From 76e20a19cf1ebcac83eb0b6affce31025a3f17fb Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 24 Mar 2024 07:03:27 +0000 Subject: [PATCH] Auto-Update: 2024-03-24T07:00:38.407535+00:00 --- CVE-2024/CVE-2024-28xx/CVE-2024-2852.json | 88 +++++++++++++++++++++++ CVE-2024/CVE-2024-28xx/CVE-2024-2853.json | 88 +++++++++++++++++++++++ CVE-2024/CVE-2024-28xx/CVE-2024-2854.json | 88 +++++++++++++++++++++++ CVE-2024/CVE-2024-28xx/CVE-2024-2855.json | 88 +++++++++++++++++++++++ README.md | 19 +++-- _state.csv | 14 ++-- 6 files changed, 370 insertions(+), 15 deletions(-) create mode 100644 CVE-2024/CVE-2024-28xx/CVE-2024-2852.json create mode 100644 CVE-2024/CVE-2024-28xx/CVE-2024-2853.json create mode 100644 CVE-2024/CVE-2024-28xx/CVE-2024-2854.json create mode 100644 CVE-2024/CVE-2024-28xx/CVE-2024-2855.json diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2852.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2852.json new file mode 100644 index 00000000000..e0c3d83e983 --- /dev/null +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2852.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-2852", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-24T05:15:09.160", + "lastModified": "2024-03-24T05:15:09.160", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Tenda AC15 15.03.20_multi. It has been declared as critical. This vulnerability affects the function saveParentControlInfo of the file /goform/saveParentControlInfo. The manipulation of the argument urls leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257776. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/saveParentControlInfo_urls.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.257776", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.257776", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2853.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2853.json new file mode 100644 index 00000000000..455fa54241d --- /dev/null +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2853.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-2853", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-24T05:15:10.517", + "lastModified": "2024-03-24T05:15:10.517", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Tenda AC10U 15.03.06.48/15.03.06.49. It has been rated as critical. This issue affects the function formSetSambaConf of the file /goform/setsambacfg. The manipulation of the argument usbName leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257777 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetSambaConf.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.257777", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.257777", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2854.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2854.json new file mode 100644 index 00000000000..6a464cc5459 --- /dev/null +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2854.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-2854", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-24T06:15:08.633", + "lastModified": "2024-03-24T06:15:08.633", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in Tenda AC18 15.03.05.05. Affected is the function formSetSambaConf of the file /goform/setsambacfg. The manipulation of the argument usbName leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-257778 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formSetSambaConf.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.257778", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.257778", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2855.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2855.json new file mode 100644 index 00000000000..e31e040dae2 --- /dev/null +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2855.