diff --git a/CVE-2022/CVE-2022-438xx/CVE-2022-43855.json b/CVE-2022/CVE-2022-438xx/CVE-2022-43855.json new file mode 100644 index 00000000000..fe953c5f79a --- /dev/null +++ b/CVE-2022/CVE-2022-438xx/CVE-2022-43855.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2022-43855", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-03-08T18:15:48.283", + "lastModified": "2024-03-08T18:15:48.283", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM SPSS Statistics 26.0, 27.0.1, and 28.0 could allow a local user to create multiple files that could exhaust the file handles capacity and cause a denial of service. IBM X-Force ID: 230235." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-399" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/239235", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7130881", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-329xx/CVE-2023-32969.json b/CVE-2023/CVE-2023-329xx/CVE-2023-32969.json new file mode 100644 index 00000000000..cc0d584b423 --- /dev/null +++ b/CVE-2023/CVE-2023-329xx/CVE-2023-32969.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-32969", + "sourceIdentifier": "security@qnapsecurity.com.tw", + "published": "2024-03-08T17:15:21.613", + "lastModified": "2024-03-08T17:15:21.613", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability has been reported to affect Network & Virtual Switch. If exploited, the vulnerability could allow authenticated administrators to inject malicious code via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQuTScloud c5.1.5.2651 and later\nQTS 5.1.4.2596 build 20231128 and later\nQuTS hero h5.1.4.2596 build 20231128 and later\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.qnap.com/en/security-advisory/qsa-24-11", + "source": "security@qnapsecurity.com.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-349xx/CVE-2023-34975.json b/CVE-2023/CVE-2023-349xx/CVE-2023-34975.json index 27c766a074f..d4824b30dd2 100644 --- a/CVE-2023/CVE-2023-349xx/CVE-2023-34975.json +++ b/CVE-2023/CVE-2023-349xx/CVE-2023-34975.json @@ -2,12 +2,12 @@ "id": "CVE-2023-34975", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2023-10-13T20:15:10.153", - "lastModified": "2023-10-18T19:54:57.237", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-08T17:15:21.860", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A SQL injection vulnerability has been reported to affect Video Station. If exploited, the vulnerability could allow authenticated users to inject malicious code via a network.\n\nWe have already fixed the vulnerability in the following version:\nVideo Station 5.7.0 ( 2023/07/27 ) and later\n" + "value": "An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute commands via a network.\nQuTScloud c5.1.x is not affected.\n\nWe have already fixed the vulnerability in the following versions:\nQuTS hero h4.5.4.2626 build 20231225 and later\nQTS 4.5.4.2627 build 20231225 and later\n" }, { "lang": "es", @@ -41,36 +41,36 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "LOW", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW", - "baseScore": 7.4, - "baseSeverity": "HIGH" + "baseScore": 6.6, + "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 3.1, + "exploitabilityScore": 2.3, "impactScore": 3.7 } ] }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "security@qnapsecurity.com.tw", "type": "Primary", "description": [ { "lang": "en", - "value": "CWE-89" + "value": "CWE-78" } ] }, { - "source": "security@qnapsecurity.com.tw", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { @@ -100,11 +100,8 @@ ], "references": [ { - "url": "https://www.qnap.com/en/security-advisory/qsa-23-52", - "source": "security@qnapsecurity.com.tw", - "tags": [ - "Vendor Advisory" - ] + "url": "https://www.qnap.com/en/security-advisory/qsa-24-12", + "source": "security@qnapsecurity.com.tw" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-349xx/CVE-2023-34980.json b/CVE-2023/CVE-2023-349xx/CVE-2023-34980.json new file mode 100644 index 00000000000..7ef1e48ddf2 --- /dev/null +++ b/CVE-2023/CVE-2023-349xx/CVE-2023-34980.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-34980", + "sourceIdentifier": "security@qnapsecurity.com.tw", + "published": "2024-03-08T17:15:22.117", + "lastModified": "2024-03-08T17:15:22.117", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute commands via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 4.5.4.2627 build 20231225 and later\nQuTS hero h4.5.4.2626 build 20231225 and later\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://www.qnap.com/en/security-advisory/qsa-24-12", + "source": "security@qnapsecurity.com.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38559.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38559.json index 0fe280a5697..9d4225b4138 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38559.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38559.json @@ -2,12 +2,16 @@ "id": "CVE-2023-38559", "sourceIdentifier": "secalert@redhat.com", "published": "2023-08-01T17:15:09.890", - "lastModified": "2023-12-21T01:39:50.027", + "lastModified": "2024-03-08T18:19:03.450", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A buffer overflow flaw was found in base/gdevdevn.c:1973 in devn_pcx_write_rle() in ghostscript. This issue may allow a local attacker to cause a denial of service via outputting a crafted PDF file for a DEVN device with gs." + }, + { + "lang": "es", + "value": "Se ha encontrado un fallo de desbordamiento de b\u00fafer en base/gdevdevn.c:1973 en devn_pcx_write_rle() en ghostscript. Este problema puede permitir a un atacante local provocar una denegaci\u00f3n de servicio mediante la salida de un archivo PDF manipulado para un dispositivo DEVN con gs." } ], "metrics": { @@ -85,8 +89,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:artifex:ghostscript:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E4876A23-725C-450E-B988-32FFF4DF53C1" + "criteria": "cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.02.0", + "matchCriteriaId": "EBC6F542-8555-4F26-9DE8-79EE02705173" } ] } diff --git a/CVE-2023/CVE-2023-472xx/CVE-2023-47221.json b/CVE-2023/CVE-2023-472xx/CVE-2023-47221.json new file mode 100644 index 00000000000..b804712c32a --- /dev/null +++ b/CVE-2023/CVE-2023-472xx/CVE-2023-47221.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-47221", + "sourceIdentifier": "security@qnapsecurity.com.tw", + "published": "2024-03-08T17:15:22.350", + "lastModified": "2024-03-08T17:15:22.350", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A path traversal vulnerability has been reported to affect Photo Station. If exploited, the vulnerability could allow authenticated administrators to read the contents of unexpected files and expose sensitive data via a network.\n\nWe have already fixed the vulnerability in the following version:\nPhoto Station 6.4.2 ( 2023/12/15 ) and later\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://www.qnap.com/en/security-advisory/qsa-24-13", + "source": "security@qnapsecurity.com.