From 628d5dcdecce32d06787c50f2a15ea1c5dc796ad Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 15 Mar 2024 03:03:18 +0000 Subject: [PATCH] Auto-Update: 2024-03-15T03:00:29.596506+00:00 --- CVE-2019/CVE-2019-252xx/CVE-2019-25210.json | 12 +++- CVE-2024/CVE-2024-08xx/CVE-2024-0802.json | 63 +++++++++++++++++++++ CVE-2024/CVE-2024-08xx/CVE-2024-0803.json | 63 +++++++++++++++++++++ CVE-2024/CVE-2024-16xx/CVE-2024-1622.json | 10 +++- CVE-2024/CVE-2024-19xx/CVE-2024-1915.json | 63 +++++++++++++++++++++ CVE-2024/CVE-2024-19xx/CVE-2024-1916.json | 63 +++++++++++++++++++++ CVE-2024/CVE-2024-19xx/CVE-2024-1917.json | 63 +++++++++++++++++++++ CVE-2024/CVE-2024-264xx/CVE-2024-26454.json | 24 ++++++++ CVE-2024/CVE-2024-265xx/CVE-2024-26540.json | 20 +++++++ README.md | 24 +++++--- _state.csv | 17 ++++-- 11 files changed, 405 insertions(+), 17 deletions(-) create mode 100644 CVE-2024/CVE-2024-08xx/CVE-2024-0802.json create mode 100644 CVE-2024/CVE-2024-08xx/CVE-2024-0803.json create mode 100644 CVE-2024/CVE-2024-19xx/CVE-2024-1915.json create mode 100644 CVE-2024/CVE-2024-19xx/CVE-2024-1916.json create mode 100644 CVE-2024/CVE-2024-19xx/CVE-2024-1917.json create mode 100644 CVE-2024/CVE-2024-264xx/CVE-2024-26454.json create mode 100644 CVE-2024/CVE-2024-265xx/CVE-2024-26540.json diff --git a/CVE-2019/CVE-2019-252xx/CVE-2019-25210.json b/CVE-2019/CVE-2019-252xx/CVE-2019-25210.json index 0b6ebad83e2..cfd97757452 100644 --- a/CVE-2019/CVE-2019-252xx/CVE-2019-25210.json +++ b/CVE-2019/CVE-2019-252xx/CVE-2019-25210.json @@ -2,12 +2,16 @@ "id": "CVE-2019-25210", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-03T21:15:49.867", - "lastModified": "2024-03-04T13:58:23.447", + "lastModified": "2024-03-15T01:15:56.040", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "An issue was discovered in Cloud Native Computing Foundation (CNCF) Helm through 3.13.3. It displays values of secrets when the --dry-run flag is used. This is a security concern in some use cases, such as a --dry-run call by a CI/CD tool. NOTE: the vendor's position is that this behavior was introduced intentionally, and cannot be removed without breaking backwards compatibility (some users may be relying on these values)." + "value": "An issue was discovered in Cloud Native Computing Foundation (CNCF) Helm through 3.13.3. It displays values of secrets when the --dry-run flag is used. This is a security concern in some use cases, such as a --dry-run call by a CI/CD tool. NOTE: the vendor's position is that this behavior was introduced intentionally, and cannot be removed without breaking backwards compatibility (some users may be relying on these values). Also, it is not the Helm Project's responsibility if a user decides to use --dry-run within a CI/CD environment whose output is visible to unauthorized persons." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Helm de Cloud Native Computing Foundation (CNCF) hasta la versi\u00f3n 3.13.3. Muestra valores de secretos cuando se utiliza el indicador --dry-run. Esto es un problema de seguridad en algunos casos de uso, como una llamada de prueba realizada por una herramienta CI/CD. NOTA: la posici\u00f3n del proveedor es que este comportamiento se introdujo intencionalmente y no se puede eliminar sin romper la compatibilidad con versiones anteriores (algunos usuarios pueden confiar en estos valores)." } ], "metrics": {}, @@ -16,6 +20,10 @@ "url": "https://github.com/helm/helm/issues/7275", "source": "cve@mitre.org" }, + { + "url": "https://helm.sh/blog/response-cve-2019-25210/", + "source": "cve@mitre.org" + }, { "url": "https://www.cncf.io/projects/helm/", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0802.