From 625ac538279ffa8a3a4b1591a5c44b8dffc0efa1 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 27 Mar 2024 19:03:28 +0000 Subject: [PATCH] Auto-Update: 2024-03-27T19:00:37.713009+00:00 --- CVE-2023/CVE-2023-05xx/CVE-2023-0582.json | 59 +++++ CVE-2023/CVE-2023-51xx/CVE-2023-5189.json | 6 +- CVE-2024/CVE-2024-15xx/CVE-2024-1540.json | 4 +- CVE-2024/CVE-2024-15xx/CVE-2024-1580.json | 26 +- CVE-2024/CVE-2024-202xx/CVE-2024-20259.json | 55 +++++ CVE-2024/CVE-2024-202xx/CVE-2024-20265.json | 55 +++++ CVE-2024/CVE-2024-202xx/CVE-2024-20271.json | 55 +++++ CVE-2024/CVE-2024-202xx/CVE-2024-20276.json | 55 +++++ CVE-2024/CVE-2024-202xx/CVE-2024-20278.json | 55 +++++ CVE-2024/CVE-2024-203xx/CVE-2024-20303.json | 55 +++++ CVE-2024/CVE-2024-203xx/CVE-2024-20306.json | 55 +++++ CVE-2024/CVE-2024-203xx/CVE-2024-20307.json | 55 +++++ CVE-2024/CVE-2024-203xx/CVE-2024-20308.json | 43 ++++ CVE-2024/CVE-2024-203xx/CVE-2024-20309.json | 55 +++++ CVE-2024/CVE-2024-203xx/CVE-2024-20311.json | 55 +++++ CVE-2024/CVE-2024-203xx/CVE-2024-20312.json | 55 +++++ CVE-2024/CVE-2024-203xx/CVE-2024-20314.json | 55 +++++ CVE-2024/CVE-2024-203xx/CVE-2024-20316.json | 55 +++++ CVE-2024/CVE-2024-203xx/CVE-2024-20324.json | 55 +++++ CVE-2024/CVE-2024-203xx/CVE-2024-20333.json | 55 +++++ CVE-2024/CVE-2024-203xx/CVE-2024-20354.json | 55 +++++ CVE-2024/CVE-2024-234xx/CVE-2024-23450.json | 59 +++++ CVE-2024/CVE-2024-234xx/CVE-2024-23451.json | 55 +++++ CVE-2024/CVE-2024-299xx/CVE-2024-29945.json | 55 +++++ CVE-2024/CVE-2024-299xx/CVE-2024-29946.json | 59 +++++ CVE-2024/CVE-2024-29xx/CVE-2024-2982.json | 4 +- CVE-2024/CVE-2024-29xx/CVE-2024-2983.json | 4 +- CVE-2024/CVE-2024-29xx/CVE-2024-2984.json | 4 +- CVE-2024/CVE-2024-29xx/CVE-2024-2985.json | 92 +++++++ CVE-2024/CVE-2024-29xx/CVE-2024-2986.json | 92 +++++++ CVE-2024/CVE-2024-29xx/CVE-2024-2987.json | 92 +++++++ CVE-2024/CVE-2024-29xx/CVE-2024-2988.json | 92 +++++++ CVE-2024/CVE-2024-29xx/CVE-2024-2989.json | 92 +++++++ README.md | 72 +++--- _state.csv | 255 +++++++++++--------- 35 files changed, 1885 insertions(+), 160 deletions(-) create mode 100644 CVE-2023/CVE-2023-05xx/CVE-2023-0582.json create mode 100644 CVE-2024/CVE-2024-202xx/CVE-2024-20259.json create mode 100644 CVE-2024/CVE-2024-202xx/CVE-2024-20265.json create mode 100644 CVE-2024/CVE-2024-202xx/CVE-2024-20271.json create mode 100644 CVE-2024/CVE-2024-202xx/CVE-2024-20276.json create mode 100644 CVE-2024/CVE-2024-202xx/CVE-2024-20278.json create mode 100644 CVE-2024/CVE-2024-203xx/CVE-2024-20303.json create mode 100644 CVE-2024/CVE-2024-203xx/CVE-2024-20306.json create mode 100644 CVE-2024/CVE-2024-203xx/CVE-2024-20307.json create mode 100644 CVE-2024/CVE-2024-203xx/CVE-2024-20308.json create mode 100644 CVE-2024/CVE-2024-203xx/CVE-2024-20309.json create mode 100644 CVE-2024/CVE-2024-203xx/CVE-2024-20311.json create mode 100644 CVE-2024/CVE-2024-203xx/CVE-2024-20312.json create mode 100644 CVE-2024/CVE-2024-203xx/CVE-2024-20314.json create mode 100644 CVE-2024/CVE-2024-203xx/CVE-2024-20316.json create mode 100644 CVE-2024/CVE-2024-203xx/CVE-2024-20324.json create mode 100644 CVE-2024/CVE-2024-203xx/CVE-2024-20333.json create mode 100644 CVE-2024/CVE-2024-203xx/CVE-2024-20354.json create mode 100644 CVE-2024/CVE-2024-234xx/CVE-2024-23450.json create mode 100644 CVE-2024/CVE-2024-234xx/CVE-2024-23451.json create mode 100644 CVE-2024/CVE-2024-299xx/CVE-2024-29945.json create mode 100644 CVE-2024/CVE-2024-299xx/CVE-2024-29946.json create mode 100644 CVE-2024/CVE-2024-29xx/CVE-2024-2985.json create mode 100644 CVE-2024/CVE-2024-29xx/CVE-2024-2986.json create mode 100644 CVE-2024/CVE-2024-29xx/CVE-2024-2987.json create mode 100644 CVE-2024/CVE-2024-29xx/CVE-2024-2988.json create mode 100644 CVE-2024/CVE-2024-29xx/CVE-2024-2989.json diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0582.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0582.json new file mode 100644 index 00000000000..e78cb940cbd --- /dev/null +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0582.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-0582", + "sourceIdentifier": "psirt@forgerock.com", + "published": "2024-03-27T18:15:08.237", + "lastModified": "2024-03-27T18:15:08.237", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ForgeRock Access Management allows Authorization Bypass.\n\nThis issue affects access management: before 7.3.0, before 7.2.1, before 7.1.4, through 7.0.2.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@forgerock.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@forgerock.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://backstage.forgerock.com/downloads/browse/am/featured", + "source": "psirt@forgerock.com" + }, + { + "url": "https://backstage.forgerock.com/knowledge/kb/article/a64088600", + "source": "psirt@forgerock.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5189.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5189.json index ebce12fc4be..6f586efc323 100644 --- a/CVE-2023/CVE-2023-51xx/CVE-2023-5189.json +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5189.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5189", "sourceIdentifier": "secalert@redhat.com", "published": "2023-11-14T23:15:12.290", - "lastModified": "2023-12-13T10:15:10.110", + "lastModified": "2024-03-27T18:15:08.710", "vulnStatus": "Modified", "descriptions": [ { @@ -97,6 +97,10 @@ "url": "https://access.redhat.com/errata/RHSA-2023:7773", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:1536", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-5189", "source": "secalert@redhat.com", diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1540.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1540.json index fa99753b346..909f053c891 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1540.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1540.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1540", "sourceIdentifier": "security@huntr.dev", "published": "2024-03-27T16:15:09.963", - "lastModified": "2024-03-27T16:15:09.963", - "vulnStatus": "Received", + "lastModified": "2024-03-27T17:48:21.140", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1580.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1580.json index 99f610d2af7..eb85bfeee45 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1580.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1580.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1580", "sourceIdentifier": "cve-coordination@google.com", "published": "2024-02-19T11:15:08.817", - "lastModified": "2024-03-26T00:15:08.497", + "lastModified": "2024-03-27T18:15:09.063", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,30 @@ } ], "references": [ + { + "url": "http://seclists.org/fulldisclosure/2024/Mar/36", + "source": "cve-coordination@google.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2024/Mar/37", + "source": "cve-coordination@google.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2024/Mar/38", + "source": "cve-coordination@google.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2024/Mar/39", + "source": "cve-coordination@google.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2024/Mar/40", + "source": "cve-coordination@google.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2024/Mar/41", + "source": "cve-coordination@google.com" + }, { "url": "https://code.videolan.org/videolan/dav1d/-/blob/master/NEWS", "source": "cve-coordination@google.com" diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20259.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20259.json new file mode 100644 index 00000000000..ca15c113779 --- /dev/null +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20259.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-20259", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-03-27T17:15:50.913", + "lastModified": "2024-03-27T17:48:21.140", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the DHCP snooping feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition.\r\n\r This vulnerability is due to a crafted IPv4 DHCP request packet being mishandled when endpoint analytics are enabled. An attacker could exploit this vulnerability by sending a crafted DHCP request through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.\r\n\r Note: The attack vector is listed as network because a DHCP relay anywhere on the network could allow exploits from networks other than the adjacent one." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dhcp-dos-T3CXPO9z", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20265.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20265.json new file mode 100644 index 00000000000..547211af131 --- /dev/null +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20265.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-20265", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-03-27T17:15:51.113", + "lastModified": "2024-03-27T17:48:21.140", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the boot process of Cisco Access Point (AP) Software could allow an unauthenticated, physical attacker to bypass the Cisco Secure Boot functionality and load a software image that has been tampered with on an affected device.\r\n\r This vulnerability exists because unnecessary commands are available during boot time at the physical console. An attacker could exploit this vulnerability by interrupting the boot process and executing specific commands to bypass the Cisco Secure Boot validation checks and load an image that has been tampered with. This image would have been previously downloaded onto the targeted device. A successful exploit could allow the attacker to load the image once. The Cisco Secure Boot functionality is not permanently compromised." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-501" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-secureboot-bypass-zT5vJkSD", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20271.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20271.json new file mode 100644 index 00000000000..9c58acda8f0 --- /dev/null +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20271.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-20271", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-03-27T17:15:51.320", + "lastModified": "2024-03-27T17:48:21.140", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the IP packet processing of Cisco Access Point (AP) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to insufficient input validation of certain IPv4 packets. An attacker could exploit this vulnerability by sending a crafted IPv4 packet either to or through an affected device. A successful exploit could allow the attacker to cause an affected device to reload unexpectedly, resulting in a DoS condition. To successfully exploit this vulnerability, the attacker does not need to be associated with the affected AP. This vulnerability cannot be exploited by sending IPv6 packets." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-dos-h9TGGX6W", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20276.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20276.json new file mode 100644 index 00000000000..4a409055089 --- /dev/null +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20276.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-20276", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-03-27T17:15:51.513", + "lastModified": "2024-03-27T17:48:21.140", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in Cisco IOS Software for Cisco Catalyst 6000 Series Switches could allow an unauthenticated, adjacent attacker to cause an affected device to reload unexpectedly.\r\n\r This vulnerability is due to improper handling of process-switched traffic. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-248" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-dos-Hq4d3tZG", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20278.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20278.json new file mode 100644 index 00000000000..84297d45a12 --- /dev/null +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20278.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-20278", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-03-27T17:15:51.703", + "lastModified": "2024-03-27T17:48:21.140", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the NETCONF feature of Cisco IOS XE Software could allow an authenticated, remote attacker to elevate privileges to root on an affected device.\r\n\r This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted input over NETCONF to an affected device. A successful exploit could allow the attacker to elevate privileges from Administrator to root." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-184" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-seAx6NLX", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20303.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20303.json new file mode 100644 index 00000000000..249d83b7b16 --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20303.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-20303", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-03-27T17:15:51.880", + "lastModified": "2024-03-27T17:48:21.140", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the multicast DNS (mDNS) gateway feature of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition.\r\n\r This vulnerability is due to improper management of mDNS client entries. An attacker could exploit this vulnerability by connecting to the wireless network and sending a continuous stream of specific mDNS packets. A successful exploit could allow the attacker to cause the wireless controller to have high CPU utilization, which could lead to access points (APs) losing their connection to the controller and result in a DoS condition." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-459" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-mdns-dos-4hv6pBGf", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20306.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20306.json new file mode 100644 index 00000000000..ce33dba41ca --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20306.