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6693.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6693.json index 2659c8c53fb..cf86a7014ff 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6693.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6693.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6693", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-02T10:15:08.930", - "lastModified": "2024-02-20T03:15:07.750", - "vulnStatus": "Modified", + "lastModified": "2024-03-08T17:57:54.067", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -89,8 +89,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6D9E0C78-9678-4CEE-9389-962CF618A51F" + "criteria": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.2.1", + "matchCriteriaId": "EF658C4B-28B2-4514-A3E6-8AE0F8028C53" } ] } @@ -120,6 +121,21 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + } + ] + } + ] } ], "references": [ @@ -140,11 +156,18 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGUN5HVOXESW7MSNM44E4AE2VNXQB6Y/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20240208-0004/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21899.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21899.json new file mode 100644 index 00000000000..fc59cfcfb59 --- /dev/null +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21899.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-21899", + "sourceIdentifier": "security@qnapsecurity.com.tw", + "published": "2024-03-08T17:15:22.587", + "lastModified": "2024-03-08T17:15:22.587", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An improper authentication vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to compromise the security of the system via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.3.2578 build 20231110 and later\nQTS 4.5.4.2627 build 20231225 and later\nQuTS hero h5.1.3.2578 build 20231110 and later\nQuTS hero h4.5.4.2626 build 20231225 and later\nQuTScloud c5.1.5.2651 and later\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://www.qnap.com/en/security-advisory/qsa-24-09", + "source": "security@qnapsecurity.com.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-219xx/CVE-2024-21900.json b/CVE-2024/CVE-2024-219xx/CVE-2024-21900.json new file mode 100644 index 00000000000..451c9a37361 --- /dev/null +++ b/CVE-2024/CVE-2024-219xx/CVE-2024-21900.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-21900", + "sourceIdentifier": "security@qnapsecurity.com.tw", + "published": "2024-03-08T17:15:22.793", + "lastModified": "2024-03-08T17:15:22.793", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to execute commands via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.3.2578 build 20231110 and later\nQuTS hero h5.1.3.2578 build 20231110 and later\nQuTScloud c5.1.5.2651 and later\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], + "references": [ + { + "url": "https://www.qnap.com/en/security-advisory/qsa-24-09", + "source": "security@qnapsecurity.com.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-219xx/CVE-2024-21901.json b/CVE-2024/CVE-2024-219xx/CVE-2024-21901.json new file mode 100644 index 00000000000..48e6e5e8d10 --- /dev/null +++ b/CVE-2024/CVE-2024-219xx/CVE-2024-21901.