b --- /dev/null +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23610.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-23610", + "sourceIdentifier": "security@ni.com", + "published": "2024-03-11T16:15:08.370", + "lastModified": "2024-03-11T16:15:08.370", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An out of bounds write due to a missing bounds check in LabVIEW may result in remote code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects LabVIEW 2024 Q1 and prior versions.\n\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@ni.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@ni.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-write-due-to-missing-bounds-check-in-labview.html", + "source": "security@ni.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23611.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23611.json new file mode 100644 index 00000000000..2d9156870c9 --- /dev/null +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23611.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-23611", + "sourceIdentifier": "security@ni.com", + "published": "2024-03-11T16:15:08.557", + "lastModified": "2024-03-11T16:15:08.557", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An out of bounds write due to a missing bounds check in LabVIEW may result in remote code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects LabVIEW 2024 Q1 and prior versions.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@ni.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@ni.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-write-due-to-missing-bounds-check-in-labview.html", + "source": "security@ni.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23612.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23612.json new file mode 100644 index 00000000000..6b6bfccd138 --- /dev/null +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23612.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-23612", + "sourceIdentifier": "security@ni.com", + "published": "2024-03-11T16:15:08.743", + "lastModified": "2024-03-11T16:15:08.743", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An improper error handling vulnerability in LabVIEW may result in remote code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects LabVIEW 2024 Q1 and prior versions.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@ni.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@ni.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-755" + } + ] + } + ], + "references": [ + { + "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/improper-error-handling-issues-in-labview.html", + "source": "security@ni.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27198.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27198.json index 0b378ef156b..f3b5ec34b54 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27198.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27198.