diff --git a/CVE-2017/CVE-2017-185xx/CVE-2017-18595.json b/CVE-2017/CVE-2017-185xx/CVE-2017-18595.json index 4d9d1f6440e..fd8f01eba37 100644 --- a/CVE-2017/CVE-2017-185xx/CVE-2017-18595.json +++ b/CVE-2017/CVE-2017-185xx/CVE-2017-18595.json @@ -2,7 +2,7 @@ "id": "CVE-2017-18595", "sourceIdentifier": "cve@mitre.org", "published": "2019-09-04T21:15:10.677", - "lastModified": "2023-02-23T23:07:23.393", + "lastModified": "2024-03-07T17:45:50.977", "vulnStatus": "Analyzed", "descriptions": [ { @@ -85,8 +85,44 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.10", + "versionEndExcluding": "3.16.55", + "matchCriteriaId": "49901FEE-9793-440B-990B-EFE1BF47A04B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.17", + "versionEndExcluding": "3.18.91", + "matchCriteriaId": "DF019A06-E384-45E0-9249-DF86D759E427" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.19", + "versionEndExcluding": "4.1.50", + "matchCriteriaId": "F71F6650-13B4-486F-80AC-20D871806D44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.2", + "versionEndExcluding": "4.4.109", + "matchCriteriaId": "E7BEC3D4-7038-49AD-B148-012F960F2B29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "4.9.74", + "matchCriteriaId": "5EED08F2-CAB9-4270-8714-16E9C8FAE7C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", "versionEndExcluding": "4.14.11", - "matchCriteriaId": "A84E4D94-A9A4-424C-8262-0B7B89C8CB6D" + "matchCriteriaId": "C9DFD0E4-9A4A-40D5-9DC5-D8DD9F99AC93" } ] } diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4886.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4886.json index 1686f71a4ea..68a056cf81a 100644 --- a/CVE-2022/CVE-2022-48xx/CVE-2022-4886.json +++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4886.json @@ -2,8 +2,8 @@ "id": "CVE-2022-4886", "sourceIdentifier": "jordan@liggitt.net", "published": "2023-10-25T20:15:09.790", - "lastModified": "2023-11-02T18:05:23.427", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-07T17:15:09.470", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -122,6 +122,10 @@ "Mailing List", "Mitigation" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0013/", + "source": "jordan@liggitt.net" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1192.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1192.json index 298111c5c6e..bb79debab23 100644 --- a/CVE-2023/CVE-2023-11xx/CVE-2023-1192.json +++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1192.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1192", "sourceIdentifier": "secalert@redhat.com", "published": "2023-11-01T20:15:08.597", - "lastModified": "2023-11-09T15:24:11.003", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-07T17:15:09.620", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -134,12 +134,8 @@ ] }, { - "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=98bea253aa28ad8be2ce565a9ca21beb4a9419e5", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List", - "Patch" - ] + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d527f51331cace562393a8038d870b3e9916686f", + "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-278xx/CVE-2023-27859.json b/CVE-2023/CVE-2023-278xx/CVE-2023-27859.json index 37ab6950a72..be1edc1078c 100644 --- a/CVE-2023/CVE-2023-278xx/CVE-2023-27859.json +++ b/CVE-2023/CVE-2023-278xx/CVE-2023-27859.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27859", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-01-22T20:15:46.550", - "lastModified": "2024-01-25T02:03:31.223", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-07T17:15:09.753", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -149,6 +149,10 @@ "Vendor Advisory" ] }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0002/", + "source": "psirt@us.ibm.com" + }, { "url": "https://www.ibm.com/support/pages/node/7105503", "source": "psirt@us.ibm.com", diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28525.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28525.json index 79fac6a4ed9..4dd78001e5d 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28525.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28525.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28525", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-03-01T02:15:06.860", - "lastModified": "2024-03-01T14:04:26.010", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-03-07T17:49:21.083", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -50,14 +70,43 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:9.7.2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "CE06AC34-D09F-4BD8-B115-1691D8643419" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors_web_access:9.7.2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "13ECE46A-0CFF-4199-A8B3-923077E07484" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/251052", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7124058", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-289xx/CVE-2023-28949.json b/CVE-2023/CVE-2023-289xx/CVE-2023-28949.json index b284e8911b8..b1cd0c1c8ab 100644 --- a/CVE-2023/CVE-2023-289xx/CVE-2023-28949.json +++ b/CVE-2023/CVE-2023-289xx/CVE-2023-28949.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28949", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-03-01T02:15:07.063", - "lastModified": "2024-03-01T14:04:26.010", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-03-07T17:50:02.250", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -50,14 +70,43 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:9.7.2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "CE06AC34-D09F-4BD8-B115-1691D8643419" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors_web_access:9.7.2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "13ECE46A-0CFF-4199-A8B3-923077E07484" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/251216", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7124058", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-363xx/CVE-2023-36328.json b/CVE-2023/CVE-2023-363xx/CVE-2023-36328.json index 71957f54c39..5e6c40d3b80 100644 --- a/CVE-2023/CVE-2023-363xx/CVE-2023-36328.json +++ b/CVE-2023/CVE-2023-363xx/CVE-2023-36328.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36328", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-01T16:15:08.177", - "lastModified": "2023-11-07T04:16:32.303", - "vulnStatus": "Modified", + "lastModified": "2024-03-07T17:46:02.277", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -60,8 +60,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:libtom:libtommath:*:*:*:*:*:*:*:*", - "versionEndExcluding": "2023-05-09", - "matchCriteriaId": "0838AE42-FC51-47AA-8752-C22D933B108C" + "versionEndExcluding": "1.2.1", + "matchCriteriaId": "9BC47322-AA42-412B-9955-4D565114FA8A" } ] } @@ -73,10 +73,20 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", + "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" } ] } @@ -94,15 +104,27 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3H2PFUTBKQUDSOJXQQS7LUSZQWT3JTW2/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46GORAXZ34MHQNUGJBKS7PJ5NSMIAJGC/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6ZUPWZGPFJ4JOI2NIP7YLRKZD5YXQTBK/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38161.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38161.json index d8728ac4500..1680295d73e 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38161.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38161.json @@ -2,12 +2,16 @@ "id": "CVE-2023-38161", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:22.850", - "lastModified": "2023-09-14T18:33:24.090", + "lastModified": "2024-03-07T17:46:16.493", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Windows GDI Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de Elevaci\u00f3n de Privilegios de Windows GDI" } ], "metrics": { @@ -74,8 +78,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", - "versionEndExcluding": "10.0.19045.3448", - "matchCriteriaId": "098480E4-3DF9-4AE1-AD98-5A24C7D135FC" + "versionEndExcluding": "10.0.19044.3448", + "matchCriteriaId": "139662E6-EF56-4398-AEE8-406B8D4F1BC4" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45193.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45193.json index 8bcc1c1d09b..5d6ae8f4335 100644 --- a/CVE-2023/CVE-2023-451xx/CVE-2023-45193.json +++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45193.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45193", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-01-22T19:15:08.520", - "lastModified": "2024-01-25T02:04:23.543", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-07T17:15:09.880", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -134,6 +134,10 @@ "Vendor Advisory" ] }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0001/", + "source": "psirt@us.ibm.com" + }, { "url": "https://www.ibm.com/support/pages/node/7105501", "source": "psirt@us.ibm.com", diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45229.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45229.json index a6b31aaf820..c6c185e74cb 100644 --- a/CVE-2023/CVE-2023-452xx/CVE-2023-45229.json +++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45229.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45229", "sourceIdentifier": "infosec@edk2.groups.io", "published": "2024-01-16T16:15:11.533", - "lastModified": "2024-01-23T19:39:38.607", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-07T17:15:10.000", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -121,6 +121,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0011/", + "source": "infosec@edk2.groups.io" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45230.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45230.json index a658031c2bb..dae6d9fa991 100644 --- a/CVE-2023/CVE-2023-452xx/CVE-2023-45230.json +++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45230.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45230", "sourceIdentifier": "infosec@edk2.groups.io", "published": "2024-01-16T16:15:11.727", - "lastModified": "2024-01-23T19:39:22.663", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-07T17:15:10.133", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -120,6 +120,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0011/", + "source": "infosec@edk2.groups.io" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45231.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45231.json index 2aa66078dfe..370b039adca 100644 --- a/CVE-2023/CVE-2023-452xx/CVE-2023-45231.json +++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45231.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45231", "sourceIdentifier": "infosec@edk2.groups.io", "published": "2024-01-16T16:15:11.910", - "lastModified": "2024-01-23T15:59:40.570", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-07T17:15:10.247", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -120,6 +120,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0011/", + "source": "infosec@edk2.groups.io" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45232.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45232.json index 30589c462f1..e8583f9f431 100644 --- a/CVE-2023/CVE-2023-452xx/CVE-2023-45232.json +++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45232.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45232", "sourceIdentifier": "infosec@edk2.groups.io", "published": "2024-01-16T16:15:12.090", - "lastModified": "2024-01-23T19:39:11.070", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-07T17:15:10.340", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -120,6 +120,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0011/", + "source": "infosec@edk2.groups.io" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45233.