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-21901", + "sourceIdentifier": "security@qnapsecurity.com.tw", + "published": "2024-03-08T17:15:23.060", + "lastModified": "2024-03-08T17:15:23.060", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A SQL injection vulnerability has been reported to affect myQNAPcloud. If exploited, the vulnerability could allow authenticated administrators to inject malicious code via a network.\n\nWe have already fixed the vulnerability in the following versions:\nmyQNAPcloud 1.0.52 ( 2023/11/24 ) and later\nQTS 4.5.4.2627 build 20231225 and later\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.qnap.com/en/security-advisory/qsa-24-09", + "source": "security@qnapsecurity.com.tw" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 34764082cbc..74164d5d053 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-03-08T17:00:30.814419+00:00 +2024-03-08T19:00:38.279177+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-03-08T16:15:45.327000+00:00 +2024-03-08T18:19:03.450000+00:00 ``` ### Last Data Feed Release @@ -29,20 +29,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -240903 +240910 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `7` +* [CVE-2022-43855](CVE-2022/CVE-2022-438xx/CVE-2022-43855.json) (`2024-03-08T18:15:48.283`) +* [CVE-2023-32969](CVE-2023/CVE-2023-329xx/CVE-2023-32969.json) (`2024-03-08T17:15:21.613`) +* [CVE-2023-34980](CVE-2023/CVE-2023-349xx/CVE-2023-34980.json) (`2024-03-08T17:15:22.117`) +* [CVE-2023-47221](CVE-2023/CVE-2023-472xx/CVE-2023-47221.json) (`2024-03-08T17:15:22.350`) +* [CVE-2024-21899](CVE-2024/CVE-2024-218xx/CVE-2024-21899.json) (`2024-03-08T17:15:22.587`) +* [CVE-2024-21900](CVE-2024/CVE-2024-219xx/CVE-2024-21900.json) (`2024-03-08T17:15:22.793`) +* [CVE-2024-21901](CVE-2024/CVE-2024-219xx/CVE-2024-21901.json) (`2024-03-08T17:15:23.060`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `3` -* [CVE-2023-40834](CVE-2023/CVE-2023-408xx/CVE-2023-40834.json) (`2024-03-08T16:15:45.327`) +* [CVE-2023-34975](CVE-2023/CVE-2023-349xx/CVE-2023-34975.json) (`2024-03-08T17:15:21.860`) +* [CVE-2023-38559](CVE-2023/CVE-2023-385xx/CVE-2023-38559.json) (`2024-03-08T18:19:03.450`) +* [CVE-2023-6693](CVE-2023/CVE-2023-66xx/CVE-2023-6693.json) (`2024-03-08T17:57:54.067`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 1dbe6ba7200..8ee08a38dce 100644 --- a/_state.csv +++ b/_state.csv @@ -208201,6 +208201,7 @@ CVE-2022-43844,0,0,64b52e46485da277d23f45c74a497e84916aaeb51aa28b04d2a390ae43725 CVE-2022-43848,0,0,fac31056597308c762268366ea7a297addf705fa1f73d9908447a73f4e53bb06,2023-11-07T03:54:05.370000 CVE-2022-43849,0,0,7c426fb70bdad93cdcad7681114de041b9f72f571f626be13225e0b19e263a3f,2023-11-07T03:54:05.460000 CVE-2022-4385,0,0,4f0a7db659419811c611b703a580d64e3b846cb87691d4e5770205d4041c9bde,2023-11-07T03:57:43.257000 +CVE-2022-43855,1,1,cd56058316caa82a53c6a06f392aef9b8fa30f90ff8da28d97f7750f8f65577b,2024-03-08T18:15:48.283000 CVE-2022-43857,0,0,61a05df5bf9237fda8c303f460ad812542beb3d319544641b53e5b02a3c8e216,2023-11-07T03:54:05.533000 CVE-2022-43858,0,0,83764c4299953aa63641ddd4ca02bc0c14e1042f90b572c06b146b3872395a56,2023-11-07T03:54:05.623000 CVE-2022-43859,0,0,518a89bad4a28252257d5c43eeb66bd5f1c269428dbacbb5b1ea16e90ac70381,2023-11-07T03:54:05.727000 @@ -223427,6 +223428,7 @@ CVE-2023-32965,0,0,235dc50e34d94fda53fd52cf92e59d0a6810fc2fcfcde4d1fc415ac28cbc1 CVE-2023-32966,0,0,597e67fb688c3b6382c2106e1864f1a7b972f2d5942d7651ace5d9d760eb8195,2023-11-16T18:19:15.237000 CVE-2023-32967,0,0,181b27218357b9534779cdb617a10e522383a0b923ba29f6df31973b04619e04,2024-02-08T03:55:41.193000 