diff --git a/CVE-2021/CVE-2021-311xx/CVE-2021-31156.json b/CVE-2021/CVE-2021-311xx/CVE-2021-31156.json new file mode 100644 index 00000000000..35a89ece756 --- /dev/null +++ b/CVE-2021/CVE-2021-311xx/CVE-2021-31156.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2021-31156", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-28T23:15:45.987", + "lastModified": "2024-03-28T23:15:45.987", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Allied Telesis AT-S115 1.2.0 devices before 1.00.024 with Boot Loader 1.00.006 allow Directory Traversal to achieve partial access to data." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/NitescuLucian/69cf22d17bf190325118304be04828e8", + "source": "cve@mitre.org" + }, + { + "url": "https://www.alliedtelesis.com/en/documents/software-release-notes-s115-v120", + "source": "cve@mitre.org" + }, + { + "url": "https://www.alliedtelesis.com/sites/default/files/documents/release-notes/ats115v120srna.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-335xx/CVE-2023-33528.json b/CVE-2023/CVE-2023-335xx/CVE-2023-33528.json new file mode 100644 index 00000000000..7fc6db896aa --- /dev/null +++ b/CVE-2023/CVE-2023-335xx/CVE-2023-33528.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-33528", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-28T23:15:46.070", + "lastModified": "2024-03-28T23:15:46.070", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "halo v1.6.0 is vulnerable to Cross Site Scripting (XSS)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/alert-moyan/be0bd087d85c1416829b8e9659e8b66c", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/halo-dev/halo/releases/tag/v1.6.0", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50969.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50969.json new file mode 100644 index 00000000000..2233c91bc87 --- /dev/null +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50969.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-50969", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-28T23:15:46.137", + "lastModified": "2024-03-28T23:15:46.137", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Thales Imperva SecureSphere WAF 14.7.0.40 allows remote attackers to bypass WAF rules via a crafted POST request, a different vulnerability than CVE-2021-45468." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://docs.imperva.com/bundle/v14.7-waf-administration-guide/page/9282.htm", + "source": "cve@mitre.org" + }, + { + "url": "https://www.hoyahaxa.com/2024/03/imperva-waf-bypass-cve-2023-50969.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24399.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24399.json index 025ce8aa3aa..d8d81d6ab4e 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24399.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24399.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24399", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-25T21:15:09.563", - "lastModified": "2024-01-29T15:57:59.413", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-28T23:15:46.200", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,12 +68,20 @@ } ], "references": [ + { + "url": "https://github.com/capture0x/leptoncms", + "source": "cve@mitre.org" + }, { "url": "https://github.com/capture0x/leptoncms/blob/main/README.md", "source": "cve@mitre.org", "tags": [ "Exploit" ] + }, + { + "url": "https://packetstormsecurity.com/files/176647/Lepton-CMS-7.0.0-Remote-Code-Execution.html", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24407.