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45233.json index 24e8414f8ba..10ea8deb47c 100644 --- a/CVE-2023/CVE-2023-452xx/CVE-2023-45233.json +++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45233.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45233", "sourceIdentifier": "infosec@edk2.groups.io", "published": "2024-01-16T16:15:12.277", - "lastModified": "2024-01-23T19:40:59.837", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-07T17:15:10.427", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -120,6 +120,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0011/", + "source": "infosec@edk2.groups.io" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45234.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45234.json index e65a613a79c..9439f194a9f 100644 --- a/CVE-2023/CVE-2023-452xx/CVE-2023-45234.json +++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45234.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45234", "sourceIdentifier": "infosec@edk2.groups.io", "published": "2024-01-16T16:15:12.460", - "lastModified": "2024-01-23T15:58:34.470", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-07T17:15:10.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -120,6 +120,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0011/", + "source": "infosec@edk2.groups.io" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45235.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45235.json index 6e84deb0e68..fa028ee6a62 100644 --- a/CVE-2023/CVE-2023-452xx/CVE-2023-45235.json +++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45235.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45235", "sourceIdentifier": "infosec@edk2.groups.io", "published": "2024-01-16T16:15:12.643", - "lastModified": "2024-01-23T15:58:27.183", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-07T17:15:10.590", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -120,6 +120,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0011/", + "source": "infosec@edk2.groups.io" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45236.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45236.json index 19a35542d72..108f929deb5 100644 --- a/CVE-2023/CVE-2023-452xx/CVE-2023-45236.json +++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45236.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45236", "sourceIdentifier": "infosec@edk2.groups.io", "published": "2024-01-16T16:15:12.820", - "lastModified": "2024-01-23T16:00:56.453", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-07T17:15:10.670", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -112,6 +112,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0011/", + "source": "infosec@edk2.groups.io" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45237.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45237.json index 29b0ded3f4a..fb2daf62e76 100644 --- a/CVE-2023/CVE-2023-452xx/CVE-2023-45237.json +++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45237.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45237", "sourceIdentifier": "infosec@edk2.groups.io", "published": "2024-01-16T16:15:13.013", - "lastModified": "2024-01-23T16:07:09.993", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-07T17:15:10.760", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -112,6 +112,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0011/", + "source": "infosec@edk2.groups.io" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47141.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47141.json index a47d9e13050..ae9c0b9b5ef 100644 --- a/CVE-2023/CVE-2023-471xx/CVE-2023-47141.json +++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47141.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47141", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-01-22T21:15:09.367", - "lastModified": "2024-01-25T02:01:48.147", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-07T17:15:10.847", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -134,6 +134,10 @@ "Vendor Advisory" ] }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0001/", + "source": "psirt@us.ibm.com" + }, { "url": "https://www.ibm.com/support/pages/node/7105497", "source": "psirt@us.ibm.com", diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47145.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47145.json index 467a108c066..acc286b6a04 100644 --- a/CVE-2023/CVE-2023-471xx/CVE-2023-47145.json +++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47145.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47145", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-01-07T19:15:08.017", - "lastModified": "2024-01-11T16:01:42.240", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-07T17:15:10.943", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -124,6 +124,10 @@ "Vendor Advisory" ] }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0003/", + "source": "psirt@us.ibm.com" + }, { "url": "https://www.ibm.com/support/pages/node/7105500", "source": "psirt@us.ibm.com", diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47152.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47152.json index e9ee14fa57a..cb9c6656c4e 100644 --- a/CVE-2023/CVE-2023-471xx/CVE-2023-47152.json +++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47152.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47152", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-01-22T20:15:46.890", - "lastModified": "2024-01-25T02:03:02.823", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-07T17:15:11.063", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -124,6 +124,10 @@ "Vendor Advisory" ] }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0001/", + "source": "psirt@us.ibm.com" + }, { "url": "https://www.ibm.com/support/pages/node/7105605", "source": "psirt@us.ibm.com", diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47158.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47158.json index b47b0a2b098..55412d87ebd 100644 --- a/CVE-2023/CVE-2023-471xx/CVE-2023-47158.json +++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47158.json @@ -2,7 +2,7 @@ "id": "CVE-2023-47158", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-01-22T20:15:47.077", - "lastModified": "2024-02-05T19:15:08.353", + "lastModified": "2024-03-07T17:15:11.147", "vulnStatus": "Modified", "descriptions": [ { @@ -159,6 +159,10 @@ "Vendor Advisory" ] }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0002/", + "source": "psirt@us.ibm.com" + }, { "url": "https://www.ibm.com/support/pages/node/7105496", "source": "psirt@us.ibm.com", diff --git a/CVE-2023/CVE-2023-477xx/CVE-2023-47746.json b/CVE-2023/CVE-2023-477xx/CVE-2023-47746.json index 86cc4b861a6..df07877ee26 100644 --- a/CVE-2023/CVE-2023-477xx/CVE-2023-47746.json +++ b/CVE-2023/CVE-2023-477xx/CVE-2023-47746.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47746", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-01-22T19:15:08.730", - "lastModified": "2024-01-25T02:04:12.947", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-07T17:15:11.277", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -159,6 +159,10 @@ "Vendor Advisory" ] }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0003/", + "source": "psirt@us.ibm.com" + }, { "url": "https://www.ibm.com/support/pages/node/7105505", "source": "psirt@us.ibm.com", diff --git a/CVE-2023/CVE-2023-477xx/CVE-2023-47747.json b/CVE-2023/CVE-2023-477xx/CVE-2023-47747.json index d39fe4d15c5..4ea8a8df08b 100644 --- a/CVE-2023/CVE-2023-477xx/CVE-2023-47747.json +++ b/CVE-2023/CVE-2023-477xx/CVE-2023-47747.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47747", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-01-22T20:15:47.267", - "lastModified": "2024-01-25T02:02:36.850", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-07T17:15:11.373", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -159,6 +159,10 @@ "Vendor Advisory" ] }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0002/", + "source": "psirt@us.ibm.com" + }, { "url": "https://www.ibm.com/support/pages/node/7105502", "source": "psirt@us.ibm.com", diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48725.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48725.json index a028fda99e9..39a6c0f5f1c 100644 --- a/CVE-2023/CVE-2023-487xx/CVE-2023-48725.json +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48725.json @@ -2,7 +2,7 @@ "id": "CVE-2023-48725", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-03-07T15:15:07.733", - "lastModified": "2024-03-07T16:15:45.123", + "lastModified": "2024-03-07T18:15:46.497", "vulnStatus": "Received", "descriptions": [ { @@ -54,10 +54,6 @@ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1887", "source": "talos-cna@cisco.com" - }, - { - "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1887", - "source": "talos-cna@cisco.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50305.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50305.json index d30c7648835..3e44a0d9822 100644 --- a/CVE-2023/CVE-2023-503xx/CVE-2023-50305.json +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50305.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50305", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-03-01T02:15:07.590", - "lastModified": "2024-03-01T14:04:26.010", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-03-07T17:50:18.457", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.4, + "impactScore": 3.6 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -50,14 +70,43 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:9.7.2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "CE06AC34-D09F-4BD8-B115-1691D8643419" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors_web_access:9.7.2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "13ECE46A-0CFF-4199-A8B3-923077E07484" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/273336", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7124058", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50308.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50308.json index e51a9f8ec58..a2c758b145a 100644 --- a/CVE-2023/CVE-2023-503xx/CVE-2023-50308.json +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50308.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50308", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-01-22T19:15:09.003", - "lastModified": "2024-01-25T02:03:49.987", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-07T17:15:11.473", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -134,6 +134,10 @@ "Vendor Advisory" ] }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0001/", + "source": "psirt@us.ibm.com" + }, { "url": "https://www.ibm.com/support/pages/node/7105506", "source": "psirt@us.ibm.com", diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50387.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50387.json index 442cf51d863..2dfa8acc53d 100644 --- a/CVE-2023/CVE-2023-503xx/CVE-2023-50387.json +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50387.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50387", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-14T16:15:45.300", - "lastModified": "2024-03-04T03:15:06.217", + "lastModified": "2024-03-07T17:15:11.587", "vulnStatus": "Modified", "descriptions": [ { @@ -393,6 +393,10 @@ "Vendor Advisory" ] }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0007/", + "source": "cve@mitre.org" + }, { "url": "https://www.athene-center.de/aktuelles/key-trap", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50868.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50868.json index 963604d83df..1bade8554e2 100644 --- a/CVE-2023/CVE-2023-508xx/CVE-2023-50868.json +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50868.