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0802.json new file mode 100644 index 00000000000..ccfc12cd06d --- /dev/null +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0802.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2024-0802", + "sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "published": "2024-03-15T01:15:57.703", + "lastModified": "2024-03-15T01:15:57.703", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Pointer Scaling vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and MELSEC-L Series CPU modules allows a remote unauthenticated attacker to read arbitrary information from a target product or execute malicious code on a target product by sending a specially crafted packet." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-468" + } + ] + } + ], + "references": [ + { + "url": "https://jvn.jp/vu/JVNVU99690199/", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-14", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + }, + { + "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-024_en.pdf", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0803.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0803.json new file mode 100644 index 00000000000..3f3de5d69ca --- /dev/null +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0803.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2024-0803", + "sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "published": "2024-03-15T01:15:57.997", + "lastModified": "2024-03-15T01:15:57.997", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Integer Overflow or Wraparound vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and MELSEC-L Series CPU modules allows a remote unauthenticated attacker to execute malicious code on a target product by sending a specially crafted packet." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://jvn.jp/vu/JVNVU99690199/", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-14", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + }, + { + "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-024_en.pdf", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1622.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1622.json index 89699b31dda..61f8c2a9faa 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1622.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1622.json @@ -2,12 +2,16 @@ "id": "CVE-2024-1622", "sourceIdentifier": "sep@nlnetlabs.nl", "published": "2024-02-26T16:27:52.387", - "lastModified": "2024-02-26T16:32:25.577", + "lastModified": "2024-03-15T02:15:06.523", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Due to a mistake in error checking, Routinator will terminate when an incoming RTR connection is reset by the peer too quickly after opening." + }, + { + "lang": "es", + "value": "Debido a un error en la verificaci\u00f3n de errores, Routinator finalizar\u00e1 cuando el interlocutor restablezca una conexi\u00f3n RTR entrante demasiado r\u00e1pido despu\u00e9s de abrirla." } ], "metrics": { @@ -47,6 +51,10 @@ } ], "references": [ + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K52QRRYBHLP73RAS3CGOPBWYT7EZVP6O/", + "source": "sep@nlnetlabs.nl" + }, { "url": "https://www.nlnetlabs.nl/downloads/routinator/CVE-2024-1622.txt", "source": "sep@nlnetlabs.nl" diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1915.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1915.json new file mode 100644 index 00000000000..8c8fc08241d --- /dev/null +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1915.