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-20306", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-03-27T17:15:52.067", + "lastModified": "2024-03-27T17:48:21.140", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the Unified Threat Defense (UTD) configuration CLI of Cisco IOS XE Software could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying host operating system. To exploit this vulnerability, an attacker must have level 15 privileges on the affected device. \r\n\r This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by submitting a crafted CLI command to an affected device. A successful exploit could allow the attacker to execute arbitrary commands as root on the underlying operating system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-233" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-utd-cmd-JbL8KvHT", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20307.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20307.json new file mode 100644 index 00000000000..eac21feac9b --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20307.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-20307", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-03-27T18:15:09.357", + "lastModified": "2024-03-27T18:15:09.357", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the IKEv1 fragmentation code of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a heap overflow, resulting in an affected device reloading.\r\n\r This vulnerability exists because crafted, fragmented IKEv1 packets are not properly reassembled. An attacker could exploit this vulnerability by sending crafted UDP packets to an affected system. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.\r\n\r Note: Only traffic that is directed to the affected system can be used to exploit this vulnerability. This vulnerability can be triggered by IPv4 and IPv6 traffic." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev1-NO2ccFWz", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20308.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20308.json new file mode 100644 index 00000000000..af3f5e6634d --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20308.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2024-20308", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-03-27T18:15:09.853", + "lastModified": "2024-03-27T18:15:09.853", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the IKEv1 fragmentation code of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a heap underflow, resulting in an affected device reloading.\r\n\r This vulnerability exists because crafted, fragmented IKEv1 packets are not properly reassembled. An attacker could exploit this vulnerability by sending crafted UDP packets to an affected system. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.\r\n\r Note: Only traffic that is directed to the affected system can be used to exploit this vulnerability. This vulnerability can be triggered by IPv4 and IPv6 traffic.." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev1-NO2ccFWz", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20309.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20309.json new file mode 100644 index 00000000000..9e89a144593 --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20309.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-20309", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-03-27T17:15:52.260", + "lastModified": "2024-03-27T17:48:21.140", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in auxiliary asynchronous port (AUX) functions of Cisco IOS XE Software could allow an authenticated, local attacker to cause an affected device to reload or stop responding.\r\n\r This vulnerability is due to the incorrect handling of specific ingress traffic when flow control hardware is enabled on the AUX port. An attacker could exploit this vulnerability by reverse telnetting to the AUX port and sending specific data after connecting. A successful exploit could allow the attacker to cause the device to reset or stop responding, resulting in a denial of service (DoS) condition." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.1, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-828" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aux-333WBz8f", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20311.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20311.json new file mode 100644 index 00000000000..17a1917975d --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20311.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-20311", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-03-27T17:15:52.463", + "lastModified": "2024-03-27T17:48:21.140", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the Locator ID Separation Protocol (LISP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload.\r\n\r This vulnerability is due to the incorrect handling of LISP packets. An attacker could exploit this vulnerability by sending a crafted LISP packet to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition.\r\n\r Note: This vulnerability could be exploited over either IPv4 or IPv6 transport." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-674" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lisp-3gYXs3qP", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20312.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20312.json new file mode 100644 index 00000000000..78d4ab5accb --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20312.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-20312", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-03-27T17:15:52.690", + "lastModified": "2024-03-27T17:48:21.140", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the Intermediate System-to-Intermediate System (IS-IS) protocol of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to insufficient input validation when parsing an ingress IS-IS packet. An attacker could exploit this vulnerability by sending a crafted IS-IS packet to an affected device after forming an adjacency. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.\r\n\r Note: The IS-IS protocol is a routing protocol. To exploit this vulnerability, an attacker must be Layer 2-adjacent to the affected device and have formed an adjacency." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-isis-sGjyOUHX", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20314.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20314.json new file mode 100644 index 00000000000..a3ae4bfb678 --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20314.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-20314", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-03-27T17:15:52.920", + "lastModified": "2024-03-27T17:48:21.140", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the IPv4 Software-Defined Access (SD-Access) fabric edge node feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause high CPU utilization and stop all traffic processing, resulting in a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to improper handling of certain IPv4 packets. An attacker could exploit this vulnerability by sending certain IPv4 packets to an affected device. A successful exploit could allow the attacker to cause the device to exhaust CPU resources and stop processing traffic, resulting in a DoS condition." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-783" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-sda-edge-dos-qZWuWXWG", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20316.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20316.json new file mode 100644 index 00000000000..450ff06b9dd --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20316.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-20316", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-03-27T17:15:53.110", + "lastModified": "2024-03-27T17:48:21.140", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the data model interface (DMI) services of Cisco IOS XE Software could allow an unauthenticated, remote attacker to access resources that should have been protected by a configured IPv4 access control list (ACL).\r\n\r This vulnerability is due to improper handling of error conditions when a successfully authorized device administrator updates an IPv4 ACL using the NETCONF or RESTCONF protocol, and the update would reorder access control entries (ACEs) in the updated ACL. An attacker could exploit this vulnerability by accessing resources that should have been protected across an affected device." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-390" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dmi-acl-bypass-Xv8FO8Vz", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20324.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20324.json new file mode 100644 index 00000000000..998c4da746f --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20324.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-20324", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-03-27T17:15:53.293", + "lastModified": "2024-03-27T17:48:21.140", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, low-privileged, local attacker to access WLAN configuration details including passwords.\r\n\r This vulnerability is due to improper privilege checks. An attacker could exploit this vulnerability by using the show and show tech wireless CLI commands to access configuration details, including passwords. A successful exploit could allow the attacker to access configuration details that they are not authorized to access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-274" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-wlc-privesc-RjSMrmPK", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20333.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20333.json new file mode 100644 index 00000000000..9314acad8ba --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20333.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-20333", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-03-27T17:15:53.480", + "lastModified": "2024-03-27T17:48:21.140", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Catalyst Center, formerly Cisco DNA Center, could allow an authenticated, remote attacker to change specific data within the interface on an affected device.\r\n\r This vulnerability is due to insufficient authorization enforcement. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to change a specific field within the web-based management interface, even though they should not have access to change that field." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ccc-authz-bypass-5EKchJRb", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20354.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20354.json new file mode 100644 index 00000000000..6fc60041b8e --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20354.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-20354", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-03-27T17:15:53.660", + "lastModified": "2024-03-27T17:48:21.140", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the handling of encrypted wireless frames of Cisco Aironet Access Point (AP) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on the affected device.\r\n\r This vulnerability is due to incomplete cleanup of resources when dropping certain malformed frames. An attacker could exploit this vulnerability by connecting as a wireless client to an affected AP and sending specific malformed frames over the wireless connection. A successful exploit could allow the attacker to cause degradation of service to other clients, which could potentially lead to a complete DoS condition." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-460" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-airo-ap-dos-PPPtcVW", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-234xx/CVE-2024-23450.json b/CVE-2024/CVE-2024-234xx/CVE-2024-23450.json new file mode 100644 index 00000000000..1bd7ca0b982 --- /dev/null +++ b/CVE-2024/CVE-2024-234xx/CVE-2024-23450.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-23450", + "sourceIdentifier": "bressers@elastic.co", + "published": "2024-03-27T17:15:53.857", + "lastModified": "2024-03-27T17:48:21.140", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A flaw was discovered in Elasticsearch, where processing a document in a deeply nested pipeline on an ingest node could cause the Elasticsearch node to crash." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "bressers@elastic.co", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "bressers@elastic.co", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://discuss.elastic.co/t/elasticsearch-8-13-0-7-17-19-security-update-esa-2024-06/356314", + "source": "bressers@elastic.co" + }, + { + "url": "https://www.elastic.co/community/security", + "source": "bressers@elastic.co" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-234xx/CVE-2024-23451.json b/CVE-2024/CVE-2024-234xx/CVE-2024-23451.json new file mode 100644 index 00000000000..0c71b2b3be0 --- /dev/null +++ b/CVE-2024/CVE-2024-234xx/CVE-2024-23451.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-23451", + "sourceIdentifier": "bressers@elastic.co", + "published": "2024-03-27T18:15:10.330", + "lastModified": "2024-03-27T18:15:10.330", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Authorization issue exists in the API key based security model for Remote Cluster Security, which is currently in Beta, in Elasticsearch 8.10.0 and before 8.13.0. This allows a\u00a0malicious user with a valid API key for a remote cluster configured to use the new Remote Cluster Security to read arbitrary documents from any index on the remote cluster, and only if they use the Elasticsearch custom transport protocol to issue requests with the target index ID, the shard ID and the document ID. None of Elasticsearch REST API endpoints are affected by this issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "bressers@elastic.co", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "bressers@elastic.co", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://discuss.elastic.co/t/elasticsearch-8-13-0-security-update-esa-2024-07/356315", + "source": "bressers@elastic.co" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29945.