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50868", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-14T16:15:45.377", - "lastModified": "2024-03-04T03:15:06.500", + "lastModified": "2024-03-07T17:15:11.817", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -100,6 +100,10 @@ "url": "https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/", "source": "cve@mitre.org" }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0008/", + "source": "cve@mitre.org" + }, { "url": "https://www.isc.org/blogs/2024-bind-security-release/", "source": "cve@mitre.org" diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5043.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5043.json index 52067842cfb..de948b2dbe9 100644 --- a/CVE-2023/CVE-2023-50xx/CVE-2023-5043.json +++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5043.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5043", "sourceIdentifier": "jordan@liggitt.net", "published": "2023-10-25T20:15:18.037", - "lastModified": "2023-11-02T17:54:38.423", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-07T17:15:11.983", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -123,6 +123,10 @@ "Mailing List", "Mitigation" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0012/", + "source": "jordan@liggitt.net" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5044.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5044.json index 8fa64f0a362..1667beff1d8 100644 --- a/CVE-2023/CVE-2023-50xx/CVE-2023-5044.json +++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5044.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5044", "sourceIdentifier": "jordan@liggitt.net", "published": "2023-10-25T20:15:18.187", - "lastModified": "2023-11-02T17:45:26.790", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-07T17:15:12.073", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -123,6 +123,10 @@ "Mailing List", "Mitigation" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0012/", + "source": "jordan@liggitt.net" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5088.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5088.json index 2bc81e39db5..0c941c8d6cd 100644 --- a/CVE-2023/CVE-2023-50xx/CVE-2023-5088.json +++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5088.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5088", "sourceIdentifier": "secalert@redhat.com", "published": "2023-11-03T14:15:08.560", - "lastModified": "2023-12-08T19:15:08.203", - "vulnStatus": "Modified", + "lastModified": "2024-03-07T17:46:40.173", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -89,8 +89,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6D9E0C78-9678-4CEE-9389-962CF618A51F" + "criteria": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.2.0", + "matchCriteriaId": "8298AC47-931D-466E-8EFF-6F9CD0F0E504" } ] } @@ -148,7 +149,10 @@ }, { "url": "https://security.netapp.com/advisory/ntap-20231208-0005/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52426.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52426.json index b630bec98b9..12af970c35f 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52426.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52426.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52426", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-04T20:15:46.120", - "lastModified": "2024-02-26T16:27:48.450", + "lastModified": "2024-03-07T17:15:11.893", "vulnStatus": "Modified", "descriptions": [ { @@ -98,6 +98,10 @@ { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNUBSGZFEZOBHJFTAD42SAN4ATW2VEMV/", "source": "cve@mitre.org" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0005/", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6816.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6816.json index cd6714273ad..4d66283c794 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6816.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6816.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6816", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-18T05:15:08.607", - "lastModified": "2024-02-09T02:15:08.207", + "lastModified": "2024-03-07T17:15:12.180", "vulnStatus": "Modified", "descriptions": [ { @@ -253,6 +253,10 @@ { "url": "https://security.gentoo.org/glsa/202401-30", "source": "secalert@redhat.com" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0006/", + "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7242.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7242.json index c76f0e099a8..c0a0e858b01 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7242.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7242.json @@ -2,16 +2,40 @@ "id": "CVE-2023-7242", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-03-01T21:15:07.213", - "lastModified": "2024-03-01T22:22:25.913", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-03-07T17:50:48.090", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "\n\nIndustrial Control Systems Network Protocol Parsers (ICSNPP) - Ethercat \nZeek Plugin versions d78dda6 and prior are vulnerable to out-of-bounds \nread during the process of analyzing a specific Ethercat packet. This \ncould allow an attacker to crash the Zeek process and leak some \ninformation in memory.\n\n\n\n\n\n" + }, + { + "lang": "es", + "value": "Industrial Control Systems Network Protocol Parsers (ICSNPP): las versiones d78dda6 y anteriores del complemento Ethercat Zeek son vulnerables a lecturas fuera de los l\u00edmites durante el proceso de an\u00e1lisis de un paquete Ethercat espec\u00edfico. Esto podr\u00eda permitir que un atacante bloquee el proceso Zeek y filtre informaci\u00f3n en la memoria." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + }, { "source": "ics-cert@hq.dhs.gov", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + }, { "source": "ics-cert@hq.dhs.gov", "type": "Secondary", @@ -46,10 +80,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisa:icsnpp-ethercat:*:*:*:*:*:zeek:*:*", + "versionEndIncluding": "d78dda6", + "matchCriteriaId": "D713D8FB-83DA-4BA8-87B2-CEB65DB5BBFE" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-051-02", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "US Government Resource", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7243.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7243.json index 525ee5f7310..bb9e6dada49 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7243.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7243.json @@ -2,16 +2,40 @@ "id": "CVE-2023-7243", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-03-01T21:15:07.417", - "lastModified": "2024-03-01T22:22:25.913", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-03-07T17:51:08.413", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "\nIndustrial Control Systems Network Protocol Parsers (ICSNPP) - Ethercat \nZeek Plugin versions d78dda6 and prior are vulnerable to out-of-bounds \nwrite while analyzing specific Ethercat datagrams. This could allow an \nattacker to cause arbitrary code execution.\n\n\n\n" + }, + { + "lang": "es", + "value": "Industrial Control Systems Network Protocol Parsers (ICSNPP): las versiones d78dda6 y anteriores del complemento Ethercat Zeek son vulnerables a escritura fuera de los l\u00edmites al analizar datagramas Ethercat espec\u00edficos. Esto podr\u00eda permitir que un atacante provoque la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "ics-cert@hq.dhs.gov", "type": "Secondary", @@ -46,10 +70,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisa:icsnpp-ethercat:*:*:*:*:*:zeek:*:*", + "versionEndIncluding": "d78dda6", + "matchCriteriaId": "D713D8FB-83DA-4BA8-87B2-CEB65DB5BBFE" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-051-02", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "US Government Resource", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7244.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7244.json index 920a478139b..dcb06da5eb8 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7244.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7244.json @@ -2,16 +2,40 @@ "id": "CVE-2023-7244", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-03-01T21:15:07.613", - "lastModified": "2024-03-01T22:22:25.913", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-03-07T17:51:19.000", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Industrial Control Systems Network Protocol Parsers (ICSNPP) - Ethercat \nZeek Plugin versions d78dda6 and prior are vulnerable to out-of-bounds \nwrite in their primary analyses function for Ethercat communication \npackets. This could allow an attacker to cause arbitrary code execution.\n\n" + }, + { + "lang": "es", + "value": "Industrial Control Systems Network Protocol Parsers (ICSNPP): las versiones d78dda6 y anteriores del complemento Ethercat Zeek son vulnerables a escritura fuera de los l\u00edmites en su funci\u00f3n de an\u00e1lisis principal para paquetes de comunicaci\u00f3n Ethercat. Esto podr\u00eda permitir que un atacante provoque la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "ics-cert@hq.dhs.gov", "type": "Secondary", @@ -46,10 +70,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisa:icsnpp-ethercat:*:*:*:*:*:zeek:*:*", + "versionEndIncluding": "d78dda6", + "matchCriteriaId": "D713D8FB-83DA-4BA8-87B2-CEB65DB5BBFE" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-051-02", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "US Government Resource", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0408.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0408.json index b6309f9a307..011e25623d6 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0408.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0408.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0408", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-18T16:15:08.380", - "lastModified": "2024-02-09T02:15:08.383", + "lastModified": "2024-03-07T17:15:12.400", "vulnStatus": "Modified", "descriptions": [ { @@ -233,6 +233,10 @@ { "url": "https://security.gentoo.org/glsa/202401-30", "source": "secalert@redhat.com" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0006/", + "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0409.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0409.json index a3dcdf83a5b..5c9ac8b7cde 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0409.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0409.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0409", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-18T16:15:08.593", - "lastModified": "2024-02-09T02:15:08.533", + "lastModified": "2024-03-07T17:15:12.540", "vulnStatus": "Modified", "descriptions": [ { @@ -234,6 +234,10 @@ { "url": "https://security.gentoo.org/glsa/202401-30", "source": "secalert@redhat.com" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0006/", + "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0853.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0853.json index 33df10e5401..78eaa8652ff 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0853.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0853.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0853", "sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9", "published": "2024-02-03T14:15:50.850", - "lastModified": "2024-02-16T15:17:48.757", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-07T17:15:12.657", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -89,6 +89,10 @@ "Exploit", "Issue Tracking" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0004/", + "source": "2499f714-1537-4658-8207-48ae4bb9eae9" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1351.