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24407.json new file mode 100644 index 00000000000..565e81dcc4e --- /dev/null +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24407.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-24407", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-28T23:15:46.283", + "lastModified": "2024-03-28T23:15:46.283", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SQL Injection vulnerability in Best Courier management system v.1.0 allows a remote attacker to obtain sensitive information via print_pdets.php component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/modian-un/CVE/blob/main/Barangay%20Population%20Monitoring%20System.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/modian-un/CVE/blob/main/Best%20courier%20management%20system.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-284xx/CVE-2024-28456.json b/CVE-2024/CVE-2024-284xx/CVE-2024-28456.json new file mode 100644 index 00000000000..f1a18832d10 --- /dev/null +++ b/CVE-2024/CVE-2024-284xx/CVE-2024-28456.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-28456", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-28T23:15:46.340", + "lastModified": "2024-03-28T23:15:46.340", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting vulnerability in Campcodes Online Marriage Registration System v.1.0 allows a remote attacker to execute arbitrary code via the text fields in the marriage registration request form." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://drive.google.com/file/d/1J3-mKlXpHYqOwlUyffRT-ibWa0joB3xC/view?usp=sharing", + "source": "cve@mitre.org" + }, + { + "url": "https://pastebin.com/CYMDR4ss", + "source": "cve@mitre.org" + }, + { + "url": "https://www.campcodes.com/projects/php/online-marriage-registration-system/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28714.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28714.json new file mode 100644 index 00000000000..13c0723164d --- /dev/null +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28714.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-28714", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-28T23:15:46.410", + "lastModified": "2024-03-28T23:15:46.410", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SQL Injection vulnerability in CRMEB_Java e-commerce system v.1.3.4 allows an attacker to execute arbitrary code via the groupid parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://crmebjava.com", + "source": "cve@mitre.org" + }, + { + "url": "https://gitee.com/ZhongBangKeJi/crmeb_java", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/JiangXiaoBaiJia/cve2/blob/main/1.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/JiangXiaoBaiJia/cve2/blob/main/a.png", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-293xx/CVE-2024-29316.json b/CVE-2024/CVE-2024-293xx/CVE-2024-29316.json new file mode 100644 index 00000000000..65ea6537acf --- /dev/null +++ b/CVE-2024/CVE-2024-293xx/CVE-2024-29316.