CVE-2023-32968,0,0,e0e3203932bd5c2cae4d597f6fb3464bec9a76376136463bc5f51f591c37c0b0,2023-12-13T16:04:28.430000 +CVE-2023-32969,1,1,cd37904b09791fc4524c274d32267eb91ae0efdb611f001cd34e31155dddd066,2024-03-08T17:15:21.613000 CVE-2023-3297,0,0,bdc2281cfc41023b838180c774157d8a716a3d7af337bc811f0341db96b22aaf,2023-09-07T19:24:36.467000 CVE-2023-32970,0,0,510cae4df1837a83975acd1b60d22acd8dd436252d3a4bc93464dae609ac7c96,2023-10-19T15:42:09.663000 CVE-2023-32971,0,0,f4d4844ce6c5516bfbfe1e633ad9133a7a48dc4282d0a6faf0732a1c98152faf,2023-10-11T17:38:24.087000 @@ -224806,9 +224808,10 @@ CVE-2023-34970,0,0,4338100854cf10b564e95a512a7f16493468b899a841304dd3e6e766ac806 CVE-2023-34971,0,0,fc24a749d08fa8a1ce3a8b95ddc241081bbfe4207e7d3bb1855243b62e63b7f9,2023-08-31T18:00:43.533000 CVE-2023-34972,0,0,69a26211f51476ee392b7d4abd057d2f7828c64868a7de05c101f0625f9a9c9d,2023-08-31T18:03:09.587000 CVE-2023-34973,0,0,f68aca85275ce05f0fbe531390442b3da71ac526666e52c19361f7783ee94e7c,2023-08-31T12:53:25.140000 -CVE-2023-34975,0,0,152cfc98acf9051aa9b7c08c131e4535af07e0c20f615362725ff3dee3164641,2023-10-18T19:54:57.237000 +CVE-2023-34975,0,1,c2f8cc61527c3d551065566a9240619a988c176b62484cbdc024fe0a860ca45b,2024-03-08T17:15:21.860000 CVE-2023-34976,0,0,5131001d44215fbf6567ba24da1cee337910bce34005877b45a52b53b568190b,2023-10-18T19:56:09.990000 CVE-2023-34977,0,0,f407e0e78bac8cdac4341b319096090890204efa811b94d7dc7e015e84f7275b,2023-10-14T01:49:11.190000 +CVE-2023-34980,1,1,30af64598e02d65243adab4976fcf5959f2d7ec4bdb6cb16b9719edd85f575fd,2024-03-08T17:15:22.117000 CVE-2023-34981,0,0,062ef46b163862296e9ed1bca5960ed7403a1b91cf881145504cee2406f2d679,2023-07-21T19:20:13.337000 CVE-2023-34982,0,0,1643d79bda64e9dba285225b355d6509894d92e2ff5521c5d9e6ac2ed2a3bebc,2023-12-08T18:53:18.187000 CVE-2023-34983,0,0,9a814cf966879a80d37c939cbcec047f54a7ba180a88458acb5b920f76cf4013,2024-02-14T15:01:51.137000 @@ -227249,7 +227252,7 @@ CVE-2023-38555,0,0,8c8405db2d409590a65b4fc183f4e0340e2ffd7dfe59ee42a9144196bfab5 CVE-2023-38556,0,0,abb1cdb6f951547c2308b8a14c846037b57f3821eae2758105bc9aeb55abe8ff,2023-08-07T19:24:44.253000 CVE-2023-38557,0,0,3c02d41c246562bab51c2e54590175d287a509af53f67aced5ca9057d122a041,2023-09-21T16:12:01.620000 CVE-2023-38558,0,0,4b4ac2e45027370ce8b0c900380bc2c1308eafaecf4666a56a6f8d66b7525a1b,2023-09-20T14:03:07.620000 -CVE-2023-38559,0,0,a025f6953bde0030c0d82905db765c802b244bcb2473329b7dec00d94963c0b5,2023-12-21T01:39:50.027000 +CVE-2023-38559,0,1,d6209645fdbc9479f4db40b83a3b04c2f2d0bd0b9ab92683e1cb3ed7c0ca52d8,2024-03-08T18:19:03.450000 CVE-2023-3856,0,0,ae1a03c45d46ce9fd2c906750e7d6d401a3fb13d0940c838eaeef2a84c1fc522,2024-02-29T01:40:47.847000 CVE-2023-38560,0,0,12cc2e71fa2e51110c6b29060fa7fd5a72de9613fcbaa08910fd8eeafbf412b8,2023-11-07T04:17:21.293000 CVE-2023-38561,0,0,e014827b302d3427e7d59be3221147ac78547bbe2c1b58cb1de40fbae2ba6b8c,2024-02-14T15:01:46.050000 @@ -228857,7 +228860,7 @@ CVE-2023-40828,0,0,e590f3c1b22f85cd3298ee83689b29f544f9ef4d07425a62c409a3f5b33df CVE-2023-40829,0,0,fd3bcb485c64eaefc8e88c81ac3a4cab0a66e348cda55eb02c240e28ce95748d,2023-10-24T12:43:04.760000 CVE-2023-40830,0,0,7cebaa8f9657a38661861c1593f9f9f87a5249ada51c574d117156cdd308dbca,2023-10-06T15:28:43.257000 CVE-2023-40833,0,0,ab918ac3c6894844f8a1303498908d5db5b58827dccfbce9bc4ab34a4c014ac1,2023-12-07T15:11:51.220000 -CVE-2023-40834,0,1,a8b960e975c57058f119d92bbe4214c3030a030b22f31b7f82e1c728bcd333a4,2024-03-08T16:15:45.327000 +CVE-2023-40834,0,0,a8b960e975c57058f119d92bbe4214c3030a030b22f31b7f82e1c728bcd333a4,2024-03-08T16:15:45.327000 CVE-2023-40837,0,0,97c19b4ff5d71c9deb91e578d4be0cd3e2646e9f79c75cec925ee0e39f1c089b,2023-09-01T20:23:05.050000 CVE-2023-40838,0,0,3649882edbdcddad2a93bc8348753323676b137f52594777c96ed1aa0be27636,2023-09-01T20:12:42.427000 CVE-2023-40839,0,0,8ae3c259aade103219cfaf6e42605d961991f26a5490668fef781a8fe225def2,2023-09-07T14:14:25.523000 @@ -232784,6 +232787,7 @@ CVE-2023-47217,0,0,0de7f48fcd98fcf3c2b428cc85ea9683bfce2c5cb7bddb251389bffcb6bfe CVE-2023-47218,0,0,83f8f641f2a43b3801eefd155daa6a42bde9110b4e0363a3c306f27bd77e53d2,2024-02-15T06:15:45.653000 CVE-2023-47219,0,0,e8eae84b161278342455d307aea60fa5f5d2ae8ca233b52f68827fe747f9943a,2024-01-10T16:53:51.923000 CVE-2023-4722,0,0,ef30ac71f129b079c192b6627a10abdaff5edc734b113ae24fd97006cd6f3afa,2023-09-06T00:15:42.687000 +CVE-2023-47221,1,1,c2955f57f45ef0b979c5a139e027d69e33621605d507a830040dd09decc5de4a,2024-03-08T17:15:22.350000 CVE-2023-47223,0,0,c7133be7f530791bf8f940b059f72ce830c1340409edd7f4402c7f0942a2d39e,2023-11-14T21:10:45.890000 CVE-2023-47226,0,0,fc7520a0436a6f4a15179889507edc640f761b4dd395a1c99c7fbc0f33f7e05c,2023-11-14T21:10:29.973000 CVE-2023-47227,0,0,fc63057c5f7821e0b870c05e89e2cc15692adaa2baed471ae1e046f579540bb9,2023-11-14T21:10:01.587000 @@ -237107,7 +237111,7 @@ CVE-2023-6687,0,0,815f0c1fb11575859202e4f8339ba0c892dff8a36cd30b831f453e8fce3948 CVE-2023-6689,0,0,f525637daa23406ff158ff2d4d69ed0fb36c36685b0e4e4782d2006f17da667c,2023-12-29T19:29:33.807000 CVE-2023-6690,0,0,4a0a71b1ead07e18f281fc4661b8ad9c1c5894485cf3fc449f0f62ac342ca884,2023-12-29T19:21:45.180000 CVE-2023-6691,0,0,4508ab5df364506b806420a77fca83d065a1d8f25fe3acc54e1f9c114307cf91,2023-12-28T18:28:00.493000 -CVE-2023-6693,0,0,5cec3dd57ff3c1a646aad7fbe80cb339517da93176489f822da46dd45287e724,2024-02-20T03:15:07.750000 +CVE-2023-6693,0,1,6873a264484b094c8ce71cc1218181d85ec7b1708eb4e4c0806f70e884fa33d8,2024-03-08T17:57:54.067000 CVE-2023-6697,0,0,e4339138bfdad4a40ac5f595e1eff8e88fb25ea1f60bcfd83302475d5a5a44cb,2024-01-30T20:25:21.367000 CVE-2023-6699,0,0,9a17c40ae044b87058ba5cf6f205be27efddf5ec08f4e3c0c855e1346e832f36,2024-01-17T00:02:15.700000 CVE-2023-6700,0,0,febd44b44e68931da5556e3850b52d8ad5facf8c9b194d0da3f6a8bc0608cdf3,2024-02-09T16:38:05.687000 @@ -239207,6 +239211,9 @@ CVE-2024-21891,0,0,cb8571e56627caa87ef673c91152fcd88080674b3913f379f1f0ca0227546 CVE-2024-21892,0,0,e9e7cd547b9c865ef0f7d643a8d56e423d474c52d8079510bad9fcfef1233a4d,2024-02-20T19:50:53.960000 CVE-2024-21893,0,0,2d188d3c7852b895bab2eb60f33b22f9fc7e1606c5595723c82f7fae54df9f67,2024-02-01T02:00:01.187000 CVE-2024-21896,0,0,f2e89bd11f46e09b5e1cac8d09f61e5326ff446268c7f7ea5ae718519ecd8d4a,2024-02-20T19:50:53.960000 +CVE-2024-21899,1,1,58e53b91b481300fa98fc0614570a92ad74c2eddbc5731a10af3ad8bf24f3c0e,2024-03-08T17:15:22.587000 +CVE-2024-21900,1,1,9bb3d0d8ea20c68238e85cf6d41192f9737f7878fdd9bcf6f1608ccb0ac40dc0,2024-03-08T17:15:22.793000 +CVE-2024-21901,1,1,22348be6c7a2d713a5ebde4e8209ab5d7dbd087c85edb3acb5b09250b6627be3,2024-03-08T17:15:23.060000 CVE-2024-21907,0,0,e97acedaa5fff8f35a2639917d8b0e8affd6b5d126dc549f4b2d35936c62833b,2024-01-17T15:24:07.360000 CVE-2024-21908,0,0,329abb805b48ea46c40d9625a0e5a18857ae42d6b89a82f5c3cf797095821263,2024-01-08T19:46:41.157000 CVE-2024-21909,0,0,1862a33cb8cb7c096543042cface003ed2658c185ec7603674a262510a57f13e,2024-02-08T02:15:40.883000