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1351.json new file mode 100644 index 00000000000..6eafba097de --- /dev/null +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1351.json @@ -0,0 +1,71 @@ +{ + "id": "CVE-2024-1351", + "sourceIdentifier": "cna@mongodb.com", + "published": "2024-03-07T17:15:12.740", + "lastModified": "2024-03-07T17:15:12.740", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Under certain configurations of --tlsCAFile and tls.CAFile, MongoDB Server may skip peer certificate validation which may result in untrusted connections to succeed. This may effectively reduce the security guarantees provided by TLS and open connections that should have been closed due to failing certificate validation. This issue affects MongoDB Server v7.0 versions prior to and including 7.0.5, MongoDB Server v6.0 versions prior to and including 6.0.13, MongoDB Server v5.0 versions prior to and including 5.0.24 and MongoDB Server v4.4 versions prior to and including 4.4.28.\n\nRequired Configuration : A server process will allow incoming connections to skip peer certificate validation if the server process was started with TLS enabled (net.tls.mode set to allowTLS, preferTLS, or requireTLS) and without a net.tls.CAFile configured.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@mongodb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cna@mongodb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], + "references": [ + { + "url": "https://jira.mongodb.org/browse/SERVER-72839", + "source": "cna@mongodb.com" + }, + { + "url": "https://www.mongodb.com/docs/manual/release-notes/4.4/#4.4.29---february-28--2024", + "source": "cna@mongodb.com" + }, + { + "url": "https://www.mongodb.com/docs/manual/release-notes/7.0/#7.0.6---feb-28--2024", + "source": "cna@mongodb.com" + }, + { + "url": "https://www.mongodb.com/docs/v5.0/release-notes/5.0/#5.0.25---february-28--2024", + "source": "cna@mongodb.com" + }, + { + "url": "https://www.mongodb.com/docs/v6.0/release-notes/6.0/#6.0.14---feb-28--2024", + "source": "cna@mongodb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1442.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1442.json new file mode 100644 index 00000000000..86d6d8a0db5 --- /dev/null +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1442.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-1442", + "sourceIdentifier": "security@grafana.com", + "published": "2024-03-07T18:15:46.590", + "lastModified": "2024-03-07T18:15:46.590", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": " A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.\nDoing this will grant the user access to read, query, edit and delete all data sources within the organization.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@grafana.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@grafana.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://grafana.com/security/security-advisories/cve-2024-1442/", + "source": "security@grafana.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21351.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21351.json index 62ad0fa7f39..a520da6f315 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21351.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21351.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21351", "sourceIdentifier": "secure@microsoft.com", "published": "2024-02-13T18:15:51.333", - "lastModified": "2024-02-15T02:00:01.653", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-03-07T17:48:52.180", + "vulnStatus": "Analyzed", "cisaExploitAdd": "2024-02-13", "cisaActionDue": "2024-03-05", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -12,6 +12,10 @@ { "lang": "en", "value": "Windows SmartScreen Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad SmartScreen de Windows" } ], "metrics": { @@ -38,10 +42,127 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20469", + "matchCriteriaId": "448534CE-1C07-4DF1-8EDD-C43C3492898B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.6709", + "matchCriteriaId": "57927CA7-FE09-43AA-9F66-6E68EE3125D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.6709", + "matchCriteriaId": "6D84C15B-58BF-4124-A1AF-BE62B4259D2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.17763.5458", + "matchCriteriaId": "97FA2666-D83E-4645-AB34-B17DD82A705B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.5458", + "matchCriteriaId": "9EF5A993-EF3B-4BE1-8325-62354DD7A7E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.5458", + "matchCriteriaId": "1957C71A-2CE0-4173-8BB6-0BE0E93E9BCC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4046", + "matchCriteriaId": "C78776CC-3A9C-41A3-8BEB-D71D92F6579D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4046", + "matchCriteriaId": "806CA6D2-42B2-4244-A5ED-D23E6DD56772" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.2777", + "matchCriteriaId": "3F7F8173-9E59-48E4-98C9-4BEB6AE79451" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3155", + "matchCriteriaId": "84EDBE52-EFE0-4D6D-AA76-698B6F9687D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3155", + "matchCriteriaId": "900D1DA2-6DA7-4681-966A-B9973B1329EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.5458", + "matchCriteriaId": "A9098F92-79E7-4762-A37C-99B4CFA8CDD1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2322", + "matchCriteriaId": "5C8F0436-3AFE-48BD-AE92-8F8392DD0A1D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.709", + "matchCriteriaId": "B6FCF1A0-6B8E-457A-AB6A-2DE939B9D18B" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21351", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21412.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21412.json index ce2044cec2d..671f380044c 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21412.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21412.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21412", "sourceIdentifier": "secure@microsoft.com", "published": "2024-02-13T18:15:59.903", - "lastModified": "2024-02-15T02:00:01.653", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-03-07T17:48:58.173", + "vulnStatus": "Analyzed", "cisaExploitAdd": "2024-02-13", "cisaActionDue": "2024-03-05", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -12,6 +12,10 @@ { "lang": "en", "value": "Internet Shortcut Files Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de archivos de acceso directo a Internet" } ], "metrics": { @@ -38,10 +42,122 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.17763.5458", + "matchCriteriaId": "97FA2666-D83E-4645-AB34-B17DD82A705B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.5458", + "matchCriteriaId": "9EF5A993-EF3B-4BE1-8325-62354DD7A7E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.5458", + "matchCriteriaId": "1957C71A-2CE0-4173-8BB6-0BE0E93E9BCC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4046", + "matchCriteriaId": "C78776CC-3A9C-41A3-8BEB-D71D92F6579D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.4046", + "matchCriteriaId": "9A6AFF70-FED0-4AF5-9D8F-5C90BF982941" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.4046", + "matchCriteriaId": "A0B61E17-FC01-4FF3-BF96-37819033F412" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.2777", + "matchCriteriaId": "481C9CDC-7383-4D08-9608-BDA2F9FADB36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.2777", + "matchCriteriaId": "60E272E2-0D33-4342-92C3-5D66C89DE531" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3155", + "matchCriteriaId": "84EDBE52-EFE0-4D6D-AA76-698B6F9687D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22631.3155", + "matchCriteriaId": "E2FB8ADD-663B-445B-B0F2-6B5E168D9E2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22631.3155", + "matchCriteriaId": "679CCD68-F014-452C-8D3F-F9D17329779C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.5458", + "matchCriteriaId": "A9098F92-79E7-4762-A37C-99B4CFA8CDD1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2322", + "matchCriteriaId": "5C8F0436-3AFE-48BD-AE92-8F8392DD0A1D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.709", + "matchCriteriaId": "B6FCF1A0-6B8E-457A-AB6A-2DE939B9D18B" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21412", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-227xx/CVE-2024-22752.json b/CVE-2024/CVE-2024-227xx/CVE-2024-22752.json new file mode 100644 index 00000000000..278a76e7daf --- /dev/null +++ b/CVE-2024/CVE-2024-227xx/CVE-2024-22752.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-22752", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-07T18:15:46.810", + "lastModified": "2024-03-07T18:15:46.810", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Insecure permissions issue in EaseUS MobiMover 6.0.5 Build 21620 allows attackers to gain escalated privileges via use of crafted executable launched from the application installation directory." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/hacker625/CVE-2024-22752", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23225.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23225.json index c52e9acda56..0f89d04bb35 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23225.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23225.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23225", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-05T20:16:01.370", - "lastModified": "2024-03-07T02:00:02.283", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-03-07T17:51:50.353", + "vulnStatus": "Analyzed", "cisaExploitAdd": "2024-03-06", "cisaActionDue": "2024-03-27", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -18,15 +18,94 @@ "value": "Se solucion\u00f3 un problema de corrupci\u00f3n de memoria con una validaci\u00f3n mejorada. Este problema se solucion\u00f3 en iOS 16.7.6 y iPadOS 16.7.6, iOS 17.4 y iPadOS 17.4. Un atacante con capacidad arbitraria de lectura y escritura del kernel puede eludir las protecciones de la memoria del kernel. Apple tiene conocimiento de un informe que indica que este problema puede haber sido aprovechado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.6", + "matchCriteriaId": "E4D5AB12-A4B6-4456-A560-DD1FFE8E8CA8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.4", + "matchCriteriaId": "E9F4BB50-D14B-4807-8F38-69ADFCE433BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.6", + "matchCriteriaId": "2AF8B925-3DE5-4CC8-A4C3-95D8F107D607" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.4", + "matchCriteriaId": "C2FE8515-300C-4B6F-92A0-7D1E6D93F907" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT214081", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214082", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23296.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23296.json index 11985a867e5..e10254db59c 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23296.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23296.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23296", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-05T20:16:01.553", - "lastModified": "2024-03-07T02:00:02.283", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-03-07T17:52:12.170", + "vulnStatus": "Analyzed", "cisaExploitAdd": "2024-03-06", "cisaActionDue": "2024-03-27", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -18,11 +18,73 @@ "value": "Se solucion\u00f3 un problema de corrupci\u00f3n de memoria con una validaci\u00f3n mejorada. Este problema se solucion\u00f3 en iOS 17.4 y iPadOS 17.4. Un atacante con capacidad arbitraria de lectura y escritura del kernel puede eludir las protecciones de la memoria del kernel. Apple tiene conocimiento de un informe que indica que este problema puede haber sido aprovechado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.4", + "matchCriteriaId": "CE5413B9-A1A8-499F-B047-163908202E69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.4", + "matchCriteriaId": "BCB4911E-7824-4C34-916D-88110CB415EB" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT214081", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23897.