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29945.json new file mode 100644 index 00000000000..1cdbcbe05ec --- /dev/null +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29945.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29945", + "sourceIdentifier": "prodsec@splunk.com", + "published": "2024-03-27T17:15:54.087", + "lastModified": "2024-03-27T17:48:21.140", + "vulnStatus": "Undergoing Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, the software potentially exposes authentication tokens during the token validation process. This exposure happens when either Splunk Enterprise runs in debug mode or the JsonWebToken component has been configured to log its activity at the DEBUG logging level." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "references": [ + { + "url": "https://advisory.splunk.com/advisories/SVD-2024-0301", + "source": "prodsec@splunk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29946.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29946.json new file mode 100644 index 00000000000..77e5c8aa16b --- /dev/null +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29946.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-29946", + "sourceIdentifier": "prodsec@splunk.com", + "published": "2024-03-27T17:15:54.273", + "lastModified": "2024-03-27T17:48:21.140", + "vulnStatus": "Undergoing Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, the Dashboard Examples Hub in the Splunk Dashboard Studio app lacks protections for risky SPL commands. This could let attackers bypass SPL safeguards for risky commands in the Hub. The vulnerability would require the attacker to phish the victim by tricking them into initiating a request within their browser." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "prodsec@splunk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://advisory.splunk.com/advisories/SVD-2024-0302", + "source": "prodsec@splunk.com" + }, + { + "url": "https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/", + "source": "prodsec@splunk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2982.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2982.json index 034e509db4b..d2085524741 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2982.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2982.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2982", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T16:15:10.210", - "lastModified": "2024-03-27T16:15:10.210", - "vulnStatus": "Received", + "lastModified": "2024-03-27T17:48:21.140", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2983.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2983.json index dde8ce42e63..5567958e162 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2983.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2983.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2983", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T16:15:10.450", - "lastModified": "2024-03-27T16:15:10.450", - "vulnStatus": "Received", + "lastModified": "2024-03-27T17:48:21.140", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2984.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2984.json index 9a379eca898..d9609a3b38a 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2984.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2984.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2984", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T16:15:10.713", - "lastModified": "2024-03-27T16:15:10.713", - "vulnStatus": "Received", + "lastModified": "2024-03-27T17:48:21.140", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2985.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2985.json new file mode 100644 index 00000000000..432c8d44158 --- /dev/null +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2985.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-2985", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-27T17:15:54.460", + "lastModified": "2024-03-27T17:48:21.140", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Tenda FH1202 1.2.0.14(408). It has been declared as critical. This vulnerability affects the function formQuickIndex of the file /goform/QuickIndex. The manipulation of the argument PPPOEPassword leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-258154 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formQuickIndex.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.258154", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.258154", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.301276", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2986.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2986.json new file mode 100644 index 00000000000..01ccf74ca12 --- /dev/null +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2986.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-2986", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-27T17:15:54.693", + "lastModified": "2024-03-27T17:48:21.140", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Tenda FH1202 1.2.0.14(408). It has been rated as critical. This issue affects the function formSetSpeedWan of the file /goform/SetSpeedWan. The manipulation of the argument speed_dir leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258155. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/SetSpeedWan.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.258155", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.258155", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.301284", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2987.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2987.json new file mode 100644 index 00000000000..f925dce0c34 --- /dev/null +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2987.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-2987", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-27T17:15:54.917", + "lastModified": "2024-03-27T17:48:21.140", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in Tenda FH1202 1.2.0.14(408). Affected is the function GetParentControlInfo of the file /goform/GetParentControlInfo. The manipulation of the argument mac leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258156. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/GetParentControlInfo.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.258156", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.258156", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.301285", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2988.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2988.json new file mode 100644 index 00000000000..61d45e50487 --- /dev/null +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2988.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-2988", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-27T18:15:10.757", + "lastModified": "2024-03-27T18:15:10.757", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in Tenda FH1203 2.0.1.6. Affected by this vulnerability is the function fromSetRouteStatic of the file /goform/fromRouteStatic. The manipulation of the argument entrys leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258157 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromSetRouteStatic.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.258157", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.258157", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.301363", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2989.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2989.json new file mode 100644 index 00000000000..c9ba1ae20c3 --- /dev/null +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2989.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-2989", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-27T18:15:11.293", + "lastModified": "2024-03-27T18:15:11.293", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in Tenda FH1203 2.0.1.6. Affected by this issue is the function fromNatStaticSetting of the file /goform/NatStaticSetting. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-258158 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromNatStaticSetting.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.258158", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.258158", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.301364", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 05a66d6c892..7ad70d48f68 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-03-27T17:00:39.052121+00:00 +2024-03-27T19:00:37.713009+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-03-27T16:15:10.713000+00:00 +2024-03-27T18:15:11.293000+00:00 ``` ### Last Data Feed Release @@ -33,50 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -243015 +243042 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `27` -- [CVE-2024-1540](CVE-2024/CVE-2024-15xx/CVE-2024-1540.json) (`2024-03-27T16:15:09.963`) -- [CVE-2024-2980](CVE-2024/CVE-2024-29xx/CVE-2024-2980.json) (`2024-03-27T15:15:48.420`) -- [CVE-2024-2981](CVE-2024/CVE-2024-29xx/CVE-2024-2981.json) (`2024-03-27T15:15:48.643`) -- [CVE-2024-2982](CVE-2024/CVE-2024-29xx/CVE-2024-2982.json) (`2024-03-27T16:15:10.210`) -- [CVE-2024-2983](CVE-2024/CVE-2024-29xx/CVE-2024-2983.json) (`2024-03-27T16:15:10.450`) -- [CVE-2024-2984](CVE-2024/CVE-2024-29xx/CVE-2024-2984.json) (`2024-03-27T16:15:10.713`) +- [CVE-2024-20265](CVE-2024/CVE-2024-202xx/CVE-2024-20265.json) (`2024-03-27T17:15:51.113`) +- [CVE-2024-20271](CVE-2024/CVE-2024-202xx/CVE-2024-20271.json) (`2024-03-27T17:15:51.320`) +- [CVE-2024-20276](CVE-2024/CVE-2024-202xx/CVE-2024-20276.json) (`2024-03-27T17:15:51.513`) +- [CVE-2024-20278](CVE-2024/CVE-2024-202xx/CVE-2024-20278.json) (`2024-03-27T17:15:51.703`) +- [CVE-2024-20303](CVE-2024/CVE-2024-203xx/CVE-2024-20303.json) (`2024-03-27T17:15:51.880`) +- [CVE-2024-20306](CVE-2024/CVE-2024-203xx/CVE-2024-20306.json) (`2024-03-27T17:15:52.067`) +- [CVE-2024-20307](CVE-2024/CVE-2024-203xx/CVE-2024-20307.json) (`2024-03-27T18:15:09.357`) +- [CVE-2024-20308](CVE-2024/CVE-2024-203xx/CVE-2024-20308.json) (`2024-03-27T18:15:09.853`) +- [CVE-2024-20309](CVE-2024/CVE-2024-203xx/CVE-2024-20309.json) (`2024-03-27T17:15:52.260`) +- [CVE-2024-20311](CVE-2024/CVE-2024-203xx/CVE-2024-20311.json) (`2024-03-27T17:15:52.463`) +- [CVE-2024-20312](CVE-2024/CVE-2024-203xx/CVE-2024-20312.json) (`2024-03-27T17:15:52.690`) +- [CVE-2024-20314](CVE-2024/CVE-2024-203xx/CVE-2024-20314.json) (`2024-03-27T17:15:52.920`) +- [CVE-2024-20316](CVE-2024/CVE-2024-203xx/CVE-2024-20316.json) (`2024-03-27T17:15:53.110`) +- [CVE-2024-20324](CVE-2024/CVE-2024-203xx/CVE-2024-20324.json) (`2024-03-27T17:15:53.293`) +- [CVE-2024-20333](CVE-2024/CVE-2024-203xx/CVE-2024-20333.json) (`2024-03-27T17:15:53.480`) +- [CVE-2024-20354](CVE-2024/CVE-2024-203xx/CVE-2024-20354.json) (`2024-03-27T17:15:53.660`) +- [CVE-2024-23450](CVE-2024/CVE-2024-234xx/CVE-2024-23450.json) (`2024-03-27T17:15:53.857`) +- [CVE-2024-23451](CVE-2024/CVE-2024-234xx/CVE-2024-23451.json) (`2024-03-27T18:15:10.330`) +- [CVE-2024-2985](CVE-2024/CVE-2024-29xx/CVE-2024-2985.json) (`2024-03-27T17:15:54.460`) +- [CVE-2024-2986](CVE-2024/CVE-2024-29xx/CVE-2024-2986.json) (`2024-03-27T17:15:54.693`) +- [CVE-2024-2987](CVE-2024/CVE-2024-29xx/CVE-2024-2987.json) (`2024-03-27T17:15:54.917`) +- [CVE-2024-2988](CVE-2024/CVE-2024-29xx/CVE-2024-2988.json) (`2024-03-27T18:15:10.757`) +- [CVE-2024-2989](CVE-2024/CVE-2024-29xx/CVE-2024-2989.json) (`2024-03-27T18:15:11.293`) +- [CVE-2024-29945](CVE-2024/CVE-2024-299xx/CVE-2024-29945.json) (`2024-03-27T17:15:54.087`) +- [CVE-2024-29946](CVE-2024/CVE-2024-299xx/CVE-2024-29946.json) (`2024-03-27T17:15:54.273`) ### CVEs modified in the last Commit -Recently modified CVEs: `106` +Recently modified CVEs: `6` -- [CVE-2024-29777](CVE-2024/CVE-2024-297xx/CVE-2024-29777.json) (`2024-03-27T15:49:41.437`) -- [CVE-2024-2978](CVE-2024/CVE-2024-29xx/CVE-2024-2978.json) (`2024-03-27T15:49:41.437`) -- [CVE-2024-29788](CVE-2024/CVE-2024-297xx/CVE-2024-29788.json) (`2024-03-27T15:49:41.437`) -- [CVE-2024-29789](CVE-2024/CVE-2024-297xx/CVE-2024-29789.json) (`2024-03-27T15:49:41.437`) -- [CVE-2024-2979](CVE-2024/CVE-2024-29xx/CVE-2024-2979.json) (`2024-03-27T15:49:41.437`) -- [CVE-2024-29790](CVE-2024/CVE-2024-297xx/CVE-2024-29790.json) (`2024-03-27T15:49:41.437`) -- [CVE-2024-29791](CVE-2024/CVE-2024-297xx/CVE-2024-29791.json) (`2024-03-27T15:49:41.437`) -- [CVE-2024-29792](CVE-2024/CVE-2024-297xx/CVE-2024-29792.json) (`2024-03-27T15:49:41.437`) -- [CVE-2024-29793](CVE-2024/CVE-2024-297xx/CVE-2024-29793.json) (`2024-03-27T15:49:41.437`) -- [CVE-2024-29794](CVE-2024/CVE-2024-297xx/CVE-2024-29794.json) (`2024-03-27T15:49:41.437`) -- [CVE-2024-29795](CVE-2024/CVE-2024-297xx/CVE-2024-29795.json) (`2024-03-27T15:49:41.437`) -- [CVE-2024-29796](CVE-2024/CVE-2024-297xx/CVE-2024-29796.json) (`2024-03-27T15:49:41.437`) -- [CVE-2024-29797](CVE-2024/CVE-2024-297xx/CVE-2024-29797.json) (`2024-03-27T15:49:41.437`) -- [CVE-2024-29798](CVE-2024/CVE-2024-297xx/CVE-2024-29798.json) (`2024-03-27T15:49:41.437`) -- [CVE-2024-29799](CVE-2024/CVE-2024-297xx/CVE-2024-29799.json) (`2024-03-27T15:49:41.437`) -- [CVE-2024-29801](CVE-2024/CVE-2024-298xx/CVE-2024-29801.json) (`2024-03-27T15:49:41.437`) -- [CVE-2024-29802](CVE-2024/CVE-2024-298xx/CVE-2024-29802.json) (`2024-03-27T15:49:41.437`) -- [CVE-2024-29803](CVE-2024/CVE-2024-298xx/CVE-2024-29803.json) (`2024-03-27T15:49:41.437`) -- [CVE-2024-29804](CVE-2024/CVE-2024-298xx/CVE-2024-29804.json) (`2024-03-27T15:49:41.437`) -- [CVE-2024-29805](CVE-2024/CVE-2024-298xx/CVE-2024-29805.json) (`2024-03-27T15:49:41.437`) -- [CVE-2024-29806](CVE-2024/CVE-2024-298xx/CVE-2024-29806.json) (`2024-03-27T15:49:41.437`) -- [CVE-2024-29807](CVE-2024/CVE-2024-298xx/CVE-2024-29807.json) (`2024-03-27T15:49:41.437`) -- [CVE-2024-29811](CVE-2024/CVE-2024-298xx/CVE-2024-29811.json) (`2024-03-27T15:49:41.437`) -- [CVE-2024-29812](CVE-2024/CVE-2024-298xx/CVE-2024-29812.json) (`2024-03-27T15:49:41.437`) -- [CVE-2024-30238](CVE-2024/CVE-2024-302xx/CVE-2024-30238.json) (`2024-03-27T15:49:41.437`) +- [CVE-2023-5189](CVE-2023/CVE-2023-51xx/CVE-2023-5189.json) (`2024-03-27T18:15:08.710`) +- [CVE-2024-1540](CVE-2024/CVE-2024-15xx/CVE-2024-1540.json) (`2024-03-27T17:48:21.140`) +- [CVE-2024-1580](CVE-2024/CVE-2024-15xx/CVE-2024-1580.json) (`2024-03-27T18:15:09.063`) +- [CVE-2024-2982](CVE-2024/CVE-2024-29xx/CVE-2024-2982.json) (`2024-03-27T17:48:21.140`) +- [CVE-2024-2983](CVE-2024/CVE-2024-29xx/CVE-2024-2983.json) (`2024-03-27T17:48:21.140`) +- [CVE-2024-2984](CVE-2024/CVE-2024-29xx/CVE-2024-2984.json) (`2024-03-27T17:48:21.140`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 