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-29316", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-28T23:15:46.470", + "lastModified": "2024-03-28T23:15:46.470", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "NodeBB 3.6.7 is vulnerable to Incorrect Access Control." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://medium.com/%40krityamkarma858041/broken-access-control-nodebb-v3-6-7-eebc59c24deb", + "source": "cve@mitre.org" + }, + { + "url": "https://nodebb.org/bounty/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29489.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29489.json new file mode 100644 index 00000000000..97fa640e1ca --- /dev/null +++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29489.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-29489", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-28T23:15:46.527", + "lastModified": "2024-03-28T23:15:46.527", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Jerryscript 2.4.0 has SEGV at ./jerry-core/ecma/base/ecma-helpers.c:238:58 in ecma_get_object_type." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/gandalf4a/9826a897ae1e3c8d1c7e71a1ec71d415", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/jerryscript-project/jerryscript/commit/cefd391772529c8a9531d7b3c244d78d38be47c6", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/jerryscript-project/jerryscript/issues/5101", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/jerryscript-project/jerryscript/pull/5129", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 78450be251c..f1daf153c46 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-03-28T23:00:38.762142+00:00 +2024-03-29T00:55:30.511190+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-03-28T22:15:09.170000+00:00 +2024-03-28T23:15:46.527000+00:00 ``` ### Last Data Feed Release @@ -33,21 +33,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -243253 +243261 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `8` -- [CVE-2023-25341](CVE-2023/CVE-2023-253xx/CVE-2023-25341.json) (`2024-03-28T22:15:09.170`) -- [CVE-2024-23727](CVE-2024/CVE-2024-237xx/CVE-2024-23727.json) (`2024-03-28T21:16:01.413`) +- [CVE-2021-31156](CVE-2021/CVE-2021-311xx/CVE-2021-31156.json) (`2024-03-28T23:15:45.987`) +- [CVE-2023-33528](CVE-2023/CVE-2023-335xx/CVE-2023-33528.json) (`2024-03-28T23:15:46.070`) +- [CVE-2023-50969](CVE-2023/CVE-2023-509xx/CVE-2023-50969.json) (`2024-03-28T23:15:46.137`) +- [CVE-2024-24407](CVE-2024/CVE-2024-244xx/CVE-2024-24407.json) (`2024-03-28T23:15:46.283`) +- [CVE-2024-28456](CVE-2024/CVE-2024-284xx/CVE-2024-28456.json) (`2024-03-28T23:15:46.340`) +- [CVE-2024-28714](CVE-2024/CVE-2024-287xx/CVE-2024-28714.json) (`2024-03-28T23:15:46.410`) +- [CVE-2024-29316](CVE-2024/CVE-2024-293xx/CVE-2024-29316.json) (`2024-03-28T23:15:46.470`) +- [CVE-2024-29489](CVE-2024/CVE-2024-294xx/CVE-2024-29489.json) (`2024-03-28T23:15:46.527`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `1` +- [CVE-2024-24399](CVE-2024/CVE-2024-243xx/CVE-2024-24399.json) (`2024-03-28T23:15:46.200`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 