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2024-1915", + "sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "published": "2024-03-15T01:15:58.197", + "lastModified": "2024-03-15T01:15:58.197", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Pointer Scaling vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and MELSEC-L Series CPU modules allows a remote unauthenticated attacker to execute malicious code on a target product by sending a specially crafted packet." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-468" + } + ] + } + ], + "references": [ + { + "url": "https://jvn.jp/vu/JVNVU99690199/", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-14", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + }, + { + "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-024_en.pdf", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1916.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1916.json new file mode 100644 index 00000000000..5fa440f6144 --- /dev/null +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1916.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2024-1916", + "sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "published": "2024-03-15T01:15:58.390", + "lastModified": "2024-03-15T01:15:58.390", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Integer Overflow or Wraparound vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and MELSEC-L Series CPU modules allows a remote unauthenticated attacker to execute malicious code on a target product by sending a specially crafted packet." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://jvn.jp/vu/JVNVU99690199/", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-14", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + }, + { + "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-024_en.pdf", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1917.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1917.json new file mode 100644 index 00000000000..983db70b58b --- /dev/null +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1917.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2024-1917", + "sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "published": "2024-03-15T01:15:58.590", + "lastModified": "2024-03-15T01:15:58.590", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Integer Overflow or Wraparound vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and MELSEC-L Series CPU modules allows a remote unauthenticated attacker to execute malicious code on a target product by sending a specially crafted packet." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://jvn.jp/vu/JVNVU99690199/", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-14", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + }, + { + "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-024_en.pdf", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-264xx/CVE-2024-26454.json b/CVE-2024/CVE-2024-264xx/CVE-2024-26454.json new file mode 100644 index 00000000000..7a05853067e --- /dev/null +++ b/CVE-2024/CVE-2024-264xx/CVE-2024-26454.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-26454", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-15T01:15:58.780", + "lastModified": "2024-03-15T01:15:58.780", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A Cross Site Scripting vulnerability in Healthcare-Chatbot through 9b7058a can occur via a crafted payload to the email1 or pwd1 parameter in login.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/OmRajpurkar/Healthcare-Chatbot/issues/4", + "source": "cve@mitre.org" + }, + { + "url": "https://medium.com/%400x0d0x0a/healthcare-chatbot-xss-cve-2024-26454-acf2607bf210", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26540.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26540.json new file mode 100644 index 00000000000..ab523ef271d --- /dev/null +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26540.