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-2855", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-24T06:15:11.860", + "lastModified": "2024-03-24T06:15:11.860", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in Tenda AC15 15.03.05.18/15.03.05.19/15.03.20. Affected by this vulnerability is the function fromSetSysTime of the file /goform/SetSysTimeCfg. The manipulation of the argument time leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257779. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/fromSetSysTime.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.257779", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.257779", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 6405d5d1e8b..313acb2be1e 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-03-24T05:00:40.019515+00:00 +2024-03-24T07:00:38.407535+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-03-24T03:15:09.177000+00:00 +2024-03-24T06:15:11.860000+00:00 ``` ### Last Data Feed Release @@ -29,24 +29,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -242500 +242504 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `4` -* [CVE-2024-2851](CVE-2024/CVE-2024-28xx/CVE-2024-2851.json) (`2024-03-24T03:15:09.177`) +* [CVE-2024-2852](CVE-2024/CVE-2024-28xx/CVE-2024-2852.json) (`2024-03-24T05:15:09.160`) +* [CVE-2024-2853](CVE-2024/CVE-2024-28xx/CVE-2024-2853.json) (`2024-03-24T05:15:10.517`) +* [CVE-2024-2854](CVE-2024/CVE-2024-28xx/CVE-2024-2854.json) (`2024-03-24T06:15:08.633`) +* [CVE-2024-2855](CVE-2024/CVE-2024-28xx/CVE-2024-2855.json) (`2024-03-24T06:15:11.860`) ### CVEs modified in the last Commit -Recently modified CVEs: `4` +Recently modified CVEs: `0` -* [CVE-2023-4256](CVE-2023/CVE-2023-42xx/CVE-2023-4256.json) (`2024-03-24T03:15:08.273`) -* [CVE-2023-43279](CVE-2023/CVE-2023-432xx/CVE-2023-43279.json) (`2024-03-24T03:15:07.743`) -* [CVE-2024-22871](CVE-2024/CVE-2024-228xx/CVE-2024-22871.json) (`2024-03-24T03:15:08.910`) -* [CVE-2024-24786](CVE-2024/CVE-2024-247xx/CVE-2024-24786.json) (`2024-03-24T03:15:09.093`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 444dd4aecdf..241ba93af94 100644 --- a/_state.csv +++ b/_state.csv @@ -229963,7 +229963,7 @@ CVE-2023-42556,0,0,2187a5d94576a257cb9be974b19372249dbd68591d78f1eddf0a8b98271d5 CVE-2023-42557,0,0,0e8d3e147392d0e1a799fc432cdd02179894e8e43bfc3e4b2a0af32dfbacd41a,2023-12-08T20:16:19.493000 CVE-2023-42558,0,0,f721c157bdeb39132d5a61efd5025fa74fc2aa6586f816577fa811d552389092,2023-12-08T19:57:46.590000 CVE-2023-42559,0,0,48b8f64120a0df785ba95332ca53393e7ab6ffa3aef3abe0cb1df35e96f69df8,2023-12-08T20:14:34.330000 -CVE-2023-4256,0,1,1ae9440acd29fb728f9ac6f1a65a22eb8b16c57a1317053c587f41f9cc0c929c,2024-03-24T03:15:08.273000 +CVE-2023-4256,0,0,1ae9440acd29fb728f9ac6f1a65a22eb8b16c57a1317053c587f41f9cc0c929c,2024-03-24T03:15:08.273000 CVE-2023-42560,0,0,86fd403c9440815947137443b88f84cdc121ec3bb1f1308e7b53df4031dae0d3,2023-12-08T19:55:47.237000 CVE-2023-42561,0,0,06c8f52175df6789ee93d2e6968ba443fb94b2e6fa39c707b81751e78d6487c6,2023-12-08T19:54:52.720000 CVE-2023-42562,0,0,898c1c5ed5472c1f05cbd575277925e0d36f2c566e3fcfd31376b7548f84a878,2023-12-08T19:53:59.103000 @@ -230437,7 +230437,7 @@ CVE-2023-43271,0,0,eed1b842f51121f55ac61b5e82eb82d797b3d3f51dfbd7f29fc145284b338 CVE-2023-43274,0,0,9a76a4f96bdabc078eca25d6d30a731c62d6b0536040a8aceec7ed331b2ca0b6,2023-09-22T02:15:02.017000 CVE-2023-43275,0,0,a66f26a59cf0c59ffad4695c3eab962513cd731b129f69d22d80e3df142a296d,2023-11-21T01:51:11.677000 CVE-2023-43278,0,0,0f16c98f2e89fb91931050970b11d8655bc98d54c38b788f418cf003b78d9eeb,2023-09-26T14:38:05.117000 -CVE-2023-43279,0,1,3d0906c9ec9a48ce852533e2de449272ddfbafdf040da8857b3d3db8abfcac43,2024-03-24T03:15:07.743000 +CVE-2023-43279,0,0,3d0906c9ec9a48ce852533e2de449272ddfbafdf040da8857b3d3db8abfcac43,2024-03-24T03:15:07.743000 CVE-2023-4328,0,0,371da3fc45b68a0efdcfc87a7f560b95fe448a3483245968bf37f1cf8be27bcb,2023-09-08T16:15:07.617000 CVE-2023-43281,0,0,56d43eafc66518f898f0c81e127f487e22af687eefeb51260967c6407c7cc8cd,2023-11-07T04:21:19.967000 