5ba76293ef0..5b4ece6d283 100644 --- a/_state.csv +++ b/_state.csv @@ -175125,6 +175125,7 @@ CVE-2021-31152,0,0,f9f969e2f21821ff2cd531a2917c79010580fdf7cbf4b08f070593333ccb1 CVE-2021-31153,0,0,7785500ba48a2dc7262292a7b799668c2f6defcf39c3c203a1dfadea9d60d5f7,2022-07-12T17:42:04.277000 CVE-2021-31154,0,0,cb899f74c2949bf579f6c460967cea91a3e63ab552650da46a81434378ee45bb,2022-07-12T17:42:04.277000 CVE-2021-31155,0,0,81c69b6114ddb1e01fa86b4fb3b5e7eb2234117f912395b273e8f19af8ad7a4f,2022-07-12T17:42:04.277000 +CVE-2021-31156,1,1,3e2b8705617f89b43be57ef7b7e5fce9613e0ae6432cad1f67f4da42329d3409,2024-03-28T23:15:45.987000 CVE-2021-31158,0,0,984fa7451b2f15dba3db5533b348fee1c44214455775671e8523d328308f3dc2,2021-05-25T18:58:43.340000 CVE-2021-31159,0,0,18961609795bb1965beee7dd2b9b095aa22b3c4e02bb0fb0a8d5a3ef42c5a136,2021-07-09T12:49:54.783000 CVE-2021-3116,0,0,9eb2d46ae82da106efedea30c9ad153b0088435acac7925372ca658c9c24e69c,2024-02-15T21:40:16.967000 @@ -217779,7 +217780,7 @@ CVE-2023-25314,0,0,3743d0c9e50521d70cf11419f7682afb137701fa142843839545a4d06772b CVE-2023-2533,0,0,5b291b5a4da0ce270a0998cf7579a2d92bb41802c75dee372670f3b39c86c5b6,2023-07-06T06:15:09.187000 CVE-2023-25330,0,0,1d34ded8efb09882ecc94bc0c54c6642c8c9f90bcd6256e4c0c4145959e7d360,2023-04-14T15:56:58.037000 CVE-2023-2534,0,0,cbf2235e236a9fecbc915b515384698385bb8cee3f0db459609fb77cb994f702,2023-05-16T14:13:26.960000 -CVE-2023-25341,1,1,0abe620af0f8b024e91887ec3af7d0bfea231ea62df217fbd88e4add78f4a278,2024-03-28T22:15:09.170000 +CVE-2023-25341,0,0,0abe620af0f8b024e91887ec3af7d0bfea231ea62df217fbd88e4add78f4a278,2024-03-28T22:15:09.170000 CVE-2023-25344,0,0,70930816741e589876da5cc17dad38d72bdcf8c6364a31653eeeff2e7e5aab9f,2023-03-18T03:50:33.213000 CVE-2023-25345,0,0,0819b86a10c46dfc6b4916cd9d6a84fb1146abfef39eb367102fc26ff1f157a2,2023-03-18T03:50:49.197000 CVE-2023-25346,0,0,d1a72e111f750bdf492093672cf4c1ba05fa5d73c6414753b6e1e7d516b59eaa,2023-04-28T02:58:53.080000 @@ -224016,6 +224017,7 @@ CVE-2023-33515,0,0,e9d5e815b9fa0bd8e76c16f8a6b04d077c2f8e142f4fd45070284dd4d5af7 CVE-2023-33517,0,0,55322461299b007ea98b09a3e665cf2b2a9bd20512224dfe92e08d8c8782880b,2023-10-31T13:05:39.123000 CVE-2023-33518,0,0,9dfce43bc9bb597c2fba73cb32f7e523d0d830245a1cc5a183ae354bb6ab5ea2,2023-06-12T13:39:52.733000 CVE-2023-33524,0,0,f6e278f1aeb2f4aeabae6c940486b3d31a90da00c9018b3b37a888e77c64feae,2023-06-09T22:54:48.677000 +CVE-2023-33528,1,1,a7efa10b18943b638c4fdeb8df3ca2e64040f01f913bf8c613e9bd40b8b6e3e3,2024-03-28T23:15:46.070000 CVE-2023-33530,0,0,49a8dd9117dd19e85174f34531a1e5c2f07e0743d0165513391d7aab9c7a0bea,2023-06-15T12:09:13.407000 CVE-2023-33532,0,0,6f993c58fac28e5ef9a6507c0e12040a1494cf7cfc8203b0e24a6bd931a6d035,2023-06-12T16:39:14.450000 CVE-2023-33533,0,0,fe9ae303f2ad2f29c2843c442a610d15370358039022a2dac97620b00cb9ffca,2023-06-14T20:41:17.157000 @@ -235327,6 +235329,7 @@ CVE-2023-50965,0,0,7d1de52a11bce456c4c16ef773b97b5e53898c75617739b3525f486b2a632 CVE-2023-50966,0,0,61bd184de2d822d9519b7baae2f5c3be8eb08057419c607e96f3ad3280f29e46,2024-03-19T16:33:58.680000 CVE-2023-50967,0,0,58bdc54872aaf156099111ca39c0a0bf2aa57001b3ff71edbbd2bfea66f2ac17,2024-03-20T17:18:21.343000 