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23897.json index 99963d94a7b..44bfb63bce3 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23897.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23897.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23897", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-01-24T18:15:09.370", - "lastModified": "2024-02-29T11:15:08.647", - "vulnStatus": "Modified", + "lastModified": "2024-03-07T17:47:35.020", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -21,20 +21,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 7.5, - "baseSeverity": "HIGH" + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" }, "exploitabilityScore": 3.9, - "impactScore": 3.6 + "impactScore": 5.9 } ] }, @@ -60,14 +60,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*", - "versionEndIncluding": "2.426.2", - "matchCriteriaId": "6007B374-F6EF-48E5-B63B-B5DDDC41B706" + "versionEndExcluding": "2.426.3", + "matchCriteriaId": "669379F5-5F67-4002-AD76-F8C470C89D61" }, { "vulnerable": true, "criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*", - "versionEndIncluding": "2.441", - "matchCriteriaId": "F32E6FB9-B0D3-47A8-A060-D8F85ED38AB7" + "versionEndExcluding": "2.442", + "matchCriteriaId": "493B263C-C8C7-4741-B7F8-B672E86CC8B4" } ] } @@ -79,7 +79,8 @@ "url": "http://packetstormsecurity.com/files/176839/Jenkins-2.441-LTS-2.426.3-CVE-2024-23897-Scanner.html", "source": "jenkinsci-cert@googlegroups.com", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] }, { @@ -87,12 +88,16 @@ "source": "jenkinsci-cert@googlegroups.com", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/01/24/6", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3314", diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25710.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25710.json index 8f5996a155e..2a2f2f3c575 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25710.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25710.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25710", "sourceIdentifier": "security@apache.org", "published": "2024-02-19T09:15:37.943", - "lastModified": "2024-02-22T15:24:45.240", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-07T17:15:12.940", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -104,6 +104,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0010/", + "source": "security@apache.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-263xx/CVE-2024-26308.json b/CVE-2024/CVE-2024-263xx/CVE-2024-26308.json index d2fce4f2259..cce7106c219 100644 --- a/CVE-2024/CVE-2024-263xx/CVE-2024-26308.json +++ b/CVE-2024/CVE-2024-263xx/CVE-2024-26308.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26308", "sourceIdentifier": "security@apache.org", "published": "2024-02-19T09:15:38.277", - "lastModified": "2024-02-22T15:21:36.213", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-07T17:15:13.050", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -84,6 +84,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240307-0009/", + "source": "security@apache.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27733.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27733.json new file mode 100644 index 00000000000..dfa0d7fcaab --- /dev/null +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27733.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-27733", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-07T17:15:13.120", + "lastModified": "2024-03-07T17:15:13.120", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "File Upload vulnerability in Byzro Network Smart s42 Management Platform v.S42 allows a local attacker to execute arbitrary code via the useratte/userattestation.php component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Sadw11v/cve/blob/main/upload.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 9f4efa94782..7011e2300fc 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-03-07T17:00:30.124741+00:00 +2024-03-07T19:00:37.916459+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-03-07T16:15:45.123000+00:00 +2024-03-07T18:15:46.810000+00:00 ``` ### Last Data Feed Release @@ -29,22 +29,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -240779 +240783 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `4` -* [CVE-2023-48725](CVE-2023/CVE-2023-487xx/CVE-2023-48725.json) (`2024-03-07T15:15:07.733`) +* [CVE-2024-1351](CVE-2024/CVE-2024-13xx/CVE-2024-1351.json) (`2024-03-07T17:15:12.740`) +* [CVE-2024-1442](CVE-2024/CVE-2024-14xx/CVE-2024-1442.json) (`2024-03-07T18:15:46.590`) +* [CVE-2024-22752](CVE-2024/CVE-2024-227xx/CVE-2024-22752.json) (`2024-03-07T18:15:46.810`) +* [CVE-2024-27733](CVE-2024/CVE-2024-277xx/CVE-2024-27733.json) (`2024-03-07T17:15:13.120`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `47` -* [CVE-2024-0818](CVE-2024/CVE-2024-08xx/CVE-2024-0818.json) (`2024-03-07T15:15:08.147`) -* [CVE-2024-0917](CVE-2024/CVE-2024-09xx/CVE-2024-0917.json) (`2024-03-07T15:15:08.257`) +* [CVE-2023-47746](CVE-2023/CVE-2023-477xx/CVE-2023-47746.json) (`2024-03-07T17:15:11.277`) +* [CVE-2023-47747](CVE-2023/CVE-2023-477xx/CVE-2023-47747.json) (`2024-03-07T17:15:11.373`) +* [CVE-2023-48725](CVE-2023/CVE-2023-487xx/CVE-2023-48725.json) (`2024-03-07T18:15:46.497`) +* [CVE-2023-50305](CVE-2023/CVE-2023-503xx/CVE-2023-50305.json) (`2024-03-07T17:50:18.457`) +* [CVE-2023-50308](CVE-2023/CVE-2023-503xx/CVE-2023-50308.json) (`2024-03-07T17:15:11.473`) +* [CVE-2023-50387](CVE-2023/CVE-2023-503xx/CVE-2023-50387.json) (`2024-03-07T17:15:11.587`) +* [CVE-2023-5043](CVE-2023/CVE-2023-50xx/CVE-2023-5043.json) (`2024-03-07T17:15:11.983`) +* [CVE-2023-5044](CVE-2023/CVE-2023-50xx/CVE-2023-5044.json) (`2024-03-07T17:15:12.073`) +* [CVE-2023-50868](CVE-2023/CVE-2023-508xx/CVE-2023-50868.json) (`2024-03-07T17:15:11.817`) +* [CVE-2023-5088](CVE-2023/CVE-2023-50xx/CVE-2023-5088.json) (`2024-03-07T17:46:40.173`) +* [CVE-2023-52426](CVE-2023/CVE-2023-524xx/CVE-2023-52426.json) (`2024-03-07T17:15:11.893`) +* [CVE-2023-6816](CVE-2023/CVE-2023-68xx/CVE-2023-6816.json) (`2024-03-07T17:15:12.180`) +* [CVE-2023-7242](CVE-2023/CVE-2023-72xx/CVE-2023-7242.json) (`2024-03-07T17:50:48.090`) +* [CVE-2023-7243](CVE-2023/CVE-2023-72xx/CVE-2023-7243.json) (`2024-03-07T17:51:08.413`) +* [CVE-2023-7244](CVE-2023/CVE-2023-72xx/CVE-2023-7244.json) (`2024-03-07T17:51:19.000`) +* [CVE-2024-0408](CVE-2024/CVE-2024-04xx/CVE-2024-0408.json) (`2024-03-07T17:15:12.400`) +* [CVE-2024-0409](CVE-2024/CVE-2024-04xx/CVE-2024-0409.json) (`2024-03-07T17:15:12.540`) +* [CVE-2024-0853](CVE-2024/CVE-2024-08xx/CVE-2024-0853.json) (`2024-03-07T17:15:12.657`) +* [CVE-2024-21351](CVE-2024/CVE-2024-213xx/CVE-2024-21351.json) (`2024-03-07T17:48:52.180`) +* [CVE-2024-21412](CVE-2024/CVE-2024-214xx/CVE-2024-21412.json) (`2024-03-07T17:48:58.173`) +* [CVE-2024-23225](CVE-2024/CVE-2024-232xx/CVE-2024-23225.json) (`2024-03-07T17:51:50.353`) +* [CVE-2024-23296](CVE-2024/CVE-2024-232xx/CVE-2024-23296.json) (`2024-03-07T17:52:12.170`) +* [CVE-2024-23897](CVE-2024/CVE-2024-238xx/CVE-2024-23897.json) (`2024-03-07T17:47:35.020`) +* [CVE-2024-25710](CVE-2024/CVE-2024-257xx/CVE-2024-25710.json) (`2024-03-07T17:15:12.940`) +* [CVE-2024-26308](CVE-2024/CVE-2024-263xx/CVE-2024-26308.json) (`2024-03-07T17:15:13.050`) ## Download and Usage diff --git a/_state.csv b/_state.csv index b3dc21e902b..6d1f1907b2f 100644 --- a/_state.csv +++ b/_state.csv @@ -101852,7 +101852,7 @@ CVE-2017-18591,0,0,3ccbac5e926ec40a7629e4f7fef9755b4ab09764d021ad8ee525e680cdf8b CVE-2017-18592,0,0,c7eaa76231acd890525b0db3c3436d212df09188e584289ea2bb19fde7592c1d,2019-08-29T15:54:17.940000 CVE-2017-18593,0,0,c54163a2100d390258ac438af5b1226d4327bad71c6e00d607e4120c606d7baf,2019-08-30T20:12:44.350000 CVE-2017-18594,0,0,2a7680d1879dc6f96384171d5a2142a37493bfce8e80eff155966e1b5b49f149,2019-09-26T12:15:10.347000 -CVE-2017-18595,0,0,8558c80e0b8fc9a1e74fef93066f692a406db0803e0502d6b6ec32c640368ac0,2023-02-23T23:07:23.393000 +CVE-2017-18595,0,1,189189ded6d17c97bb926e72a02b05acf0865dfb654a26f83900d08cc8a56288,2024-03-07T17:45:50.977000 CVE-2017-18596,0,0,a680c0e03a2412453808a406b270b9ad95d46c1476c97d700869ed68a9b22fbd,2020-08-25T12:35:58.723000 CVE-2017-18597,0,0,c8e5f5a8729c5fa9d63aa4e35f77b41425620cc69fbfca075ca329550e7a7108,2019-09-10T20:43:12.960000 CVE-2017-18598,0,0,58fd927bb2d75dfdacec027ea1b4385af0d85bd1fbb2b8b42c0381e79bb495ca,2019-09-10T17:21:55.597000 @@ -211323,7 +211323,7 @@ CVE-2022-4882,0,0,9dbb43dedac8d8de9064de26e4f2fce55f1a52d4bb1c0f26c0dc7d345f3036 CVE-2022-4883,0,0,9c652f454eb98f51746b7543d23cdfc2a1cc8d56ddc8392b10b53c00232483c6,2023-10-17T15:55:36.773000 CVE-2022-4884,0,0,798b78539b695dec5692fb25024ba248d78abd48f32a8f338fa903542bd07342,2023-01-12T21:23:17.837000 CVE-2022-4885,0,0,bff67f132b1382b565b0162be245b1900e23e7966004cd6a8fee33bda4eaac5f,2024-02-29T01:36:49.297000 -CVE-2022-4886,0,0,f0118a465f292586d5895b5982b510c98abf6dad8e4e9b84d973ed5a281fea61,2023-11-02T18:05:23.427000 +CVE-2022-4886,0,1,f02ba78f4af0afa851086018a3bea02fdbca24a6362ec8a068c9b4338bba6f6f,2024-03-07T17:15:09.470000 CVE-2022-4888,0,0,dafe103df0fcf10fe43033ef8822e9be6466c3bbfd0cc09003954252b8765280,2023-11-07T03:59:13.600000 CVE-2022-4889,0,0,f3ecfdbc03bb38e3af4e99289f7aa97aea023da910733a40db189ddf077246dc,2024-02-29T01:36:49.420000 CVE-2022-4890,0,0,c371bd2631f37e57be5ee879142ff90121dbebef07aefe82b7e3da223c384390,2024-02-29T01:36:49.533000 @@ -212529,7 +212529,7 @@ CVE-2023-1188,0,0,9e846fcd955202ae8e9f250598b66bf1a4e6762c2856c97ca89a64f51e62dd CVE-2023-1189,0,0,a449f623733f462d0fa3f359225a02a010e0a82bd005dabddb8d44d07d72a6c4,2024-02-29T01:37:15.830000 CVE-2023-1190,0,0,58fc817617f4de7e9634312b320d02d305e334f933890f0b23792bd880d8a678,2024-02-29T01:37:15.927000 CVE-2023-1191,0,0,a4d4a636fa5fe21042f36a7cfdae6ed79b29496496db3cc8f6119a2ad31b5dfb,2024-02-29T01:37:16.020000 -CVE-2023-1192,0,0,572fd38ca16ea64534d08ee116c67e4f5a94ffcad3857d843b21e6e1f83790cc,2023-11-09T15:24:11.003000 +CVE-2023-1192,0,1,43f75905a84d60b4fe0024fb3344daff56e7e8be72197ab70df11568482fceb6,2024-03-07T17:15:09.620000 CVE-2023-1193,0,0,dc2f9a132ac2ca8284383e9305af2b7b7914a5c70822a6ddea25e36d093d4e45,2023-11-09T15:13:51.737000 CVE-2023-1194,0,0,e3c489657d9258a7ebcceef6eb19af9ef1f568365ec0d64e22ad7c6e7c28144b,2023-12-21T22:15:08.460000 CVE-2023-1195,0,0,c1160a2f7242a2032a241487e2adf46ebd473e7f0b951b8890d61c8afc9c143e,2023-05-26T18:27:29.387000 @@ -219519,7 +219519,7 @@ CVE-2023-27855,0,0,4b5d8cf13eb565c0f3b89c29aea12274e6f1a048eff52b322eb4d8a9927d1 CVE-2023-27856,0,0,57809d3b05a9a8822217e7eb76fccce3a6b30297f5027e1aaf725280c7298ef9,2023-11-07T04:10:19.790000 CVE-2023-27857,0,0,2c3920cfac4b731a001d27ee4d27583a3feb911fb3597ad4dbc64b2eae406e44,2024-01-09T02:31:27.647000 CVE-2023-27858,0,0,8b6dce34823fa5ed0de7ce94814b7ea16cd2940f9adb89436bfb88a8f0a3d916,2023-11-07T18:07:36.920000 -CVE-2023-27859,0,0,1d2949ce7a3055d98f4d4e73c8c2698006c5118be13fd6d8b75dd566dfa2196a,2024-01-25T02:03:31.223000 +CVE-2023-27859,0,1,2c8ef2daff0ff454fc969899b7c73b962d239db8f5fe739d12de46e73882d6ba,2024-03-07T17:15:09.753000 CVE-2023-2786,0,0,d8b95aaceeea9d299d494d5d1b67adea7cec45363882e1b8873e4e1f485f5077,2023-06-26T17:48:28.750000 CVE-2023-27860,0,0,0f3e27ed4a59a583860342541d3c1eb8233c9ce2ea08284904698844cddf772a,2023-05-04T20:44:00.350000 CVE-2023-27861,0,0,8788d89e03f154b568e2330be390285d9f761b5b948a076deb2ddb5f1534c740,2023-06-09T23:58:43.357000 @@ -220160,7 +220160,7 @@ CVE-2023-2852,0,0,9e7ab75f67deb8e584c7f063682dc633c05ba1ccab104314cbdc92fe0a93db CVE-2023-28520,0,0,6d3894db7ff47e1b21104537808095d722e6ede0f5633aed0fbf9feb507162d6,2023-05-19T17:13:10.227000 CVE-2023-28522,0,0,8bbf4232c7eaccf09e2c9b67036392ce612e474f12236686ad3e107906edd35d,2023-05-22T14:51:38.743000 CVE-2023-28523,0,0,b3f81f65f3fd5d59de0aa2d2d7713a5ab62c4d885fba8eaa24205c7ae4048d6b,2023-12-12T21:08:23.727000 -CVE-2023-28525,0,0,171a90a4ed20d9d1f8e3410e030e82a86601140ff3219f322735a44436c864aa,2024-03-01T14:04:26.010000 +CVE-2023-28525,0,1,81dbf82b3a2de0091cfbc4678f9de712fd8ab41d382437fc0430b3b8faf59c21,2024-03-07T17:49:21.083000 CVE-2023-28526,0,0,58ba57da9ce51abaeb6f8cb3241c04b0118e6da3ef91b0bd1de57766333c8ef1,2023-12-12T21:05:56.680000 CVE-2023-28527,0,0,3c0856c2c085c342f3eb8c88a01e0a859fac1d2cb11aa4b7cdd086742ed44b3c,2023-12-12T21:05:28.540000 CVE-2023-28528,0,0,c604f5a424d72ff383c0d7050e9805d9ced96cd3d5a877a0d4e801f67e21c7c5,2023-05-18T16:15:09.617000 @@ -220530,7 +220530,7 @@ CVE-2023-28936,0,0,8fe54381164956262dcd17033984b4cbdeb9e60805f90a3970abde4acbd7c CVE-2023-28937,0,0,6e2a8c539f6d09f5964f825bc8d8fd021c125848a7c6be67887a164fe9468016,2023-06-13T10:15:10.047000 CVE-2023-28938,0,0,018feb89ef0cceb57c342d9dc53ed05f9f8ff11ec5e877251c1e8007715e4407,2023-11-07T04:10:58.907000 CVE-2023-2894,0,0,ad879ae0ef6b122688bafc156258cc3381ab42068278e00bb5364783ef6a423b,2023-11-07T04:13:29.760000 -CVE-2023-28949,0,0,17a4072fd8e36a61514aa1abfaa2dc64489480fff9f4e9e2ff5ba8b589685124,2024-03-01T14:04:26.010000 +CVE-2023-28949,0,1,853baa16026593cfc157bb44a21331344c461dee8c775192dcfebdd4fcebdd26,2024-03-07T17:50:02.250000 CVE-2023-2895,0,0,50c6f9db7e70a092eee6257538bf888f9ec56cf83a28736b342d2da6788a4d02,2023-11-07T04:13:29.950000 CVE-2023-28950,0,0,db426378ac1397a8ecc4a9df6d4f111d2cb20674db30fe6d21f67753d47b3d3b,2023-05-26T14:15:16.233000 CVE-2023-28953,0,0,2bad42558e8ded6db3fed9e65e510d495f26ff6ca7de5036d9bab6440feadda1,2023-08-14T19:15:10.920000 @@ -225597,7 +225597,7 @@ CVE-2023-3632,0,0,320299693720ef84d57d01f8449a73311eb256538d0800daeb747bb6a62157 CVE-2023-36321,0,0,cc2c8c53c922b3a2245fc58bf10cc52f422e1d5cbd458d0657415f02299068c4,2023-10-24T23:40:13.823000 CVE-2023-36326,0,0,d1df7c74bc35e9a4a028b2d1d5e49b1bb16c66ac96201e75b2edaa0dc8b2a142,2023-09-06T00:04:24.377000 CVE-2023-36327,0,0,ae22984d8293ccc36bc9518fead752d9ab8ab03f4342ab78e57b3f79bfb6a331,2023-09-06T00:05:15.863000 -CVE-2023-36328,0,0,7d2ec1c7abc117d1ebc712441b8623ba7f8f9756b42db50fe7b7f77bfbd1783e,2023-11-07T04:16:32.303000 +CVE-2023-36328,0,1,8fff2c668bd38b09513a7a452a81cd12d32fbbebecfa02609aed7b2cf6ac27a4,2024-03-07T17:46:02.277000 CVE-2023-3633,0,0,3c9f796d8545fe65edc49bfeb6ac0e5b4551cb0003e3d8ef24c186ff877eeb05,2023-07-27T03:56:59.660000 CVE-2023-36339,0,0,c0648ec7fac0a5b076652494c53d99ccb043c74046b01d7452b471c486d6b1b1,2023-07-28T21:57:14.937000 CVE-2023-36340,0,0,a9c65e0c2e5a644199adc44144e99acaa60e4bd2efbdefc3b1346d65858752d0,2023-10-19T11:10:01.763000 @@ -226900,7 +226900,7 @@ CVE-2023-38157,0,0,0644654ec7595404d46e68f331c2a5a07662e3022994980569512eb9c14b1 CVE-2023-38158,0,0,620a4376a873018b524ed1fa41e8abb1a39d9109805a9c3062e8002716b87355,2023-08-24T21:39:33.910000 CVE-2023-38159,0,0,65eae44058aa66997a6807a530bcb298e74054d101b7516747d5769e55402b62,2023-10-12T22:19:27.903000 CVE-2023-38160,0,0,1fd813b6c7976c00c8cfd8be4f9cf067696d5ca7c96046f392b62df9a2891008,2023-09-14T18:46:43.170000 -CVE-2023-38161,0,0,616bca3ccbee5c16ae6ee9cd8a4cc6df1093965be75db8e96d963fedcf0f4fbe,2023-09-14T18:33:24.090000 +CVE-2023-38161,0,1,6bde35b5f4216c14e27cf6e34f2523c0c0aee0d5224aa6f9752c57dbdf5a1d53,2024-03-07T17:46:16.493000 CVE-2023-38162,0,0,32e879aaf5b2b8afa7dfdb6a368787062c1e7bc8ded71090759e02885eee5f2b,2023-09-14T18:29:23.190000 CVE-2023-38163,0,0,39cd643de261052851186bc7e948417913f891fa520d830cd3887623e2445a78,2023-09-14T02:34:29.220000 CVE-2023-38164,0,0,09a8729087fcb6e6112d5ad6eff2ec6b9b0b58e61d210f474e273081520c45dd,2023-09-14T02:30:40.417000 @@ -231405,7 +231405,7 @@ CVE-2023-45187,0,0,50fe3917bef6f155de7c2ef7d4d38b62123ce4c23e74e434f5c6a36d50e03 CVE-2023-45189,0,0,df153b6d1053e0ec8ad7a75797868a0b23f8c9deecf4676d70e63dec9cc0990b,2023-11-09T20:27:56.003000 CVE-2023-45190,0,0,ee5cdff23ea1c9c51b85b56e05c245a9158fa23b5938ef53dd8353ecb5eef64c,2024-02-15T04:41:35.763000 CVE-2023-45191,0,0,0471d71b4e832eeadfce865b6a4a3f21dfa7a9078549997d149920fc7d734d05,2024-02-15T04:43:16.217000 -CVE-2023-45193,0,0,c3de42c53dd6d455a774a37c4f8763a7c3d5f2a16761fcec4d525d582477be2c,2024-01-25T02:04:23.543000 +CVE-2023-45193,0,1,0c497ac09778c9b72ec1e37b357578dd6880cf4125371a7f2cb787ecdbc947cf,2024-03-07T17:15:09.880000 CVE-2023-45194,0,0,d5c89e53cbf9029912da4482ada08495c9f99ebbbb14329dd33526185af3bf8f,2023-10-31T18:08:52.140000 CVE-2023-45198,0,0,e83575150f55c9693ecaa3d3d8ecc28b28389ef4c4551e169f843e36cfbc4ca1,2023-10-11T17:15:31.923000 CVE-2023-45199,0,0,ffec34f4347277cf1a81398e2045556919c611109a0a71706ab507c8e66ad4f5,2023-10-12T18:19:39.860000 @@ -231431,16 +231431,16 @@ CVE-2023-45225,0,0,0fb7960f90e9546b4a2991c9cdf514b6593013dc8179a1d69842eae888e49 CVE-2023-45226,0,0,7b86b40ba7207cafdbb9c5ef30954750c59f6071a71a21a99d196d749e54c9c6,2023-10-18T01:27:45.367000 CVE-2023-45227,0,0,4ffb0311b26c436ba20e67f324124acf224981c7f480b51fbf58a45a4e0a7901,2024-02-12T16:45:47.247000 CVE-2023-45228,0,0,d3ce09fbc0053d966a1c84575fc054963cc930f15296e011428d43b06e7ca000,2023-11-07T19:55:08.333000 -CVE-2023-45229,0,0,53945af80c3e7262e368e75381623a623170287914194728911e94f35a79ce31,2024-01-23T19:39:38.607000 +CVE-2023-45229,0,1,ba7df8658c821bb3ec61211859d4f1196e179fdd3ba514897a74ae64ee8462c4,2024-03-07T17:15:10 CVE-2023-4523,0,0,7594ef971654e5b13b747bcbe0f6a98b28a2c227054ae0ac208549d4afc41901,2023-09-29T15:39:05.767000 -CVE-2023-45230,0,0,621beada92e7b9428d00f06a50db1812bb188e02d79a08fbbb0e3d553ea9c9ba,2024-01-23T19:39:22.663000 -CVE-2023-45231,0,0,3af80ff53ca4ce51073d39a4cf09df8eb1964c49bfd7f48b7b61e9f375e7b5b5,2024-01-23T15:59:40.570000 -CVE-2023-45232,0,0,712f2d35c1bd7623967e122aab06f60c008e1d46653a7d8a40f65966c3333be0,2024-01-23T19:39:11.070000 -CVE-2023-45233,0,0,df58ebf8f541d594c532f8f4526b6b0e738297dd85105d55bb1879473485428b,2024-01-23T19:40:59.837000 -CVE-2023-45234,0,0,8bde5bcea93e40a389cb98a1289db8a61a86ba5138772e7b708a69d32a3a8e18,2024-01-23T15:58:34.470000 -CVE-2023-45235,0,0,d63e37b709bac24585e02351f459e70d2586b7571bac5615dd9d630b7fb0ebb7,2024-01-23T15:58:27.183000 -CVE-2023-45236,0,0,9ae688713f2832bc5f80bb7a19a4bbcb7be4fc38f44847322744c60b768c53b4,2024-01-23T16:00:56.453000 -CVE-2023-45237,0,0,7601aaee6b804ca085092f6eb17d1e27d1052eff695bbc3bb46c659aa7e49c5e,2024-01-23T16:07:09.993000 +CVE-2023-45230,0,1,d519bd35b3993a3fb458dd365bcc37c4eee106c3eca5668477a2fcc497327eb1,2024-03-07T17:15:10.133000 +CVE-2023-45231,0,1,fbbeb2f22df3db01e4122b1157e36b4d7b87da56bc68a5632f68a25eae66323a,2024-03-07T17:15:10.247000 +CVE-2023-45232,0,1,05a1f11780c48729e8d559758265e57c5f802167eb837ee96a29259517e4a12d,2024-03-07T17:15:10.340000 +CVE-2023-45233,0,1,d6c63a70c57013bb00e0d0afb4aa82975835477d09cfbb9be6bd0718f2d7987b,2024-03-07T17:15:10.427000 +CVE-2023-45234,0,1,188a4ad340934a8970ceb47bfbb4e2e4ce2cb81c7a2e2832ff0b7a273b3407dd,2024-03-07T17:15:10.510000 +CVE-2023-45235,0,1,a56b315e0a90e532fb1b31e4bf7b5813e3bc8139eca7adc42725ce5cc5635c3d,2024-03-07T17:15:10.590000 +CVE-2023-45236,0,1,525499e6b39416baf89ff249494efc66f2267491565e0b1d6266bb92beb48bd9,2024-03-07T17:15:10.670000 +CVE-2023-45237,0,1,b86309e9c318e2bf34954205b33e4af0526735c885502c1b3ed0bb23eefefa82,2024-03-07T17:15:10.760000 CVE-2023-45239,0,0,ceec829d8bee367996c0f5c7e35bbe30b5631d6dfbec310aeef7b055c317044a,2023-11-07T04:21:43.770000 CVE-2023-4524,0,0,733bd7f0ea8780ce69aa3faa4947052b9e0dd28f7ad1c0423b24c8bb385e1bec,2023-11-07T04:22:41.293000 CVE-2023-45240,0,0,da4de80f5b4496f4e42cb7a39c3ffc190dc14dfb523360c59a5be08b6de1a43c,2023-10-10T14:55:56.860000 @@ -232724,15 +232724,15 @@ CVE-2023-47131,0,0,74701737596a712fff285f89765331d35b4717764abb7070b3f923f7da2cd CVE-2023-47132,0,0,2614ca3b200a86dae2d77ae2380e37b32dd95d58dda33f9f5a2d0c6f8f5f2070,2024-02-15T17:07:31.827000 CVE-2023-4714,0,0,ba38e44e3f285bfa19218321f0903a8663d31b0bcb9265b78cdbac0e6e8837e4,2024-02-29T01:41:53.897000 CVE-2023-47140,0,0,e4dcc27272763d822e970013add6c6fa8a1afdb1559fdb5d66bb469884c6b2e4,2024-01-11T16:58:30.733000 -CVE-2023-47141,0,0,9eaa40e7e50a1710e2ee6671dc0dbb74a946eb836f431d6e8df63c03242d813b,2024-01-25T02:01:48.147000 +CVE-2023-47141,0,1,23931b7854521ec8a950e63ec1d2ed13eef864de3c1c46f0e662114edc8d4963,2024-03-07T17:15:10.847000 CVE-2023-47142,0,0,86791e2ccc9b86a9c9dc9d6496e778e63a8fda979369686cb84d0db0c9427f86,2024-02-08T19:32:57.063000 CVE-2023-47143,0,0,7acc48a2d5a4570d6f29396faeecc738d3ff93f287fe7f2c4731eabceb6dde76,2024-02-08T20:00:13.007000 CVE-2023-47144,0,0,83eb749854fa495bd83421f08126c9a63b91a925c2652c722fd715a8f60c0017,2024-02-08T20:01:15.150000 -CVE-2023-47145,0,0,6db5909579bdc8a82dcc060c8691610ec6bc28cc5e7f4f9b82d242ed9bff7a38,2024-01-11T16:01:42.240000 +CVE-2023-47145,0,1,620ae7f5678047a8c4108d9fbdf5fa18578054841b939f4838b425b9745ba933,2024-03-07T17:15:10.943000 CVE-2023-47146,0,0,20e69829653fae8f4b2686a3902570d251dd86f6502cbd24bd7e7bddd7d52e98,2023-12-27T17:50:55.147000 CVE-2023-47148,0,0,b288941dfe3b1bf420ecb81fb3f06fe48a4281a820ff4a84a19d97a629ab7c25,2024-02-08T19:58:30.023000 -CVE-2023-47152,0,0,1cb00cbfe8da05419f387cc02f2b2ac3c21da849d61ef2c5cb84f751cbd335ee,2024-01-25T02:03:02.823000 -CVE-2023-47158,0,0,ba60a8c8f917d3f769be1f887c353f90f677a2df83b62672e4563404f8748c47,2024-02-05T19:15:08.353000 +CVE-2023-47152,0,1,21eae157a0c14eb599c0d65626b59a59bd4bef9c2fca5d41f60c8cae56283468,2024-03-07T17:15:11.063000 +CVE-2023-47158,0,1,846f95a2725be32047541f14ae8c358ff876d7b2eaf417c4327cad289f3b21cd,2024-03-07T17:15:11.147000 CVE-2023-4716,0,0,19a8e4bcfef050287a950063ecd9c6c3a76d47aa7d1ec3543611c805970cc149,2023-11-07T04:22:53.527000 CVE-2023-47161,0,0,aa545c6f0a0ec7887c0d704af140334d0b005fb716fcaee73533e212265aa4ed,2023-12-27T18:41:28.277000 CVE-2023-47163,0,0,d5ba5c5494cd6dba199f3b95a2f7529c892a015f889691b261aa6e93b0585aa8,2023-11-16T18:16:27.767000 @@ -233089,8 +233089,8 @@ CVE-2023-4774,0,0,80337a6c3aa30e3ac07cf852f754f44f4c329153addec6fb4c0a980cfa59de CVE-2023-47741,0,0,bc210f1d0d5dc855129de9cb9f7b0cec12b64c4591e6a3d888b1fc1b1b8d7ef9,2023-12-22T18:40:58.353000 CVE-2023-47742,0,0,cdc8f9b81df348ba8d67d4a3b415ef87b95e0515a21bf44971a47f7f0dadf816,2024-03-04T13:58:23.447000 CVE-2023-47745,0,0,e615409f5070bf5eeada0e705bb63cdf68988679c222577c10fd67ffd36caf12,2024-03-04T13:58:23.447000 -CVE-2023-47746,0,0,a4db80f0bb0d7b9675639000452bc56e60583cbf1ba7e14aadf5b8a57928148e,2024-01-25T02:04:12.947000 -CVE-2023-47747,0,0,4f8b7d30715704626db4437fad83336ca389392daa1c7e0784f83840435d69f2,2024-01-25T02:02:36.850000 +CVE-2023-47746,0,1,93753620ff8573c61e7dc7c1fdefcdb958513fec90b20f73d795fff4314c983d,2024-03-07T17:15:11.277000 +CVE-2023-47747,0,1,d613277358fc9e82ed2beb1501924858e58060b561a99c5ff0d63c458c5103a6,2024-03-07T17:15:11.373000 CVE-2023-4775,0,0,4e5ccce62c019ae90651a7d9690d12270ecb351214fedeca533657639c045ca8,2023-11-17T13:59:12.040000 CVE-2023-47754,0,0,b6cddd46805b5fb405530109355d87a68bc44fa1afbf0eb5db6bb65fde25cdf3,2023-12-22T19:33:56.743000 CVE-2023-47755,0,0,31896f99dcd5875e4354b962666fd913a560a4347a62f665f6a1fb1d935fba61,2023-12-02T00:25:09.250000 @@ -233790,7 +233790,7 @@ CVE-2023-48720,0,0,71e46ed990f77e5e1ab7e573b7ce199df9e319357ad7189c0aedad622b34f CVE-2023-48721,0,0,8c47109b9e61cc40969444ae2ead7963b8d4bdd6b8b65c475e745b38f8da5161,2024-01-02T16:15:12.337000 CVE-2023-48722,0,0,b21bc90cd9ce1ec7c1af64c0d1da78505a33d180402299b29d84366f786b9b7d,2023-12-29T15:30:32.720000 CVE-2023-48723,0,0,51de78ba4a0fea3bc725aa980029a19ae13dc47bb89690d15ea1655fe7f3baae,2024-01-02T16:15:12.377000 -CVE-2023-48725,1,1,616e89ec1781422fd259faff18c3b18503a9266877dac52b46eab6ce7b3c85d7,2024-03-07T16:15:45.123000 +CVE-2023-48725,0,1,75c085b4163799cb668cf7ca4bc0de9ef738d5db157f91ec810a73765f82b083,2024-03-07T18:15:46.497000 CVE-2023-48728,0,0,ed4fb3603eb3d1fb4a8089303ba944449bfea1856081f932800d0cc5bd7026e1,2024-01-17T15:19:11.497000 CVE-2023-48729,0,0,13f3c83cf7904baff3f0b31a9a04b64ff281e898cd527079412a7cd8a8ab623a,2024-02-14T18:15:46.243000 CVE-2023-4873,0,0,83d019ca780565da868ccd4d7d22c76909e8192d214e3ff6bf7c093762207a87,2024-02-29T01:41:57.527000 @@ -234677,9 +234677,9 @@ CVE-2023-50297,0,0,a0ca77d6c29f649a29f82abde09a7845345036424a0fb896f71d914eca012 CVE-2023-50298,0,0,71b04767764ab2b65ac7070adde737edc7d5333faf7ecedfb92526bf3c676f59,2024-02-15T18:40:56.680000 CVE-2023-5030,0,0,401e4610c808baabd3e1b47776fdd2b7121fb0b8c0efbfc4c7959d4407fb8710,2024-02-29T01:42:10.283000 CVE-2023-50303,0,0,4971cf4aa87365d079c650f097262885c7d04f841e4ed4d262d2eea7668b80b6,2024-02-28T14:06:45.783000 -CVE-2023-50305,0,0,a6a705ef028d8e4c572b0ec5d2dfc39846c6511a54360445c525b9336d6debdc,2024-03-01T14:04:26.010000 +CVE-2023-50305,0,1,52af726547eaa95f1201f2c6f25887776aab26306ea8ffca4b6104efe8e4721e,2024-03-07T17:50:18.457000 CVE-2023-50306,0,0,b7ddc06b3066ca347c84251d1caa127c00e942b8fec6ff8cba9ebf76cc4bab75,2024-02-20T19:50:53.960000 -CVE-2023-50308,0,0,0ce6cfef3bd8d2c5af543f846c63d7740b5ba151747835464f0ef8d81ef12ac1,2024-01-25T02:03:49.987000 +CVE-2023-50308,0,1,4c428dc4aa8f2a5b0595b4c0d28f670c006a7eb1ab0b493ed318005adf3984fc,2024-03-07T17:15:11.473000 CVE-2023-5031,0,0,2ddfa688e91851fb9ee9c26fd0795cb423292b04fea2bd434ed03085a5f1525c,2024-02-29T01:42:10.360000 CVE-2023-50312,0,0,6148af5f69534aed77dae184fe2b672b68a4148611b3e761eddeb346c4e8ac63,2024-03-01T14:04:26.010000 CVE-2023-5032,0,0,e2d0fc8f37cc56ebb13f7b14337bd0fbcd61976e96205eef41ad2e2eaaf73db0,2024-02-29T01:42:10.440000 @@ -234724,7 +234724,7 @@ CVE-2023-50378,0,0,fdbe7a34fdf8cd9d71ae9618ce3ef0ad0a4804eb88dccf3d4747fb05eb07f CVE-2023-50379,0,0,2ba768024158d3957bf97073914ab21cf6e76e13687c6569b9647fa3455e4c0b,2024-02-27T14:20:06.637000 CVE-2023-50380,0,0,b5737d428cd7d3280b11a55da8c282450fdebb25171b34cbfbfc4de989e3a9f5,2024-02-28T14:06:45.783000 CVE-2023-50386,0,0,eb9175c624998374fffbb8bbdcfbc3fcd759c84a0c5cafd0e6294c2d31318a7f,2024-02-15T18:40:48.837000 -CVE-2023-50387,0,0,a93f59759db18f04358a0350fa91f0038d1c48a320311cb4bf6f42f7eaa8909d,2024-03-04T03:15:06.217000 +CVE-2023-50387,0,1,d6b6855a40848b9c54d9d59a3a311e1d6f69807c6c79ff2b8a01eb2163f073a2,2024-03-07T17:15:11.587000 CVE-2023-50395,0,0,1428a30e7f791887f351d6276b38dd6e66ef73f4c78586f3c8084af9d6bd298b,2024-02-13T20:35:06.703000 CVE-2023-5041,0,0,9eb23c87c3c86b8b889ef8868762c31909282e2886c58aff180fae5c65cd6817,2024-01-24T19:20:29.410000 CVE-2023-5042,0,0,76558d00ae1daa232624f7fa83b8c4ee909b7bd23da74f0b90b7096dbf524598,2023-09-25T13:25:16.230000 @@ -234733,13 +234733,13 @@ CVE-2023-50423,0,0,76755ef4095537b87793fcbaa84c66e6144cfa55259e1485b20e226bfcb60 CVE-2023-50424,0,0,89f3a64bec1a6aedb95e63614a714963ac97866b07259e6b76e32f06e7e01c29,2023-12-15T16:53:04.417000 CVE-2023-50428,0,0,ee38f297101d048b525cc8e108719c5b4279d7c7b397e53b64582862962f0f42,2024-01-04T17:15:08.690000 CVE-2023-50429,0,0,226bcaaff69c07707f641dbe9ce77da1a81f20b3606931034b0e6b06dfac422c,2023-12-14T14:33:52.857000 -CVE-2023-5043,0,0,7691728e8f6bdb5a6529b138417513c8d5cd2dc4696cd3aa1716fdb907e82f1c,2023-11-02T17:54:38.423000 +CVE-2023-5043,0,1,99fbb32806f488364becee5b2452ddbbdbf099b8aadeaa8418f878c2aad9dff9,2024-03-07T17:15:11.983000 CVE-2023-50430,0,0,4e933b75fee4c7e24ec319e365c288375c6e0e3a67966a0cafa5ea42d6537a4b,2023-12-13T19:10:39.247000 CVE-2023-50431,0,0,a37473383fef96d33bf0f59c3fa43743d2170c71b5a2a216d64f02e9a46ff45e,2023-12-12T22:34:10.203000 CVE-2023-50436,0,0,5f4a54322e18e4e426c305cb80a0741bdac03f3cda3d7db0d7e91ff7759346ec,2024-02-29T13:49:47.277000 CVE-2023-50437,0,0,087bf2fe61780896ed884cdb606b733c49e0268aac7a96a7112659f33954f489,2024-02-29T13:49:47.277000 CVE-2023-50439,0,0,22917e6a90c296c3d7c909fa67289b75621f4c3b8cab040412485bb2d3d2206a,2023-12-20T18:29:44.920000 -CVE-2023-5044,0,0,b4fc81b52bf69994a31c999ec5b938bd9a655e8756566ddf3c7dff1542f32464,2023-11-02T17:45:26.790000 +CVE-2023-5044,0,1,c77cb84a9812b72a5b970981b7d5fef0c5fc4f0dd761df3af2b84138e07b646c,2024-03-07T17:15:12.073000 CVE-2023-50440,0,0,cbe5d539e208b6097ace139cbeeedb49e866c5d97b399c073c43b5f8f70264c2,2023-12-20T18:29:28.293000 CVE-2023-50441,0,0,9bd760298da517bd28996f023ce7334405dbe92c32aa3c503cc1491615459ae4,2023-12-20T18:31:44.053000 CVE-2023-50442,0,0,a057a5b7c26414fc7563d24cb642834802b777e3b23cc824df69ea34217acf4a,2023-12-20T18:29:15.687000 @@ -234933,7 +234933,7 @@ CVE-2023-50864,0,0,dbb8d20e5f36a035c3156fb7a77589dedbf6adf8027e6048f396876e33958 CVE-2023-50865,0,0,48e50b801467797a5fb545180a82a848b29c010b0d9ff30f321b93c311614a5a,2024-01-10T01:12:29.470000 CVE-2023-50866,0,0,0d65d6a6346342d7f1632295af06fb66d902cdd24452e19d2e81b7338b5e01dd,2024-01-10T01:12:23.503000 CVE-2023-50867,0,0,813e7f594844fcee13255526631a248747714772b8a3c7fe20b8c1a531ee27c7,2024-01-10T01:12:15.103000 -CVE-2023-50868,0,0,d0ee2f1c607c8014504eac36a75a16a8c412e39af8e04429af5af83985bd3779,2024-03-04T03:15:06.500000 +CVE-2023-50868,0,1,1acef704c38344b53c0b7e369828b095b769c1fc01c9bcc30ab995406b56a6d7,2024-03-07T17:15:11.817000 CVE-2023-5087,0,0,cb83bb80de48780d6ddfd511869f6feaba7211f246baaaa49f1e770f0a9c1488,2023-11-07T04:23:26.693000 CVE-2023-50870,0,0,5b8837a6e60e4203ba051628b99db23d2e092916c152f0e1a5a22594cfa2f839,2023-12-19T18:48:01.647000 CVE-2023-50871,0,0,4ddf269f53c856e0f2588f2eb354c7028d0f2397d2615866b6215dfdb27c4698,2023-12-19T18:50:30.227000 @@ -234942,7 +234942,7 @@ CVE-2023-50874,0,0,bcacd6fc18a6a7384f9e3410fc219a27fd51425023bb3ea76f15234acd5bd CVE-2023-50875,0,0,1106938097fb18960ed1f89813982d05ff2f39c25d4530bc17f1d69fd9b36d68,2024-02-16T19:28:59.943000 CVE-2023-50878,0,0,09d9775c521beb2bdbe6a10e9cce75ea90abd897c23ddc9c0ed036fdb98e2785,2024-01-05T16:21:46.253000 CVE-2023-50879,0,0,e7f635ec835f8af6e68324c638f96c217e373f3a3af9c80d6a7d36cc1662f020,2024-01-05T17:35:04.347000 -CVE-2023-5088,0,0,63218d0edf33fa7cd956d09f569a12a5f9e6a1dcd109cdbb04295ca6752b8231,2023-12-08T19:15:08.203000 +CVE-2023-5088,0,1,568d51164c9264fd994fc3b9ec65036bce17134420ca04c5ab028845c9aa43d8,2024-03-07T17:46:40.173000 CVE-2023-50880,0,0,45dfc20edf873b6f54c033b90d8b745bc998db6f75a866db44cd1e8a384e14b7,2024-01-05T17:36:02.743000 CVE-2023-50881,0,0,21fc9e5f06f2216fa2395fe2689d924b63b36b0b4cdf8b0f9c5260d788c328af,2024-01-05T17:37:29.017000 CVE-2023-50889,0,0,c1ad7d35b6d5afc074175b11fcf31e66a1f88510cc63a735f12500e424605271,2024-01-05T17:39:22.253000 @@ -235740,7 +235740,7 @@ CVE-2023-52399,0,0,37d927beb74e1ec97855b4601610f34d1a22a50030ec8f9612a6087d84ff0 CVE-2023-5240,0,0,7d5cd0fb5f88df14118e200bc681b22dfebb68caa308ed4d356fa96870c74385,2023-10-17T16:11:51.793000 CVE-2023-5241,0,0,35c07b59eeb8e5320751d006c11a71068c67265a473a9c681e74240ba9afa1bb,2023-12-22T19:02:58.717000 CVE-2023-52425,0,0,1145b8790151da9a533a17237f261953453044cf16039d08ab64a7c9289adaa5,2024-02-26T16:27:48.367000 -CVE-2023-52426,0,0,049f0e5fc4b83a1a59d05230d25941463cb3bb9a42ebd193de4616703027f9ad,2024-02-26T16:27:48.450000 +CVE-2023-52426,0,1,a83b975d267204be7bc0424d16dfb1a6cdd5c043e3c113cb1f287aa4ec1048f1,2024-03-07T17:15:11.893000 CVE-2023-52427,0,0,7b1268fe3c875e4de6b668786e2b70da182fd0ccf1ffa3ad115cfe60942d0759,2024-02-12T21:39:34.807000 CVE-2023-52428,0,0,2eeb582baad618917d7ab81e73c328480f805daca7410119b9e12d80dcec6fc7,2024-02-11T22:29:15.837000 CVE-2023-52429,0,0,cbf1a64bea07cad721a2d66b517d7675865722376214fa45ab2682c4a3ee0642,2024-02-26T21:15:57.833000 @@ -237184,7 +237184,7 @@ CVE-2023-6806,0,0,68d5cc1d96ec25c7ab186323c9b5003516462d40f7f679e830f007d1bc0e49 CVE-2023-6807,0,0,8211ca38107dc4f9b4127c6352451c7045672cf7336c16fcb14315bbd9ab0669,2024-02-27T14:21:27.377000 CVE-2023-6808,0,0,453d7720ba5e9cbfc061121430ec5679037ea2f22b990571ad72c0ac48f6ec8b,2024-02-09T16:49:29.023000 CVE-2023-6815,0,0,d97387eb71cb43fe6e993223b0683dbb82353c2109d50f7b045bdf1d8b203f4e,2024-02-14T04:15:08.497000 -CVE-2023-6816,0,0,32ab877fd6be57cefd857f2677ca6f2c4880d6c7ff598778c941b95eb6fea82c,2024-02-09T02:15:08.207000 +CVE-2023-6816,0,1,e7839a0ba60fd8f45333ca3d0c1da185b693b7e81293656670d077cc9777a76a,2024-03-07T17:15:12.180000 CVE-2023-6817,0,0,15a873d76f1c7613f3959855e73f950459b6718d3731740781c6b052a6a56c9a,2024-02-08T16:15:47.270000 CVE-2023-6824,0,0,8c6e875229d872169eb2bfb9390a02ca75cb4bc4bc222093fdb4ebb6a0125835,2024-01-23T15:35:27.123000 CVE-2023-6826,0,0,8033a5c072d463793e3b1a3dcb626312fffc26b8ea88b724da5c112e96daece5,2023-12-21T04:49:03.117000 @@ -237506,9 +237506,9 @@ CVE-2023-7234,0,0,23278876305e1d44b5315edea84989da2790a3c72b01a04cdbcb9933098a26 CVE-2023-7235,0,0,5a57373c824e0c960ebb1d7ed373397d379b4a945d30165f19c755e196b87393,2024-02-22T19:07:27.197000 CVE-2023-7237,0,0,34878d83edae1c68fbb7c6d0f9d3ee08547b03913d6b374f32337269fef1a0b4,2024-01-31T20:37:01.760000 CVE-2023-7238,0,0,7187ce9bc4d8ddad00e06886245b2e662c42772077283e0d271ebcd7974e5802,2024-01-30T14:20:10.613000 -CVE-2023-7242,0,0,ac54fdf54979c293dd37520f2380c2b680d40908ab92b74f6e8493e5f0606480,2024-03-01T22:22:25.913000 -CVE-2023-7243,0,0,8cc65c54f0098ba4a995839c6cccd1c17b6732fc5ad1174851a72e2070fae459,2024-03-01T22:22:25.913000 -CVE-2023-7244,0,0,62790636aed6fb491e7a1d387a840a32a418795c4896888dac3c252594a59108,2024-03-01T22:22:25.913000 +CVE-2023-7242,0,1,db2d6d5cc91868613ca46292b47ef3b5a3c4ae96f4def2aa8c9c1271db71c444,2024-03-07T17:50:48.090000 +CVE-2023-7243,0,1,c43192a066d4b9535821b574845a0af87800cbe78fe61a46f4663ee5807e93c6,2024-03-07T17:51:08.413000 +CVE-2023-7244,0,1,ba207e3262e0671e0b0b028bd6f1a9cad89868b7212853a50edc68e0c8b30845,2024-03-07T17:51:19 CVE-2023-7245,0,0,c2b129587df81b933ff7a681e47b41470d61b90df3071adf7be4cf4925974850,2024-02-20T19:50:53.960000 CVE-2024-0007,0,0,1173dcf63e36e77ef1ebddafdf32fafcec606695fbc0816f54b661f0aac88aac,2024-02-15T06:23:39.303000 CVE-2024-0008,0,0,9c41805289fe313f8323749103b11eb8b3211483db37513fd0baf5ed76da3178,2024-02-15T06:23:39.303000 @@ -237726,8 +237726,8 @@ CVE-2024-0402,0,0,2fe1b596353be20e61cfde75d3fd6588203ea2d19b7c21e2ce1c5a9ecc57cc CVE-2024-0403,0,0,ba0983060e2034b216b25cd26ed2bb024a7850bc1fcd95abc9a090d5040f7805,2024-03-01T14:04:26.010000 CVE-2024-0405,0,0,efdadcc35fc4ed87224ff4e930a96f9ee86e8b4ccb1a79f084616e91b90070e3,2024-01-24T17:23:09.773000 CVE-2024-0407,0,0,f3bc2895be8ea5b6951b82e45fc670b2af282e8da3ab8846004c7a5f8a8e92ad,2024-02-22T19:07:37.840000 -CVE-2024-0408,0,0,43985c336a03f402aeedabf908a000c648c1c236d0fbc08b82265b346c5d65c4,2024-02-09T02:15:08.383000 -CVE-2024-0409,0,0,05e7278f67c8a59552c587c9f2326e71048a786dc94c7b4128171258bb2dd76f,2024-02-09T02:15:08.533000 +CVE-2024-0408,0,1,4e3e81f52cf3d5178a7182e7de9f0301b287ec329828c0391a69e3034670a699,2024-03-07T17:15:12.400000 +CVE-2024-0409,0,1,34ebe0729ae458ad3578e4d18065a813c37b10bf9cf2255ae436410c7013521e,2024-03-07T17:15:12.540000 CVE-2024-0410,0,0,b7c9980392b1e84c96745fa2196deb8831d9dc73822058dbf4e5c03728818e2f,2024-03-04T20:25:41.347000 CVE-2024-0411,0,0,e9767f7a52a02ef643e56eda85bb59a185cc76378645ef12c7be1bf6ca802d4d,2024-02-29T01:43:10.490000 CVE-2024-0412,0,0,c54eefe6e0e0e016a8189e728b824cd56c9fce47b714f3340694ff726b377062,2024-02-29T01:43:10.580000 @@ -238056,7 +238056,7 @@ CVE-2024-0813,0,0,ff30ac3dc79b0550523d06b2455ee17a966f55c90b0406d419b89863b89f1a CVE-2024-0814,0,0,1d0403c9ecdba18257e6f96087bde1c50ad1c1389cfe686e29580d08cead7d2b,2024-01-29T14:27:48.647000 CVE-2024-0815,0,0,67504d7248aecf951936f1e6796ec6f3ce9a0c8a5636d40f121610e36b3c6614,2024-03-07T13:52:27.110000 CVE-2024-0817,0,0,4c9fa67064c61ab5b0da2ace15adecfc82aa106cf8469695bed0f2fd232ae5b4,2024-03-07T13:52:27.110000 -CVE-2024-0818,0,1,aab2d221f37c23ee7f2ec3782b2d9ede535f7fce09aa18f8f5fd767e46148b65,2024-03-07T15:15:08.147000 +CVE-2024-0818,0,0,aab2d221f37c23ee7f2ec3782b2d9ede535f7fce09aa18f8f5fd767e46148b65,2024-03-07T15:15:08.147000 CVE-2024-0819,0,0,84062588306c2d3f219b6045d8f0c99714b3fa9d659a191e940313afd7953da5,2024-02-27T14:19:41.650000 CVE-2024-0821,0,0,f9f03ada3b8baaa4211e4a983219e417254ecaad082f436ae6848b641d1ac399,2024-02-29T13:49:29.390000 CVE-2024-0822,0,0,f0d03b223c25850830b62db3595d4728a822efa091e187df2417c03c793bd8f4,2024-02-21T21:15:08.900000 @@ -238074,7 +238074,7 @@ CVE-2024-0841,0,0,00c1a87332bcc448f20d823e8d7d15c699f2b88301134bf45ff680384c84d2 