7a487e3075b..86ff62f29bd 100644 --- a/_state.csv +++ b/_state.csv @@ -137319,7 +137319,7 @@ CVE-2019-2045,0,0,1705229e4fec9bfd82aef2ac1bb1c2832b7fc423971d0092d9264e10cc6fd5 CVE-2019-20451,0,0,4d0762291a44e046795f84a4a06312ecbbc433e327a7f1e0d5459472a5e8f6f6,2021-09-09T17:41:35.163000 CVE-2019-20452,0,0,1f4817a23fd44e7988cfa9a7e5714919e1f832aa5a7fdf2840e96e68b57f31cb,2020-08-24T17:37:01.140000 CVE-2019-20453,0,0,f7bfb81c36b8409e27bcfd752ebe01abba843256421a0d4b2f525ac7e95541d5,2020-08-24T17:37:01.140000 -CVE-2019-20454,0,1,c2543304793955f430a64b58f46bed16bf5f70f7299b4671d92d021d0fd8dc76,2024-03-27T16:05:17.853000 +CVE-2019-20454,0,0,c2543304793955f430a64b58f46bed16bf5f70f7299b4671d92d021d0fd8dc76,2024-03-27T16:05:17.853000 CVE-2019-20455,0,0,020f23034a46cfcbb565c99a2d99878424784e7d74607830136b187ff274b046,2024-02-14T01:17:43.863000 CVE-2019-20456,0,0,f5478a7543aa47e5bb933cc310b3647eb2820951f2995f375bdbe4dff39f90a0,2020-02-26T15:10:12.293000 CVE-2019-2046,0,0,5a99507a8351f8e058070df1d46e5e4a8733b86f79bb1d0063ca3a86c67d1bff,2021-07-21T11:39:23.747000 @@ -137722,7 +137722,7 @@ CVE-2019-20834,0,0,2f046198ffab2ceb1fc7e73446b82a9822085609cdbb82469e2699c1c960f CVE-2019-20835,0,0,4e5523f899e61855d812ac2a1e43101d0993f92a1e0e689e05361cb59d2b2e6b,2020-06-05T16:28:06.647000 CVE-2019-20836,0,0,884b3ca5bb0fe09112ce82a99226cd4cee13d30147b25af155e4811fdc80bdb3,2020-06-05T16:15:58.883000 CVE-2019-20837,0,0,1327025412446e71b0bb00c2f3d6721de4beba338c3d8c9d7bf39b7f128a72d7,2020-06-05T16:29:52.857000 -CVE-2019-20838,0,1,ae85425ffe9a90e620e01fbb5f6fb3ec72934f3c2a72308ebfe16b79353d78e2,2024-03-27T16:05:46.553000 +CVE-2019-20838,0,0,ae85425ffe9a90e620e01fbb5f6fb3ec72934f3c2a72308ebfe16b79353d78e2,2024-03-27T16:05:46.553000 CVE-2019-20839,0,0,fff52c25682d0f6d7e1c0e14768f63c2c904e37343a8044d7831bcbfd024b515,2023-11-07T03:09:13.630000 CVE-2019-2084,0,0,5e601ed0ca8bcc9033586975ff4fc6e7b2f7b5d3ef91eec06b110cebd1d7ad51,2019-10-01T13:30:46.273000 CVE-2019-20840,0,0,aefbc83031592623633897c2f9cdcd0ba991e172c26249b04dbed70dd6ecd9ed,2023-11-07T03:09:13.720000 @@ -148884,7 +148884,7 @@ CVE-2020-14151,0,0,9ffddf0999e3d6a8a75e114bd5964acf118fd9c17127d60bccf0e39641478 CVE-2020-14152,0,0,57e3f0cecf7bf86bfe5da88a7620e56351963f06700f63c35b8f5171187e3849,2023-02-27T18:17:27.037000 CVE-2020-14153,0,0,237e4355f1b9bc09eda761245741f1003a98ac0666084ce326343a58b8dbcc5e,2023-02-27T18:18:36.527000 CVE-2020-14154,0,0,03dc2a851685fd84058c57da71b4b3e059b96f8634c99ac94cc109d7b722276a,2023-03-01T16:01:38.367000 -CVE-2020-14155,0,1,71383f8981e2e521d3a64705adf0ac7a332883e698a288bb87a7e3df9703cdba,2024-03-27T16:04:48.863000 +CVE-2020-14155,0,0,71383f8981e2e521d3a64705adf0ac7a332883e698a288bb87a7e3df9703cdba,2024-03-27T16:04:48.863000 CVE-2020-14156,0,0,926f8b5c9a479e61c041a7ec2f5fb4b4fef427878be695f5f18dd7586db5dc89,2020-06-22T18:33:42.990000 CVE-2020-14157,0,0,ec6714662b4fd251e84456bfdef37480a0d5b708cceace12ae5070f687b701b6,2021-07-21T11:39:23.747000 CVE-2020-14158,0,0,257c62d2d59f801f636fda0a5316dad846b25cbce009f7e0efa72f1cac35ab1c,2020-08-05T14:37:36.397000 @@ -162959,7 +162959,7 @@ CVE-2020-8165,0,0,b90f56eef4d394caafda41afeb1888db8d9e5be27c35ede9be39154ac6db31 CVE-2020-8166,0,0,47c3904ebbdd2a5d9a1995acdeafdcc0912b1b4a1c6f035b0f63ad505e021cdf,2020-11-20T17:47:47.463000 CVE-2020-8167,0,0,6d3767d0ff1146a65240741c1692557c5e3379cf0dd5883c168490dc71b44892,2021-10-21T14:35:21.047000 CVE-2020-8168,0,0,ccb8c7a6475759104f1711b3a83fc1942ad048ad01cf973341e84f4b01e9b3dd,2023-11-07T03:26:17.750000 -CVE-2020-8169,0,1,5c99b47230440422d8b435273484301a874fd5e619e3cc621c9255024327f19b,2024-03-27T16:04:23.890000 +CVE-2020-8169,0,0,5c99b47230440422d8b435273484301a874fd5e619e3cc621c9255024327f19b,2024-03-27T16:04:23.890000 CVE-2020-8170,0,0,c93bdaef62335dd3a34e497b1610bbed4f1531f0cdc62596c702d97cf7316ed2,2020-05-28T20:03:07.140000 CVE-2020-8171,0,0,645a1ab3b96b9928f218f2a9a5fca0f8e8167d5a980ea9eeeaf49fee58513164,2020-05-28T20:00:03.527000 CVE-2020-8172,0,0,aa60f1cb50e023b6bcefad51394fa465cda46ac1817e5b5ccf939eaf3ce619c5,2022-05-12T15:01:02.140000 @@ -162967,7 +162967,7 @@ CVE-2020-8173,0,0,34ceedff128c979f4774d29c75bd8a1e6c39839074dee16b306c28f746c7ce CVE-2020-8174,0,0,ac6b23e6b056d5a60f6974c777b55f9bb43d28eb7261a72f0325944e6fa3d8f6,2022-05-12T15:01:21.717000 CVE-2020-8175,0,0,7c8b3c608d62151b045b3bb4fdf28e38a67da6066b16b2a4582925c6150ce840,2020-07-27T17:54:05.343000 CVE-2020-8176,0,0,4a4c8126c4dcf74ee9d176934e967067a7bb58ed770baed0696fedbbcf0cd9a3,2020-07-10T19:30:40.273000 -CVE-2020-8177,0,1,349339cb813587dce0e4231c21f8a34d831e8d889fe95ab7ae85eb5b183170d8,2024-03-27T16:04:20.437000 +CVE-2020-8177,0,0,349339cb813587dce0e4231c21f8a34d831e8d889fe95ab7ae85eb5b183170d8,2024-03-27T16:04:20.437000 CVE-2020-8178,0,0,81183e0e8c36d4d786b7e3a77c245d153eb61d8171589dd60b01f990fe023e7b,2020-07-21T12:36:01.557000 CVE-2020-8179,0,0,935857d37fccce66d998380d30e28774b93fb272a89f5be8703042a361a65e66,2020-07-08T15:18:11.680000 CVE-2020-8180,0,0,8cb081c94bf954092880caba93d685420308ab45526f3938b72742d9685a0bb4,2020-06-11T18:10:23.393000 @@ -163021,7 +163021,7 @@ CVE-2020-8227,0,0,3b78fe266dffb4032d2b4e32d9ef3476c07b68b63646b25b0f1292cb88f6cc CVE-2020-8228,0,0,51f515d27850dd37c61ce5207f1b36b53947b36f17faa52faecdff4b8377a4a1,2020-10-20T18:56:06.573000 CVE-2020-8229,0,0,08777f070fbcde0d30b96edeece4f672522bb23e5cbc11f4f79f873314073641,2022-09-27T16:00:41.497000 CVE-2020-8230,0,0,2f0be1134ef3c6182aa36f6843e120f2dbc96fb6cf2b7c6eaaa30173af344e84,2022-09-27T15:55:38.753000 -CVE-2020-8231,0,1,9446a1e9744263543f370599c1337460d7eb0d0cefd89d7b92a552fc6be71363,2024-03-27T16:04:17.597000 +CVE-2020-8231,0,0,9446a1e9744263543f370599c1337460d7eb0d0cefd89d7b92a552fc6be71363,2024-03-27T16:04:17.597000 CVE-2020-8232,0,0,a9c7f9a40f8c8864a7e3d701a0e990044acd6299147e74baf1d5d5f48bba2b7a,2021-09-23T13:57:02.790000 CVE-2020-8233,0,0,a7c70cae7ff9ea797af45a8e6bf71362a6e567e5946f869c3d5abdb997855221,2022-05-24T17:03:55.223000 CVE-2020-8234,0,0,0ecda2f78c5958b8d082e21a2aedcafa2a5797fa89f53e9fcdbc3e7f5b196655,2023-11-07T03:26:18.827000 @@ -163073,9 +163073,9 @@ CVE-2020-8280,0,0,8d5f0a3c05bd32b92e1a858a83594675a405cccfedeb61c86c6b0f4a117866 CVE-2020-8281,0,0,7b0fbce8746c448976b5242155b86de40c6c79f6aef5f735ac25b73023022b1a,2021-01-11T17:39:01.227000 CVE-2020-8282,0,0,8222c1643818edd8f6af8739cd00802cafdf09f4420f884c84232b750c7a9ce4,2020-12-16T15:41:49.850000 CVE-2020-8283,0,0,27005cdc68403e5c13995e8fdafcca44a2c6dc4c7d8c8e52cb9054d9aec06275,2020-12-17T18:45:00.930000 -CVE-2020-8284,0,1,d48f38208932ba541cfea5b7fe90f4f148d2ce5c7905914cff47a907a00825af,2024-03-27T15:50:07.387000 -CVE-2020-8285,0,1,c3522f16bed2fee4b17164c0cd5d5a93552cd535d4c4756a633db3011ffa406c,2024-03-27T15:47:57.647000 -CVE-2020-8286,0,1,a02fcb8742fe23470beab7341e4d5bc8102e3b0e9656dfa9fa789b059c0b5ddf,2024-03-27T15:47:53.600000 +CVE-2020-8284,0,0,d48f38208932ba541cfea5b7fe90f4f148d2ce5c7905914cff47a907a00825af,2024-03-27T15:50:07.387000 +CVE-2020-8285,0,0,c3522f16bed2fee4b17164c0cd5d5a93552cd535d4c4756a633db3011ffa406c,2024-03-27T15:47:57.647000 +CVE-2020-8286,0,0,a02fcb8742fe23470beab7341e4d5bc8102e3b0e9656dfa9fa789b059c0b5ddf,2024-03-27T15:47:53.600000 CVE-2020-8287,0,0,49a08588ed5b600c0a1dd7fd9f5faae9c0e4ddd142e8c3d1feda2c223f49818f,2023-11-07T03:26:19.870000 CVE-2020-8288,0,0,b0824b7a38b5f17525fb96fd83bb8be5d6d553292e795764d879457314ab7a3e,2021-02-01T15:31:43.600000 CVE-2020-8289,0,0,c14da3e86fd5ce60216301b1e5350cc462897aac50f7af592f55008c44fd2d61,2020-12-31T19:04:39.117000 @@ -168944,7 +168944,7 @@ CVE-2021-22872,0,0,b5374c75cf52173069742df9932b16f3b48df418bcc8bce07737040217b3d CVE-2021-22873,0,0,151b01066b491a5d4fdbb1cf5af054bb65ff50d7128e043ad61d55a2cb1dd4f5,2021-02-02T15:09:34.250000 CVE-2021-22874,0,0,1ce3a63dfe6ef7545b98b97473516dd45fa986322bfe405209f2cfb2fff0f431,2021-01-29T00:33:14.217000 CVE-2021-22875,0,0,5972e538cca49d2dab14de25fc021bd84962446b27e9e851f91860a6be14e55a,2021-01-29T00:34:11.237000 -CVE-2021-22876,0,1,635332ad1f2e8c939d1336401f65b12220e00ac3b929f0fc7f45bbf076316cbe,2024-03-27T15:47:49.590000 +CVE-2021-22876,0,0,635332ad1f2e8c939d1336401f65b12220e00ac3b929f0fc7f45bbf076316cbe,2024-03-27T15:47:49.590000 CVE-2021-22877,0,0,d00f745ea4e6955be0d21c2b3581cc251c5387efdc342004d5fd1b051a534600,2023-11-07T03:30:27.240000 CVE-2021-22878,0,0,a397005e6377fa8af698364fc7863f02965632978142467d10d498bfb5ec781b,2023-11-07T03:30:27.327000 CVE-2021-22879,0,0,20824c00df9bf493afe91eb2a7b2a5f67eedca0b2dbccbe3e6d4b48552ed7023,2023-11-07T03:30:27.393000 @@ -168960,19 +168960,19 @@ CVE-2021-22887,0,0,b2fa7c63bdd19b54dc86ebdd10536c3f921ebb88d0726027644261e221041 CVE-2021-22888,0,0,ddf077ad7028415ff9feadf75a6d2804bf094969bc5cd0965f8f5541a1a59d72,2021-03-27T02:44:16.250000 CVE-2021-22889,0,0,86cd09cb795d6cf361c193c51bdba63af652cf09deac6863d564318021b9f94a,2021-03-27T02:46:12.017000 CVE-2021-2289,0,0,a94497e362293b07d63c1e24b9ab43d924b97fff21751187f0d37f432ecc4f17,2021-04-29T20:48:33.577000 -CVE-2021-22890,0,1,6e90c8900d2275195296c2294321949788f61b3ba7e5b3a3553ee48037ff4897,2024-03-27T15:47:45.160000 +CVE-2021-22890,0,0,6e90c8900d2275195296c2294321949788f61b3ba7e5b3a3553ee48037ff4897,2024-03-27T15:47:45.160000 CVE-2021-22891,0,0,62e457c672d7ef03c1a6c6a6be7d4775111c15248290645768bc2e5d4d8037bf,2021-08-12T20:50:40.970000 CVE-2021-22892,0,0,cc16542affc64667468e45e7977166f203b89e17820ccc51cb3935248d38e4cb,2022-08-30T19:10:08.513000 CVE-2021-22893,0,0,7ab02627a0e7b95efe96113aa2edf5623e1aa9b80d3d385fbff5c67735077340,2024-02-27T21:04:17.560000 CVE-2021-22894,0,0,c9c58e1159876c6444311b72946002e4e5756fa16778959f63470df8d4f32431,2024-02-27T21:04:17.560000 CVE-2021-22895,0,0,964c1af433e584d2cc6bc559959c01008e727d05833d888f72e1b680dca9164a,2021-12-02T21:19:58.540000 CVE-2021-22896,0,0,93eac2f06ca1a31d34040275095383a0dc24b2782b510f11050b1bce250d645e,2021-06-22T01:03:15.073000 -CVE-2021-22897,0,1,8feb0e04bd9da8a3ba4a00d9981917dd470faaa8c0c8dea7518428c4a2a2ce49,2024-03-27T15:47:40.347000 -CVE-2021-22898,0,1,cb7aed26a2f0c6d972f5db58a0bf991ac14a9ade5c2e96dd169dd9a05a486826,2024-03-27T15:47:36.380000 +CVE-2021-22897,0,0,8feb0e04bd9da8a3ba4a00d9981917dd470faaa8c0c8dea7518428c4a2a2ce49,2024-03-27T15:47:40.347000 +CVE-2021-22898,0,0,cb7aed26a2f0c6d972f5db58a0bf991ac14a9ade5c2e96dd169dd9a05a486826,2024-03-27T15:47:36.380000 CVE-2021-22899,0,0,7ccc1d6227bdfe11f58d4901d8af453098ec0e9ba60386fc44c5d290e6849d99,2024-02-27T21:04:17.560000 CVE-2021-2290,0,0,e161d5970dbe21534ca8a58bed4dd6c1987c83e10878bb74e78478ffbc0f0ee0,2021-04-29T20:47:58.447000 CVE-2021-22900,0,0,11a74ac18596a70d6c0516ae29fd70e796dabfbb34e2f92013099e700819c483,2024-02-27T21:04:17.560000 -CVE-2021-22901,0,1,2a1a7208fc9121c18a2c89b2042f15bd19d95e85ecb19178162498c4e0a4deac,2024-03-27T15:12:59.917000 +CVE-2021-22901,0,0,2a1a7208fc9121c18a2c89b2042f15bd19d95e85ecb19178162498c4e0a4deac,2024-03-27T15:12:59.917000 CVE-2021-22902,0,0,a4a2f38d3c797c9517b7f337fa2d0e3e5b8d86adecf091a3702d7a01df0e157e,2021-08-18T19:13:08.357000 CVE-2021-22903,0,0,d99c63747b80c7b228edad210ca49963f2a6a5d584bb06dc2d26f5bd0882cc38,2021-10-21T14:32:48.653000 CVE-2021-22904,0,0,c7c7adf8c040783b0936d1c950d3c44f5a571a588ff5dd5f6c9de0c39943e2a1,2021-09-20T13:51:48.960000 @@ -168995,11 +168995,11 @@ CVE-2021-22919,0,0,5b87ea27363e05614e4a5485baeac7da5070817fc270c91e352c520206170 CVE-2021-2292,0,0,aae95cf3c4655101628b7554f035b288cc5af5918aa24130f926447a2ca1222e,2021-04-29T20:47:34.503000 CVE-2021-22920,0,0,60e418487b730f0bed1da720516f9512142293b89ddf82fee7fc1b233d082f08,2021-08-13T14:26:49.893000 CVE-2021-22921,0,0,feb4fb83ce2bf5e935c6de933544186d50f0116ae15db7d20909d87724c99312,2022-04-06T14:30:09.710000 -CVE-2021-22922,0,1,2a6d6c53ceaa934818277b479285d90cbbc0a427dd59031c3bfba28a777b402b,2024-03-27T15:12:55.770000 -CVE-2021-22923,0,1,a82050eb038ef4e5284a2e0a6f950b794e78571ece5049ff8d206611a1b4e322,2024-03-27T15:11:51.407000 -CVE-2021-22924,0,1,72ff22a33290cc49cb2f521b2873a9b2f36f6b6688a5fea8c78dfcdea7bc8bfc,2024-03-27T15:11:45.923000 -CVE-2021-22925,0,1,10ffe09200017c9648adf7fa5be8f1caacf63435ae34ee4b2a1f93c7622d0586,2024-03-27T15:11:42.063000 -CVE-2021-22926,0,1,3efc635fa0235e65a9c189d16b56eea42ebb077237b16dedab9ddeabbf64bf9e,2024-03-27T15:11:38.047000 +CVE-2021-22922,0,0,2a6d6c53ceaa934818277b479285d90cbbc0a427dd59031c3bfba28a777b402b,2024-03-27T15:12:55.770000 +CVE-2021-22923,0,0,a82050eb038ef4e5284a2e0a6f950b794e78571ece5049ff8d206611a1b4e322,2024-03-27T15:11:51.407000 +CVE-2021-22924,0,0,72ff22a33290cc49cb2f521b2873a9b2f36f6b6688a5fea8c78dfcdea7bc8bfc,2024-03-27T15:11:45.923000 +CVE-2021-22925,0,0,10ffe09200017c9648adf7fa5be8f1caacf63435ae34ee4b2a1f93c7622d0586,2024-03-27T15:11:42.063000 +CVE-2021-22926,0,0,3efc635fa0235e65a9c189d16b56eea42ebb077237b16dedab9ddeabbf64bf9e,2024-03-27T15:11:38.047000 CVE-2021-22927,0,0,1b8462bd45eb1b8bbb2dd622741a6b441c80899ff24289230174628fdcea5934,2021-08-16T20:14:39.867000 CVE-2021-22928,0,0,eb0dcc242a46f18d3ecc4eb85eb326e9e33689232040f26456b27ab9e35bd837,2022-07-12T17:42:04.277000 CVE-2021-22929,0,0,774cbc1647fc8fb32f6b2128bf970d90f5e640dadbb29ee069cbab5e2f5fb8bd,2021-09-10T14:11:28.307000 @@ -169020,9 +169020,9 @@ CVE-2021-22941,0,0,790f39177cb178344fc54a0bbb6992e1c74aac7fe2479d9a5090505eb5132 CVE-2021-22942,0,0,1da3830a53259463f709f5ba4027ae9b3637d47628a0ea6018e6187c6cd82118,2024-02-02T14:15:53.073000 CVE-2021-22943,0,0,a779577368528cbca69c94f741434f52bbd682ef6911362b85b82b3036804a5a,2021-09-09T00:23:55.950000 CVE-2021-22944,0,0,eb9ced6a11b6750716f46ac3d98436723d8a1f88ede10032cc3bac0ddb1abd25,2022-07-12T17:42:04.277000 -CVE-2021-22945,0,1,c8b9b5f36257cd0029eca06a8c67ddac907a5238990f8a30330780d98bf902f2,2024-03-27T15:04:30.460000 -CVE-2021-22946,0,1,34c4886fd3ded8a81159779bf38e5eec423d3337f732456a04ae6127d219ee2b,2024-03-27T15:12:52.090000 -CVE-2021-22947,0,1,1f0d215e655ba698cf8c5924566d829a44a9033863a6cf777d890396311f0a45,2024-03-27T15:03:30.377000 +CVE-2021-22945,0,0,c8b9b5f36257cd0029eca06a8c67ddac907a5238990f8a30330780d98bf902f2,2024-03-27T15:04:30.460000 +CVE-2021-22946,0,0,34c4886fd3ded8a81159779bf38e5eec423d3337f732456a04ae6127d219ee2b,2024-03-27T15:12:52.090000 +CVE-2021-22947,0,0,1f0d215e655ba698cf8c5924566d829a44a9033863a6cf777d890396311f0a45,2024-03-27T15:03:30.377000 CVE-2021-22948,0,0,3ae29b064ef956ec50546dd688fd9027239438584162735a1f0be84abdde7a16,2023-06-30T17:50:34.397000 CVE-2021-22949,0,0,726df53d67307bd416ab1f5c561fc0aac2ca19398b535bd9686e823a2044b612,2021-10-19T16:47:45.690000 CVE-2021-2295,0,0,02b76f640c5b0c546264dd7fe3019280895cc3f4c3d3c1ab1754e973bcd9757d,2021-04-29T20:46:25.240000 @@ -175457,7 +175457,7 @@ CVE-2021-31558,0,0,d6b7eca8b3661e1164cde3cafef1c266e2f8472859f6d02c98f0ee8c033dc CVE-2021-31559,0,0,960ef105b3161c8de185bc6fc58d26fca8236596b08b91f433c81abecf743c41,2022-10-25T16:42:38.307000 CVE-2021-3156,0,0,f7e7c8ef1b0e324cf2ea0191a3cda9d24a63ed0693294ca151795598dc60b3ad,2024-02-04T09:15:08.010000 CVE-2021-31562,0,0,797d186a32fce9d0031f33fb21467dc046abc2641f41f3a4eb668dae3bcade3e,2022-01-28T15:55:53.923000 -CVE-2021-31566,0,1,9f6729ca0b8caaeddd1206b928ad0457539959c073118fdcfd964b35f3aa80df,2024-03-27T16:04:30.260000 +CVE-2021-31566,0,0,9f6729ca0b8caaeddd1206b928ad0457539959c073118fdcfd964b35f3aa80df,2024-03-27T16:04:30.260000 CVE-2021-31567,0,0,bca43f0db30fc722ddd2e9bd8fed1b110a7669196d896ae913f81e804a6662ff,2022-02-03T17:09:44.553000 CVE-2021-31571,0,0,ac310b71da451791809abe07817b13f801603fe521103d861c539df6dddb4324,2021-06-02T18:34:27.147000 CVE-2021-31572,0,0,4a0d1e85208db2b4aa6a27ae410c9ffbc5b5d32694228ebc0356df3d4f0ad164,2021-06-02T18:33:41.203000 @@ -178183,7 +178183,7 @@ CVE-2021-35196,0,0,3c93f00a18e99aace340d6044644723c83a7fc554c345131bd8f0eac840a8 CVE-2021-35197,0,0,2ff79030327337ae3dee0c61c9baeb32fff891d83c78c592ce6d47974492f2a4,2023-11-07T03:36:30.150000 CVE-2021-35198,0,0,e96990d62672cf02fa4cbfbf2e31fc75388b38d1e046810266a814dca0823507,2021-10-04T17:33:36.207000 CVE-2021-35199,0,0,9f062618d9a6cdf8c10bd83760fab290dac75318dde871525dfe843905fa91aa,2021-10-04T17:34:23.810000 -CVE-2021-3520,0,1,60daddfb9f0bfc98507b64ef9c2c09b3106e89016024f6e140545c37e7343e5b,2024-03-27T16:12:07.343000 +CVE-2021-3520,0,0,60daddfb9f0bfc98507b64ef9c2c09b3106e89016024f6e140545c37e7343e5b,2024-03-27T16:12:07.343000 CVE-2021-35200,0,0,aac4a0c49e39317db7297384a39c931b1b31e44af9c47b1b42addc5f5a769c5a,2021-10-04T17:34:51.317000 CVE-2021-35201,0,0,c0e0431448d3ba12a3d72455869761436f021a172ba4e64a31d8fe9f90cdbb0e,2021-10-04T17:39:16.717000 CVE-2021-35202,0,0,db5717bdc407832303592e1688309f0a7efc338fdecfe7ebb2ba8778dd1dc3a5,2022-07-12T17:42:04.277000 @@ -179322,7 +179322,7 @@ CVE-2021-36972,0,0,7f5d343ad41aad3817fa2bedd0395a3df6e9fecf214880f976d53a911b896 CVE-2021-36973,0,0,ac2dc242541a2ee5ba49d79bf57e002c1a9b668a1f03222716899ff14ef45ffe,2023-12-28T20:15:57.900000 CVE-2021-36974,0,0,c30cf6d5afa3e9f7a6e032f7b5f5299dda13609f19eee733b117b26d25d84367,2023-12-28T20:15:58.080000 CVE-2021-36975,0,0,ce220aa95f2c890a8d4ff736efe2d9dfc0ea623ac7903ab52c4780e62b63d8a4,2023-12-28T20:15:58.270000 -CVE-2021-36976,0,1,11edc2c9d5ff54dd12fe221d4b1b2e9240999e37529e96d126a0df71db91805c,2024-03-27T16:04:33.757000 +CVE-2021-36976,0,0,11edc2c9d5ff54dd12fe221d4b1b2e9240999e37529e96d126a0df71db91805c,2024-03-27T16:04:33.757000 CVE-2021-36977,0,0,7ecd05ff14517c69b8531d9df96b8b2d27de568c1702c608fa6bb1a478b2e3fb,2022-04-29T15:06:24.723000 CVE-2021-36978,0,0,c092dc339b5081975b530efaad454d5fce3a66a1b72c84e10cddb2024985c236,2024-01-15T14:15:24.063000 CVE-2021-36979,0,0,73adb542e1879400d086ac81162f560768e693d2fe0591e07a9d4d8e8ed4e8f9,2023-11-07T03:36:53.250000 @@ -191242,7 +191242,7 @@ CVE-2022-2257,0,0,dad20c73a2c2f0d659cc80938da21afb7f70013cf16b8dcc2003499bc089cc CVE-2022-22570,0,0,705979cc0a814572a0cd5c9e0662feac9cb14f55a7c65f73308c1223d21dd60a,2022-04-09T02:19:58.207000 CVE-2022-22571,0,0,8cf67737c2cf76f5e72d366fed0fdef4b956f75d8f90492ab3949699e0044275,2022-04-15T13:59:11.807000 CVE-2022-22572,0,0,6c69b74689b3da56cc5cd4ac07a6d48f8516d77a0d623ae20b558e21731dadf1,2022-04-18T16:48:20.967000 -CVE-2022-22576,0,1,5c200c3d4493404e43d751132cb6faac3af6609098c75a1fdfc162eb0900192c,2024-03-27T15:02:35.557000 +CVE-2022-22576,0,0,5c200c3d4493404e43d751132cb6faac3af6609098c75a1fdfc162eb0900192c,2024-03-27T15:02:35.557000 CVE-2022-22577,0,0,2c7e6e442f1a2def91b5d39b63b26dbccbdeed76757f7c584ef306f58ed0c62d,2023-03-14T08:15:12.540000 CVE-2022-22578,0,0,73b80115f4455669055d8343359cec891f19e3b0a3a3e4b5856a6807563a33ed,2022-03-28T16:44:22.473000 CVE-2022-22579,0,0,d5ee72c4fe4d45872a66d282d7714d780c37d05ff42ee4a479e5f47abbb3fe46,2022-03-28T15:44:07.387000 @@ -195565,16 +195565,16 @@ CVE-2022-2776,0,0,91f9249f9762db987391c6f5fe8c27628dcd0a98ebf2a2f0d87620befd7093 CVE-2022-2777,0,0,0391d02bd79913feea13c05d4ceee16b4c5d33425d0fc7c99ff2b86956b2f6f8,2022-08-15T18:47:59.257000 CVE-2022-27772,0,0,19b630a50a6d4660f9e5f590ec103d80f3271aeaab0f1e28ab8117ec2c7a0a03,2024-03-21T02:42:31.680000 CVE-2022-27773,0,0,091201079ac7882e9e194f3c9d8d1a4a6a54d2b5882895d61e7c68603566a544,2022-12-07T17:36:07.027000 -CVE-2022-27774,0,1,fb1147cbe33ccdcdad1fb4a673f329c1884c101fd45f17d9a031914a02dfdc32,2024-03-27T15:02:31.430000 -CVE-2022-27775,0,1,c1eadfce756295b3b6b28dd1721c814b989b792c83033617f3aa9ef1deada2c6,2024-03-27T15:02:27.427000 -CVE-2022-27776,0,1,f9d3880f8bd8996b45317c60d3f8b57e3dfa597ee089dd4449a011d1943a6eeb,2024-03-27T15:02:23.683000 +CVE-2022-27774,0,0,fb1147cbe33ccdcdad1fb4a673f329c1884c101fd45f17d9a031914a02dfdc32,2024-03-27T15:02:31.430000 +CVE-2022-27775,0,0,c1eadfce756295b3b6b28dd1721c814b989b792c83033617f3aa9ef1deada2c6,2024-03-27T15:02:27.427000 +CVE-2022-27776,0,0,f9d3880f8bd8996b45317c60d3f8b57e3dfa597ee089dd4449a011d1943a6eeb,2024-03-27T15:02:23.683000 CVE-2022-27777,0,0,e53f0de9a226215bf6b68db8cc4fda72582d13893879270665b18291e9910ee7,2023-03-14T08:15:12.993000 -CVE-2022-27778,0,1,e68aa53c00ebd71e950de2e2de15f4dc3314d61497fb345b9ac5f9ffc19ac244,2024-03-27T15:02:14.720000 -CVE-2022-27779,0,1,624ab60dd56fc169eac4aa37ff3f5a59306663a86baea40df643b824b133432f,2024-03-27T15:02:07.080000 +CVE-2022-27778,0,0,e68aa53c00ebd71e950de2e2de15f4dc3314d61497fb345b9ac5f9ffc19ac244,2024-03-27T15:02:14.720000 +CVE-2022-27779,0,0,624ab60dd56fc169eac4aa37ff3f5a59306663a86baea40df643b824b133432f,2024-03-27T15:02:07.080000 CVE-2022-2778,0,0,06de8b398c09429f19f0c3e3fe7de194f9df7821d3cffcbef711cd3616feb4da,2022-10-04T18:20:12.593000 -CVE-2022-27780,0,1,8a859689331e44c2f2d4915c7a406179db2ece5d9d9950ebd78fa4c7a131b090,2024-03-27T15:01:58.407000 -CVE-2022-27781,0,1,c3f7e062814594e95161cf77a64c2c1cf1b81ab8d54714f16da8ef5d4332164b,2024-03-27T15:01:53.060000 -CVE-2022-27782,0,1,8a58a7225be5f4a0725a4b892831f4fdea6cb48003542f266c6a715e2a18f87a,2024-03-27T15:01:49.180000 +CVE-2022-27780,0,0,8a859689331e44c2f2d4915c7a406179db2ece5d9d9950ebd78fa4c7a131b090,2024-03-27T15:01:58.407000 +CVE-2022-27781,0,0,c3f7e062814594e95161cf77a64c2c1cf1b81ab8d54714f16da8ef5d4332164b,2024-03-27T15:01:53.060000 +CVE-2022-27782,0,0,8a58a7225be5f4a0725a4b892831f4fdea6cb48003542f266c6a715e2a18f87a,2024-03-27T15:01:49.180000 CVE-2022-27783,0,0,19dc1467106cf4d13c4cbca7b4d3d753aca29f021174cae3299962a01c8e40e4,2022-05-13T17:29:38.363000 CVE-2022-27784,0,0,b7f32c2a04336f6a7e6280db469db0b1c9e818e53867bee1bbb46d1260bc8172,2023-01-24T15:40:03.220000 CVE-2022-27785,0,0,815f6325247a3206bba95ff03c9af5bbe8be4931c2ab1a0696317b6c44469ad8,2023-11-07T03:45:23.953000 @@ -197511,7 +197511,7 @@ CVE-2022-30110,0,0,e9dd44f77ad831587ec4e39383c77b19970dfa79ea2836269377ed5e66ff8 CVE-2022-30111,0,0,fd7ce5e1f36c9b6c8f614d5a82d13d60a0686a1b619f0786a8ee5c19809658f8,2022-05-26T16:24:35.227000 CVE-2022-30113,0,0,db69ed943e1ef593f870b319436186438ef07a7d5150cabaae529fed6b3aa1a5,2022-07-20T14:03:39.717000 CVE-2022-30114,0,0,42dd9ab35652e5702b947020cdff9115df4b404dbdaa5bb380da18fec15c5fe1,2023-09-21T22:15:09.740000 -CVE-2022-30115,0,1,092abca7773c8fc2c2cd84485613813b066cf454c73fa0db7b767c462abb36b3,2024-03-27T15:01:44.073000 +CVE-2022-30115,0,0,092abca7773c8fc2c2cd84485613813b066cf454c73fa0db7b767c462abb36b3,2024-03-27T15:01:44.073000 CVE-2022-30117,0,0,33574de4664a2d386ce6045e061b1c748627576714c0165735a81caafad848ba,2022-07-05T18:05:54.507000 CVE-2022-30118,0,0,213c2c2d84fe4379961dc11aa96d4e79201e7d1f9ec84b813d01a5493181bf54,2022-07-05T18:39:18.303000 CVE-2022-30119,0,0,985ddc925894e6d93e1f83c0fa1b896227b46d2592b676030321ee11299fd8f4,2022-07-05T19:40:24.917000 @@ -199223,10 +199223,10 @@ CVE-2022-3220,0,0,631146846ce39a437d1ca5e831536fa4c835a6a44e107e799c6ab41eb6a3c0 CVE-2022-32200,0,0,6a1e2ddcf6e11f75fddf89de9541431f41a9d459d4394ba83c378609e2b29803,2022-06-10T16:16:20.087000 CVE-2022-32201,0,0,41e373400f3c5eb580922a9928f9240aff7ff160b5a59f6c054ca3d376e10daa,2022-06-10T16:18:35.690000 CVE-2022-32202,0,0,d2e75bbd3c8ec7203fccfd537614f1837041af7a919f7f66ebd547b99b110d7b,2022-06-10T16:14:28.477000 -CVE-2022-32205,0,1,36d1f2c768ab18fa849fbb0196dcbd7ce761b5a6fbd2c79fe2418061b4439eaa,2024-03-27T15:01:05.383000 -CVE-2022-32206,0,1,95a472387799ef8f8393056737e78a46cd10cd43c0b52fc2809d3f4b772ae161,2024-03-27T15:00:54.267000 -CVE-2022-32207,0,1,76c3acd367c4b491ab1b8915dc9b7162aef765744ab96e118dcc2dd8860b637e,2024-03-27T15:00:46.637000 -CVE-2022-32208,0,1,854a09574eede661d6fcd781930e4022272ea24f63f9749d49ae1fb23ef1b69c,2024-03-27T15:00:41.657000 +CVE-2022-32205,0,0,36d1f2c768ab18fa849fbb0196dcbd7ce761b5a6fbd2c79fe2418061b4439eaa,2024-03-27T15:01:05.383000 +CVE-2022-32206,0,0,95a472387799ef8f8393056737e78a46cd10cd43c0b52fc2809d3f4b772ae161,2024-03-27T15:00:54.267000 +CVE-2022-32207,0,0,76c3acd367c4b491ab1b8915dc9b7162aef765744ab96e118dcc2dd8860b637e,2024-03-27T15:00:46.637000 +CVE-2022-32208,0,0,854a09574eede661d6fcd781930e4022272ea24f63f9749d49ae1fb23ef1b69c,2024-03-27T15:00:41.657000 CVE-2022-32209,0,0,fad525a81bc1b9ee0d0345f2c1b1b664f3e12e7a15389ea71ebb61bdde77f886,2024-02-01T16:22:15.683000 CVE-2022-3221,0,0,275d674547ffc29400f67559d3c8664d4bccd2f7c7c5cc0914b161b5d13d38e0,2022-09-18T01:29:18.213000 CVE-2022-32210,0,0,9e0166b5a9c2173e071ae40a153be840b224b053a9221f7e9315a8d7bbb82718,2022-07-25T18:29:47.667000 @@ -199240,7 +199240,7 @@ CVE-2022-32218,0,0,0fac3e82cd2a8928892ed0557823b129d2ed0d18d92f79b5ccb401e684104 CVE-2022-32219,0,0,ce0f6a2e7c8b2c1b75c33893a6089ec39040bca0900f6cfc8f7468907726a4ea,2022-09-27T14:06:46.800000 CVE-2022-3222,0,0,212ba91fe1f852e9243096a789e5d2a1894879240e2e011179953511ea237565,2023-05-27T04:15:22.017000 CVE-2022-32220,0,0,fd8431710aa17c0431d6dc891fe66b12ab5a39b6ac62c0ef31b0405c6cadc85a,2023-07-21T19:26:19.830000 -CVE-2022-32221,0,1,e0b9b99050dd15f817721346f60019d6b3ed4fd3a3a72fb36e3efae0a0f3af70,2024-03-27T15:00:28.423000 +CVE-2022-32221,0,0,e0b9b99050dd15f817721346f60019d6b3ed4fd3a3a72fb36e3efae0a0f3af70,2024-03-27T15:00:28.423000 CVE-2022-32222,0,0,f6863d565197651f10e273293713647cea3e9589a5b34582984bacb0a3cf6013,2023-07-24T13:16:33.287000 CVE-2022-32223,0,0,13371c7607369d44516921cc35bd568a13425936d43496b18a3ac8eaa07dc9b3,2022-10-28T18:29:55.297000 CVE-2022-32224,0,0,c7e760846594e69e5ff3ec467a23094bdb9b067f54b82e4a845627fa9168b70a,2022-12-08T13:20:13.287000 @@ -201600,7 +201600,7 @@ CVE-2022-35249,0,0,4c6921f429d6bd1a292af5d1fd6f601f8709ef83cb0a62c1ab6499da12b96 CVE-2022-3525,0,0,75561123723350358039f471247ec09372fff2a78b9c6e04483a8d98e0d06f04,2022-11-21T12:48:31.207000 CVE-2022-35250,0,0,ec6109697f611365321a4135191e4ed4202eed0d67e5c4f88ed90ffaa0669a21,2022-09-27T14:01:56.857000 CVE-2022-35251,0,0,8392cf117d9d355d6a9a22038422f8a6df683652ea7eff129e05eaeeeb56ba05,2022-09-26T18:57:30.417000 -CVE-2022-35252,0,1,a7acc1b310ed6164ff3b8361257c78a9d599d2a4812dc9bcba522c8334435bba,2024-03-27T15:00:36.607000 +CVE-2022-35252,0,0,a7acc1b310ed6164ff3b8361257c78a9d599d2a4812dc9bcba522c8334435bba,2024-03-27T15:00:36.607000 CVE-2022-35253,0,0,e053b5a59154fa71549362ff1254aad5a17d795d5d576559056d101db6f096fc,2023-11-07T03:48:50.267000 CVE-2022-35254,0,0,398e3c9e1641afa6350efff5fbea64706007f5b21fbfbd16f261842e0115b8da,2024-02-27T21:04:17.560000 CVE-2022-35255,0,0,be61bc588357a04ca4532960eb00f68d2f25632d0ec56bd426356558ea4f8d18,2023-03-01T15:03:19.287000 @@ -201609,7 +201609,7 @@ CVE-2022-35257,0,0,2a29302a18d6bb048d135c2ed4575264b665bbe6abafe303c171598d03d9b CVE-2022-35258,0,0,db1b3249eaf132ed21cc153b92c2cd2eca5eb4b8c299e1af4a8e695fee0855ea,2024-02-27T21:04:17.560000 CVE-2022-35259,0,0,1aeb15137064e3f4d1c3900c7f24a5d8ef5a4046b9b810c15cbf5e6650f837e5,2022-12-07T04:29:38.620000 CVE-2022-3526,0,0,3ae96b98b67bb903279f9c95bb1f9d03c7340492162b12b023b5135599e06054,2023-11-07T03:51:22.083000 -CVE-2022-35260,0,1,ff918b3aed204b27a237bc271679ce911a0dd0f3e7eca4a401fc793d0896dfc1,2024-03-27T15:00:15.383000 +CVE-2022-35260,0,0,ff918b3aed204b27a237bc271679ce911a0dd0f3e7eca4a401fc793d0896dfc1,2024-03-27T15:00:15.383000 CVE-2022-35261,0,0,e0a49de2aec7a5126bc065964afe0c6bc397cb86d75f0bd1921899e3409eb5e5,2023-04-26T19:17:33.857000 CVE-2022-35262,0,0,67f31eae660ebbd628db1eead9eb4d1b767416d9a5115c5a9a1a5d8204ad06f6,2023-04-26T19:17:00.687000 CVE-2022-35263,0,0,e96ef86312f89649a1f690d12e1343c6e2cef7a4ed4da7c595838f66cd735a61,2023-04-26T19:16:39.727000 @@ -201991,7 +201991,7 @@ CVE-2022-35730,0,0,d02cd3657a6ab2fdea42f1d139c507e9826c68abf50607d3ee6cd7f9529b9 CVE-2022-35733,0,0,be53f5556df3a76705715263635913f30607949039453cda94fa44233963b354,2022-08-26T13:17:34.277000 CVE-2022-35734,0,0,1023c438f5e4873a54369b93f7352270fb7fabdee2d21379bef4c8dc0ab450f7,2023-11-07T03:49:23.210000 CVE-2022-35735,0,0,d17a4faa9fef2a8ec7968a5529a09aaeff8a9967ff28ac502b61a21ddb15417e,2022-08-10T19:26:57.143000 -CVE-2022-35737,0,1,5fb8e472436ae3d6667c73253b8c2e3ede3cff2a5d90ad9492a780730605885e,2024-03-27T16:05:26.360000 +CVE-2022-35737,0,0,5fb8e472436ae3d6667c73253b8c2e3ede3cff2a5d90ad9492a780730605885e,2024-03-27T16:05:26.360000 CVE-2022-35739,0,0,688371722965873cfecda0dbf2e1d7ac964f4a29df90cab90a3cdd5199f55d74,2022-10-28T19:51:12.957000 CVE-2022-3574,0,0,57e7551b871b46986e50c49a9481f07f2809cd0dc446b380d9e58de2f73309ba,2022-11-16T19:11:47.043000 CVE-2022-35740,0,0,d1f07cec4539d195c6d930975815af939c2ace905dcba7b78b91706e8e72a92a,2022-11-15T20:35:35.397000 @@ -202459,7 +202459,7 @@ CVE-2022-36223,0,0,af713d64429debb696a606282b4196e159af605ab60fe15071aea1c7fae2f CVE-2022-36224,0,0,08d6bff510d0faac0e761e55f7111fca66e5d819a4007bb48d89793fa3523f3e,2022-08-22T16:26:22.077000 CVE-2022-36225,0,0,bf3e137c686147aedd0a2f5e33321fcdcae3edae04b22a0da940ed7849985afc,2022-08-22T19:54:34.733000 