diff --git a/CVE-2022/CVE-2022-460xx/CVE-2022-46070.json b/CVE-2022/CVE-2022-460xx/CVE-2022-46070.json new file mode 100644 index 00000000000..0e340c10f96 --- /dev/null +++ b/CVE-2022/CVE-2022-460xx/CVE-2022-46070.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2022-46070", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-11T22:15:54.230", + "lastModified": "2024-03-11T22:15:54.230", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "GV-ASManager V6.0.1.0 contains a Local File Inclusion vulnerability in GeoWebServer via Path." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://s3.amazonaws.com/geovision_downloads/TechNotice/CyberSecurity/Security_Advistory_ASManager-ASM-2022-11.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-442xx/CVE-2023-44253.json b/CVE-2023/CVE-2023-442xx/CVE-2023-44253.json index d0dce0ca5a3..0dd840a7f72 100644 --- a/CVE-2023/CVE-2023-442xx/CVE-2023-44253.json +++ b/CVE-2023/CVE-2023-442xx/CVE-2023-44253.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44253", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-02-15T14:15:44.830", - "lastModified": "2024-02-20T21:05:07.937", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-11T22:15:54.337", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -175,6 +175,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-25j8-69h7-83h2", + "source": "psirt@fortinet.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1400.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1400.json new file mode 100644 index 00000000000..61f44b6597d --- /dev/null +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1400.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2024-1400", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-03-11T22:15:54.490", + "lastModified": "2024-03-11T22:15:54.490", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Mollie Forms plugin for WordPress is vulnerable to unauthorized post or page duplication due to a missing capability check on the duplicateForm function in all versions up to, and including, 2.6.3. This makes it possible for authenticated attackers, with subscriber access or higher, to duplicate arbitrary posts and pages." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3046896/mollie-forms/trunk/classes/Admin.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/43c4ca71-0bf0-4529-97d9-2349f96bbb9e?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1645.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1645.json new file mode 100644 index 00000000000..cd0085e097a --- /dev/null +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1645.json @@ -0,0 +1,51 @@ +{ + "id": "CVE-2024-1645", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-03-11T22:15:54.690", + "lastModified": "2024-03-11T22:15:54.690", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Mollie Forms plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the exportRegistrations function in all versions up to, and including, 2.6.3. This makes it possible for authenticated attackers, with subscriber access or higher, to export payment data collected by this plugin." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/mollie-forms/trunk/classes/Admin.php#L904", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3046896/mollie-forms/trunk/classes/Admin.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/353c244f-6d5d-47d6-988e-33da722a02f9?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25114.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25114.json new file mode 100644 index 00000000000..91f877b16f1 --- /dev/null +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25114.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-25114", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-03-11T22:15:54.870", + "lastModified": "2024-03-11T22:15:54.870", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Collabora Online is a collaborative online office suite based on LibreOffice technology. Each document in Collabora Online is opened by a separate \"Kit\" instance in a different \"jail\" with a unique directory \"jailID\" name. For security reasons, this directory name is randomly generated and should not be given out to the client. In affected versions of Collabora Online it is possible to use the CELL() function, with the \"filename\" argument, in the spreadsheet component to get a path which includes this JailID. The impact of this vulnerability in its own is low because it requires to be chained with another vulnerability. Users should upgrade to Collabora Online 23.05.9; Collabora Online 22.05.22; Collabora Online 21.11.10 or higher. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.6, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/CollaboraOnline/online/security/advisories/GHSA-2fh2-ppjf-p3xv", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/LibreOffice/online/blob/master/wsd/README", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25202.