CVE-2023-50968,0,0,1be7697af13b25532d69588f5ad5851b1702b3a38866422424919ca1d182ecbc,2024-01-04T03:01:53.323000 +CVE-2023-50969,1,1,491c0c7cec6ea3984215d829cb791fcce274e6396b20674f6b892e4ceec9a606,2024-03-28T23:15:46.137000 CVE-2023-5097,0,0,0f86cc372d2c26b6541ac3ec5ba289a39a168bf65c355711efa9e745857fe3d2,2024-01-23T19:29:08.583000 CVE-2023-50974,0,0,64121c933f739d8b35ccb2b018adc49dbc3ecd37fb638c0ca9261e8aa268c1c8,2024-01-12T20:25:04.120000 CVE-2023-50975,0,0,a3c387351b5cb3112ae57eb6decd6048c7e5563bc70bcc034afc09ab81c61e0e,2024-02-22T19:07:27.197000 @@ -240824,7 +240827,7 @@ CVE-2024-23722,0,0,38e4afcdeed536b1189b96cd2e826d0a0039b5151073f4df55924a643f5fb CVE-2024-23724,0,0,47401decfa65f84dd047eaa15adb1a17aa44914fc15b5198b908ecf69c381f70,2024-03-21T02:52:08.230000 CVE-2024-23725,0,0,e7109aa5ed154918326c3254d584acf7e8190c7c6acd985ea1145474ef362350,2024-01-29T15:25:48.110000 CVE-2024-23726,0,0,1e6b5838c3bbe1bdea4cff85e0dab09275e17fdbeddbc74981e476f308132713,2024-01-29T15:25:36.090000 -CVE-2024-23727,1,1,a31c704cc9465a2529706ba7ad3c49a4dfe5ff0994e007c3dcb3700eaac32ea8,2024-03-28T21:16:01.413000 +CVE-2024-23727,0,0,a31c704cc9465a2529706ba7ad3c49a4dfe5ff0994e007c3dcb3700eaac32ea8,2024-03-28T21:16:01.413000 CVE-2024-23730,0,0,d92f048ce6391682e60079e47ad5c6180f200f01a67f3ef72f3e5b2c01bc2cc3,2024-01-29T15:22:56.753000 CVE-2024-23731,0,0,204152b9ab32090d3f201504afd34c062c39bfd578f661ea797bbd83dd0dc3fb,2024-01-26T21:11:25.430000 CVE-2024-23732,0,0,042666c99b3635fb407c7af7c818760f4159a23a8e9e6c2822d5ba07aae8999c,2024-01-26T21:11:51.840000 @@ -241133,9 +241136,10 @@ CVE-2024-24393,0,0,90dfcf43d684735b8235a3326fe419899f2f2a761b862d82b04f2c974933d CVE-2024-24396,0,0,490bf819c482001abd1dcba25c4c319f8da0b154dd54e7da19b5736b32d31753,2024-02-14T17:58:05.850000 CVE-2024-24397,0,0,c42f6e3d95ec1079046817a9a19cbab9b7268b0d74721cd48822bbfd3065325f,2024-02-22T03:39:02.803000 CVE-2024-24398,0,0,f4bfb9d92cdfc220b232a85deeb8216b709f2d184cff7e693fbf714bca45d499,2024-02-13T16:06:17.117000 -CVE-2024-24399,0,0,353ec2da6e48e6292145d6b75abe75b7e4722004c5ee075b39e05af1ecc581a2,2024-01-29T15:57:59.413000 +CVE-2024-24399,0,1,2e7582d8cf05fc5cc0390390d8153875357f61ad246771dec4b700cc1f20bef3,2024-03-28T23:15:46.200000 CVE-2024-24401,0,0,ec06c8cf90df05f5e4115d49f7ce6be6908f7d5473423eaeaae838929ca6fe04,2024-02-26T22:10:40.463000 CVE-2024-24402,0,0,97bd4ff0a8ca6538f4d318e89076733036a976638fa55c2c6b338003bd50f01d,2024-02-26T22:10:40.463000 +CVE-2024-24407,1,1,dfd166a0396fad142fa1842ddf89ba32c2d37e0cbc42b7b3bb5d41e8fcd6dfe2,2024-03-28T23:15:46.283000 CVE-2024-2442,0,0,0d54231b215523b626c71b7463aad779d480c5846b076b4b0c6a1642731e806f,2024-03-20T13:00:16.367000 CVE-2024-2443,0,0,87198108d503c5a711df7bfcf0fb226ea0f7baf969bd1bb248e1ffaed5765227,2024-03-21T12:58:51.093000 CVE-2024-2445,0,0,3aece2c7d99f4f988e852fe4d4830ce49e1f7b44f3ea5261c934033985be71a4,2024-03-15T12:53:06.423000 @@ -242706,6 +242710,7 @@ CVE-2024-28441,0,0,5f38f329aa34d3551b4435a62b00ae0d72806d981cac257e26fcd8895c19c CVE-2024-28442,0,0,9ea96c60b8ff6baa7d1ad057217e5f7850dd6ddd87730a2235900122a8b6a92d,2024-03-27T12:29:30.307000 CVE-2024-28446,0,0,e3b0d814ee24ce9a2740eda808696f714c3071d6722fa7bd76f62923d12a194d,2024-03-19T13:26:46 