CVE-2022-36226,0,0,c15fa20a54d9581f15906ddda250ac3c5e168091f424408ef65541c2fc414c40,2022-08-31T16:27:39.307000 -CVE-2022-36227,0,1,41b76a9f24783b77e5f4675ed89258c2e29bf45423afe65aad37115594bd00c4,2024-03-27T16:04:27.210000 +CVE-2022-36227,0,0,41b76a9f24783b77e5f4675ed89258c2e29bf45423afe65aad37115594bd00c4,2024-03-27T16:04:27.210000 CVE-2022-36228,0,0,2a8c144fa323e882ce8512ba86c4d448ea3607b0656403e02263245fc2a00697,2023-10-12T18:37:26.680000 CVE-2022-3623,0,0,c3cca1c9d7e5c93f94099fe1f079e9625cabe3c9de9d85375d161d414b59c8fc,2023-08-18T18:55:40.750000 CVE-2022-36231,0,0,bd266977b014f49f864962d37e36d14dd80315d917f63a9aca2024dc7d7ffd9c,2023-03-03T19:28:14.753000 @@ -209554,7 +209554,7 @@ CVE-2022-45842,0,0,9f25540ae216de5e80164f6a8f1c3e751daed0b834ae44796a3ade59d0323 CVE-2022-45843,0,0,5509ae3d19ef873f9b0c2e5074f3bcf43a244b9d1d9d19239688ff5032b78ca9,2023-11-07T03:54:53.320000 CVE-2022-45845,0,0,7c7b5704ec58a7e6b0b65bc99493616aff55a25ad9837751371510d52188a7b5,2024-01-25T22:19:41.890000 CVE-2022-45846,0,0,8180d177894fabd765bd35647192f753aa5e8efd68ae118429536372bad2940b,2023-05-16T19:17:03.097000 -CVE-2022-45847,0,1,45dcccfedd863be101e19a66ccb58ff88331ff85555bb783dbc7441772d6b236,2024-03-27T15:49:41.437000 +CVE-2022-45847,0,0,45dcccfedd863be101e19a66ccb58ff88331ff85555bb783dbc7441772d6b236,2024-03-27T15:49:41.437000 CVE-2022-45848,0,0,fad62e623651689ae95e2fc4f689ac1b8448d31b314d8c49c68285751fad7661,2023-11-07T03:54:53.547000 CVE-2022-45849,0,0,705787250de6f0b2626b38d25516ea3dba7bf004e02dd10b4c9840c8901ce7b4,2023-04-21T04:17:06.770000 CVE-2022-4585,0,0,dfc84e49b205895cb267e11431be1f335d9b1de0cfd68ee1a905558e4e7037c6,2023-11-07T03:58:14.437000 @@ -212065,6 +212065,7 @@ CVE-2023-0578,0,0,c2cf10d09529bf342567ff561ff5fc5b2abe259e50445b77cdf258d0a115db CVE-2023-0579,0,0,504b4338f864e933aa44e888a09084f9d604fd2edb1bc93c969428fcc9526d01,2023-11-07T04:00:52.513000 CVE-2023-0580,0,0,496b4aaf459be8082f40af9709a8d52cae4c41b641bd7ca2e1f477b04712ed00,2023-11-07T04:00:52.727000 CVE-2023-0581,0,0,80d4f5ae1b34ea0255629d958cda2cdcf146f8044343eecb0200e915f691c351,2023-11-07T04:00:52.963000 +CVE-2023-0582,1,1,b3d8f7c84b265316b7e893995a48113564e6ef297a2eb81dadb43454ece92941,2024-03-27T18:15:08.237000 CVE-2023-0583,0,0,ce927582782be4db333475ecc49caef43ac381b8ee355357a8ae6188916854c1,2023-11-07T04:00:53.253000 CVE-2023-0584,0,0,661ecf0e0e258efd0247b994949d777aeb58bd9b6fb3f10f25ebfe1d0595391a,2023-11-07T04:00:53.487000 CVE-2023-0585,0,0,e90d02e3a14ec76a3f74d6f239a409836679ba4da0fdac7466ba614a8fa9d16d,2023-11-07T04:00:53.740000 @@ -224362,7 +224363,7 @@ CVE-2023-34013,0,0,500f8f8006bcf5c0893b8111c3bad0218a0838aa8f762361a0079a993f68b CVE-2023-34015,0,0,8d3ead4f06239d4e652b53ad320e486662a5f6043183f11384bd9be80285d7ee,2023-07-18T14:47:17.697000 CVE-2023-34017,0,0,c870dbb656b8499b3cf2883461d680862292835cec64c41b6df87e8549c650aa,2023-07-31T18:00:08.770000 CVE-2023-34018,0,0,8e3d0d9d918bf4729ce0fbb0a52f4bcea31d1b64524ed9bb7ad175834b2e3110,2023-12-06T00:34:10.727000 -CVE-2023-34020,0,1,6303b7365b6a78484b12527e5cee1750cfe83ba4c60e2b0cd3cee68978d12260,2024-03-27T15:49:41.437000 +CVE-2023-34020,0,0,6303b7365b6a78484b12527e5cee1750cfe83ba4c60e2b0cd3cee68978d12260,2024-03-27T15:49:41.437000 CVE-2023-34021,0,0,3a3e2358a671ec1c445afbf616a746a1f517d1449b1bf5492bd59da42a46cff4,2023-06-28T07:24:29.103000 CVE-2023-34022,0,0,17ce84d4577657f691cbf35839eb41895ae44b6198bae31ad30ea35e514fc1f2,2023-09-01T12:28:20.133000 CVE-2023-34023,0,0,dda712b30f36d5187a63c35f5fe5aee61d09f88bac602b14d0474a131788a98a,2023-09-01T12:29:56.897000 @@ -227961,7 +227962,7 @@ CVE-2023-39303,0,0,d81a0865c899018b1bf357d592ab28d95ab5876f93fb600c5e62942433b06 CVE-2023-39306,0,0,6fdea6e755ad3c897f08918d9c1d51ddc69d961346f27f39c6f47d3188ca876e,2024-03-27T12:29:30.307000 CVE-2023-39307,0,0,7acef3cec93184c51474f9c31e2a1c837088af3bbc58f21a5e50dcf1d40254e9,2024-03-27T12:29:30.307000 CVE-2023-39308,0,0,0a6368135905c51e4bfc8658e86115693ae2beb292d59faa84b5dcfe3424348f,2023-10-02T19:36:52.837000 -CVE-2023-39311,0,1,439e9e33a3292d2e437c686880384c336acf226575769e1b0c928b9e71ee51ff,2024-03-27T15:49:41.437000 +CVE-2023-39311,0,0,439e9e33a3292d2e437c686880384c336acf226575769e1b0c928b9e71ee51ff,2024-03-27T15:49:41.437000 CVE-2023-39314,0,0,ea740e75552d6dc1c0cf1f6c4b3f96de5bf219ab1a6cac778aaf3dfb58fa2dc3,2023-08-15T00:14:54.643000 CVE-2023-39316,0,0,bd233c030a147eb3f789ee38efc103e8bf004636997da3293bc77e895bbfe866,2024-01-11T18:05:52.470000 CVE-2023-39317,0,0,326a3ff897e3724ba6821d5440b392c61a19aa276b4d83da4c1edff4078ddab6,2024-01-11T18:05:45.287000 @@ -231466,7 +231467,7 @@ CVE-2023-44995,0,0,2e692294cf4d62dc41e425947f979ee8c21d0e539d91dc7695b1ee7c8fc16 CVE-2023-44996,0,0,8ad2f639c3253abbde238fd5a9cde75a13aa5bd5fd7ebe20480f9c9b35655ae0,2023-10-14T01:49:41.830000 CVE-2023-44997,0,0,81ee87730db4999076f9ba13b533f7ee822bfab430b5bd9758fdc4dc99b355f8,2023-10-16T19:04:19.087000 CVE-2023-44998,0,0,6cc3050d478119a51a717478faad92a6fd89b774c0150f63b5670fdc0d17544a,2023-10-17T18:19:41.770000 -CVE-2023-44999,0,1,084ce61dccbe80f3a147cccc676be8764a18056ded4deb616c3d87e37d87862a,2024-03-27T15:49:41.437000 +CVE-2023-44999,0,0,084ce61dccbe80f3a147cccc676be8764a18056ded4deb616c3d87e37d87862a,2024-03-27T15:49:41.437000 CVE-2023-4500,0,0,1706dc981901fc97569eb9643727c2c6db6e12a4486c14d5471830d688bfe4cc,2023-11-07T04:22:40.307000 CVE-2023-45001,0,0,7ae6d2a6a50d43f250007cb67a905b12b402783a75b5f34158cdfb57c3adcb31,2023-11-10T04:18:01.923000 CVE-2023-45003,0,0,e4a647054cefc57f163934c624babd072f49088fb353601c09d173ca854ba7b2,2023-10-20T18:08:51.807000 @@ -235294,7 +235295,7 @@ CVE-2023-50951,0,0,ac9a2ba6b69cc6219b314f88f75f8d16d80977a7838c8861bc4cc4a5a90b3 CVE-2023-50955,0,0,2dac25424bb634048955c93e845cd595a5737c34f7a73119031e8a018fd0e20a,2024-02-22T19:07:27.197000 CVE-2023-50957,0,0,a38d290def706a6975d8b2902c3d1f58a6074172158e1685b40a6a512f9caf13,2024-02-15T04:37:53.297000 CVE-2023-5096,0,0,1b0896fcd5a16a2bfc5ce288684748ddee835572b804e4af539b42517b79d371,2023-11-27T22:10:14.173000 -CVE-2023-50961,0,1,a9d9b75e02dfcfb3f65c9ff56b43527d188f145358242dce35d298fb3c8bb736,2024-03-27T15:49:51.300000 +CVE-2023-50961,0,0,a9d9b75e02dfcfb3f65c9ff56b43527d188f145358242dce35d298fb3c8bb736,2024-03-27T15:49:51.300000 CVE-2023-50962,0,0,365daa63183eee3bc8e35da897e2163d0fc458ef66adb39b8eb249f4c8a968ff,2024-02-12T14:31:36.920000 CVE-2023-50963,0,0,f8ab53d3916fdeb747721dbad810b91a4d8cca1f3447b9dedd0b7a0a236caf08,2024-01-24T21:22:22.293000 CVE-2023-50965,0,0,7d1de52a11bce456c4c16ef773b97b5e53898c75617739b3525f486b2a63242b,2023-12-20T20:02:23.497000 @@ -235763,7 +235764,7 @@ CVE-2023-51886,0,0,57376d86734d9125cdefeefb78630aac114d6de1902e63e7e68f3a3c286da CVE-2023-51887,0,0,5ef2b724fc508a46d98e2525360ceec49832ad8963da68755a3ed1e998657e14,2024-02-05T17:29:49.697000 CVE-2023-51888,0,0,0c26c76fa0194a6bf43f7b0d37b92c45dfae056622dc0b83d9eb4f0ea5ca00ab,2024-02-05T14:11:51.323000 CVE-2023-51889,0,0,8818124c066a6fc089f0ca349b82501811306f8e10b0be4d7c4755f36976d478,2024-02-05T14:10:48.287000 -CVE-2023-5189,0,0,c147a09eb43ab25371513a32cca88515adb22676507348ad033296b8f2641894,2023-12-13T10:15:10.110000 +CVE-2023-5189,0,1,dd34534e185942a0e90badb41c5e213b21a944d47974c8c87a51609f819a599b,2024-03-27T18:15:08.710000 CVE-2023-51890,0,0,781340432dbcfdc8e5dd47cf218a3ee83bd6eb1e3c9d4e385b3f27a1d7a54d20,2024-02-05T13:57:15.610000 CVE-2023-51892,0,0,83e77db8e71e0f4c493aeecdca7dc8524049c5ad059bc3e1dc3f8c0291c22774,2024-01-26T17:12:58.500000 CVE-2023-5190,0,0,4e5acd0b306f781670b3a54b1d1143953c2740e2d360008f138cc2e5de5de17a,2024-02-20T19:50:53.960000 @@ -237065,7 +237066,7 @@ CVE-2023-6149,0,0,43627cf55c1dbb5c825fba826743af0296f49d6a8c24065c1a631c49138b39 CVE-2023-6150,0,0,1ea907d678f48f22ce30b6bad5c8da7daf76b35ef23c59476e04071a5892fe2e,2023-12-05T07:15:10.570000 CVE-2023-6151,0,0,7559e2f33b50293cab689a38634ef34d917b527790c29a35f6155f6feef60ac3,2023-12-05T07:15:11.207000 CVE-2023-6152,0,0,650857fc8203f2c7b3ce096d7962f1ec279cbc9f5ea52dff75397db33e06f18d,2024-02-14T13:59:35.580000 -CVE-2023-6153,0,1,5029d75c8c42e6df7abb880dd03acef9a43af5e3dd820aafdebb873d4b25b2d7,2024-03-27T15:49:51.300000 +CVE-2023-6153,0,0,5029d75c8c42e6df7abb880dd03acef9a43af5e3dd820aafdebb873d4b25b2d7,2024-03-27T15:49:51.300000 CVE-2023-6155,0,0,3ade3aecef51d941d8061f8d0b14aa2df7731495ef3e1609ad30477044f4d6ff,2024-01-02T20:16:59.773000 CVE-2023-6156,0,0,d7561fff0656f62c31cf7fed3e16d348c47083d2199659e3634f7ff4096281e1,2023-11-30T21:08:21.483000 CVE-2023-6157,0,0,19feaf86781e5b84fd59f4c0155ffcd6eb44ba3b8740d1cd952fe7d4823f3848,2023-11-30T21:00:23.003000 @@ -237253,7 +237254,7 @@ CVE-2023-6395,0,0,ac793203a9dc0a042800eca54ed9e135226e7af456816d583effac8dcec849 CVE-2023-6397,0,0,32328345f587e4af99f4aaa1bcc8b79a52413e2b10103761bed029c881877b7c,2024-02-20T19:50:53.960000 CVE-2023-6398,0,0,6df96db5309a9e573369d025141b91026dcf883d56f38d0728e8a69e9f438402,2024-02-21T10:15:42.770000 CVE-2023-6399,0,0,891fd568ed116fcad25bf9db62f014842821e1923047c86d46a6c2d8dab27f63,2024-02-21T10:15:42.900000 -CVE-2023-6400,0,1,707a8d108ff29e3f5ec9ab008205c7906004d1fc50c2cf7855d902b59313f0e8,2024-03-27T15:49:51.300000 +CVE-2023-6400,0,0,707a8d108ff29e3f5ec9ab008205c7906004d1fc50c2cf7855d902b59313f0e8,2024-03-27T15:49:51.300000 CVE-2023-6401,0,0,411546d88eebf199d44e9988166ea5b8e6f2b675b6fe8a537c285170b3230267,2024-03-21T02:50:36.180000 CVE-2023-6402,0,0,dd329c4dbc100bff910a0c70a7294dd06e33e9b2468f50cfcaf0604e5c4e1810,2024-03-21T02:50:36.267000 CVE-2023-6407,0,0,fd3b1ec8c2350f5672df571bd288bbd2e9afe054b223cdc538cdef15170f355f,2023-12-18T19:34:53.843000 @@ -239048,7 +239049,7 @@ CVE-2024-1535,0,0,c2e452de4f130d0657f2ad52768b1d03d46cb2c5e636f4ca1b10840f9898bd CVE-2024-1536,0,0,3680c54e462a2a7edc1fc99438ddf2bbe56f66c6c70a4febe86757b7c0d77832,2024-03-13T18:15:58.530000 CVE-2024-1537,0,0,90084d772bcb3ecc6e07d74ed60eae5fe9aea59c6e1713f7863063d24965b57f,2024-03-13T18:15:58.530000 CVE-2024-1538,0,0,7710e1b546e09312497f0b9c9df24bcccbffd2cbc2e6cf10ad6aac7ce2ffe5db,2024-03-21T12:58:51.093000 -CVE-2024-1540,1,1,89cd06ed913bb19437dfd8dce4934b885739e3f5438ab021d31e6f934d45cd8e,2024-03-27T16:15:09.963000 +CVE-2024-1540,0,1,76005015a825567349150f82c72870d086e465eb518fb8c7a03f9bc7bf9bede1,2024-03-27T17:48:21.140000 CVE-2024-1541,0,0,0b73186deefb215b3bbc0b2b970c4145b3ad229def4c224287b4e5a63ecff82c,2024-03-13T18:15:58.530000 CVE-2024-1546,0,0,d87548555f4c8992ddc193a435b01cbf450a34c4725a832074955ddd5326558a,2024-03-04T09:15:37.650000 CVE-2024-1547,0,0,fc3de1ace81ccfdd8fbde9e6a6951be522c10c940115407bd01fd7d037e7d770,2024-03-04T09:15:37.740000 @@ -239069,7 +239070,7 @@ CVE-2024-1564,0,0,84875cf797fa64328b336ae33772e46886c72657e3c983b9d184a2a3d50ffd CVE-2024-1566,0,0,fae18125d42af6480c1fb49e1e6428a52d2bf4f1074f21a5dfe482b2c8d87086,2024-02-28T14:06:45.783000 CVE-2024-1568,0,0,03adf0f94bdba0662cb278cdaa3b54a5cd3ae08b3ef89a1e89169605096fa6c9,2024-02-28T14:06:45.783000 CVE-2024-1570,0,0,fa96633d08cf4f7a9a083fffefdd325991610013e77e1890328cb3b85d75e300,2024-02-29T13:49:29.390000 -CVE-2024-1580,0,0,8ab013089e97147c04c4a5ef6b3954117d4a37f719c6f181dbd352698d2066ba,2024-03-26T00:15:08.497000 +CVE-2024-1580,0,1,4a10e63fa95d49470234e2661449f906487822e0aeb3a95c53a88e84627958f0,2024-03-27T18:15:09.063000 CVE-2024-1582,0,0,5801086f12a7b25e0a24481309300eacfe3989ff6a37128452730610efa279b1,2024-03-13T12:33:51.697000 CVE-2024-1585,0,0,e91f99f5d286c3afef1058be20d258b7aa9acfdf346cd5b86fd70de17ee7844a,2024-03-13T18:15:58.530000 CVE-2024-1586,0,0,0f7dcaaedeb3b15eee35c0b1fbce415960454d76b6eae4dff9a3ecfad1011e31,2024-02-29T13:49:29.390000 @@ -239362,13 +239363,18 @@ CVE-2024-20252,0,0,b3e7ab7affd116881816a7adc1b9a82671c5b4da83512a13f8133ebc1b35c CVE-2024-20253,0,0,d3a8e74c395d6dc3e7ac6947f74fcfd7abc559db9a2a5673b58b5d97e64fbd4a,2024-02-02T16:15:53.893000 CVE-2024-20254,0,0,483b1bcc903a1f3fe5774e73017e3920b0d7ed3bc82e804e2d29798a514160f0,2024-02-15T15:54:33.153000 CVE-2024-20255,0,0,4c8067b6b3b68c94894b4ecd8c182992b7e2d67f936be466104b1472a1d76a79,2024-02-15T15:54:19.960000 +CVE-2024-20259,1,1,320a14ee14d62aa5d17681a1efe29c443b0cdc7bc00d2121817f310cc495e59d,2024-03-27T17:48:21.140000 CVE-2024-20262,0,0,a40254b410d0784e77864e44354a4b6d276cfd1ed801d8c8cea773abddaa6fdb,2024-03-13T18:15:58.530000 CVE-2024-20263,0,0,eee9d5be1e797577581d307b6debeb0e216dfa8c65e90aa4284e364da06d4b08,2024-02-06T19:23:20.600000 +CVE-2024-20265,1,1,3489362a547286567b228fe9ed8fabd87d542e719de273953f70320b8c723a6a,2024-03-27T17:48:21.140000 CVE-2024-20266,0,0,7107175b332490e839d5721f467b6ded5bb175039dfd7bbdacb90e93b939405e,2024-03-13T18:15:58.530000 CVE-2024-20267,0,0,2716a642cdad532c3a4bd75fb20d5fecd6f79884b8ec8ad4d3b70c55b604b9c9,2024-03-04T22:45:43.893000 CVE-2024-20270,0,0,e782cd7ba9de695c0ad1c66716422322472732a1f5415c3e41652abc7d8c0edc,2024-02-02T16:15:54.227000 +CVE-2024-20271,1,1,dfae8db584f1048f6a3c2c1977b24965cd6ce960b56141c77d166e3081815ee1,2024-03-27T17:48:21.140000 CVE-2024-20272,0,0,185f140724efe06396f39e49d9628053efc8d5b0f336793319946b145d008ecc,2024-02-02T16:15:54.683000 +CVE-2024-20276,1,1,296a5bdd5467948ab48ce59d6adf71ce96a1b7c0465de9d78357fece032b5e4b,2024-03-27T17:48:21.140000 CVE-2024-20277,0,0,c44de8c225b0707871143fcb06737e334d929dd5a0acde877fcecec9290acbf6,2024-02-02T16:15:54.787000 +CVE-2024-20278,1,1,3422bd62c0dbfc03ee503f488f9025cb4328d1a2c7b9cbaa4588ba28546b6550,2024-03-27T17:48:21.140000 CVE-2024-2028,0,0,5879943042d614ba399bf0758e5dda45ae5ecb9ad367a59e13a5814f1ed688df,2024-03-13T18:15:58.530000 CVE-2024-20287,0,0,73801d80b462793a88b2af436ab77ac49555a7cb9634b8a2ccc26dc598e491a1,2024-02-02T16:15:54.887000 CVE-2024-20290,0,0,057d5dfa7ca9ea45e2cb423f9faaf6e87f8f428206a3f34ecdd5587406e21147,2024-02-15T15:43:27.240000 @@ -239377,17 +239383,28 @@ CVE-2024-20292,0,0,bd2670c9582b587cdf9a7328c2351789f5b8997cab8f7bfcaca92954507c5 CVE-2024-20294,0,0,1d3a9a3e9164827aaec419fc6a9a7d933913e3a790dc40da7ac082a33393bbf9,2024-02-29T13:49:29.390000 CVE-2024-2030,0,0,1279e34f262b0c0064508219ec7b722bb72cd0ff45a7c2dd1c4bd367a96f5a52,2024-03-13T18:15:58.530000 CVE-2024-20301,0,0,5731f674f5ae2bcf96420fc328e70e5146901802d1ab3db25461c019cd20961d,2024-03-07T13:52:27.110000 +CVE-2024-20303,1,1,e5ac9d50052f4c4c8ef804ccaefc800a16509a09aa16e231d189818adcc2e3c2,2024-03-27T17:48:21.140000 CVE-2024-20305,0,0,ab61a4ab7882e267880cc2c0e6b3ec1ab9c8b4d0dadf3a4832bdf14ae2ae012d,2024-02-15T19:56:38.910000 +CVE-2024-20306,1,1,7ce4ce882880d6a48a5bc5e41b86d2467b57bc87bd8f78243b3657e3eec48482,2024-03-27T17:48:21.140000 +CVE-2024-20307,1,1,6e057a049f344ad501317a246d37c6a97da44c74d43554b7afa1d19dde729fe3,2024-03-27T18:15:09.357000 +CVE-2024-20308,1,1,5982f15762a09863ecfc1c3105619d4c65dd988fdcec0e1b0f62fbfed1430f39,2024-03-27T18:15:09.853000 +CVE-2024-20309,1,1,e1a5a828e0a9998a91a0f24ce922d605b9c5494ea6372c8e56a89d1b0cae6848,2024-03-27T17:48:21.140000 CVE-2024-2031,0,0,8c1bcd6bbcf916842768e08303dd42fc425614624a1e3216d105b6a1ddb5c8c0,2024-03-13T12:33:51.697000 +CVE-2024-20311,1,1,c693e0e2ebd0ccff4af9c3de016bddd629d8a55f7bab90eb59f830d5f1210bde,2024-03-27T17:48:21.140000 +CVE-2024-20312,1,1,c48be856a777b8fad526c083b489e4d8d6e24a6434163b12913e7e6d6bd387df,2024-03-27T17:48:21.140000 +CVE-2024-20314,1,1,25da68acd340edea4119f8cd36c690ff3a322aebd5bc20462f4be9eaaddee7e2,2024-03-27T17:48:21.140000 CVE-2024-20315,0,0,831cd6ed54c2f6f2fd4097d9fc2e0953e1c74073f83cfb1960f6ad1247cec241,2024-03-13T18:15:58.530000 +CVE-2024-20316,1,1,0facf79c751f7edbf8bf7eb947aeebd24e08d05d059114eedc01d842bfa7840d,2024-03-27T17:48:21.140000 CVE-2024-20318,0,0,31b265ae70125be15efc925115276ad5f47aba03d611ad31fd59e0405ac987ce,2024-03-13T18:15:58.530000 CVE-2024-20319,0,0,fce820c860756da39956bcf24654b4c258181605332ce4ef4670a251a36856dc,2024-03-13T18:15:58.530000 CVE-2024-20320,0,0,f414732037b8e5e2b31a0c4322e496ff34c28ecfb3a724091e51a412efa51350,2024-03-13T18:15:58.530000 CVE-2024-20321,0,0,6de34d7d404f536decd9f5a380e1c4f28760edee84d237a9b02d7c6e56d785b7,2024-03-04T22:45:23.647000 CVE-2024-20322,0,0,2b06b6a28ea98e3be45957586078049ced390e2bbb1013999023329f607687e9,2024-03-13T18:15:58.530000 +CVE-2024-20324,1,1,4ceb90fa15b34b60a6093578287d94925925781fa75d2c106af71ed06f3f60fb,2024-03-27T17:48:21.140000 CVE-2024-20325,0,0,dfe1f947bf6fc9efa452f1881c4faae47bd9e909bfa416f69baa534db16c5289,2024-02-22T19:07:27.197000 CVE-2024-20327,0,0,99fc6b346e02158b3f4b7079ce29acef1779b3bc5057517cd2f663d4239946c0,2024-03-13T18:15:58.530000 CVE-2024-20328,0,0,f336e809226305b79cd50f26fae203aa1632211d86957dd92abacb2f83d51af6,2024-03-01T22:22:25.913000 +CVE-2024-20333,1,1,0fc0d9f2bb75be1d1f2fb11cd6f9cf26712193c623a9dcfd720083347398fc6f,2024-03-27T17:48:21.140000 CVE-2024-20335,0,0,e7a578f13e250b46805a1e9177b3b5be279d06874d056b5f6fc5ebbcf99e61d7,2024-03-07T13:52:27.110000 CVE-2024-20336,0,0,79e0816d77620de3a577cfb98875db786f37b5ccab0f43d45d78748499d8cbc3,2024-03-07T13:52:27.110000 CVE-2024-20337,0,0,3b1a37d60fcaa85f947811f983b479d3e4900eee9d9299595cf069082e613c78,2024-03-07T13:52:27.110000 @@ -239395,6 +239412,7 @@ CVE-2024-20338,0,0,5566f1b7285f199c07a2500bed0125d8d757cef5cccae1c32214ac0d6cd53 CVE-2024-20344,0,0,5701c086cd49552fb9b4e42b34522b298fb97269a26ec090e5fb132f538cd956,2024-02-29T13:49:29.390000 CVE-2024-20345,0,0,3d1a51edca02a2407f1ed6f3ffcbd5d09253c77ae2ce2b00247da9ce4f441eef,2024-03-07T13:52:27.110000 CVE-2024-20346,0,0,f967daadb6c5a5a55ae179293422d73f8c43ceb443c382f34755b3930e28b331,2024-03-06T21:42:54.697000 +CVE-2024-20354,1,1,d77b2c2498bd40063174d789072339810259d4fa0e4bc5c8d41a694f11a95e02,2024-03-27T17:48:21.140000 CVE-2024-2042,0,0,f6d54c5204cd94c19a84e1963b44103dc197c946869366cb59a65e7a4114231d,2024-03-17T22:38:29.433000 CVE-2024-2044,0,0,3d73c6b2cc04bd01f48c15467e360d6d6689d47e2b89d6d93430f2c98bfeca1a,2024-03-23T03:15:12.063000 CVE-2024-2045,0,0,72838b74e2668b744754639ee1018477ba3696de5929605fbc709ccd12df2c15,2024-03-01T14:04:26.010000 @@ -240636,6 +240654,8 @@ CVE-2024-23441,0,0,821a9fc4779da9403532f4be71c4c0616cc5f4f7bdd56ecb83e25ef4a979d CVE-2024-23446,0,0,250d55c97e03f858281f4b571f5417bd7430f2eb75d812ec1a5460363cd232aa,2024-02-14T20:10:24.323000 CVE-2024-23447,0,0,d914699914a1032e2f26c2be4fcf7737ff60c4d99dbe7a58145b0312508d8818,2024-02-14T20:02:00.753000 CVE-2024-23448,0,0,9b1c1e9aca41646e9bc0b5aea887714df628a3eafb241e1a8858ac207b41bd27,2024-02-15T15:39:14.317000 +CVE-2024-23450,1,1,6ff242ba8621158a6fc5bf1e14cebaff80a919a65abf5fe5c94bac3fd2cfef43,2024-03-27T17:48:21.140000 +CVE-2024-23451,1,1,396a36e96f019a84ce41421d631ed0347d8e4d3267d4975e6f03c5a130a41249,2024-03-27T18:15:10.330000 CVE-2024-23452,0,0,aaa529ca6e03eefd16006bb57cfd95647fc8b44bb3a3176fd8a83e06021cb7e9,2024-02-29T01:44:08.877000 CVE-2024-23453,0,0,ab3a22284e10fea1933712f86026a2e7792304e1f83321557a4d02140679b266,2024-01-29T22:58:07.777000 CVE-2024-23476,0,0,e3d84cdb88c20fc5ad4183c7e154fd4eb94d6574a64f56328103056889f0fc9e,2024-02-20T20:39:10.033000 @@ -240655,11 +240675,11 @@ CVE-2024-23506,0,0,1374ac637ee795ef76e472829586ea10162cf799e7f8facdf1ae775daa957 CVE-2024-23507,0,0,5e40ce7b11a8b26bc0a529a8393436247da9b21902b7ceeec2a950c934f8cd05,2024-02-05T20:42:09.590000 CVE-2024-23508,0,0,3a5d965b173789f90e04ab11d7235589e66f2e700d9aef01bbadb70d9def40c4,2024-02-05T20:27:29.570000 CVE-2024-2351,0,0,db54bad65395196f0c1789f4e2b7b2565491796aeba8bcf50c97119ee330dc9b,2024-03-21T02:52:33.103000 -CVE-2024-23510,0,1,f7020632d5dbc868e99ae1897d50110782a9a2a4bc20759c8f8985d0284bfe7e,2024-03-27T15:49:41.437000 +CVE-2024-23510,0,0,f7020632d5dbc868e99ae1897d50110782a9a2a4bc20759c8f8985d0284bfe7e,2024-03-27T15:49:41.437000 CVE-2024-23512,0,0,f774c1ac0cd010afc581062aca17eed5006d65805abf1bdf2daba7cd31140d9b,2024-02-12T14:19:54.330000 CVE-2024-23513,0,0,6b5819940e0cbb5eaed45cc3f1856dd03cfd514bc33059a14b7ee124f7e640d4,2024-02-12T14:19:54.330000 CVE-2024-23514,0,0,d7e3c284194c6ceaffde4175d0b48a010f01f7192801918385ee65be56400e43,2024-02-16T13:42:03.290000 -CVE-2024-23515,0,1,53bf497ae935ccecb307d1bdcdbad5772717f87289795b507399eb475ef84725,2024-03-27T15:49:41.437000 +CVE-2024-23515,0,0,53bf497ae935ccecb307d1bdcdbad5772717f87289795b507399eb475ef84725,2024-03-27T15:49:41.437000 CVE-2024-23516,0,0,f908beaf0aef3ecf8a8819fae23d2c4559de7dc9d2df85df41316958d107a5e0,2024-02-16T13:41:48.350000 CVE-2024-23517,0,0,e4bbedbc00468997609a0c9179822a4e7c082017c830cbf85558e35c31daa8f6,2024-02-16T13:41:33.563000 CVE-2024-23519,0,0,323d9800215ce0c9e36032433bafa6695128989b60bb35cada524fbfda63857e,2024-02-29T13:49:29.390000 @@ -242114,8 +242134,8 @@ CVE-2024-26647,0,0,29bdc4340bafd301bcad34511ccc4699e791a96b6f9c94e00888fcdf9decc CVE-2024-26648,0,0,28db65aa9bed6961e64f3164f5e2671ea79deb15b882dd8229f6c9a5965d8f38,2024-03-27T12:29:41.530000 CVE-2024-26649,0,0,86aeb2fae965a4a5332ed6f99e853d97c707f8eddf2b6cb0afb03f1458efaad0,2024-03-27T12:29:41.530000 CVE-2024-26650,0,0,a6462e36b1dd6f69ddd876eed038a048534eb12e06d7671796e4cb5890514076,2024-03-27T12:29:41.530000 -CVE-2024-26651,0,1,a2e5e1171fae5cd37adc9c273beac8339c77df92cf6c9b2119d65e36bb3ce0f0,2024-03-27T15:49:41.437000 -CVE-2024-26652,0,1,ccc590b218f45c6bb9fa7fed88041733bb926c9879d519c1ffc1f038a0a8e977,2024-03-27T15:49:41.437000 +CVE-2024-26651,0,0,a2e5e1171fae5cd37adc9c273beac8339c77df92cf6c9b2119d65e36bb3ce0f0,2024-03-27T15:49:41.437000 +CVE-2024-26652,0,0,ccc590b218f45c6bb9fa7fed88041733bb926c9879d519c1ffc1f038a0a8e977,2024-03-27T15:49:41.437000 CVE-2024-2668,0,0,d8e22e7bb795e8f8d48dc1ea67b8b3706e737c441fdb6e3cdf26dd6015682f9f,2024-03-21T02:52:41.070000 CVE-2024-2669,0,0,4f5a2d5969b59448109cf022193bd2b7c88dc7ffa7ca03caa723fb0f374642a3,2024-03-21T02:52:41.157000 CVE-2024-2670,0,0,51102bd696ec0a80433e00190a81242d0892d06afe5affb13dd51bd0c370ce65,2024-03-21T02:52:41.253000 @@ -242153,7 +242173,7 @@ CVE-2024-27087,0,0,797d68e52883598465cd96feb0df00e139da26d73f23e4ac2cae928dbfb41 CVE-2024-27088,0,0,51e0e40780267d1754ef6fc0476358b31f9f3458dd54a6b66fef5c03c4a96208,2024-02-26T22:10:40.463000 CVE-2024-27089,0,0,80888df8a8beb579eb58ecd8e5017bb9d7c0dad21161e687af8e50a608c5d017,2024-02-26T20:19:06.073000 CVE-2024-2709,0,0,05c473f010934bdd2fa56f73920990168cacc8a107825196c2fa48c0e97716de,2024-03-21T12:58:51.093000 -CVE-2024-27091,0,1,6c02da8a41fc8608262d0427db7fdd08eb03b81c66303da6889c1d90b51325a9,2024-03-27T15:49:51.300000 +CVE-2024-27091,0,0,6c02da8a41fc8608262d0427db7fdd08eb03b81c66303da6889c1d90b51325a9,2024-03-27T15:49:51.300000 CVE-2024-27092,0,0,46c8a65175e30ca99bc1ca448e9739f5a9fd09a26b86761b076001350720e53c,2024-02-29T13:49:29.390000 CVE-2024-27093,0,0,2adc536c19af535e2a03a5b98ba4818457cc5a617ec41b1d012943c718349d43,2024-02-27T14:20:06.637000 CVE-2024-27094,0,0,5b44307768a1f51c7f559a6b28fd23c9fbc41c848843f808ad0625dfa254064d,2024-03-21T12:58:51.093000 @@ -242235,7 +242255,7 @@ CVE-2024-2726,0,0,670b2be162ea05000bb5b040a32b1dee9c94eee7d1b48ed8e7d2e78e98ae50 CVE-2024-27265,0,0,caf2cbef481f9d0206d06f75a38ca052c5291ba0582e91875cea8f52e6d86a34,2024-03-19T16:52:02.767000 CVE-2024-27266,0,0,f3ab0f27c5fbbc81843b4329fa53134d5b91174cad9bacbbc5dbf01cfacc3864,2024-03-19T16:52:35.400000 CVE-2024-2727,0,0,89ce6b1f6bb0b4eb1c8d237648735f02e0931a62bd13bcc4638eefeb18037510,2024-03-22T15:34:43.663000 -CVE-2024-27270,0,1,1dd30dbb0e3fca00e54defbdce0f737f2baf29b2c8e90e62b85e02800e0e4451,2024-03-27T15:49:51.300000 +CVE-2024-27270,0,0,1dd30dbb0e3fca00e54defbdce0f737f2baf29b2c8e90e62b85e02800e0e4451,2024-03-27T15:49:51.300000 CVE-2024-27277,0,0,eb365bab444835328458e82045190ce3a564e0755801fc1f65f8b5d9bbf59bcb,2024-03-21T19:47:03.943000 CVE-2024-27278,0,0,2ef9546b6eb3a76ad70be700186038d995dd630654759ed72b9b3d10968f6d39,2024-03-06T15:18:08.093000 CVE-2024-27279,0,0,a0a465925dfcee0f633443a4d3db070f2bf023c10d4135b020d1a0fbe76c5a4b,2024-03-12T12:40:13.500000 @@ -242678,7 +242698,7 @@ CVE-2024-28753,0,0,73ca850c1b6879daba607bc61d7d16457b56173a47004b8bff799b514a526 CVE-2024-28754,0,0,9281349f951cf3fa92b3f484f1e5f3e3b9f20229dcabe6872ba34e9bebaf3b2c,2024-03-11T01:32:39.697000 CVE-2024-28756,0,0,25c89ab9b64cbd69060fc1b1f68e4f1c76ee574185097dbf9146fc8b2b315bf5,2024-03-22T12:45:36.130000 CVE-2024-28757,0,0,6f674e74da8b1d303f1997061736a8f7699c424c20f0aba68e441f140f441071,2024-03-23T03:15:11.920000 -CVE-2024-28784,0,1,2bc1ea2e712d4e90db6a7b931c77b9f29985433c42fe688e3c826f016a685898,2024-03-27T15:49:51.300000 +CVE-2024-28784,0,0,2bc1ea2e712d4e90db6a7b931c77b9f29985433c42fe688e3c826f016a685898,2024-03-27T15:49:51.300000 CVE-2024-28815,0,0,f9ba7e38674697b7d17d51e7b24c9c896d5b8cd72333d8b6833bda1b0cb49c74,2024-03-27T12:29:30.307000 CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000 CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e9dc,2024-03-11T12:47:42.653000 @@ -242692,8 +242712,8 @@ CVE-2024-28849,0,0,5e73d26630408070b9f2d0554aca63f533ce0044a2d97ed66eab06494ab2b CVE-2024-2885,0,0,cf50d0de63046c25a9c06aae6750e831b06cf13de0fd69058b9ce32d2d050ac0,2024-03-27T12:29:30.307000 CVE-2024-28850,0,0,3f010e48b33d8f74ceb957fab8d6defaf56ad7dc42ab2eb1e3bf15c4cfbd82b3,2024-03-26T12:55:05.010000 CVE-2024-28851,0,0,f15187ac52243f1288d6dabed456ab5bd2287b2db60c97a538d0582f4f0ba12d,2024-03-17T22:38:29.433000 -CVE-2024-28852,0,1,81477f31a68a79cf239e62d41f0c7941d39269da2e1c0040b745dee79d9f52fb,2024-03-27T15:49:41.437000 -CVE-2024-28853,0,1,ea120d2b937113b211783fea6e205020383522b3385da9d8677cfced8a49293b,2024-03-27T15:49:41.437000 +CVE-2024-28852,0,0,81477f31a68a79cf239e62d41f0c7941d39269da2e1c0040b745dee79d9f52fb,2024-03-27T15:49:41.437000 +CVE-2024-28853,0,0,ea120d2b937113b211783fea6e205020383522b3385da9d8677cfced8a49293b,2024-03-27T15:49:41.437000 CVE-2024-28854,0,0,8cb03aded6b194ffbf5e93b6a999bfbf01ac8f736343c4fc752b0e38a8bc9f90,2024-03-17T22:38:29.433000 CVE-2024-28855,0,0,2384a3330fde47f752f152bfa13a6226cb6b236bb18ff2466f5e886c7d3e893c,2024-03-19T13:26:46 CVE-2024-28859,0,0,2d0407c7b83f2786a493b842ae3fe3ce3f906494adee8b0e0f61c75557fcb17c,2024-03-17T22:38:29.433000 @@ -242867,56 +242887,56 @@ CVE-2024-29684,0,0,bf20e1eee3419c30e31b5c1e15077ebe4738914779e007adc0a6cf94ae841 CVE-2024-2971,0,0,898bc718d43d0c390c6d16657d6a8f74b1bed4195ca2be9f6e03b60807e37565,2024-03-27T12:29:30.307000 CVE-2024-29732,0,0,3aff958eec55f5cf06538251c792be6423021bd21573f6f2f920d098c9ad37bd,2024-03-21T12:58:51.093000 CVE-2024-29735,0,0,286fbba4f7cb1bbd32eae740efb468430068245735dc6c522579c415dcd44e18,2024-03-27T12:29:41.530000 -CVE-2024-29758,0,1,850000367bf365fc67358722bd3f49f9e6efe1177fc04e28429703ce7619a3b6,2024-03-27T15:49:41.437000 -CVE-2024-29759,0,1,604dde57e158ba268d6ad5edd22f6f9ee225a2c65d1a266897bc2dc328d431c0,2024-03-27T15:49:41.437000 -CVE-2024-2976,0,1,0b50db41b4280994d8ba65b62c091178f13c54aa94ca8ab9ef2147cb1970d8ea,2024-03-27T15:49:41.437000 -CVE-2024-29760,0,1,7eb818a3c28c1f97de13ad72a84131f01130ec37e7142cdb428d023e4ce66871,2024-03-27T15:49:41.437000 -CVE-2024-29761,0,1,cc5c3ba7815c601086b652c857d276cd318c49aa89a3c9384e9951044880487b,2024-03-27T15:49:41.437000 -CVE-2024-29762,0,1,aaddd686bc3db71dabf4f7e85f42e6c46b97df4732f38ffb96878045fdd29b25,2024-03-27T15:49:41.437000 -CVE-2024-29763,0,1,30323441c62e60ca33f6dd2c29898360453843790bcc6e91d33af1ae4fa17148,2024-03-27T15:49:41.437000 -CVE-2024-29764,0,1,a7e034992ed1c63536559262a04804a84bd56ff02c9edb940bd6a052423afb08,2024-03-27T15:49:41.437000 -CVE-2024-29765,0,1,98e82fd5fded6cd499e69c0f014328d69598d01afd9585e3714d45b0fbd70415,2024-03-27T15:49:41.437000 -CVE-2024-29766,0,1,45c1da4cd021b137fe62f544f1028abb2098662c1dbd6348f454f93491c946b7,2024-03-27T15:49:51.300000 -CVE-2024-29767,0,1,3a1e80de1205c2b3c4e911ff057ffa52ee92306bf90fb66835329b42a0a4471c,2024-03-27T15:49:51.300000 -CVE-2024-29768,0,1,d9762da294a1ca22ea7a67aa43fe98efb43232a0a476c14841d2c754ac4a606b,2024-03-27T15:49:51.300000 -CVE-2024-29769,0,1,c9ab754c046c255443da858120ac7312f6c44f9137f47bb927c2d35cc00ea50c,2024-03-27T15:49:51.300000 -CVE-2024-2977,0,1,265a8e0885b275ccb8c8a7fb5d6b545c4848fc25e3d153bde1d499f0e11c2444,2024-03-27T15:49:41.437000 -CVE-2024-29770,0,1,a49737f958ade2e568c6a268defe7fd245f9865b992e740d9c5f4c1b1df7cb94,2024-03-27T15:49:51.300000 -CVE-2024-29771,0,1,99eaaf300460484cb14da0ae3234fa8f436a97aa719f6da5c1afc3c68c088288,2024-03-27T15:49:51.300000 -CVE-2024-29772,0,1,a0fde1848c9f64fbc382c578c7e01c4c0ab620bd0ead0e612d021fe39802b51b,2024-03-27T15:49:51.300000 -CVE-2024-29773,0,1,acb085aed13af95bb8372ad0588f2261bd14f1251d46b2a953f7e9c206793454,2024-03-27T15:49:41.437000 -CVE-2024-29774,0,1,ae6539860a62635b04f816c43ef0f8b274e7a885187931e27451e43c4732f9c1,2024-03-27T15:49:51.300000 -CVE-2024-29775,0,1,c579fdc00d77d197afe0af16c71be06b98b4f8e7314c1a2e1eb78f6992cd8305,2024-03-27T15:49:41.437000 -CVE-2024-29776,0,1,41c24a7d916a74c4603a3edaaed2be0a1d06a9fb7a65c8c9e2ca59dc51827147,2024-03-27T15:49:41.437000 -CVE-2024-29777,0,1,6ca2f9794500ac914681af47788da89b9c80d56e1876cb1f64975d9a66ffb8a4,2024-03-27T15:49:41.437000 -CVE-2024-2978,0,1,ccc57f57023ca7268aaa9e33e078721d1b8ed4cc2a9d5fba1402a5ae074e2103,2024-03-27T15:49:41.437000 -CVE-2024-29788,0,1,2fb18370a76e5cb12562cdeaf4ac512430afc35aaba20836464a022117314d5a,2024-03-27T15:49:41.437000 -CVE-2024-29789,0,1,527e862cf3490a2c7f0ebc13eb33a969d581e7c1ad36955ed4d6e199035cdaa6,2024-03-27T15:49:41.437000 -CVE-2024-2979,0,1,b48fa5c9d2f47bc4e52ee839def41fa08bbb2e05a711ae00ed5d25891030ebd0,2024-03-27T15:49:41.437000 -CVE-2024-29790,0,1,33f7dab8aab944a64462c58246cf3a4aa8b3acf33d35f16594fcf0e9e0e49eec,2024-03-27T15:49:41.437000 -CVE-2024-29791,0,1,da3ce5323fe0059f87050dffbd1c548157467ea6614ee9f88f6fe2389b7969ef,2024-03-27T15:49:41.437000 -CVE-2024-29792,0,1,1cc3a43409e151a80fd012c5bec518b61fa90dc58697900f281dd38c77b3dedf,2024-03-27T15:49:41.437000 -CVE-2024-29793,0,1,38990b7403b37a4b172e4b95aaa1873a77115e041022e69af6fe1a71828c57f7,2024-03-27T15:49:41.437000 -CVE-2024-29794,0,1,4e1539afb130e7d8b5b602b4774a03d21365dcd87ac0b2851375a396e3a96328,2024-03-27T15:49:41.437000 -CVE-2024-29795,0,1,f1a7c8c32a0c2edb61fe45efb42ecf6718606c318c61e81cc9ede03fc04a89d4,2024-03-27T15:49:41.437000 -CVE-2024-29796,0,1,aaa707079b712de4c1539fc5342496e10082d2b15da68bddf8004c4d4177bb76,2024-03-27T15:49:41.437000 -CVE-2024-29797,0,1,f4d0695be063b4aa93c639c7e7ecc9649ecb1f66cb10856f41ecc87aef7cdf89,2024-03-27T15:49:41.437000 -CVE-2024-29798,0,1,e4cde7751e85b2aa0407fc3f0780fe5af2f13da8d8f278ca7bbe875863a7dcbd,2024-03-27T15:49:41.437000 -CVE-2024-29799,0,1,f1281c50846b69e40773fdd85d2ac4c83e1c7a0539df9e80293cfe5915e9fe72,2024-03-27T15:49:41.437000 -CVE-2024-2980,1,1,f134107d0ff7e395a04515a053eb7eea89201a89938306b64df80e4ed25ab2ae,2024-03-27T15:49:41.437000 -CVE-2024-29801,0,1,723ff24a22f5c35bfa87fba17edbd54dc3241a90618f7407842799030e337d3a,2024-03-27T15:49:41.437000 -CVE-2024-29802,0,1,f0281d2f4c4f7b33e6995f73ab5f2da2dcad47bf02c650232bfa71db30f560d1,2024-03-27T15:49:41.437000 -CVE-2024-29803,0,1,ec2d6e8b1de4f1b12189eb4f5f1b8889e432d71bec7878f196027a0271541134,2024-03-27T15:49:41.437000 -CVE-2024-29804,0,1,e1a5eba48948258de92f35b86a197e4e3725bcb26472341e46a5d04fa4f155f9,2024-03-27T15:49:41.437000 -CVE-2024-29805,0,1,bbcea86f7733f810b3280a0692ef470761110b7d55b9f4d7c96e636d1e3103b5,2024-03-27T15:49:41.437000 -CVE-2024-29806,0,1,1fa0a4d7bcdf174f5850cd4be365ca5b2be71d8963cf745f412aed7bbc2ec06e,2024-03-27T15:49:41.437000 -CVE-2024-29807,0,1,a70ed7c03cde5e433e6ebe101af7f7df5552bde53453625634bd6b408cd95fdb,2024-03-27T15:49:41.437000 +CVE-2024-29758,0,0,850000367bf365fc67358722bd3f49f9e6efe1177fc04e28429703ce7619a3b6,2024-03-27T15:49:41.437000 +CVE-2024-29759,0,0,604dde57e158ba268d6ad5edd22f6f9ee225a2c65d1a266897bc2dc328d431c0,2024-03-27T15:49:41.437000 +CVE-2024-2976,0,0,0b50db41b4280994d8ba65b62c091178f13c54aa94ca8ab9ef2147cb1970d8ea,2024-03-27T15:49:41.437000 +CVE-2024-29760,0,0,7eb818a3c28c1f97de13ad72a84131f01130ec37e7142cdb428d023e4ce66871,2024-03-27T15:49:41.437000 +CVE-2024-29761,0,0,cc5c3ba7815c601086b652c857d276cd318c49aa89a3c9384e9951044880487b,2024-03-27T15:49:41.437000 +CVE-2024-29762,0,0,aaddd686bc3db71dabf4f7e85f42e6c46b97df4732f38ffb96878045fdd29b25,2024-03-27T15:49:41.437000 +CVE-2024-29763,0,0,30323441c62e60ca33f6dd2c29898360453843790bcc6e91d33af1ae4fa17148,2024-03-27T15:49:41.437000 +CVE-2024-29764,0,0,a7e034992ed1c63536559262a04804a84bd56ff02c9edb940bd6a052423afb08,2024-03-27T15:49:41.437000 +CVE-2024-29765,0,0,98e82fd5fded6cd499e69c0f014328d69598d01afd9585e3714d45b0fbd70415,2024-03-27T15:49:41.437000 +CVE-2024-29766,0,0,45c1da4cd021b137fe62f544f1028abb2098662c1dbd6348f454f93491c946b7,2024-03-27T15:49:51.300000 +CVE-2024-29767,0,0,3a1e80de1205c2b3c4e911ff057ffa52ee92306bf90fb66835329b42a0a4471c,2024-03-27T15:49:51.300000 +CVE-2024-29768,0,0,d9762da294a1ca22ea7a67aa43fe98efb43232a0a476c14841d2c754ac4a606b,2024-03-27T15:49:51.300000 +CVE-2024-29769,0,0,c9ab754c046c255443da858120ac7312f6c44f9137f47bb927c2d35cc00ea50c,2024-03-27T15:49:51.300000 +CVE-2024-2977,0,0,265a8e0885b275ccb8c8a7fb5d6b545c4848fc25e3d153bde1d499f0e11c2444,2024-03-27T15:49:41.437000 +CVE-2024-29770,0,0,a49737f958ade2e568c6a268defe7fd245f9865b992e740d9c5f4c1b1df7cb94,2024-03-27T15:49:51.300000 +CVE-2024-29771,0,0,99eaaf300460484cb14da0ae3234fa8f436a97aa719f6da5c1afc3c68c088288,2024-03-27T15:49:51.300000 +CVE-2024-29772,0,0,a0fde1848c9f64fbc382c578c7e01c4c0ab620bd0ead0e612d021fe39802b51b,2024-03-27T15:49:51.300000 +CVE-2024-29773,0,0,acb085aed13af95bb8372ad0588f2261bd14f1251d46b2a953f7e9c206793454,2024-03-27T15:49:41.437000 +CVE-2024-29774,0,0,ae6539860a62635b04f816c43ef0f8b274e7a885187931e27451e43c4732f9c1,2024-03-27T15:49:51.300000 +CVE-2024-29775,0,0,c579fdc00d77d197afe0af16c71be06b98b4f8e7314c1a2e1eb78f6992cd8305,2024-03-27T15:49:41.437000 +CVE-2024-29776,0,0,41c24a7d916a74c4603a3edaaed2be0a1d06a9fb7a65c8c9e2ca59dc51827147,2024-03-27T15:49:41.437000 +CVE-2024-29777,0,0,6ca2f9794500ac914681af47788da89b9c80d56e1876cb1f64975d9a66ffb8a4,2024-03-27T15:49:41.437000 +CVE-2024-2978,0,0,ccc57f57023ca7268aaa9e33e078721d1b8ed4cc2a9d5fba1402a5ae074e2103,2024-03-27T15:49:41.437000 +CVE-2024-29788,0,0,2fb18370a76e5cb12562cdeaf4ac512430afc35aaba20836464a022117314d5a,2024-03-27T15:49:41.437000 +CVE-2024-29789,0,0,527e862cf3490a2c7f0ebc13eb33a969d581e7c1ad36955ed4d6e199035cdaa6,2024-03-27T15:49:41.437000 +CVE-2024-2979,0,0,b48fa5c9d2f47bc4e52ee839def41fa08bbb2e05a711ae00ed5d25891030ebd0,2024-03-27T15:49:41.437000 +CVE-2024-29790,0,0,33f7dab8aab944a64462c58246cf3a4aa8b3acf33d35f16594fcf0e9e0e49eec,2024-03-27T15:49:41.437000 +CVE-2024-29791,0,0,da3ce5323fe0059f87050dffbd1c548157467ea6614ee9f88f6fe2389b7969ef,2024-03-27T15:49:41.437000 +CVE-2024-29792,0,0,1cc3a43409e151a80fd012c5bec518b61fa90dc58697900f281dd38c77b3dedf,2024-03-27T15:49:41.437000 +CVE-2024-29793,0,0,38990b7403b37a4b172e4b95aaa1873a77115e041022e69af6fe1a71828c57f7,2024-03-27T15:49:41.437000 +CVE-2024-29794,0,0,4e1539afb130e7d8b5b602b4774a03d21365dcd87ac0b2851375a396e3a96328,2024-03-27T15:49:41.437000 +CVE-2024-29795,0,0,f1a7c8c32a0c2edb61fe45efb42ecf6718606c318c61e81cc9ede03fc04a89d4,2024-03-27T15:49:41.437000 +CVE-2024-29796,0,0,aaa707079b712de4c1539fc5342496e10082d2b15da68bddf8004c4d4177bb76,2024-03-27T15:49:41.437000 +CVE-2024-29797,0,0,f4d0695be063b4aa93c639c7e7ecc9649ecb1f66cb10856f41ecc87aef7cdf89,2024-03-27T15:49:41.437000 +CVE-2024-29798,0,0,e4cde7751e85b2aa0407fc3f0780fe5af2f13da8d8f278ca7bbe875863a7dcbd,2024-03-27T15:49:41.437000 +CVE-2024-29799,0,0,f1281c50846b69e40773fdd85d2ac4c83e1c7a0539df9e80293cfe5915e9fe72,2024-03-27T15:49:41.437000 +CVE-2024-2980,0,0,f134107d0ff7e395a04515a053eb7eea89201a89938306b64df80e4ed25ab2ae,2024-03-27T15:49:41.437000 +CVE-2024-29801,0,0,723ff24a22f5c35bfa87fba17edbd54dc3241a90618f7407842799030e337d3a,2024-03-27T15:49:41.437000 +CVE-2024-29802,0,0,f0281d2f4c4f7b33e6995f73ab5f2da2dcad47bf02c650232bfa71db30f560d1,2024-03-27T15:49:41.437000 +CVE-2024-29803,0,0,ec2d6e8b1de4f1b12189eb4f5f1b8889e432d71bec7878f196027a0271541134,2024-03-27T15:49:41.437000 +CVE-2024-29804,0,0,e1a5eba48948258de92f35b86a197e4e3725bcb26472341e46a5d04fa4f155f9,2024-03-27T15:49:41.437000 +CVE-2024-29805,0,0,bbcea86f7733f810b3280a0692ef470761110b7d55b9f4d7c96e636d1e3103b5,2024-03-27T15:49:41.437000 +CVE-2024-29806,0,0,1fa0a4d7bcdf174f5850cd4be365ca5b2be71d8963cf745f412aed7bbc2ec06e,2024-03-27T15:49:41.437000 +CVE-2024-29807,0,0,a70ed7c03cde5e433e6ebe101af7f7df5552bde53453625634bd6b408cd95fdb,2024-03-27T15:49:41.437000 CVE-2024-29808,0,0,1a083356e9d0f501470cdfed0d1c85987d8c8667e4684d7b2ae73ab2fb9e2d44,2024-03-26T17:09:53.043000 CVE-2024-29809,0,0,21a6514e4479b2af7c07059597ccbdef1cddc762bb223c6efd7d97d6a6cee8d3,2024-03-26T17:09:53.043000 -CVE-2024-2981,1,1,63fba9d2c68cd2879c505cf8d50b9a3caeb150f5fed9881fb4066302e315473c,2024-03-27T15:49:41.437000 +CVE-2024-2981,0,0,63fba9d2c68cd2879c505cf8d50b9a3caeb150f5fed9881fb4066302e315473c,2024-03-27T15:49:41.437000 CVE-2024-29810,0,0,eff91a2f0d80ceae6d9d4c914195c5a044b82fbe1cafb4a26b6b9c2e1aa693cf,2024-03-26T17:09:53.043000 -CVE-2024-29811,0,1,484b9a978cf4458e6a6cd3e1d014b1a9b41a0d8478a1a8ee658320929485e4c5,2024-03-27T15:49:41.437000 -CVE-2024-29812,0,1,eea488bae5a3bc74c00dca82c435160bacb5f5ae567985445e1e1039cfede973,2024-03-27T15:49:41.437000 +CVE-2024-29811,0,0,484b9a978cf4458e6a6cd3e1d014b1a9b41a0d8478a1a8ee658320929485e4c5,2024-03-27T15:49:41.437000 +CVE-2024-29812,0,0,eea488bae5a3bc74c00dca82c435160bacb5f5ae567985445e1e1039cfede973,2024-03-27T15:49:41.437000 CVE-2024-29813,0,0,b92c8b4b8dc44fdf902974ed6bdae2df7d58513146055d3aee69855a4f40f773,2024-03-27T12:29:30.307000 CVE-2024-29814,0,0,066a243dd0997d380d27eb89de10396940c1484c7e51310d2de950a5d930462b,2024-03-27T12:29:30.307000 CVE-2024-29815,0,0,e474045fee5a994704d14c9b91da0090703e8eef80577b15658e4496608af879,2024-03-27T12:29:30.307000 @@ -242924,18 +242944,21 @@ CVE-2024-29816,0,0,26098ad42810abc782a6312323b3749848e728c068871f3a8e562ffd3827f CVE-2024-29817,0,0,b9d7d90bcba101b5bf99517f691b068a1efc5e5e388d754e386eca951d336d45,2024-03-27T12:29:30.307000 CVE-2024-29818,0,0,44af120b55fc277e2559e8317cff590953d75564f18e5cdb1a3adef98c7f6fa2,2024-03-27T12:29:30.307000 CVE-2024-29819,0,0,489085f50dbde78feed33cc0a68fd671c989aac2e872d0b30a126d7fff3447e6,2024-03-27T12:29:30.307000 -CVE-2024-2982,1,1,477f547330f0ab08e6d21faee4dc47be09f9639ddaea8955ea45d08f1c1fd24f,2024-03-27T16:15:10.210000 +CVE-2024-2982,0,1,dda049ea5d2486c6f2bdb234a1dfc5a467a2381ac2f931408cf9328cd77cd76d,2024-03-27T17:48:21.140000 CVE-2024-29820,0,0,da81473ce6ac9b7a0c8169d0e94b81abe513c85a432f3965c234ec8d7d8b927f,2024-03-27T12:29:30.307000 -CVE-2024-2983,1,1,3798275594497c10345a0244007437a821bd5cea22741ef9c039b13c5b602bb7,2024-03-27T16:15:10.450000 +CVE-2024-2983,0,1,873ca2d79b54162cace8ca3da7294f22ebfacbb79289c971b5f392cd577e4689,2024-03-27T17:48:21.140000 CVE-2024-29832,0,0,e21971089d12a8b67bd5dc57f7dea93be0cc79e81378beb3ae2f03d4ff6e4c14,2024-03-26T17:09:53.043000 CVE-2024-29833,0,0,4c9a8c532b47162f5aea1ac06e294c5bbf9e597d7d17a1d16e86b5dc1293a53a,2024-03-26T17:09:53.043000 -CVE-2024-2984,1,1,82a30415ede29bd42a5fc32bfdc177889cae7d7e274f41d7b410438a4a7a2ef8,2024-03-27T16:15:10.713000 +CVE-2024-2984,0,1,2d375aee96f2c9f8a84e53391976f555aaa90b5661a5979b39e2ea2d3b374caf,2024-03-27T17:48:21.140000 +CVE-2024-2985,1,1,d2c440a5fe0f8e92f2900a5671fbef483e2af166b02191dac0aceb0548aa2911,2024-03-27T17:48:21.140000 CVE-2024-29858,0,0,585719d860c91771e96e52d882eed744121f21e899f727afe6b381f4ffbb308d,2024-03-21T12:58:51.093000 CVE-2024-29859,0,0,6ebff5730a73f542ffebf0a56f74146bb69314ac3f95118519ec4b678666f245,2024-03-21T12:58:51.093000 +CVE-2024-2986,1,1,c77fe7aa4ac5882d2496045c16279acb6d3f21728c12d35e86b894b6435b955d,2024-03-27T17:48:21.140000 CVE-2024-29862,0,0,78f62d6320f790cb50cb5767943bbca91d7f9763b83315a1495201af3fd41026,2024-03-21T12:58:51.093000 CVE-2024-29864,0,0,3c9560ffae0fa16acac4cf8327bf4ae3182996a8c684b25430908ed832b73c71,2024-03-21T12:58:51.093000 CVE-2024-29865,0,0,e24c5786380c2695525e4e2d9b0d8cb3d2e21b4351c584a8032e8ded5e6f9da9,2024-03-22T15:34:43.663000 CVE-2024-29866,0,0,d3474a4cb7339082dcfbd889d056a2a906f051d7c933d6576013f44ee70632b2,2024-03-21T15:24:35.093000 +CVE-2024-2987,1,1,b4986bea0aba6f48be24f8f454c5e35bb2f698d582004b815160c33ab9e532b1,2024-03-27T17:48:21.140000 CVE-2024-29870,0,0,04eec461d26d3928388aa1ebeda7f3889d70d7fb805b862b11fc37cdb9c73805,2024-03-21T15:24:35.093000 CVE-2024-29871,0,0,e7b820291fe87f3c68126b9e66a3cb2071635a1781039b23d1340b3ec50d7104,2024-03-21T15:24:35.093000 CVE-2024-29872,0,0,2ed0e31c2aeb7a79b11a328bd37ec6ac592cb7ae8ad49b21b1fd6587d921da01,2024-03-21T15:24:35.093000 @@ -242946,9 +242969,11 @@ CVE-2024-29876,0,0,81e9b92db68fe1869c86668a1e00f2a9ff624f59839df1fbe18d8e987774c CVE-2024-29877,0,0,5b6a7271e346dceec62c9141f9ae12b0e5342a31cc26366c653fe20c26c8bc21,2024-03-21T15:24:35.093000 CVE-2024-29878,0,0,59bd69937e12e8238cdc5eae96014d85a453bedc37861446ca2ffcb7373dda8d,2024-03-21T15:24:35.093000 CVE-2024-29879,0,0,f281e5565c18f62981e30c243c39ad05583d9bbab1631a620c93b3c78846e1db,2024-03-21T15:24:35.093000 +CVE-2024-2988,1,1,44a505017c98ed38c8d5dc5d8e011605d3c9f7895e5eca811eae32b18fc8f7bb,2024-03-27T18:15:10.757000 CVE-2024-29880,0,0,e4ba47a3336aba44b26bc2b767c682c9997cfe6f0e16a9457e7fe50a3abeaa1c,2024-03-21T15:24:35.093000 CVE-2024-29881,0,0,7eaff78a6eecd508372203508f2ecab97ebc62cfd94b7af6101b5d7b6ca209b2,2024-03-26T17:09:53.043000 CVE-2024-29883,0,0,2444d321a867d6f4cdf63bf8a1bc6af3b407752f2134c1f64a1d02545242c426,2024-03-26T17:09:53.043000 +CVE-2024-2989,1,1,28b7dcd865137d9f2b8b08b53206e10e337ffacc5ed400750f6a854bac66dab1,2024-03-27T18:15:11.293000 CVE-2024-29906,0,0,5e6afa8dbe77b2ceaee29629c66d8bdf273caddf4f38f955d682aeefe9beab4c,2024-03-27T12:29:30.307000 CVE-2024-29907,0,0,95ebf1e66704307f93559559f18923b10f644f7f3c6486fedede31060b34f004,2024-03-27T12:29:30.307000 CVE-2024-29908,0,0,e8d16098eaf081188862f8dc959904187f56568ff6eac559fa0228e1e293cd7d,2024-03-27T12:29:30.307000 @@ -242982,6 +243007,8 @@ CVE-2024-29935,0,0,be0415ab39e2424d7707b3e026043937bddf40f9f881b75f312fe4db29a75 CVE-2024-29936,0,0,a0aa951ea6a61ca1da8503010b43db132d71646708e0e57d95e11fe2a44ec10b,2024-03-27T12:29:30.307000 CVE-2024-29943,0,0,39d573a490fc5d2b219e8af270d3feeff9aa72e4341ddd52f10b0ddfa677f78e,2024-03-22T15:34:43.663000 CVE-2024-29944,0,0,4d21f9c7c1ab1ff30cce77b261f7b06b8e28526248b968d986726dab452f24fc,2024-03-25T17:15:51.670000 +CVE-2024-29945,1,1,97b7c829f41e6375bb757d6df21152ea8c651e9cee7b85bf8ce197c3feb776e6,2024-03-27T17:48:21.140000 +CVE-2024-29946,1,1,1dcd38a0ed008144b587f71b29e9f0373aec4787ad19668521370ecc593e8a2d,2024-03-27T17:48:21.140000 CVE-2024-30156,0,0,aff0cd27a6d4ebd55e03f44f61cc23ee9163e094843acbac5af736e684ab9391,2024-03-25T01:51:01.223000 CVE-2024-30161,0,0,f6d00094643508d05d1e5626fca4ef83c82ab69ba4696adb329c49eff6d0ab4a,2024-03-25T01:51:01.223000 CVE-2024-30177,0,0,ce7cec2fca67508ea4a8b86ac0339410ad9c9cb05c2afad1960db626913e7789,2024-03-27T12:29:30.307000 @@ -243013,4 +243040,4 @@ CVE-2024-30232,0,0,f91ac1a16b6560e63a231b2b02f73b0e579de91231d5661b2fdb0493e2d31 CVE-2024-30233,0,0,4c2695d2f3b076c7408bd91fee17c2a607f64636c8c0001f359b0796de1d2054,2024-03-26T17:09:53.043000 CVE-2024-30234,0,0,a6be244378f8a1646e756d1cd111fc8fb568601f74deb65508c56b004a03b137,2024-03-26T17:09:53.043000 CVE-2024-30235,0,0,ef6f7f84deca979173abd2d122dde5dfb4f5568a80e848e8fa95eae1319c946f,2024-03-26T17:09:53.043000 -CVE-2024-30238,0,1,33e85580fdd0a4e3fa2eff1ee3b65f63c015d9c54bc4af4192eb2ee2204281b7,2024-03-27T15:49:41.437000 +CVE-2024-30238,0,0,33e85580fdd0a4e3fa2eff1ee3b65f63c015d9c54bc4af4192eb2ee2204281b7,2024-03-27T15:49:41.437000