CVE-2024-0842,0,0,2d4febcc0a5bd3f6b5f6eeeb222e1bdadfd7499df5c95fd0f9cc7e2a10a87dbd,2024-02-15T19:11:14.253000 CVE-2024-0844,0,0,9b0ede7ee0379ed34aa516e6f2cba464e96d05ae45278d47c03f7b0b4baaf7d5,2024-02-08T16:15:39.903000 CVE-2024-0849,0,0,ab143b9a0b5d37d266faac9cd54f50fee666b57f962e8e1bec5db73357a455f9,2024-02-13T19:16:30.810000 -CVE-2024-0853,0,0,1ec53e67ee9d5919be932b36d73918e7fb022ee23c3898bd3e3e19084b12a2f3,2024-02-16T15:17:48.757000 +CVE-2024-0853,0,1,72eb57fa9d91eeed9b78ea6861ab48b720d6a39710ade722cce53b9624df3bc8,2024-03-07T17:15:12.657000 CVE-2024-0854,0,0,b2a19a635a88b4ff68549abb31f11c392c07f9e329d9704350bbb3ee75810c41,2024-01-30T17:01:37.127000 CVE-2024-0855,0,0,fee06b61accc977f963cdb2b2ef743d4f7ee62d05033c371692bc8e3d7ebf823,2024-02-27T14:20:06.637000 CVE-2024-0859,0,0,ebdbbfb62fdac702a888e13ac2f08cf009b152778d43282d960af2d2fbc4e23d,2024-02-13T19:45:29.770000 @@ -238099,7 +238099,7 @@ CVE-2024-0907,0,0,701cea52331df058a887458bc81b02e5da4430df695e176c30a10532890709 CVE-2024-0909,0,0,7864e9d833556eb295eb67e87cebb39c8d9b11d41ed1f5327a80b30fe013438c,2024-02-08T20:07:51.410000 CVE-2024-0911,0,0,5f8186e1a077698fb2fa1e99d28cc6e32ac8b7b7afb205a3a02bc10c8ca698f0,2024-02-14T18:15:48.077000 CVE-2024-0914,0,0,e3ac9d00ae6383306423d8f717c5b50d1c543189340e8152c8f7c1506432b02e,2024-02-09T01:01:38.453000 -CVE-2024-0917,0,1,9f6cbf5481e96ae26ba65bdd4d5f7d686cf34db01c53a885ec0177a4776d8cbc,2024-03-07T15:15:08.257000 +CVE-2024-0917,0,0,9f6cbf5481e96ae26ba65bdd4d5f7d686cf34db01c53a885ec0177a4776d8cbc,2024-03-07T15:15:08.257000 CVE-2024-0918,0,0,7e821bad8b27a06490cf84c3eef2d84feef1a9067fdf8ec3e9a35926cc8cb97e,2024-02-29T01:43:31.073000 CVE-2024-0919,0,0,3b478c35c692e18b68fff4537fc7f547d639f4cb6c99e89e4f69456108d65167,2024-02-29T01:43:31.153000 CVE-2024-0920,0,0,1709552f07ed0300b748180c05eeff9fa877e00f39d37e36f650d0861249a53e,2024-02-29T01:43:31.233000 @@ -238375,6 +238375,7 @@ CVE-2024-1344,0,0,6e9ea80e9b1906095e19ebbcfe72bb26c4abf1a00053a32e3b2ac9d853412e CVE-2024-1345,0,0,edc14e21821ef700ebe0363d9d625110658b2ac84664f2109ac9f28db37f2b84,2024-02-20T19:50:53.960000 CVE-2024-1346,0,0,f9b1cf937db0cca6baf401ddf2b76ede34aff7f78d164647460f90ba78591111,2024-02-20T19:50:53.960000 CVE-2024-1349,0,0,67d4fc446dab701f6cac94b2ffa043e7391b89daca4d9149739a8dd94e1ed50d,2024-02-29T13:49:29.390000 +CVE-2024-1351,1,1,0cef1ae511ad560c983cbcfe3814f67aff9cc3acbba10e61386ba08f2ba7ffc9,2024-03-07T17:15:12.740000 CVE-2024-1353,0,0,853663be0a3764d75bc90d77c3fa1fa06bab948d2070b8859d35c2dce2f75df6,2024-02-29T01:43:49.133000 CVE-2024-1354,0,0,7e9a958865e30c89765260c45d4ae133e4c586a23883dff6b33b804192a001d2,2024-03-05T20:22:24.573000 CVE-2024-1355,0,0,dd36a54ac939524c987827d5cb09797409e1063b770f9d9a2dc86b1a7287f5d9,2024-03-05T20:22:38.100000 @@ -238417,6 +238418,7 @@ CVE-2024-1435,0,0,3d9157bea425ae0ccbf8fb80f8804820a71722fe736e6d6583f664e8ae632d CVE-2024-1436,0,0,89cc5ea7a7e1178a29adf59c2f4cf429bb9957790ab8a0265c3119401c784ce0,2024-02-26T16:32:25.577000 CVE-2024-1437,0,0,95b845910a840a20b7fa4620989917eab09ec6f88cd90b7d076b0bb6f7afcc4a,2024-02-29T13:49:29.390000 CVE-2024-1439,0,0,0872453f826d79b5bb50df9535aa030a513837aff169f1535b08260848c8b609,2024-02-12T14:19:54.330000 +CVE-2024-1442,1,1,128b5e04431df7e786adec72827e5f2f441ea50a6ce457805a0d546db7b10cae,2024-03-07T18:15:46.590000 CVE-2024-1443,0,0,715b4f1b1b036595e816d480c22f0394bab184a4b61631c3489044453d5f3bfb,2024-03-07T13:52:27.110000 CVE-2024-1444,0,0,56d4978632986301b509a1a8d65f888b9f13fd4ebe8f88db05c849bbae5ae999,2024-02-16T17:15:08.710000 CVE-2024-1445,0,0,74c7764f426ceaa1bf76f0a1b70674bbf7fb8a94e36e8d8e518e71fa4f86c32f,2024-02-29T13:49:29.390000 @@ -238960,7 +238962,7 @@ CVE-2024-21348,0,0,2f0da17b5d81bcad4a469c8de7565dbe161b35559ab267b8db95afce05a8d CVE-2024-21349,0,0,0bde696fc002ef8b21621e2874d326995f846f9433de704241e439d13339e84c,2024-02-13T18:22:58.333000 CVE-2024-2135,0,0,0e7ec41b09287f9e5eebd186f40b1f916e022c2d2f615c89b8bace6b4283e741,2024-03-04T13:58:23.447000 CVE-2024-21350,0,0,479d68a29fcf25b6a253ca04d86cad3a1ebed8b4cb1311171f1451c12c1d525d,2024-03-05T20:02:13.803000 -CVE-2024-21351,0,0,accd4e6cdbf5759d93aaea5bae77a891847606061d162914a1bf70b096d5892e,2024-02-15T02:00:01.653000 +CVE-2024-21351,0,1,7a48bfbc6a48523321bf61d371facac94a044f299f4405c4a4f7eed1aeeb604e,2024-03-07T17:48:52.180000 CVE-2024-21352,0,0,10bcf10d69b8d5f4c7cbc76bccdf708b902db66e46e1a6537556096436a2fffa,2024-03-05T18:54:26.843000 CVE-2024-21353,0,0,069ec1572ad8f80f7de702cc2ddaf6f315837c56bad7260abb2296947f3ace92,2024-02-27T19:45:28.470000 CVE-2024-21354,0,0,6be7f60c96e505d2d0d48d7cd874227816e97d1a763ccd038e009c4053923fa8,2024-02-13T18:22:58.333000 @@ -239013,7 +239015,7 @@ CVE-2024-21404,0,0,8aba03ed666ffd23124b08c87a2acd614c58649f26fe48e08bdfdea134622 CVE-2024-21405,0,0,7b2bcd85f8b75e36055a51e8d6e50e620fbb5da00673d7a82956b2dcc3d7e6dd,2024-02-22T17:57:19.810000 CVE-2024-21406,0,0,4926f610f67020e143f717a8966dfc594abc79953c895df1691f78cfff880f19,2024-03-01T22:57:15.940000 CVE-2024-21410,0,0,bd862af63cde79d77d3d96c08b20eb8ee12ef6b46d7738e8f98c5d9c8af65aee,2024-02-26T21:10:38.713000 -CVE-2024-21412,0,0,8a75d7e90f680d77013f86849427febcb5dbc45ab7c0755f94917e51501f4e93,2024-02-15T02:00:01.653000 +CVE-2024-21412,0,1,6df500642ad441e157d67f1fe17b6dc5155211f5565d89e1eed7797770fe5407,2024-03-07T17:48:58.173000 CVE-2024-21413,0,0,e8b53a5cd4bd3cc4178f808efd349017a89b016f9da30aa2b26e33753aaea59b,2024-02-23T21:04:05.710000 CVE-2024-21420,0,0,4a89fb64b6e21ff3e8e62b1263c75efc47583308c96cfb26d691252d4777d2ed,2024-02-13T18:22:43.577000 CVE-2024-21423,0,0,bdd3e5505bf37095cf28502668c3363668037784f8adcb8492701fb6ce5eb572,2024-02-26T13:42:22.567000 @@ -239477,6 +239479,7 @@ CVE-2024-22727,0,0,552f053e0e1c0024595d8b9c36096b73d98357dde818cb308f879c4f292f6 CVE-2024-22729,0,0,57c8e9cec7b5acfd3e659a660e85c84e7c6a8dee54d39c1d317d497e3590bfe9,2024-02-01T15:15:34.173000 CVE-2024-22749,0,0,28b47196f940e010ff68d16ae17a176c2008b3f3d80a9a233b85dddceddd9f34,2024-01-31T18:01:59.017000 CVE-2024-22751,0,0,ab17857cbf4a2c34d716834488e793a841a7a79f729d2c38db04d05bbf5a85f0,2024-01-30T21:18:23.127000 +CVE-2024-22752,1,1,617b937ee27ee889b8085c46785fee31250d3f6dfd60def49f6e5ed3b25a8b11,2024-03-07T18:15:46.810000 CVE-2024-22768,0,0,ba9cf2204f3f97d0818292d26d832ffe54135ea1c816ff09eb4adc0d121dff97,2024-01-29T15:50:06.730000 CVE-2024-22769,0,0,5e5bc2110f51bc548c6bae4c09b681eaa2d83c749bf7b8fa551acdf866c69a4b,2024-01-29T15:54:12.760000 CVE-2024-22770,0,0,f2a2a69cf9ce7d556b6b228c10722f7f9528f890b579414a4469048f6692bbc1,2024-01-29T15:53:41.323000 @@ -239603,10 +239606,10 @@ CVE-2024-23219,0,0,6138a00dd33e643c6da7ab985c8bb39139630ef127b2b12e557a72994a3a6 CVE-2024-23222,0,0,f33369aa9cec44a1ad31bb6d34cd20c739c85b243ce1438560b80098a06e2b7b,2024-02-29T08:15:46.907000 CVE-2024-23223,0,0,d780b4d6e2ed4fd16bbb8e5d6b950b4f66cdf843fe3ec44eff85a2bd755e98e1,2024-01-27T03:48:24.797000 CVE-2024-23224,0,0,8c8e9af636b106e202b7f940d165666567457368baa4cae37acc93fd6c8a64d2,2024-01-27T03:45:02.100000 -CVE-2024-23225,0,0,402741bef0a3563916ff7c9bc8cbedf60a443448609374051334e1db212f612a,2024-03-07T02:00:02.283000 +CVE-2024-23225,0,1,0940b4eb622a5ca08e9e82814e209e6830541c7304bbd3ac3e55186efb9661e9,2024-03-07T17:51:50.353000 CVE-2024-23243,0,0,c883edf88be24cb000066cd5d9f6fce63ff3cd1b907967baf9bcb4112a04838c,2024-03-06T15:18:08.093000 CVE-2024-23256,0,0,c655cd9ec538c6782627acb472c38f233867428eb6687fe294704e26cdb390af,2024-03-06T15:18:08.093000 -CVE-2024-23296,0,0,7e7bf20f93796575e206d9d1e355afb3fcc4aee575fe2298561fc68cd199377e,2024-03-07T02:00:02.283000 +CVE-2024-23296,0,1,c57d72763b186a63e442df0c81d825c3430bf4ffc66b86a75cb0d8a6f6cddae2,2024-03-07T17:52:12.170000 CVE-2024-23301,0,0,95f1c4c0d3c3f56beb5ca2f43c481bd416943d89ac106cdf8ea6bddea7fc220a,2024-02-21T03:15:08.950000 CVE-2024-23302,0,0,863344aa30e4660a85cb1dadb5cc739d77d5cca4411a54dffe0a3cc5e6d4c938,2024-02-29T13:49:29.390000 CVE-2024-23304,0,0,f4bc63f089c081f8de89565719320483c4f38e3af47af8e7dc8d4d30748891c3,2024-02-13T22:49:18.687000 @@ -239866,7 +239869,7 @@ CVE-2024-23893,0,0,ecb9213a2cdfa52079aa821524dfb1bb775fe26da56c79eae32e25ce922c0 CVE-2024-23894,0,0,4a83274aa71c12777419979ff96e6b220f9b5868499b10e181bd1420b2a29144,2024-02-15T10:15:20.110000 CVE-2024-23895,0,0,d59597dc18583f4069a00336744145b3a95cc3985b05876996e2842d836aeded,2024-02-15T10:15:20.403000 CVE-2024-23896,0,0,05098f39a53ae86a6319e8b4133c1254bf82ffe2a6f0f1c3c0bb46552d5cc3a9,2024-02-15T10:15:20.657000 -CVE-2024-23897,0,0,2f29b456fad948ef5aae408794f92ecbd663abb08ec87cd4fe153c14d23830f1,2024-02-29T11:15:08.647000 +CVE-2024-23897,0,1,52e5d4a522b850a631c21f9f4455068e9ae869bfa4d176c7f6db84f611c56ead,2024-03-07T17:47:35.020000 CVE-2024-23898,0,0,27c5368dff9cda77d4579c68aa3c6e2c647b0b454e5e30199a0592eead600202,2024-02-29T11:15:08.843000 CVE-2024-23899,0,0,7221f9efcd89ca48f9c6571bde7a7f417c82020935a02dda82803137a099714c,2024-01-31T18:43:39.183000 CVE-2024-23900,0,0,ffcf73f765e34eaa4d21dbbb66f11c097bdbe82c6c23f515de989ab74fdb5e2d,2024-01-31T17:20:14.777000 @@ -240418,7 +240421,7 @@ CVE-2024-25675,0,0,7eb120f8543ce89181641a0a8c791e82666c8e07d23577075c360f9dbf73d CVE-2024-25677,0,0,1d7f4f51208daa48b27418602ba1484337c537523201080701287445cfed0006,2024-02-15T19:43:24.983000 CVE-2024-25678,0,0,9470e3115b8c3f5b60b6b175aa8ef46b05e07e3f194ab4ff036467dbe264bd9e,2024-02-15T18:45:09.663000 CVE-2024-25679,0,0,224a0956154aafe3a65144732719712897f981c578a083f4eecb3f79135bc5a3,2024-02-15T18:44:40.547000 -CVE-2024-25710,0,0,98ade4ffa7aef75419a71990b81bf934b1fd86fbebd436fa569a732a370bfcf5,2024-02-22T15:24:45.240000 +CVE-2024-25710,0,1,ab520189ef240d987a199d6e814c3161f9be705f75e79c9ab42865a168e0f18f,2024-03-07T17:15:12.940000 CVE-2024-25711,0,0,d3f8257017dbfc5bdd6c4e4b8e295b2d28e0327c4086b62797abd4226251f28d,2024-02-27T14:20:06.637000 CVE-2024-25712,0,0,51de0f8ba1579ed685b4e63152564f2da5ea830e3b6201a5b430e6e0f9d5912b,2024-02-29T13:49:29.390000 CVE-2024-25713,0,0,82886cecbf7fc1474a5475d864f3cf6580d0ba42b5cd7356d033fc3fe3f82895,2024-02-29T13:49:29.390000 @@ -240558,7 +240561,7 @@ CVE-2024-26299,0,0,1afbf7f788ace8cba2c17888dbd26aca37a12f501fd6b7049b270edc1159b CVE-2024-26300,0,0,957ff2fceea083c23710802994700a4cf17bc21a9f298857e1101271f2e4ee8e,2024-02-28T14:06:45.783000 CVE-2024-26301,0,0,ca5ba4fc82d74473f58bbb8ab53e52870805c492ae0704dcd3113ae9fe8a11a4,2024-02-28T14:06:45.783000 CVE-2024-26302,0,0,af4ef1bb4da1c0ac0e7b0a0b03804bb031d31d0e464ca3573002ab0828a12d88,2024-02-28T14:06:45.783000 -CVE-2024-26308,0,0,1fb27c5235ff932b36ccef777a6cf311a453b9774c0b0ba421c55a05d725695f,2024-02-22T15:21:36.213000 +CVE-2024-26308,0,1,82b0ecfd78ac1924ca4de8327395ad25f7b35e7d9f3c5c23f6744c8d052e1727,2024-03-07T17:15:13.050000 CVE-2024-26310,0,0,cdf3231f7a059b92520dd591ab7449fe300f81e89c81c63cb479e44416fa612e,2024-02-22T19:07:27.197000 CVE-2024-26311,0,0,c10525456294b75c6b4919ba396921719972a7cc08a82934dcff79f6c0deabee,2024-02-22T19:07:27.197000 CVE-2024-26318,0,0,5a8434e81e693bc0f90a66d9a6d8655df17a4e5f3f1f4a63075d970f5e64fed9,2024-02-20T19:50:53.960000 @@ -240726,6 +240729,7 @@ CVE-2024-27689,0,0,f4ebc1e59160fdab518bfa3aa9af1f1ba832ce6045359e8a975bb23df8ccd CVE-2024-27692,0,0,96cf609944e6476718d8d1c519869d6f251f131a1b19ff614e15f00c454cdd33,2024-03-01T17:15:07.617000 CVE-2024-27694,0,0,f3214413fbbba6e4989cb23c7682c51f2973a0b48d2e319f7c34a38e30c11001,2024-03-05T13:41:01.900000 CVE-2024-27718,0,0,1278a2a8cee5a68342beae95f220d454fcd35e5e3853b311cb50bcc440948ebc,2024-03-05T13:41:01.900000 +CVE-2024-27733,1,1,f8f1c6d8c88b3e67a1f64356450ad60dd7a9b3cb717d1eb857d80e05f4c31c43,2024-03-07T17:15:13.120000 CVE-2024-27734,0,0,3c0f551c79bd519411a50f44170878bc190cec512cea2012a65cd2d3219a1ee2,2024-03-01T22:22:25.913000 CVE-2024-27743,0,0,6af784c89001e5e3304a051e2cbbb71e2daee0d197f297c681b1d37ee3f97874,2024-03-01T22:22:25.913000 CVE-2024-27744,0,0,678780b6b69944545a0d8cad148a51f5d84c2d7bab88f74324d94f2ee8805643,2024-03-01T22:22:25.913000