CVE-2023-43284,0,0,653c4223aeac7f457d39a3cd2a7626ef038d14cf3e013b79b9dc69a51dc40b3f,2023-11-22T15:15:09.303000 @@ -240197,7 +240197,7 @@ CVE-2024-2286,0,0,4e63f346a8fb407c0df61868747039ecf265eb3d735d3473ec4c61461b9c80 CVE-2024-22860,0,0,2356d6c888fca02c70325b51a39623a7535f82a709f9194a1301833cd9cbfe59,2024-02-02T23:38:02.733000 CVE-2024-22861,0,0,c89d044769ece1a7b6a075f4ae298dac300ceb86cde9ed7916956be6ce090fa7,2024-02-02T23:38:20.193000 CVE-2024-22862,0,0,8c77a453cf55f4869bcb690a30d93ebca959e1728384e14ae5102a4662e5da73,2024-02-02T23:38:28.047000 -CVE-2024-22871,0,1,e9ecd82d56ec3247868ab1a712ec2b02bb22b83148693677e1b066f1f92adeb7,2024-03-24T03:15:08.910000 +CVE-2024-22871,0,0,e9ecd82d56ec3247868ab1a712ec2b02bb22b83148693677e1b066f1f92adeb7,2024-03-24T03:15:08.910000 CVE-2024-22873,0,0,14789fb2681adf12f9009c702f5c1cba345ea8825b4ab809cedb2d400318ad71,2024-02-26T16:32:25.577000 CVE-2024-22876,0,0,ab3e7325225f85fec74512859181d3694c521af354c51fd0a6e35209ffc9a561,2024-01-25T18:19:25.647000 CVE-2024-22877,0,0,642d7085683e3f73b5dacc06a16c4d9d3eb82f5021c869a0fbd04c810dffe02a,2024-01-25T17:45:50.770000 @@ -240990,7 +240990,7 @@ CVE-2024-24782,0,0,cec52fb522063b4541c054f611458d0df6c7d32db1a26bd5bb59ee4420900 CVE-2024-24783,0,0,12be64e2db63a036341461fa12b20bbb20b8ea46e325e75c94cfb782663e82b6,2024-03-06T15:18:08.093000 CVE-2024-24784,0,0,5450058de71553b9cf7fdedc345d5ee5f35be919b251db9a4b49d663fd2c521a,2024-03-06T15:18:08.093000 CVE-2024-24785,0,0,7b9073a1f2be203ed1de8c1594434fc8421a0c0316879bd3f71a1253b422083d,2024-03-06T15:18:08.093000 -CVE-2024-24786,0,1,4dc9334988f29d383874110c009efd994347fefdf817f6300d6c17c85e9cd63f,2024-03-24T03:15:09.093000 +CVE-2024-24786,0,0,4dc9334988f29d383874110c009efd994347fefdf817f6300d6c17c85e9cd63f,2024-03-24T03:15:09.093000 CVE-2024-2479,0,0,aeec3978caeb72940f3c6bb5c8629aaf4b6d0a4192566a1921b3135a09694f17,2024-03-21T02:52:34.570000 CVE-2024-24793,0,0,c02d48f5d574325816298b4b1d2848ca92f5dc7aa67a2fd30978e3885630bc1b,2024-02-20T19:50:53.960000 CVE-2024-24794,0,0,0d491c54da3b197a1321ac69102f9de79d058e3462ee7572209ea583555d837a,2024-02-20T19:50:53.960000 @@ -242301,11 +242301,15 @@ CVE-2024-28446,0,0,e3b0d814ee24ce9a2740eda808696f714c3071d6722fa7bd76f62923d12a1 CVE-2024-28447,0,0,729795bf39bd106c71b5b798b10fa8f526cc5d6a6eb2785b0edfa8459a535a4c,2024-03-19T13:26:46 CVE-2024-2849,0,0,e255554df31d5a2be5f1c68b740cace49b575f03af154cb1af4922f66122e90f,2024-03-23T18:15:07.770000 CVE-2024-2850,0,0,4cd3be288e79bf59ffaa181573a0e5480a6cd00aa673c85dc83831b442015b08,2024-03-24T02:15:07.517000 -CVE-2024-2851,1,1,d34e2e3647fa65cf3dd6820b40a940187c5449577d5122f74010dc45e0fb545c,2024-03-24T03:15:09.177000 +CVE-2024-2851,0,0,d34e2e3647fa65cf3dd6820b40a940187c5449577d5122f74010dc45e0fb545c,2024-03-24T03:15:09.177000 +CVE-2024-2852,1,1,a2fd2d6bcf9acd86b3a856901b4314c4a6b4ded19f0c394921168a3620466870,2024-03-24T05:15:09.160000 CVE-2024-28521,0,0,8ab5b6bd1cc025dda03cab07eeddd7e1f81756c34e55025f1870bf6a0feb8a5b,2024-03-22T12:45:36.130000 +CVE-2024-2853,1,1,209548ae772857c426e415979a34bfe530867d834d8eab298ebde9ba9cef6b6a,2024-03-24T05:15:10.517000 CVE-2024-28535,0,0,174c70ce71a26af929a40c7b6a103a5242ac3321f34f35a982d598e918b67152,2024-03-21T20:58:46.217000 CVE-2024-28537,0,0,ff6bf2a37289dca28bccb57e311acb6479e1a577841d298af6b3b484403dfc2c,2024-03-18T19:40:00.173000 +CVE-2024-2854,1,1,569e4fa03b03fffc6e63cd6b0751993d8e2bb20aa3a8c72ba9b45e76a0e64585,2024-03-24T06:15:08.633000 CVE-2024-28547,0,0,a2de8a258b087cbf7c5442c921d96afce5895db417e9c628fe7656334d2bb7cc,2024-03-18T19:40:00.173000 +CVE-2024-2855,1,1,b5e203d28165ea1ab596ac548db93f74ba22ae294eece4f41f8475f60ad83b87,2024-03-24T06:15:11.860000 CVE-2024-28550,0,0,55b413fc03c0e6dbaa5c4b6ccf0c8e244ea995bce860e043c8086ce78f470aae,2024-03-18T19:40:00.173000 CVE-2024-28553,0,0,f74a5d2edd657e610cfc2b884ed1530d128afd106cc0a285c1f4868830f65cd2,2024-03-21T20:58:52.357000 CVE-2024-28559,0,0,0614f972b1018fef175a5be020062e1808da1307fa27e18c6ccd6df48da36c98,2024-03-22T12:45:36.130000