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25202.json index ffd061aae6c..dd1c2321995 100644 --- a/CVE-2024/CVE-2024-252xx/CVE-2024-25202.json +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25202.json @@ -2,19 +2,31 @@ "id": "CVE-2024-25202", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-28T20:15:41.810", - "lastModified": "2024-02-29T13:49:47.277", + "lastModified": "2024-03-11T22:15:55.080", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability in Phpgurukul User Registration & Login and User Management System 1.0 allows attackers to run arbitrary code via the search bar." + }, + { + "lang": "es", + "value": "Vulnerabilidad de cross-site scripting en Phpgurukul User Registration & Login y User Management System 1.0 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de la barra de b\u00fasqueda." } ], "metrics": {}, "references": [ + { + "url": "https://drive.google.com/file/d/1oMNcChsXPMP9pu9lIE2C11n8mzkmLhcY/view", + "source": "cve@mitre.org" + }, { "url": "https://github.com/Agampreet-Singh/CVE-2024-25202", "source": "cve@mitre.org" + }, + { + "url": "https://medium.com/%40agampreetsingh_93704/cve-2024-25202-discover-by-agampreet-singh-cyber-security-expert-ff8e32f5cf52", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25851.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25851.json index 760869865d3..4d340a3c718 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25851.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25851.json @@ -2,18 +2,22 @@ "id": "CVE-2024-25851", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-22T15:15:08.590", - "lastModified": "2024-02-22T19:07:27.197", + "lastModified": "2024-03-11T22:15:55.150", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Netis WF2780 v2.1.40144 was discovered to contain a command injection vulnerability via the config_sequence parameter in other_para of cgitest.cgi." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Netis WF2780 v2.1.40144 conten\u00eda una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro config_sequence en other_para de cgitest.cgi." } ], "metrics": {}, "references": [ { - "url": "https://github.com/no1rr/Vulnerability/blob/master/netis/igd_wps_set_wps_ap_ssid5g.md", + "url": "https://github.com/no1rr/Vulnerability/blob/master/netis/other_para_config_sequence.md", "source": "cve@mitre.org" }, { diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25854.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25854.json new file mode 100644 index 00000000000..8e346e0ae58 --- /dev/null +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25854.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25854", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-11T22:15:55.210", + "lastModified": "2024-03-11T22:15:55.210", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting (XSS) vulnerability in Sourcecodester Insurance Management System 1.0 allows attackers to run arbitrary code via the Subject and Description fields when submitting a support ticket." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/hakkitoklu/hunt/blob/main/Insurance%20Management%20System%20PHP%20and%20MySQL%201.0/xss.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27297.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27297.json new file mode 100644 index 00000000000..56d272661a5 --- /dev/null +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27297.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2024-27297", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-03-11T22:15:55.277", + "lastModified": "2024-03-11T22:15:55.277", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Nix is a package manager for Linux and other Unix systems. A fixed-output derivations on Linux can send file descriptors to files in the Nix store to another program running on the host (or another fixed-output derivation) via Unix domain sockets in the abstract namespace. This allows to modify the output of the derivation, after Nix has registered the path as \"valid\" and immutable in the Nix database. In particular, this allows the output of fixed-output derivations to be modified from their expected content. This issue has been addressed in versions 2.3.18 2.18.2 2.19.4 and 2.20.5. Users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/NixOS/nix/commit/f8170ce9f119e5e6724eb81ff1b5a2d4c0024000", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/NixOS/nix/security/advisories/GHSA-2ffj-w4mj-pg37", + "source": "security-advisories@github.com" + }, + { + "url": "https://hackmd.io/03UGerewRcy3db44JQoWvw", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27938.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27938.json new file mode 100644 index 00000000000..6a75b48cb17 --- /dev/null +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27938.json @@ -0,0 +1,67 @@ +{ + "id": "CVE-2024-27938", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-03-11T22:15:55.490", + "lastModified": "2024-03-11T22:15:55.490", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Postal is an open source SMTP server. Postal versions less than 3.0.0 are vulnerable to SMTP Smuggling attacks which may allow incoming e-mails to be spoofed. This, in conjunction with a cooperative outgoing SMTP service, would allow for an incoming e-mail to be received by Postal addressed from a server that a user has 'authorised' to send mail on their behalf but were not the genuine author of the e-mail. Postal is not affected for sending outgoing e-mails as email is re-encoded with `` line endings when transmitted over SMTP. This issue has been addressed and users should upgrade to Postal v3.0.0 or higher. Once upgraded, Postal will only accept End of DATA sequences which are explicitly `.