CVE-2024-28447,0,0,729795bf39bd106c71b5b798b10fa8f526cc5d6a6eb2785b0edfa8459a535a4c,2024-03-19T13:26:46 +CVE-2024-28456,1,1,fcb5ac20687af886221b35c86b831614d98d5a19b95318ec9a5956bebad1a619,2024-03-28T23:15:46.340000 CVE-2024-2849,0,0,689f01009061efff1ee0cd29db14c96053c4b561f68402f2590b4aaf791eded8,2024-03-26T09:15:11.360000 CVE-2024-2850,0,0,18a7df7924646d54c8018dc44d3ceaaa7b16c75f99276cbe6ac98b765122f744,2024-03-26T03:15:24.927000 CVE-2024-2851,0,0,9a668cf4331e419a65111b1e6f8abf3e27bc0fce212b623cd8a47fdd549e170b,2024-03-26T03:15:36.833000 @@ -242778,6 +242783,7 @@ CVE-2024-28682,0,0,2c53ed716809a76ded005fd10ac6d93891dbf2dd9f02238c66f1445af60cb CVE-2024-28683,0,0,14fce1fb8fe5dd3fb68153125dd387047f48de59cd587ce41acfe8b0e8fa04c2,2024-03-13T18:15:58.530000 CVE-2024-28684,0,0,df89c702874c46527da5dc5bf33ec252c05a69f53466623f5ca04f0566a6cd25,2024-03-13T14:28:45.217000 CVE-2024-28713,0,0,e08dea2bd6ea41c86adfd6db0e66602ac0ddbc5b76865cfa0864771acc3659ff,2024-03-28T20:53:20.813000 +CVE-2024-28714,1,1,f9aefa5087de23ca950905efa5a769afbdc8d742b5645553e7deb42ec7068ba8,2024-03-28T23:15:46.410000 CVE-2024-28715,0,0,af77246106a78842a7b294f3e28f52ff784cab47ce869925f80951f17109d52a,2024-03-20T13:00:16.367000 CVE-2024-2873,0,0,38b44d61d3230fcaba1c551f8073fe8dda4eadd0cd50d8705b668e3c4529f628,2024-03-26T12:55:05.010000 CVE-2024-28734,0,0,bb594e0a4ca8bb02d549585c26850af992a8eb906f708b8c0205bd91934fdfb1,2024-03-19T14:31:27.883000 @@ -242959,6 +242965,7 @@ CVE-2024-2930,0,0,1ad9e8da3d9e338360bae5cfe06f7f2b34c53691a77fd9b2835daafc635760 CVE-2024-29301,0,0,154c6ea8f36ae553114269a1e880d159b7e9b09b869cc177af921f11e043c79a,2024-03-26T12:55:05.010000 CVE-2024-29302,0,0,befca4baa09da55c6ccc652e95ace012df1b1e2aab7ec33ac183ae5971911acf,2024-03-26T12:55:05.010000 CVE-2024-29303,0,0,9fc5b63681179dd34090ab25180fdf1128a0a8fe7fe2b044acdbb780ed8094f7,2024-03-26T12:55:05.010000 +CVE-2024-29316,1,1,7430b05bb9d4cd55731b99cb12775ef348bbfb98b60b36da56fae8e2133afe98,2024-03-28T23:15:46.470000 CVE-2024-2932,0,0,e7442b733184a1b9f22f25ceb3ef49f5e962fea29dd14cc27b02db5eca7f4996,2024-03-27T12:29:30.307000 CVE-2024-29338,0,0,17a24f10f7d0496e7fcb2400fc6c6af48717728349b99b9f4dc4f19499bc4c6d,2024-03-22T19:02:10.300000 CVE-2024-2934,0,0,d43e58921fa4cabbd65c934aabbf626f359e24517d20dda47718ff1baa406784,2024-03-27T12:29:30.307000 @@ -242985,6 +242992,7 @@ CVE-2024-29471,0,0,82d45a5ffd79414ce139218b143945b76a967fb1502a8005b616153a32c45 CVE-2024-29472,0,0,8914457096a81cfec257e1932986907f8b2f25a966f10c0d7629905ec24b0f86,2024-03-21T12:58:51.093000 CVE-2024-29473,0,0,2dcbe7e94767e08f46a9353b62d8f30da500a221f5affb32fc9ef958cfff985b,2024-03-21T12:58:51.093000 CVE-2024-29474,0,0,cd74b93fedbacc13ab911c0f2a2b89e07d9e578953f3b262ce40503b72930e98,2024-03-21T12:58:51.093000 +CVE-2024-29489,1,1,3833025e78154f4f04395834034f983f21bf7cdae3f494f72963cb33c51fef56,2024-03-28T23:15:46.527000 CVE-2024-29499,0,0,bc8db29a97bf5517e5213278d0d5f5ecdec4b51f00adea3262848d25f6e735bc,2024-03-22T19:02:10.300000 CVE-2024-2951,0,0,7025f71f619ebfb5f00b29e3d72fe62bb5f0ea0dbfe92a58b33e63352aa0779c,2024-03-27T12:29:41.530000 CVE-2024-29515,0,0,79c9f65757e49bdb19c4dcff88d6ba2d524b1951e790ac90d5ffb4f302abcf45,2024-03-26T12:55:05.010000