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-26540", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-15T01:15:58.833", + "lastModified": "2024-03-15T01:15:58.833", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A heap-based buffer overflow in Clmg before 3.3.3 can occur via a crafted file to cimg_library::CImg::_load_analyze." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/GreycLab/CImg/issues/403", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 300875ea234..2017e774b71 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-03-15T00:55:30.055870+00:00 +2024-03-15T03:00:29.596506+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-03-14T23:15:46.230000+00:00 +2024-03-15T02:15:06.523000+00:00 ``` ### Last Data Feed Release @@ -23,28 +23,34 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-03-14T01:00:20.248550+00:00 +2024-03-15T01:00:20.249894+00:00 ``` ### Total Number of included CVEs ```plain -241537 +241544 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `7` -* [CVE-2024-1853](CVE-2024/CVE-2024-18xx/CVE-2024-1853.json) (`2024-03-14T23:15:45.057`) -* [CVE-2024-26163](CVE-2024/CVE-2024-261xx/CVE-2024-26163.json) (`2024-03-14T23:15:45.813`) -* [CVE-2024-26246](CVE-2024/CVE-2024-262xx/CVE-2024-26246.json) (`2024-03-14T23:15:46.230`) +* [CVE-2024-0802](CVE-2024/CVE-2024-08xx/CVE-2024-0802.json) (`2024-03-15T01:15:57.703`) +* [CVE-2024-0803](CVE-2024/CVE-2024-08xx/CVE-2024-0803.json) (`2024-03-15T01:15:57.997`) +* [CVE-2024-1915](CVE-2024/CVE-2024-19xx/CVE-2024-1915.json) (`2024-03-15T01:15:58.197`) +* [CVE-2024-1916](CVE-2024/CVE-2024-19xx/CVE-2024-1916.json) (`2024-03-15T01:15:58.390`) +* [CVE-2024-1917](CVE-2024/CVE-2024-19xx/CVE-2024-1917.json) (`2024-03-15T01:15:58.590`) +* [CVE-2024-26454](CVE-2024/CVE-2024-264xx/CVE-2024-26454.json) (`2024-03-15T01:15:58.780`) +* [CVE-2024-26540](CVE-2024/CVE-2024-265xx/CVE-2024-26540.json) (`2024-03-15T01:15:58.833`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `2` +* [CVE-2019-25210](CVE-2019/CVE-2019-252xx/CVE-2019-25210.json) (`2024-03-15T01:15:56.040`) +* [CVE-2024-1622](CVE-2024/CVE-2024-16xx/CVE-2024-1622.json) (`2024-03-15T02:15:06.523`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 30de77a33a5..406f59a2a41 100644 --- a/_state.csv +++ b/_state.csv @@ -138355,7 +138355,7 @@ CVE-2019-2518,0,0,9efef458b1303554e425998695dd03f68df8dae2feff042ca130dc9d08d180 CVE-2019-2519,0,0,80cb8a26de2a58d99b181963daed12ecd759858d5d5f05a1d765a0af10d1fcb8,2020-08-24T17:37:01.140000 CVE-2019-2520,0,0,ae5d364f342d6d6e11cbfa1103b72fc4c48c965eceb925e0681dc4c71b896617,2020-08-24T17:37:01.140000 CVE-2019-2521,0,0,895d3d1e42e6880cb82a0d4fefb4c7b7e8f06c7c8e9ae8e0a5e83fb55980297e,2020-08-24T17:37:01.140000 -CVE-2019-25210,0,0,ec65011193a3e22e3e2c50dd8439f14bc491651fa04889ebf8a725a164a79dcf,2024-03-04T13:58:23.447000 +CVE-2019-25210,0,1,b5db022eb7f0833051e708fca9e348bbb145e7b825f3faae0d520e104bb6fcd8,2024-03-15T01:15:56.040000 CVE-2019-2522,0,0,ae55dddc2cf216d0836c321fa3f09f9eb54cf6815873c5427c0842a495c7f153,2020-08-24T17:37:01.140000 CVE-2019-2523,0,0,2420d5fa367bd9afc8efca036c098c95836d2845178df0523b9e6ef463059e04,2020-08-24T17:37:01.140000 CVE-2019-2524,0,0,23ed838788d5538a8e4757f53d25252723d39ac2a7a29dd85ea00493a946f02f,2020-08-24T17:37:01.140000 @@ -238187,6 +238187,8 @@ CVE-2024-0798,0,0,2f1b0b827ba8873a7b25770613534b3f8d6a0f026296e59c448002f5144077 CVE-2024-0799,0,0,565bc32cefccc7b54c8a2a9ae87b575853af295d8bcf02c26770d29b4f9124c3,2024-03-14T12:52:21.763000 CVE-2024-0800,0,0,d01951efcbc246e656d94cfc618f67e25f655df800a6a24c24ab44bafa9ef9ed,2024-03-14T12:52:21.763000 CVE-2024-0801,0,0,a89dd8886cf81b019461340c433bdec2c4bcb02d2b385117b1316445faec54f0,2024-03-14T12:52:21.763000 +CVE-2024-0802,1,1,e79832631d2489113a3aef3c721db9649babbb143a5a1bd0bc0d019ce790febe,2024-03-15T01:15:57.703000 +CVE-2024-0803,1,1,792eb6294b542c54bbb6e5ffc4fd5ada9f64baaa10f545fbcdfcfeb92827eacd,2024-03-15T01:15:57.997000 CVE-2024-0804,0,0,70935988ae140dfc2a5adfcb943faf94a39f18e0935f58c282d47a399ed09108,2024-01-29T14:29:25.953000 CVE-2024-0805,0,0,479c25c464f6a328d6731c12cfc75b50b35f0f2dec0194359c3aeae6dde0d30d,2024-01-29T14:24:19.087000 CVE-2024-0806,0,0,9c93ca7b1341b35e16a22cdbbee1fe7fe1f2eaf26781f684014c115afdc39972,2024-01-29T14:24:48.090000 @@ -238716,7 +238718,7 @@ CVE-2024-1597,0,0,0788307c80ba77730580ebf7121ded97ea91ea8a6104800552d5fad5d2571f CVE-2024-1608,0,0,9c8b01b69ae5b4c70260d911aff7b2894c96a989ff451b383a0cacb2ffa6ce98,2024-02-20T19:50:53.960000 CVE-2024-1618,0,0,d4ed9a7b03a6bc2af34446a7f8522f650b18bcab5c93148fbff943d48943d202,2024-03-12T16:02:33.900000 CVE-2024-1619,0,0,3bd1c888593742e1605642ab3506d543678d2b012b17cc6ff867249b1db44054,2024-02-29T13:49:29.390000 -CVE-2024-1622,0,0,1d222b911973fd9290c478c0e6d945ad0ee78ccc642760873944d3c008edc991,2024-02-26T16:32:25.577000 +CVE-2024-1622,0,1,3b47981f6d4ce81a3950b5cb0d924fb09a89503a4e8b3b21847c201e61726546,2024-03-15T02:15:06.523000 CVE-2024-1623,0,0,74336518ba6901cae439374d392edb30e277a62b6b1e25aec45bf5853748bc8f,2024-03-14T14:21:20.217000 CVE-2024-1624,0,0,67ec40e5c3fa09b35ea998f014823e4639ce179ca19a19b5112abed94e17b4a2,2024-03-01T22:22:25.913000 CVE-2024-1631,0,0,fc2893d5d84aff0551fae290d2fe3cfb3246f815cc3e85e7be8cb7a443e59ea9,2024-02-22T19:07:37.840000 @@ -238829,7 +238831,7 @@ CVE-2024-1834,0,0,71484c054cc8716550405a2212257a1bb19512d3ccfc712afddd01b2d896ef CVE-2024-1843,0,0,979d0dff9637d9cab00bf6a14f591ee68b79b4ec3300ebdf02b15cf0e8a60188,2024-03-13T18:15:58.530000 CVE-2024-1847,0,0,152f4d845ce8c23980172297d934e8efa3d32af4a304d4db000f4175545dd48b,2024-02-29T13:49:47.277000 CVE-2024-1851,0,0,ac07ab34f3e596527407cf2fcb93e785fa1a213045982c8aadd05f9e543a11a5,2024-03-08T14:02:57.420000 -CVE-2024-1853,1,1,91a30626bb38fc15bd03532e0bb3b2887a7258ef07a1ce45d55ec3d6197d7523,2024-03-14T23:15:45.057000 +CVE-2024-1853,0,0,91a30626bb38fc15bd03532e0bb3b2887a7258ef07a1ce45d55ec3d6197d7523,2024-03-14T23:15:45.057000 CVE-2024-1854,0,0,67720ca675e573934fd73c30069aead563244277f4e5c6d2e86973e2c6bd9b5b,2024-03-13T18:15:58.530000 CVE-2024-1859,0,0,c19a8bbad570254357ebcf90235dc1b7204181d3a1a12c804d832963f66d9a08,2024-03-01T14:04:26.010000 CVE-2024-1860,0,0,53b7775f88dbda3fc2d4abeb2e913e87a2f0c7e010f7824d10356d98445fd8c8,2024-02-28T14:06:45.783000 @@ -238865,6 +238867,9 @@ CVE-2024-1907,0,0,674a8f990612fbd789e8b29e4f4db555efa2966321d7535d44b4ff9d82432e CVE-2024-1909,0,0,12e32b499c59433d30e6ac050b3983e16567b85d72e6d218e26a62327a6048b6,2024-02-27T14:19:41.650000 CVE-2024-1910,0,0,211f272c3ce02464501561e3549f84db9f1611eadb733262f278463e5a2128b8,2024-02-27T14:19:41.650000 CVE-2024-1912,0,0,3c8c0a0238b829a76fd9478bd9956e4a11490ac17d1dddd78b43604a20598ec4,2024-02-27T14:19:41.650000 +CVE-2024-1915,1,1,d7083ca16f8de0945efb0966939cb8b1f07ba83c7018bdb885192a4e317f48f3,2024-03-15T01:15:58.197000 +CVE-2024-1916,1,1,1b6c6948a80d8bcabff93ca20b41b809d76dcf5acb93b4865ecb1112a074dfaa,2024-03-15T01:15:58.390000 +CVE-2024-1917,1,1,92520f8fdbd766a55badd9fc1fb6de18622b15f7a5e36569378ca8a713204b7e,2024-03-15T01:15:58.590000 CVE-2024-1918,0,0,1bafa8f12a3e1e89cbdae2d567e58d0f2dd7fa8d62ec65a26fca54b119ab135d,2024-02-29T01:43:56.517000 CVE-2024-1919,0,0,72d56d7edb3e5a5021c1ed22bcc46eb2a75ae4941d6cc2cec5dac07191166356,2024-02-29T01:43:56.607000 CVE-2024-1920,0,0,609fbe0726b7e3b7b8c9d1e9070e8f3b7491975accc744191b84356320447097,2024-02-29T01:43:56.683000 @@ -241110,7 +241115,7 @@ CVE-2024-26159,0,0,8db8f42d5662b161251586cebfdfad3ac7119bf59dcefc0ce4412d5330cc4 CVE-2024-26160,0,0,fa9ab77966a6520f6fd48a75b259529e6a68bdc5f72bc11ac282a7c57a6be71f,2024-03-12T17:46:17.273000 CVE-2024-26161,0,0,179c500caa38708835a1de408543085e57586fd097d7453a1bf1888d48f494e3,2024-03-12T17:46:17.273000 CVE-2024-26162,0,0,abe9736aa1712017432f5ac3cb4f9e06d55b8e6b2899e4fcc1a691ec906deb0c,2024-03-12T17:46:17.273000 -CVE-2024-26163,1,1,6939eef05c0e0bbf4833a6716f364069e87d00f2d004f9fcc842b3a5370a2eb3,2024-03-14T23:15:45.813000 +CVE-2024-26163,0,0,6939eef05c0e0bbf4833a6716f364069e87d00f2d004f9fcc842b3a5370a2eb3,2024-03-14T23:15:45.813000 CVE-2024-26164,0,0,c529ef056d97ddfa055f4dab67a98e2c243b207609d3b8417d59eb6c8893d127,2024-03-12T17:46:17.273000 CVE-2024-26165,0,0,63d3dcf1b589358d7ead4e45bd2c42171f291333fcff06cba556b682dcc81435,2024-03-12T17:46:17.273000 CVE-2024-26166,0,0,978ab57484f1682cc950150e2b2e40d5b99e83a0da48cc1356ec7b38d0d948ec,2024-03-12T17:46:17.273000 @@ -241134,7 +241139,7 @@ CVE-2024-26199,0,0,c783249e58f7a34cdbc3a4a74bdf378194f69958b248f8c80379c0377a914 CVE-2024-26201,0,0,117ccddc353ed4894703f364acf785dd6a24217537e061ef980d1ca56918f180,2024-03-12T17:46:17.273000 CVE-2024-26203,0,0,6110281b9eda03c7d5a8219ec3a2aff67cf54ad90870a79c096fe875f28ea385,2024-03-12T17:46:17.273000 CVE-2024-26204,0,0,413dd43bdbc47045478482b7d3349e3e66b0c3197ca627e0b5f71ae7053c6d3e,2024-03-12T17:46:17.273000 -CVE-2024-26246,1,1,4b4ed0cf0e2600e86bbce86e87526797b278887cddb7df8851ab25d517e80097,2024-03-14T23:15:46.230000 +CVE-2024-26246,0,0,4b4ed0cf0e2600e86bbce86e87526797b278887cddb7df8851ab25d517e80097,2024-03-14T23:15:46.230000 CVE-2024-26260,0,0,e265a50d624e832bed578eaaf671225475ee52a0a641253d8d3fa4cc960d0968,2024-02-15T06:23:39.303000 CVE-2024-26261,0,0,0e54368aae0104b528b2c2b10aa27bd070162dbc45df6e809e95785e5efd10d2,2024-02-15T06:23:39.303000 CVE-2024-26262,0,0,6d57968ac2564b388ee7eb2f157289b2d34f808f6708bcc9236e1289de720f6f,2024-02-15T06:23:39.303000 @@ -241182,6 +241187,7 @@ CVE-2024-26351,0,0,61b98d66760f09ba8a0757ca890b9ad836349a62d566c880c0eb8336d14db CVE-2024-26352,0,0,ed876b320273da7c752d57a08640f2d98ce80b026324bdf46d0712ec0097ce54,2024-02-22T19:07:27.197000 CVE-2024-26445,0,0,3735cabd04dab3a1baa3e135ef467df65425520025be25bd7cf66dc1b1b0bf61,2024-02-22T19:07:27.197000 CVE-2024-26450,0,0,e70e1c7044e1447bb73bfa4a556135e1953f1916a7225089ba5c38735bf8ee34,2024-03-09T08:15:06.120000 +CVE-2024-26454,1,1,33e2e35e1b1d9bb1914c2dde003f183cd8296e7c928ff04a99d7adb7d73c8804,2024-03-15T01:15:58.780000 CVE-2024-26455,0,0,b8d798122eed5fa7dc5e81852b3374f7f4b40339c21e80b998d09e1a756fc71d,2024-02-26T22:10:40.463000 CVE-2024-26458,0,0,4b2bac12846011765db5a8d92c99fed71bd0c8fd706ee4d4f4c7e419547c7ad4,2024-02-29T13:49:29.390000 CVE-2024-26461,0,0,904046a1bdb8d57e836285398ec79f3a5f035120c749bfa545aeddc73ebaca7d,2024-02-29T13:49:29.390000 @@ -241209,6 +241215,7 @@ CVE-2024-26492,0,0,223ddadc0c7efe7b0886f487630808be0927541c8864c0a1df96647191c41 CVE-2024-26503,0,0,43e68039cc1e1816a5768c80e0b0a77933f2c9a1550bccb4962112c27d165eb1,2024-03-14T22:15:22.550000 CVE-2024-26521,0,0,0e3dff2f526dd01b3807e889e548f69877c6fbe716f338bf9b68ff7b3cd2a892,2024-03-12T12:40:13.500000 CVE-2024-26529,0,0,ceb7dffe95e5cd49d7bba0e418c1f06e328c8386f0796095312ed90a87d2d1b6,2024-03-13T12:33:51.697000 +CVE-2024-26540,1,1,e27ba931e3f9dad59642643380776efc64b66a14c2307881b3ffbc14b651063c,2024-03-15T01:15:58.833000 CVE-2024-26542,0,0,84bcc676050237f7706e936cd8d9d490aa0a127cdccddbe7afe739c073267e25,2024-02-28T14:06:45.783000 CVE-2024-26548,0,0,7b31129407d10e539a4174451b23a0f83a48cdb246d6dd13af61036fdc95df1c,2024-03-01T14:04:26.010000 CVE-2024-26559,0,0,3b7b5127dd0e422a83fadfb79310bdd57e4fb71532d47a597a5aa1449637c0ce,2024-02-29T13:49:47.277000