`. If a non-compliant sequence is detected it will be logged to the SMTP server log. There are no workarounds for this issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-116" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/postalserver/postal/commit/0140dc4", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/postalserver/postal/security/advisories/GHSA-j42r-6c99-hqf2", + "source": "security-advisories@github.com" + }, + { + "url": "https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide", + "source": "security-advisories@github.com" + }, + { + "url": "https://www.postfix.org/smtp-smuggling.html", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28120.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28120.json new file mode 100644 index 00000000000..30ed30ac4f6 --- /dev/null +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28120.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2024-28120", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-03-11T22:15:55.707", + "lastModified": "2024-03-11T22:15:55.707", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "codeium-chrome is an open source code completion plugin for the chrome web browser. The service worker of the codeium-chrome extension doesn't check the sender when receiving an external message. This allows an attacker to host a website that will steal the user's Codeium api-key, and thus impersonate the user on the backend autocomplete server. This issue has not been addressed. Users are advised to monitor the usage of their API key." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + }, + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Exafunction/codeium-chrome/security/advisories/GHSA-8c7j-2h97-q63p", + "source": "security-advisories@github.com" + }, + { + "url": "https://securitylab.github.com/advisories/GHSL-2024-027_GHSL-2024-028_codeium-chrome", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 7c8471252cd..8154308f807 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-03-11T21:00:39.406916+00:00 +2024-03-11T23:00:38.168327+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-03-11T20:15:07.867000+00:00 +2024-03-11T22:15:55.707000+00:00 ``` ### Last Data Feed Release @@ -29,44 +29,30 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -241057 +241065 ``` ### CVEs added in the last Commit -Recently added CVEs: `49` +Recently added CVEs: `8` -* [CVE-2024-27210](CVE-2024/CVE-2024-272xx/CVE-2024-27210.json) (`2024-03-11T19:15:48.200`) -* [CVE-2024-27211](CVE-2024/CVE-2024-272xx/CVE-2024-27211.json) (`2024-03-11T19:15:48.247`) -* [CVE-2024-27212](CVE-2024/CVE-2024-272xx/CVE-2024-27212.json) (`2024-03-11T19:15:48.290`) -* [CVE-2024-27213](CVE-2024/CVE-2024-272xx/CVE-2024-27213.json) (`2024-03-11T19:15:48.333`) -* [CVE-2024-27218](CVE-2024/CVE-2024-272xx/CVE-2024-27218.json) (`2024-03-11T19:15:48.380`) -* [CVE-2024-27219](CVE-2024/CVE-2024-272xx/CVE-2024-27219.json) (`2024-03-11T19:15:48.423`) -* [CVE-2024-27220](CVE-2024/CVE-2024-272xx/CVE-2024-27220.json) (`2024-03-11T19:15:48.470`) -* [CVE-2024-27221](CVE-2024/CVE-2024-272xx/CVE-2024-27221.json) (`2024-03-11T19:15:48.513`) -* [CVE-2024-27222](CVE-2024/CVE-2024-272xx/CVE-2024-27222.json) (`2024-03-11T19:15:48.560`) -* [CVE-2024-27223](CVE-2024/CVE-2024-272xx/CVE-2024-27223.json) (`2024-03-11T19:15:48.603`) -* [CVE-2024-27224](CVE-2024/CVE-2024-272xx/CVE-2024-27224.json) (`2024-03-11T19:15:48.647`) -* [CVE-2024-27225](CVE-2024/CVE-2024-272xx/CVE-2024-27225.json) (`2024-03-11T19:15:48.693`) -* [CVE-2024-27226](CVE-2024/CVE-2024-272xx/CVE-2024-27226.json) (`2024-03-11T19:15:48.737`) -* [CVE-2024-27227](CVE-2024/CVE-2024-272xx/CVE-2024-27227.json) (`2024-03-11T19:15:48.783`) -* [CVE-2024-27228](CVE-2024/CVE-2024-272xx/CVE-2024-27228.json) (`2024-03-11T19:15:48.827`) -* [CVE-2024-27229](CVE-2024/CVE-2024-272xx/CVE-2024-27229.json) (`2024-03-11T19:15:48.873`) -* [CVE-2024-27230](CVE-2024/CVE-2024-272xx/CVE-2024-27230.json) (`2024-03-11T19:15:48.920`) -* [CVE-2024-27233](CVE-2024/CVE-2024-272xx/CVE-2024-27233.json) (`2024-03-11T19:15:48.963`) -* [CVE-2024-27234](CVE-2024/CVE-2024-272xx/CVE-2024-27234.json) (`2024-03-11T19:15:49.010`) -* [CVE-2024-27235](CVE-2024/CVE-2024-272xx/CVE-2024-27235.json) (`2024-03-11T19:15:49.057`) -* [CVE-2024-27236](CVE-2024/CVE-2024-272xx/CVE-2024-27236.json) (`2024-03-11T19:15:49.100`) -* [CVE-2024-27237](CVE-2024/CVE-2024-272xx/CVE-2024-27237.json) (`2024-03-11T19:15:49.143`) -* [CVE-2024-28187](CVE-2024/CVE-2024-281xx/CVE-2024-28187.json) (`2024-03-11T20:15:07.180`) -* [CVE-2024-28197](CVE-2024/CVE-2024-281xx/CVE-2024-28197.json) (`2024-03-11T20