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27198", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-03-04T18:15:09.040", - "lastModified": "2024-03-08T02:00:01.667", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-11T15:15:47.483", + "vulnStatus": "Modified", "cisaExploitAdd": "2024-03-07", "cisaActionDue": "2024-03-28", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -103,6 +103,10 @@ } ], "references": [ + { + "url": "https://www.darkreading.com/cyberattacks-data-breaches/jetbrains-teamcity-mass-exploitation-underway-rogue-accounts-thrive", + "source": "cve@jetbrains.com" + }, { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", "source": "cve@jetbrains.com", diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27199.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27199.json index 0d0d5481f94..df08d3a7b61 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27199.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27199.json @@ -2,12 +2,16 @@ "id": "CVE-2024-27199", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-03-04T18:15:09.377", - "lastModified": "2024-03-05T13:41:01.900", + "lastModified": "2024-03-11T15:15:47.663", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible" + }, + { + "lang": "es", + "value": "En JetBrains TeamCity antes de 2023.11.4 era posible un path traversal permitiendo realizar acciones administrativas limitadas" } ], "metrics": { @@ -47,6 +51,10 @@ } ], "references": [ + { + "url": "https://www.darkreading.com/cyberattacks-data-breaches/jetbrains-teamcity-mass-exploitation-underway-rogue-accounts-thrive", + "source": "cve@jetbrains.com" + }, { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", "source": "cve@jetbrains.com" diff --git a/README.md b/README.md index 131cbd81de4..93b07e43176 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-03-11T15:00:45.148845+00:00 +2024-03-11T17:00:53.042690+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-03-11T14:15:06.917000+00:00 +2024-03-11T16:15:08.743000+00:00 ``` ### Last Data Feed Release @@ -29,23 +29,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -240956 +240962 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `6` -* [CVE-2024-1441](CVE-2024/CVE-2024-14xx/CVE-2024-1441.json) (`2024-03-11T14:15:06.917`) -* [CVE-2024-2370](CVE-2024/CVE-2024-23xx/CVE-2024-2370.json) (`2024-03-11T13:15:52.920`) +* [CVE-2024-0670](CVE-2024/CVE-2024-06xx/CVE-2024-0670.json) (`2024-03-11T15:15:47.267`) +* [CVE-2024-23608](CVE-2024/CVE-2024-236xx/CVE-2024-23608.json) (`2024-03-11T16:15:07.897`) +* [CVE-2024-23609](CVE-2024/CVE-2024-236xx/CVE-2024-23609.json) (`2024-03-11T16:15:08.157`) +* [CVE-2024-23610](CVE-2024/CVE-2024-236xx/CVE-2024-23610.json) (`2024-03-11T16:15:08.370`) +* [CVE-2024-23611](CVE-2024/CVE-2024-236xx/CVE-2024-23611.json) (`2024-03-11T16:15:08.557`) +* [CVE-2024-23612](CVE-2024/CVE-2024-236xx/CVE-2024-23612.json) (`2024-03-11T16:15:08.743`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `3` -* [CVE-2023-3576](CVE-2023/CVE-2023-35xx/CVE-2023-3576.json) (`2024-03-11T13:15:52.550`) -* [CVE-2023-52356](CVE-2023/CVE-2023-523xx/CVE-2023-52356.json) (`2024-03-11T13:15:52.753`) +* [CVE-2023-52514](CVE-2023/CVE-2023-525xx/CVE-2023-52514.json) (`2024-03-11T16:15:07.720`) +* [CVE-2024-27198](CVE-2024/CVE-2024-271xx/CVE-2024-27198.json) (`2024-03-11T15:15:47.483`) +* [CVE-2024-27199](CVE-2024/CVE-2024-271xx/CVE-2024-27199.json) (`2024-03-11T15:15:47.663`) ## Download and Usage diff --git a/_state.csv b/_state.csv index d4c95a51cec..9d741a7e742 100644 --- a/_state.csv +++ b/_state.csv @@ -225207,7 +225207,7 @@ CVE-2023-3573,0,0,49b7f2d44d94282fd92e4e51fd75140c6d27fd1eb60b043bb5658c6909308f CVE-2023-3574,0,0,c46f3ebebeb50c74076f9bdd903b2401894ef2646196eb960c08c98cd128d220,2023-07-19T15:58:24.693000 CVE-2023-3575,0,0,cb418c109da6ae5c3db4c1cfd49867dd6bedc2e2b3460bc932b1f4a8938017b2,2023-11-07T04:19:05.260000 CVE-2023-35759,0,0,737d089372a13d311d938b6f73fbc87604835ac5d6e732c4dc0dc97aa37b299e,2024-02-05T17:15:08.490000 -CVE-2023-3576,0,1,afc3943dafc3dce0b127a1fe6f63cb13cec0d0d4331467a034b7ea0ef34bb624,2024-03-11T13:15:52.550000 +CVE-2023-3576,0,0,afc3943dafc3dce0b127a1fe6f63cb13cec0d0d4331467a034b7ea0ef34bb624,2024-03-11T13:15:52.550000 CVE-2023-35762,0,0,d3d58c95cdc44cd1c3674a8efa00d524d00379a36ec6dd9b457951306765e9b9,2023-11-29T20:52:44.790000 CVE-2023-35763,0,0,d967a50d80e9fca1c8b396011c9adaeb43d2582130d44fa236f81f07f6cc7468,2023-11-07T04:15:57.230000 CVE-2023-35765,0,0,c9d756b3cf84f57072c1ddad827e0ca15c83ffcc92755c9945c039f52d670aa0,2023-07-13T22:38:39.083000 @@ -235718,7 +235718,7 @@ CVE-2023-5235,0,0,501d70ffe62054b2f34e569922209bc8c97e72f29972137f98206c72df307e CVE-2023-52353,0,0,51c95c68b53b17ae5c9383b4fb7643d2f698c0a7aeb9527a084925d0123ca2a0,2024-01-29T15:53:20.917000 CVE-2023-52354,0,0,15087b81bcfb8f0a08f98300e2d3a8a3cc0e673259e9dc08373afde8da8bc3a6,2024-01-29T16:56:40.830000 CVE-2023-52355,0,0,30175535bfde6e66be6dce4a86bb0177b08047eb9e1fb2db9c326dc5f918982b,2024-02-04T20:15:45.900000 -CVE-2023-52356,0,1,f4861a9c0008839a2b5ec1f2513aaa75cc90ea85b18808e65d7bc888af5c1638,2024-03-11T13:15:52.753000 +CVE-2023-52356,0,0,f4861a9c0008839a2b5ec1f2513aaa75cc90ea85b18808e65d7bc888af5c1638,2024-03-11T13:15:52.753000 CVE-2023-52357,0,0,b1d8671149392ba36552d2d7975d95dd19f0db4f65b14e0cfedba761dce5c034,2024-02-20T19:50:53.960000 CVE-2023-52358,0,0,0b53d52db0f0a147bc8902c908a4bfab00aea8420e8b8fd20902eb5f941687f3,2024-02-20T19:50:53.960000 CVE-2023-5236,0,0,dca46a86e45346118bf2a7ab84eba7b576d6badd3032b0dee15268882dfcf4cc,2024-01-25T14:15:26.617000 @@ -235841,7 +235841,7 @@ CVE-2023-52510,0,0,39bb20f902ce77c6c2cc24fdd471414543682dc6368dd71901ad66ceeb858 CVE-2023-52511,0,0,96ad6a250685bb1f1b043d2d9629c3703274f2a26b2172e6f2f583cb342aa7f7,2024-03-04T13:58:23.447000 CVE-2023-52512,0,0,6b0934a2f05e016672719445c73a46d1beddc36452fb6794d32bde3c681e15b5,2024-03-04T13:58:23.447000 CVE-2023-52513,0,0,c3f6403d0bd91c1256183cc63f5a42ed5e32a237d5cc51f6ef463aa0f44f6a2a,2024-03-04T13:58:23.447000 -CVE-2023-52514,0,0,9718b62edb9b3397ceaaab8c6770546bfedf23c9b5b59b29e4816c31e0aac68d,2024-03-04T13:58:23.447000 +CVE-2023-52514,0,1,2a9bbaa87d5c1eab9d9277a12e928b1961b3fc1968dd1c401d6d2c797142906a,2024-03-11T16:15:07.720000 CVE-2023-52515,0,0,7ed1681a7c6a3267a3342d453126aab09b934cffe5e0a5e93e54c0492dd6af3d,2024-03-04T13:58:23.447000 CVE-2023-52516,0,0,a2d74778820fd67a3143b965286178ba729cfdcbf87ce7c74d33fa89175e0a71,2024-03-04T13:58:23.447000 CVE-2023-52517,0,0,43af2c38c9abb65135989190406e737cf4a1757d3e820b8a9ce0cd8ea74c6d05,2024-03-04T13:58:23.447000 @@ -237959,6 +237959,7 @@ CVE-2024-0665,0,0,4f11c74d31ee400b4dead80ad52f0a187a0b330f44c457216c2744da6f3597 CVE-2024-0667,0,0,2681b7becac6d5374ec2219687491519adea78bdc5162cd2d7253f0786abc5ef,2024-02-01T04:15:17.817000 CVE-2024-0668,0,0,3db9a5de6e4dca9e79ecb9554115ef410935372b559bc145d7ca0c6d374ebafc,2024-02-13T16:24:26.927000 CVE-2024-0669,0,0,476d8f93fcd7134fc732a1bd0cd06cc03563cad47067b8fa5ebf76f58a942cc6,2024-01-26T18:52:05.550000 +CVE-2024-0670,1,1,96f0c0f86d7d60e941c6ad942ddc9516bfeba336a67759b22368dff441aebf7b,2024-03-11T15:15:47.267000 CVE-2024-0674,0,0,9139aa9ed68295af11e7b8aed5b715e6e747bd34139c805f237fd0a45d0b36ba,2024-02-08T16:39:59.450000 CVE-2024-0675,0,0,8bea4fa993c9477b8fb58d2ccef75bd1eb1d23abf07c79567a0ddce8b0191850,2024-02-08T16:39:42.950000 CVE-2024-0676,0,0,8035a70d9b2fb746a1bd04ffd363a65316fee85917c37a6970742638f1f2186e,2024-02-08T16:39:00.907000 @@ -238442,7 +238443,7 @@ CVE-2024-1435,0,0,3d9157bea425ae0ccbf8fb80f8804820a71722fe736e6d6583f664e8ae632d CVE-2024-1436,0,0,89cc5ea7a7e1178a29adf59c2f4cf429bb9957790ab8a0265c3119401c784ce0,2024-02-26T16:32:25.577000 CVE-2024-1437,0,0,95b845910a840a20b7fa4620989917eab09ec6f88cd90b7d076b0bb6f7afcc4a,2024-02-29T13:49:29.390000 CVE-2024-1439,0,0,0872453f826d79b5bb50df9535aa030a513837aff169f1535b08260848c8b609,2024-02-12T14:19:54.330000 -CVE-2024-1441,1,1,779b128d5e6dbaccc3e862d37e1f7b9cbeae4c7d0f84d699ae8ad4489da37214,2024-03-11T14:15:06.917000 +CVE-2024-1441,0,0,779b128d5e6dbaccc3e862d37e1f7b9cbeae4c7d0f84d699ae8ad4489da37214,2024-03-11T14:15:06.917000 CVE-2024-1442,0,0,d5be8c6d2acf818787220c68cc096ecac92494a9aeb2f3b78b57d2953e31d3e2,2024-03-08T14:02:57.420000 CVE-2024-1443,0,0,715b4f1b1b036595e816d480c22f0394bab184a4b61631c3489044453d5f3bfb,2024-03-07T13:52:27.110000 CVE-2024-1444,0,0,56d4978632986301b509a1a8d65f888b9f13fd4ebe8f88db05c849bbae5ae999,2024-02-16T17:15:08.710000 @@ -239823,6 +239824,11 @@ CVE-2024-23603,0,0,fa877b171423c355baa3228ce2c605e41edbf822a3508567d7754cb447355 CVE-2024-23605,0,0,6357ef47a85c4e22049db0926cbddeb8bbc82cdf2a1a81b5a28ca15d9cbb7aa0,2024-02-26T18:15:07.673000 CVE-2024-23606,0,0,598e3aff4ae1bfd2aada0c773944509bbb201f8071a41b1a5b9e3c7372eb5aae,2024-02-20T19:50:53.960000 CVE-2024-23607,0,0,8fbc2564c100ed17fa897212d565c049df0409466e1eb4358411ecb3ce547801,2024-02-14T18:04:45.380000 +CVE-2024-23608,1,1,c98de50f4e8b973dad8f1d54c5df75c409c8b04702a613e588947dbe5d7e1073,2024-03-11T16:15:07.897000 +CVE-2024-23609,1,1,19a21d0e98904f29c5d0adf7e8c9ed6e794486d28b167a48186898accac1dd49,2024-03-11T16:15:08.157000 +CVE-2024-23610,1,1,27c772e96c2f354c984e3aa4b85ca26a8e6005fd4d4dd2fc8250a636b5c8e2a7,2024-03-11T16:15:08.370000 +CVE-2024-23611,1,1,c03fa71964a3d81dc6f1eb12a354aa4c86e804a5415aadd4646c131e3c8dc6b0,2024-03-11T16:15:08.557000 +CVE-2024-23612,1,1,0875aa7379f496dc1516588cb14ef4d3721dd4c67c8e3b96216bd2de56c83a6b,2024-03-11T16:15:08.743000 CVE-2024-23613,0,0,a6caa42c068605a90eb5a5d2a146a2e76fb38281e14d3e07f037d267becbaa2b,2024-01-31T19:22:48.627000 CVE-2024-23614,0,0,64dd22961f50564212ca1f64f5062c8108f1d059ef6d673b05a943850d4463e6,2024-01-31T19:54:08.847000 CVE-2024-23615,0,0,eafd7ffa6180e2fc03ed45df24f769fecb2bae7a56932300e20ffd987e061483,2024-01-31T23:46:44.913000 @@ -239882,7 +239888,7 @@ CVE-2024-23686,0,0,ed98c70a3681e7ffc9688a2b700aefef53fbafafcbc0cbfe3bff77d9af067 CVE-2024-23687,0,0,888c703c13765b4aadeca06043a7e3dd693e14ab5fbf0ceb683a371be24cfabd,2024-01-26T16:54:13.900000 CVE-2024-23688,0,0,07f47d429f26f5d25558115321368745a1af1492969a475a8855a8882844f455,2024-01-26T15:53:31.397000 CVE-2024-23689,0,0,d7d4e018343e45ab929852f091e2e71006911f05a5c0cdd59769a6f5a80fdcee,2024-01-26T14:50:45.023000 -CVE-2024-2370,1,1,16f988ff46fdfe91c440b55eb7c64364d5f6cdcb167f09fe7bf66f636001f14e,2024-03-11T13:15:52.920000 +CVE-2024-2370,0,0,16f988ff46fdfe91c440b55eb7c64364d5f6cdcb167f09fe7bf66f636001f14e,2024-03-11T13:15:52.920000 CVE-2024-23724,0,0,ce25237b1b8be392e772c83f957fdb1e42b10b520f1a3f65fb6dea0241ad88c3,2024-02-11T22:29:15.837000 CVE-2024-23725,0,0,e7109aa5ed154918326c3254d584acf7e8190c7c6acd985ea1145474ef362350,2024-01-29T15:25:48.110000 CVE-2024-23726,0,0,1e6b5838c3bbe1bdea4cff85e0dab09275e17fdbeddbc74981e476f308132713,2024-01-29T15:25:36.090000 @@ -240816,8 +240822,8 @@ CVE-2024-27133,0,0,1abfe171f722b9df6ead5b24935068c395a52a06c146ec300701d2b7e8652 CVE-2024-27138,0,0,1ec0ded3b41c12b07651e921188be783731716c54fb55c30f65f5b3e8197e8cc,2024-03-01T22:22:25.913000 CVE-2024-27139,0,0,66ddd9efc34252e5e972ac0e5a31e042faa3995b86c5ae6f0f108c10e1d7b562,2024-03-01T22:22:25.913000 CVE-2024-27140,0,0,34daddef6e0d13f2bea16bc1184887cdd01053137a36a3bc5699d2875c449127,2024-03-01T22:22:25.913000 -CVE-2024-27198,0,0,3a98d8062dafc1de24ad12b403b71c3094aa343c0c581a4abb34664c413ba43b,2024-03-08T02:00:01.667000 -CVE-2024-27199,0,0,d457ea54ebb9c29f640aac2e6f43f7c47fbeea8723f871e1cde0ce0fe82e1907,2024-03-05T13:41:01.900000 +CVE-2024-27198,0,1,e4259fe3d4611134ab5dfb0d4f88f5b563c21b8238f30b4253811838ad004753,2024-03-11T15:15:47.483000 +CVE-2024-27199,0,1,3dd3bfb58b796a8c7735f0a6f342852f32998fc13795786d35eb3d4375df0417,2024-03-11T15:15:47.663000 CVE-2024-27215,0,0,651ced2c4948681508a9ad090546fd018840608eea0c7482bdd7848315ac417f,2024-02-21T18:15:52.060000 CVE-2024-27255,0,0,07d4523d50b3b6ceec1ed85c31e8859376bfd63a9732f2f4d2cf6e5b4c34b76b,2024-03-04T13:58:23.447000 CVE-2024-27278,0,0,2ef9546b6eb3a76ad70be700186038d995dd630654759ed72b9b3d10968f6d39,2024-03-06T15:18:08.093000