:15:07.420`) -* [CVE-2024-28198](CVE-2024/CVE-2024-281xx/CVE-2024-28198.json) (`2024-03-11T20:15:07.643`) +* [CVE-2022-46070](CVE-2022/CVE-2022-460xx/CVE-2022-46070.json) (`2024-03-11T22:15:54.230`) +* [CVE-2024-1400](CVE-2024/CVE-2024-14xx/CVE-2024-1400.json) (`2024-03-11T22:15:54.490`) +* [CVE-2024-1645](CVE-2024/CVE-2024-16xx/CVE-2024-1645.json) (`2024-03-11T22:15:54.690`) +* [CVE-2024-25114](CVE-2024/CVE-2024-251xx/CVE-2024-25114.json) (`2024-03-11T22:15:54.870`) +* [CVE-2024-25854](CVE-2024/CVE-2024-258xx/CVE-2024-25854.json) (`2024-03-11T22:15:55.210`) +* [CVE-2024-27297](CVE-2024/CVE-2024-272xx/CVE-2024-27297.json) (`2024-03-11T22:15:55.277`) +* [CVE-2024-27938](CVE-2024/CVE-2024-279xx/CVE-2024-27938.json) (`2024-03-11T22:15:55.490`) +* [CVE-2024-28120](CVE-2024/CVE-2024-281xx/CVE-2024-28120.json) (`2024-03-11T22:15:55.707`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `3` +* [CVE-2023-44253](CVE-2023/CVE-2023-442xx/CVE-2023-44253.json) (`2024-03-11T22:15:54.337`) +* [CVE-2024-25202](CVE-2024/CVE-2024-252xx/CVE-2024-25202.json) (`2024-03-11T22:15:55.080`) +* [CVE-2024-25851](CVE-2024/CVE-2024-258xx/CVE-2024-25851.json) (`2024-03-11T22:15:55.150`) ## Download and Usage diff --git a/_state.csv b/_state.csv index a0bc3597a53..c34bbc500f2 100644 --- a/_state.csv +++ b/_state.csv @@ -209571,6 +209571,7 @@ CVE-2022-4606,0,0,54f44bf17b152db6412582e0620f0d0d766b73e0cf752246d1889e46dfdb41 CVE-2022-46061,0,0,e12f29d073851846befcb6ddc0a8aeebc5b88c385ffa9ef2e9900f7efee0a2dd,2022-12-16T04:58:35.193000 CVE-2022-46062,0,0,9bef03e602aa56bdf2fbb6faa98b430909cedb29eb84d9140d248601473817cf,2022-12-15T20:45:59.180000 CVE-2022-4607,0,0,ecc800de303bf082ccb38774687d9ca7ef840a9b0ddfb82701e237dea167c365,2024-02-29T01:36:43.570000 +CVE-2022-46070,1,1,fe4956b2d976f0935f803d875d7d796d906356c46a75b0ef2668f3ad7f823e8f,2024-03-11T22:15:54.230000 CVE-2022-46071,0,0,7a67726ab997ec52a4e7bd2708959721f39adf6b34d769652d474b136f6d9adc,2023-01-30T17:55:05.703000 CVE-2022-46072,0,0,621b370c453c641a16374181b8390cdb58c53a4903182ee4e591d98ef5ab393f,2023-01-30T17:51:29.990000 CVE-2022-46073,0,0,227f1aeb0c53e4a98bac446a5a583c714a8f98436871914d7cd1143885446706,2023-01-30T17:53:04.420000 @@ -230969,7 +230970,7 @@ CVE-2023-44249,0,0,7387e716bd2e1cc406de3520c5be46766f483d26051fdb8ea949636183bf1 CVE-2023-44250,0,0,3165960603a0db493dd4bba12c66801115a708bb74106ce71e755ac95d8cd94b,2024-01-18T13:54:40.410000 CVE-2023-44251,0,0,bd1a17b69322ee4ca76a616eee193a48e03a05d52b59b86cb1a7bb5f086a4c4c,2023-12-18T17:34:13.253000 CVE-2023-44252,0,0,94a064c8dde2a48c821d76ba5ff49355e75fb89e696b24797a592b76a5d10d6e,2023-12-18T17:34:39.763000 -CVE-2023-44253,0,0,9fe7ce6297cd2656be31705e4db281bdbf85cee9a64c4360ec4292041f27aa3b,2024-02-20T21:05:07.937000 +CVE-2023-44253,0,1,6b3e47842a89f29dc874e9e41cc3e909f905cdc7556b0f7df66da75a99e5e3b0,2024-03-11T22:15:54.337000 CVE-2023-44256,0,0,aa0f77c63f0356ef60af907dc450171d7c84c072a82f6332b9d9a0abcfb1e015,2023-11-07T04:21:34.997000 CVE-2023-44257,0,0,68d84256e04941b1d334fa33279d70dbdb1db2130ae861e3da7aa2620b1f7b2e,2023-10-12T01:48:28.493000 CVE-2023-44259,0,0,771de690623dcac6253abdcdf5b192e27d10ab87f64c71e00fe342df44ce21fc,2023-10-12T00:41:15.513000 @@ -238453,6 +238454,7 @@ CVE-2024-1388,0,0,9f4f35daf92433c068c4ad0e3cff9f0fc31d7e6b5e8f690807686322bd29d2 CVE-2024-1389,0,0,62d171117c191cb5fc110201c06be5328bba09160ed0dc883ad2c72ee32b12f1,2024-02-29T13:49:29.390000 CVE-2024-1390,0,0,760bcdaac2db269a3249aaa20e58e1659b2977bdb995748ef5e46a1ecb85447f,2024-02-29T13:49:29.390000 CVE-2024-1398,0,0,7a7783e481aa897afa83bd125da0d53c431d5a5a9d43f1ade8b1e715449f59a0,2024-03-04T13:58:23.447000 +CVE-2024-1400,1,1,f6299283a45b3cd05cee7296f8542b5ec537d16aa49e22e35d7c4cc0482a71b4,2024-03-11T22:15:54.490000 CVE-2024-1402,0,0,f5ee948d1697d1774361c2691c46c88d302c6ae408ab90a865a59173f66ccaae,2024-02-15T18:42:03.397000 CVE-2024-1403,0,0,52ae0be80e56bab12c9eb7614c5934d9c3f91ac3ecccfb883ba911d569f9ab9b,2024-02-28T14:07:00.563000 CVE-2024-1404,0,0,1b49ab95872e7aebf44ce53f8bd207dc74e587353a926692e694bcd6ae3118fd,2024-02-29T01:43:49.687000 @@ -238549,6 +238551,7 @@ CVE-2024-1635,0,0,afdfc88a91b3e19c23e9baf0c4ef009675cb15f38c497a875cb9cabeec1970 CVE-2024-1636,0,0,110561fc2d8220a09cd098605d5d9c82332c44e2266859d6f751e2ed66576fc3,2024-02-28T14:06:45.783000 CVE-2024-1638,0,0,3d25792f560ad8670a55d542406f093195536acafd656ae4b3cd5fcca03c7380,2024-02-20T19:50:53.960000 CVE-2024-1644,0,0,258e0c2c60e2ead118c6bf409e3c4e6182303d86b8fb67135f0b03753d76fde4,2024-02-20T19:50:53.960000 +CVE-2024-1645,1,1,cf378ce5b0cc895a170b1c209bc4990efed5c31916053fb34d2b368507468957,2024-03-11T22:15:54.690000 CVE-2024-1647,0,0,54139a2a2a3a50db142faf8dcea4fe1dc96abdff85a01701062a380d090db1a3,2024-02-20T19:50:53.960000 CVE-2024-1648,0,0,df8581548207f098c521d901093d9d52c33a9f0520924af81b2273765446e0d5,2024-02-20T19:50:53.960000 CVE-2024-1649,0,0,cddd1d16a2fa649554e20977d58fb00396a226e17a846f01579d277dc429b938,2024-02-27T14:19:41.650000 @@ -239275,13 +239278,13 @@ CVE-2024-21983,0,0,ded146d4808fc5f83424e373b65cdad37794b676d9611f5162836ce6d86d8 CVE-2024-21984,0,0,c4d05388605f2fb7e341aa0197be1de56d0ddb669904fcfa6f2ad451633ba0ba,2024-02-20T19:51:05.510000 CVE-2024-21985,0,0,853a82d200092c0582c4290723b53256d943e3aa0955024d181a6e0dc05dbcae,2024-02-05T18:32:52.040000 CVE-2024-21987,0,0,5cbacef8d973a258493b6f3339adef8cd944a54f5ab54894a910d3add02dbf7c,2024-02-16T21:39:50.223000 -CVE-2024-22005,1,1,95add7290cd294e301bc690167e22af844b132815193f8b19ec7df20a64ad2b4,2024-03-11T19:15:47.120000 -CVE-2024-22006,1,1,db8c52ddfa9cd6c36377e5746f14e75a549f66708318384ecb84175ad610c7f4,2024-03-11T20:15:07.030000 -CVE-2024-22007,1,1,7560e61eadbef70d8229c48edb96bf7aed5aa04526dfcfbe8b59f370e32932f9,2024-03-11T19:15:47.233000 -CVE-2024-22008,1,1,aba9989dae8d7582f3835bd6d5800be61625fd3f6ea4ac8e0b6c7af5a6a8b06e,2024-03-11T19:15:47.280000 -CVE-2024-22009,1,1,85dd34e55b7f63503c3b71919c0381d0afaaf40b4a7ab9bf72f431026dd5f718,2024-03-11T19:15:47.320000 -CVE-2024-22010,1,1,8f08ddd17f796bf3db7b24856f6667b3f30b19adf576177d23f5829c5e76b1fa,2024-03-11T19:15:47.367000 -CVE-2024-22011,1,1,c63ee0310c45308632bed00d4bd5ef5bebfb63f149c74e8509442e70486e4592,2024-03-11T19:15:47.413000 +CVE-2024-22005,0,0,95add7290cd294e301bc690167e22af844b132815193f8b19ec7df20a64ad2b4,2024-03-11T19:15:47.120000 +CVE-2024-22006,0,0,db8c52ddfa9cd6c36377e5746f14e75a549f66708318384ecb84175ad610c7f4,2024-03-11T20:15:07.030000 +CVE-2024-22007,0,0,7560e61eadbef70d8229c48edb96bf7aed5aa04526dfcfbe8b59f370e32932f9,2024-03-11T19:15:47.233000 +CVE-2024-22008,0,0,aba9989dae8d7582f3835bd6d5800be61625fd3f6ea4ac8e0b6c7af5a6a8b06e,2024-03-11T19:15:47.280000 +CVE-2024-22009,0,0,85dd34e55b7f63503c3b71919c0381d0afaaf40b4a7ab9bf72f431026dd5f718,2024-03-11T19:15:47.320000 +CVE-2024-22010,0,0,8f08ddd17f796bf3db7b24856f6667b3f30b19adf576177d23f5829c5e76b1fa,2024-03-11T19:15:47.367000 +CVE-2024-22011,0,0,c63ee0310c45308632bed00d4bd5ef5bebfb63f149c74e8509442e70486e4592,2024-03-11T19:15:47.413000 CVE-2024-22012,0,0,3496e1376faff79bfb913c3511ac976ce741484efad2ac0961c5ff3c4bf8d282,2024-02-15T15:10:05.857000 CVE-2024-22016,0,0,72bb3341c866069974fe863b6c9e848e25809f5f0697d51cda8a3c348c9671f4,2024-02-07T17:33:12.727000 CVE-2024-22019,0,0,973223829547718a3f4f3bb4fa40a22f9bc1dc5683cd76da421f37d5d7095881,2024-02-20T19:50:53.960000 @@ -239858,7 +239861,7 @@ CVE-2024-2354,0,0,6474b9f1daec1a2dcc75cfc012fc15a1d60c7e19de88b7cedc44ae49b05d7a CVE-2024-2355,0,0,1ea896b23dde620508bb7022c8604ad2c803139cc978a2cbb0a4628b0582d758,2024-03-11T01:32:29.610000 CVE-2024-23550,0,0,233aa541fdda788f0e4e95c8a9a0a8f5d7fa7689dcd559af0cf5e5843a531076,2024-02-13T00:57:33.613000 CVE-2024-23553,0,0,51ea2d50cc1ff4dbab518de2a29e9ef6a91bd6b91073c23eb1a7f0cb7c8f1090,2024-02-10T00:59:00.423000 -CVE-2024-2357,1,1,f69d73d2e7168c49c56d452e4f16dd836760bc01104f34f037dddb40c85e8b5f,2024-03-11T20:15:07.867000 +CVE-2024-2357,0,0,f69d73d2e7168c49c56d452e4f16dd836760bc01104f34f037dddb40c85e8b5f,2024-03-11T20:15:07.867000 CVE-2024-23591,0,0,f4c08614f6a162f49ecc99f020c088036b0b565e06b57796e1304b45ae78e59d,2024-02-20T22:15:08.353000 CVE-2024-23603,0,0,fa877b171423c355baa3228ce2c605e41edbf822a3508567d7754cb447355052,2024-02-14T18:04:45.380000 CVE-2024-23605,0,0,6357ef47a85c4e22049db0926cbddeb8bbc82cdf2a1a81b5a28ca15d9cbb7aa0,2024-02-26T18:15:07.673000 @@ -240432,6 +240435,7 @@ CVE-2024-25110,0,0,24d08fbde056008d1573de20c59de5968ddecd641d43f19a3146bb63dda83 CVE-2024-25111,0,0,8d304b96b70aec61377c997bcf1349baefa2e910003e5b26a2a113712a3f02d6,2024-03-06T21:42:48.053000 CVE-2024-25112,0,0,9f92b56982d5d0e159eb7030e033a87c46cac6fe6908722221c7e2c374361051,2024-02-13T14:01:40.577000 CVE-2024-25113,0,0,e5d677582d1aad971970a68e649e33cfa2ee5186bf6cd06840ccc711efadc8c5,2024-02-17T22:15:46.660000 +CVE-2024-25114,1,1,ea667be1817401fae4fcbb24f0129b30a9d5ca8aa9ba946fe9467bf5b7a63a45,2024-03-11T22:15:54.870000 CVE-2024-25117,0,0,cce25568087f33e003e408ef917e795ca999bd847bf0523692770a2f14b70a2f,2024-02-22T19:07:27.197000 CVE-2024-25118,0,0,557c105a7b5782a478cbc7b92a63142660ddc2cae3207683e4d3fac47f331dc4,2024-02-14T13:59:35.580000 CVE-2024-25119,0,0,bbb39e4f066a0670237cfd7766ee329ec0be6e95761cf28e3f81545c0f84a41b,2024-02-14T13:59:35.580000 @@ -240472,7 +240476,7 @@ CVE-2024-25198,0,0,8b4024e60f871c76602fecb0152519496407fa53a46a195f21141146c8618 CVE-2024-25199,0,0,633725c6a8fb3b98edd79b77d04beba3772199f893fd1dc52d18b3d5b4d30d5a,2024-02-20T19:50:53.960000 CVE-2024-25200,0,0,1274a79d375d34fee92825da3e942b670613a4d255fa242e04ccd2d32c35b298,2024-02-15T15:22:25.980000 CVE-2024-25201,0,0,bfe46b1bf114bcec0e6979818328c95472b0f2a68d7c4d63c6c58cdf16d9a244,2024-02-15T15:21:30.993000 -CVE-2024-25202,0,0,52ed934ca9bb6d9c0d0b789533f981a256976f8cd333e77471a3775567e4bda5,2024-02-29T13:49:47.277000 +CVE-2024-25202,0,1,c422e9401b4db774c0f691c7b5ea2ed61f0503ab63d1f7e46beff47ddd901d16,2024-03-11T22:15:55.080000 CVE-2024-25207,0,0,522bd19ce7b2ddffc5be36f745ae847668b3400b09298028269262ddb75d3c09,2024-02-15T06:26:56.397000 CVE-2024-25208,0,0,742eb42fda465b287aa7e8d41245379c8031d383095e8531f215f5845758ed8a,2024-02-15T06:27:02.687000 CVE-2024-25209,0,0,44b8425e5bf16406937e1b3f814f6db05503cf2471da19fc8018aa7c48221faf,2024-02-14T16:13:16.563000 @@ -240664,7 +240668,8 @@ CVE-2024-25847,0,0,3ef11c19c61f974f609d7aad1c236864e0c5c70eed994d9ec6e1f8ca02f84 CVE-2024-25848,0,0,5895359e1a5386228352b229e7b9653c0bf0c5830f471332dfc6294d51c68c9c,2024-03-08T14:02:57.420000 CVE-2024-25849,0,0,fd6a8a3b861265723369727f5c31932283295a2905dc4ab7ca20ef4c116b9249,2024-03-08T14:02:57.420000 CVE-2024-25850,0,0,692066b7b812d3f581962a79e3b9fc15f6aba377d7bab52c8307a8f270f93599,2024-02-22T19:07:27.197000 -CVE-2024-25851,0,0,80e9be0d6a7053788297433ad38f07cfa16013d9c71aad70af25e756dbe8ac6c,2024-02-22T19:07:27.197000 +CVE-2024-25851,0,1,bd0046433b2fafcbbbb1e5febcb4c1f8638f8ee71fb735a659aa488f84a496bf,2024-03-11T22:15:55.150000 +CVE-2024-25854,1,1,1611908d390b3ffb8a04b3e4456ae3e747529a9d4befb6eeb0983cf67cec5dd5,2024-03-11T22:15:55.210000 CVE-2024-25858,0,0,e3703a6486af47542a5758b9a0dbed02e4c149644fb605d74af0ebc4b01ef273,2024-03-06T15:18:08.093000 CVE-2024-25859,0,0,535afe19fadca146fcb852c884e13f1f96dd0ffd0b267def3f0a58c94171106c,2024-02-29T13:49:47.277000 CVE-2024-25865,0,0,3c1600c9938d3c741a0c565875112497fc6aab8ca57710df7f556dbbd2f4c5d8,2024-03-04T13:58:23.447000 @@ -240710,16 +240715,16 @@ CVE-2024-25980,0,0,d14541c9bd05a1639b1a62b0f754591e13211a9cd13e14f154a9be2b3d087 CVE-2024-25981,0,0,b1e3e7b3112b200a12d00f066add816f7584aa68dc501d60e52b5fde4e625430,2024-02-29T03:15:07.267000 CVE-2024-25982,0,0,2ce9a54c1a7816fbeec4bd16145642068435e7c887fd25687a9f7d22cb5d12e6,2024-02-29T03:15:07.330000 CVE-2024-25983,0,0,ff154fc00e6515081197744006f01532137b922b6260f549c6b1a3e405b64cb0,2024-02-29T03:15:07.400000 -CVE-2024-25984,1,1,fa24a1d0575f4812ea69c48ccbc1fdc974868c8b4ea283f5ea86c12beccaa42c,2024-03-11T19:15:47.460000 -CVE-2024-25985,1,1,0ca4e4f4f7e07b9f40fa84f446a57a6f354b2f08ca426baedaeeae74a0262d4a,2024-03-11T19:15:47.513000 -CVE-2024-25986,1,1,35f724ac07762317864cb75b0cd0baa278b9e3095115d740aa78f14b94b0573b,2024-03-11T19:15:47.560000 -CVE-2024-25987,1,1,70e6b65b2ce7e61688758c616ebab00fae03b777d6a61741b83e75cb2d57ae93,2024-03-11T19:15:47.603000 -CVE-2024-25988,1,1,ce6e450eda03cb1041dcfd931464388d8064f92f66e692b8deb51942ecaeb992,2024-03-11T19:15:47.650000 -CVE-2024-25989,1,1,d548f640aa9f027469526f81efcc62bbdbba552065578f2fe3fa45c3012c1ccc,2024-03-11T19:15:47.697000 -CVE-2024-25990,1,1,9e138ffaad52d85463615618b6a4a2763965b5fa1f6c44fe92235c258fe6d279,2024-03-11T19:15:47.743000 -CVE-2024-25991,1,1,5b51dd67d56acb1790c815f7985917f74848324981ed3e8498b2fb33c0f9651b,2024-03-11T19:15:47.793000 -CVE-2024-25992,1,1,a7c311d727b6e94f9cb331f80e0a2d766bacc29a3421ebd6697ff5a902acf399,2024-03-11T19:15:47.840000 -CVE-2024-25993,1,1,d150b8d2fc6c187cd1644f9278d5030c67801b6cd620e5c9c609ae1b72f0e2f3,2024-03-11T19:15:47.883000 +CVE-2024-25984,0,0,fa24a1d0575f4812ea69c48ccbc1fdc974868c8b4ea283f5ea86c12beccaa42c,2024-03-11T19:15:47.460000 +CVE-2024-25985,0,0,0ca4e4f4f7e07b9f40fa84f446a57a6f354b2f08ca426baedaeeae74a0262d4a,2024-03-11T19:15:47.513000 +CVE-2024-25986,0,0,35f724ac07762317864cb75b0cd0baa278b9e3095115d740aa78f14b94b0573b,2024-03-11T19:15:47.560000 +CVE-2024-25987,0,0,70e6b65b2ce7e61688758c616ebab00fae03b777d6a61741b83e75cb2d57ae93,2024-03-11T19:15:47.603000 +CVE-2024-25988,0,0,ce6e450eda03cb1041dcfd931464388d8064f92f66e692b8deb51942ecaeb992,2024-03-11T19:15:47.650000 +CVE-2024-25989,0,0,d548f640aa9f027469526f81efcc62bbdbba552065578f2fe3fa45c3012c1ccc,2024-03-11T19:15:47.697000 +CVE-2024-25990,0,0,9e138ffaad52d85463615618b6a4a2763965b5fa1f6c44fe92235c258fe6d279,2024-03-11T19:15:47.743000 +CVE-2024-25991,0,0,5b51dd67d56acb1790c815f7985917f74848324981ed3e8498b2fb33c0f9651b,2024-03-11T19:15:47.793000 +CVE-2024-25992,0,0,a7c311d727b6e94f9cb331f80e0a2d766bacc29a3421ebd6697ff5a902acf399,2024-03-11T19:15:47.840000 +CVE-2024-25993,0,0,d150b8d2fc6c187cd1644f9278d5030c67801b6cd620e5c9c609ae1b72f0e2f3,2024-03-11T19:15:47.883000 CVE-2024-26016,0,0,225df2de732dbe1aa65450d758c74d9fd62d1571f14eb88fac267d40c0b495b0,2024-02-28T15:15:09.320000 CVE-2024-26128,0,0,487fd4a47ca7d01d688a4160da954eb7676a1080733cdfedc265ac6cf53a8666,2024-02-23T02:42:54.547000 CVE-2024-26129,0,0,968e60f64e57be6f8f2df784210f5788e81353ced4a4f4353953a10484d71d0a,2024-02-20T19:50:53.960000 @@ -240888,35 +240893,35 @@ CVE-2024-27139,0,0,66ddd9efc34252e5e972ac0e5a31e042faa3995b86c5ae6f0f108c10e1d7b CVE-2024-27140,0,0,34daddef6e0d13f2bea16bc1184887cdd01053137a36a3bc5699d2875c449127,2024-03-01T22:22:25.913000 CVE-2024-27198,0,0,e4259fe3d4611134ab5dfb0d4f88f5b563c21b8238f30b4253811838ad004753,2024-03-11T15:15:47.483000 CVE-2024-27199,0,0,3dd3bfb58b796a8c7735f0a6f342852f32998fc13795786d35eb3d4375df0417,2024-03-11T15:15:47.663000 -CVE-2024-27204,1,1,824209b6e9ba470551c63e3d3d81a08ab679d34202c3f3f5916084eff37ad745,2024-03-11T19:15:47.930000 -CVE-2024-27205,1,1,21b986f37fa2e8c4df712a0552119440cd4a6314ff7f4b19fc00174982caf0b1,2024-03-11T19:15:47.977000 -CVE-2024-27206,1,1,2103573414ee19bb9c7ebb35385d2ea9706e79e011c742fcc090d8a141ef03bf,2024-03-11T19:15:48.020000 -CVE-2024-27207,1,1,66bd21b251acb24164ef2e7ea08fbf76aae38b42f2e35a23032517537b813be8,2024-03-11T20:15:07.090000 -CVE-2024-27208,1,1,5c3466a9b81e5fff7160138c3417a94c41eb95f508f4229480f9baad77b094b4,2024-03-11T19:15:48.107000 -CVE-2024-27209,1,1,61f7901a575a445fbb10ff4a0ab07fc9b192a7c83a695674b0663d0cd049c420,2024-03-11T19:15:48.160000 -CVE-2024-27210,1,1,2bd436b550fbe76b4828b60f270f46944f2c7dda412c82bff13c64aa30e6430c,2024-03-11T19:15:48.200000 -CVE-2024-27211,1,1,c1191de0809b223fca72ae941a378c862efcf40de51620512bdd567502e5a9df,2024-03-11T19:15:48.247000 -CVE-2024-27212,1,1,c43ad32f935f60a51c45cc36e9a8b625c9a51c5add7e48b713d38ed5e86c7bb6,2024-03-11T19:15:48.290000 -CVE-2024-27213,1,1,03c341f084fce516200404f6cfa6d04f0c70c178b8fba117a9074592a21abf64,2024-03-11T19:15:48.333000 +CVE-2024-27204,0,0,824209b6e9ba470551c63e3d3d81a08ab679d34202c3f3f5916084eff37ad745,2024-03-11T19:15:47.930000 +CVE-2024-27205,0,0,21b986f37fa2e8c4df712a0552119440cd4a6314ff7f4b19fc00174982caf0b1,2024-03-11T19:15:47.977000 +CVE-2024-27206,0,0,2103573414ee19bb9c7ebb35385d2ea9706e79e011c742fcc090d8a141ef03bf,2024-03-11T19:15:48.020000 +CVE-2024-27207,0,0,66bd21b251acb24164ef2e7ea08fbf76aae38b42f2e35a23032517537b813be8,2024-03-11T20:15:07.090000 +CVE-2024-27208,0,0,5c3466a9b81e5fff7160138c3417a94c41eb95f508f4229480f9baad77b094b4,2024-03-11T19:15:48.107000 +CVE-2024-27209,0,0,61f7901a575a445fbb10ff4a0ab07fc9b192a7c83a695674b0663d0cd049c420,2024-03-11T19:15:48.160000 +CVE-2024-27210,0,0,2bd436b550fbe76b4828b60f270f46944f2c7dda412c82bff13c64aa30e6430c,2024-03-11T19:15:48.200000 +CVE-2024-27211,0,0,c1191de0809b223fca72ae941a378c862efcf40de51620512bdd567502e5a9df,2024-03-11T19:15:48.247000 +CVE-2024-27212,0,0,c43ad32f935f60a51c45cc36e9a8b625c9a51c5add7e48b713d38ed5e86c7bb6,2024-03-11T19:15:48.290000 +CVE-2024-27213,0,0,03c341f084fce516200404f6cfa6d04f0c70c178b8fba117a9074592a21abf64,2024-03-11T19:15:48.333000 CVE-2024-27215,0,0,651ced2c4948681508a9ad090546fd018840608eea0c7482bdd7848315ac417f,2024-02-21T18:15:52.060000 -CVE-2024-27218,1,1,a236b632a2aa002560982ee2fcebf0b8d15ed0fbb62beec1352a77ee182b13bb,2024-03-11T19:15:48.380000 -CVE-2024-27219,1,1,e78ab0ea8943a03430f4e2554a61777cdcad07704c3e2eb6adaadb83aeaf49f4,2024-03-11T19:15:48.423000 -CVE-2024-27220,1,1,ae7914dca545aa12d673285dc2b4ea6cde6e964c6435268aed8d7e17c22effad,2024-03-11T19:15:48.470000 -CVE-2024-27221,1,1,4d8e7e5e726bb9fee100153fa0c5d5b7e3d89796416f05a4afe0fdb21afdbd7a,2024-03-11T19:15:48.513000 -CVE-2024-27222,1,1,ff7739836f61380f5264fd6a30a21e1e40dc2117936cf4eba96e6c91793fbbb9,2024-03-11T19:15:48.560000 -CVE-2024-27223,1,1,c9252fd292973e8286614474bf8d5b60c5c0c39a521b624a9063dcda9dc9053a,2024-03-11T19:15:48.603000 -CVE-2024-27224,1,1,f168c98e661174930a9ebf515ace3a4f984cdd3a3b42c1b7bc24d8fe1afa5e41,2024-03-11T19:15:48.647000 -CVE-2024-27225,1,1,d37995bba00c59b1bb5527ed615f498fcf485bce505677152e600ef89a11719d,2024-03-11T19:15:48.693000 -CVE-2024-27226,1,1,b5c55e32c69a54e7db76c6bca2b37f2633a42147b4c19e52d7f6ccdab12461af,2024-03-11T19:15:48.737000 -CVE-2024-27227,1,1,cf39bcc17992e1f390364b159848486f290b1dd25d345367db152dcee8bfe11f,2024-03-11T20:15:07.137000 -CVE-2024-27228,1,1,bc9ab05120f5c79221abc807afeb677d440a6a97c101129fcdf9ef5f9fc2672f,2024-03-11T19:15:48.827000 -CVE-2024-27229,1,1,67c4acb2995c43da4f01f93ae6334c8559cf21aa1551e9e1895d15dde882ad51,2024-03-11T19:15:48.873000 -CVE-2024-27230,1,1,4f1f2d2153776ed5ed98a9e562d54ced7dc27861a96ae74576e37e3fa343b6e4,2024-03-11T19:15:48.920000 -CVE-2024-27233,1,1,eafb788de644bbe48248352ce855f8d67f92c631325eae857ceafed04d674dc9,2024-03-11T19:15:48.963000 -CVE-2024-27234,1,1,827c9d6dace72ad075eba6081b9a38dd5b71d2b454a21df757ad3aac74322bb3,2024-03-11T19:15:49.010000 -CVE-2024-27235,1,1,dde9ac25e3dc28ca1eb542e7721afb29f428c971e5de3c7b52f8a95c0a5d34fe,2024-03-11T19:15:49.057000 -CVE-2024-27236,1,1,282b94bf5a7d0d2e513a4bf96e41fe02f99a50dc299b4c04b5b554698e6d9893,2024-03-11T19:15:49.100000 -CVE-2024-27237,1,1,6e6c1327fba165e84802328ddd95f3b756fd6dd1ae76c621cb6fa8e9149e0d13,2024-03-11T19:15:49.143000 +CVE-2024-27218,0,0,a236b632a2aa002560982ee2fcebf0b8d15ed0fbb62beec1352a77ee182b13bb,2024-03-11T19:15:48.380000 +CVE-2024-27219,0,0,e78ab0ea8943a03430f4e2554a61777cdcad07704c3e2eb6adaadb83aeaf49f4,2024-03-11T19:15:48.423000 +CVE-2024-27220,0,0,ae7914dca545aa12d673285dc2b4ea6cde6e964c6435268aed8d7e17c22effad,2024-03-11T19:15:48.470000 +CVE-2024-27221,0,0,4d8e7e5e726bb9fee100153fa0c5d5b7e3d89796416f05a4afe0fdb21afdbd7a,2024-03-11T19:15:48.513000 +CVE-2024-27222,0,0,ff7739836f61380f5264fd6a30a21e1e40dc2117936cf4eba96e6c91793fbbb9,2024-03-11T19:15:48.560000 +CVE-2024-27223,0,0,c9252fd292973e8286614474bf8d5b60c5c0c39a521b624a9063dcda9dc9053a,2024-03-11T19:15:48.603000 +CVE-2024-27224,0,0,f168c98e661174930a9ebf515ace3a4f984cdd3a3b42c1b7bc24d8fe1afa5e41,2024-03-11T19:15:48.647000 +CVE-2024-27225,0,0,d37995bba00c59b1bb5527ed615f498fcf485bce505677152e600ef89a11719d,2024-03-11T19:15:48.693000 +CVE-2024-27226,0,0,b5c55e32c69a54e7db76c6bca2b37f2633a42147b4c19e52d7f6ccdab12461af,2024-03-11T19:15:48.737000 +CVE-2024-27227,0,0,cf39bcc17992e1f390364b159848486f290b1dd25d345367db152dcee8bfe11f,2024-03-11T20:15:07.137000 +CVE-2024-27228,0,0,bc9ab05120f5c79221abc807afeb677d440a6a97c101129fcdf9ef5f9fc2672f,2024-03-11T19:15:48.827000 +CVE-2024-27229,0,0,67c4acb2995c43da4f01f93ae6334c8559cf21aa1551e9e1895d15dde882ad51,2024-03-11T19:15:48.873000 +CVE-2024-27230,0,0,4f1f2d2153776ed5ed98a9e562d54ced7dc27861a96ae74576e37e3fa343b6e4,2024-03-11T19:15:48.920000 +CVE-2024-27233,0,0,eafb788de644bbe48248352ce855f8d67f92c631325eae857ceafed04d674dc9,2024-03-11T19:15:48.963000 +CVE-2024-27234,0,0,827c9d6dace72ad075eba6081b9a38dd5b71d2b454a21df757ad3aac74322bb3,2024-03-11T19:15:49.010000 +CVE-2024-27235,0,0,dde9ac25e3dc28ca1eb542e7721afb29f428c971e5de3c7b52f8a95c0a5d34fe,2024-03-11T19:15:49.057000 +CVE-2024-27236,0,0,282b94bf5a7d0d2e513a4bf96e41fe02f99a50dc299b4c04b5b554698e6d9893,2024-03-11T19:15:49.100000 +CVE-2024-27237,0,0,6e6c1327fba165e84802328ddd95f3b756fd6dd1ae76c621cb6fa8e9149e0d13,2024-03-11T19:15:49.143000 CVE-2024-27255,0,0,07d4523d50b3b6ceec1ed85c31e8859376bfd63a9732f2f4d2cf6e5b4c34b76b,2024-03-04T13:58:23.447000 CVE-2024-27278,0,0,2ef9546b6eb3a76ad70be700186038d995dd630654759ed72b9b3d10968f6d39,2024-03-06T15:18:08.093000 CVE-2024-27283,0,0,d0d6cc69e38ce7977029c4d3a011dff4f743808fa73bec6f0327124024522ffa,2024-02-22T19:07:27.197000 @@ -240928,6 +240933,7 @@ CVE-2024-27289,0,0,47af4bc7cdfd8b932586f8ab9b118be2b9049675bb63c3d42c32ea7c51cb1 CVE-2024-27294,0,0,1e7e6995898095f1d685eff7bc88643d7927f9fb3d48787703721f8c8c06100b,2024-03-01T14:04:26.010000 CVE-2024-27295,0,0,7b61bc68a0e7596ec39f45cf16eb56847e1e2291e2b9c36b655d40907b3609d3,2024-03-01T22:22:25.913000 CVE-2024-27296,0,0,efeac0d0835ce5e895a91174ac6e0936bc76da32bc1ae41fcb14571a12d2985d,2024-03-01T22:22:25.913000 +CVE-2024-27297,1,1,12baf4f69a16e3a9085769a61c18918da91db5e71583d869fbef36b2fba203b8,2024-03-11T22:15:55.277000 CVE-2024-27298,0,0,1aaf802a3586818726ce977e3c4d8b52b79c9b45f43876bfaeae085dddddd041,2024-03-01T22:22:25.913000 CVE-2024-27302,0,0,f49f7cb8056f6127ae14fec0cfff2d0bf177dfba1318b206d31d7b548bf3e9f5,2024-03-06T21:42:48.053000 CVE-2024-27303,0,0,5bf58561ed507a70ca73108a11218e0be9a2a377c18b42118ebe9af756d8ec79,2024-03-06T21:42:48.053000 @@ -241005,6 +241011,7 @@ CVE-2024-27915,0,0,e3ea2d621ba17649c82b1ac50772a17f6f4bcbc919f498c03dc3f90c544f5 CVE-2024-27917,0,0,af242c2d21e7486c1314f58994d4b13c43efcfe28649da8aeb5e5a5a818348df,2024-03-06T21:42:48.053000 CVE-2024-27929,0,0,39502b4a24aeb4ce49408f96b15d6d1bf553bf86f106f7b47d0609503cbda65d,2024-03-06T22:15:57.473000 CVE-2024-27931,0,0,edca36e5744b6d31feb40b55ed56762c342a513bdb2558b00d26097669ed2360,2024-03-05T18:50:18.333000 +CVE-2024-27938,1,1,c8ca69ce2258bdddcda67deec477d574172f24f3b31129c18250836627bd67c3,2024-03-11T22:15:55.490000 CVE-2024-27948,0,0,67e156b37ac5c6da6ca4063513792c829bdbe8e804f7b01b28e54c9fc1c182b2,2024-02-29T13:49:47.277000 CVE-2024-27949,0,0,12ee9b935394b527d1677a59b517c94d0df067a0b32bfff31d7cb2be5b4b5d00,2024-03-01T14:04:26.010000 CVE-2024-27950,0,0,56d632dad56c45d949d3327de16e5b70b08683cea8ce7876ca8c59cc37ee8062,2024-03-01T14:04:04.827000 @@ -241018,6 +241025,7 @@ CVE-2024-28097,0,0,ad0a3d7a6b96970687d28d32c41921c3200422c4265f25f269de512c4cb80 CVE-2024-28110,0,0,0aa63c709bee34101fee09332c67840fa8b7d5aea01ed58b7f238cd7f26f2f87,2024-03-07T13:52:27.110000 CVE-2024-28111,0,0,ef109000cb681b8950a504435d888106cd334990070bd9ca1f33bba165c1974a,2024-03-07T13:52:27.110000 CVE-2024-28115,0,0,3e0e705412ec4ecfb9fabefcb95634cd838a6bf7c9c03087d677ba199986f693,2024-03-08T14:02:57.420000 +CVE-2024-28120,1,1,4613f1ac8a551507991d8653bc519be257b1eb177402e232f9525bbbf7446e2f,2024-03-11T22:15:55.707000 CVE-2024-28122,0,0,3209f9a611aea4804720e8e5b4eeb3a02772982f302e787ac8040299af464092,2024-03-11T01:32:39.697000 CVE-2024-28149,0,0,bb1327eb2ceb44ae2cc8e952fde2f54b109f1740591e1ece1b912c644025402b,2024-03-06T21:42:54.697000 CVE-2024-28150,0,0,bd9c785686979f74fc956d3a9d80b65ba208ec849a10e17a7f0c9226761980a2,2024-03-06T21:42:54.697000 @@ -241038,9 +241046,9 @@ CVE-2024-28174,0,0,fa1674b985861bddf4d0ff5ab075ec0e4328a9665c668bfe339f9f0de580d CVE-2024-28176,0,0,5bb6d329167995170bd276a45554624691bdda8cbb6c83c2d08f42eba9f617aa,2024-03-11T01:32:39.697000 CVE-2024-28180,0,0,1e73ce45496cde15ab7710e8895a9f7d4caf4d2dcdb0d6de4d94afa753e9a64b,2024-03-11T01:32:39.697000 CVE-2024-28184,0,0,043b0bc7533d0fc96bb6df4be7b21b8477ffe807b0ac6ed0c4b06cf7d8241c3c,2024-03-11T01:32:39.697000 -CVE-2024-28187,1,1,6ad3874ba881443f641f39e3a3b8faab086575f93d3871aa198b7b52707f1e2f,2024-03-11T20:15:07.180000 -CVE-2024-28197,1,1,81a6695e3f35180411e9e1480d63884dec3c7546044011915077e5a9022c6f52,2024-03-11T20:15:07.420000 -CVE-2024-28198,1,1,b69b10822779767b360027621125c34db7967289e82c7e08b708ce0af64114c2,2024-03-11T20:15:07.643000 +CVE-2024-28187,0,0,6ad3874ba881443f641f39e3a3b8faab086575f93d3871aa198b7b52707f1e2f,2024-03-11T20:15:07.180000 +CVE-2024-28197,0,0,81a6695e3f35180411e9e1480d63884dec3c7546044011915077e5a9022c6f52,2024-03-11T20:15:07.420000 +CVE-2024-28198,0,0,b69b10822779767b360027621125c34db7967289e82c7e08b708ce0af64114c2,2024-03-11T20:15:07.643000 CVE-2024-28211,0,0,c1ed1ddd829861cccd703be6254c437e62099ef974f2a29a31d06b3aa407dda5,2024-03-07T13:52:27.110000 CVE-2024-28212,0,0,5a2751cb50b15d5c440d2b8966e76c727b56c2f7e1085394c9464fe62a449a7f,2024-03-07T13:52:27.110000 CVE-2024-28213,0,0,123dce2bcd1dc69568d6c5cbaff040ae81dbab0468f48456713cfbf9a03f5945,2024-03-07T13:52:27.110000