From b4be1255c4ca565ae6b08c13e516dc108ea39999 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 21 Mar 2024 17:03:52 +0000 Subject: [PATCH] Auto-Update: 2024-03-21T17:01:03.199130+00:00 --- CVE-2023/CVE-2023-477xx/CVE-2023-47715.json | 60 +++++++++++++++++++++ CVE-2024/CVE-2024-13xx/CVE-2024-1394.json | 6 +-- CVE-2024/CVE-2024-24xx/CVE-2024-2463.json | 41 ++++++++++++++ CVE-2024/CVE-2024-24xx/CVE-2024-2464.json | 41 ++++++++++++++ CVE-2024/CVE-2024-24xx/CVE-2024-2465.json | 41 ++++++++++++++ CVE-2024/CVE-2024-24xx/CVE-2024-2494.json | 4 +- CVE-2024/CVE-2024-279xx/CVE-2024-27993.json | 56 +++++++++++++++++++ CVE-2024/CVE-2024-279xx/CVE-2024-27994.json | 56 +++++++++++++++++++ CVE-2024/CVE-2024-279xx/CVE-2024-27995.json | 56 +++++++++++++++++++ CVE-2024/CVE-2024-288xx/CVE-2024-28834.json | 4 +- CVE-2024/CVE-2024-292xx/CVE-2024-29243.json | 21 ++++++++ CVE-2024/CVE-2024-292xx/CVE-2024-29244.json | 21 ++++++++ CVE-2024/CVE-2024-298xx/CVE-2024-29866.json | 4 +- CVE-2024/CVE-2024-298xx/CVE-2024-29870.json | 4 +- CVE-2024/CVE-2024-298xx/CVE-2024-29871.json | 4 +- CVE-2024/CVE-2024-298xx/CVE-2024-29872.json | 4 +- CVE-2024/CVE-2024-298xx/CVE-2024-29873.json | 4 +- CVE-2024/CVE-2024-298xx/CVE-2024-29874.json | 4 +- CVE-2024/CVE-2024-298xx/CVE-2024-29875.json | 4 +- CVE-2024/CVE-2024-298xx/CVE-2024-29876.json | 4 +- CVE-2024/CVE-2024-298xx/CVE-2024-29877.json | 4 +- CVE-2024/CVE-2024-298xx/CVE-2024-29878.json | 4 +- CVE-2024/CVE-2024-298xx/CVE-2024-29879.json | 4 +- CVE-2024/CVE-2024-298xx/CVE-2024-29880.json | 4 +- README.md | 48 ++++++++++------- _state.csv | 39 ++++++++------ 26 files changed, 477 insertions(+), 65 deletions(-) create mode 100644 CVE-2023/CVE-2023-477xx/CVE-2023-47715.json create mode 100644 CVE-2024/CVE-2024-24xx/CVE-2024-2463.json create mode 100644 CVE-2024/CVE-2024-24xx/CVE-2024-2464.json create mode 100644 CVE-2024/CVE-2024-24xx/CVE-2024-2465.json create mode 100644 CVE-2024/CVE-2024-279xx/CVE-2024-27993.json create mode 100644 CVE-2024/CVE-2024-279xx/CVE-2024-27994.json create mode 100644 CVE-2024/CVE-2024-279xx/CVE-2024-27995.json create mode 100644 CVE-2024/CVE-2024-292xx/CVE-2024-29243.json create mode 100644 CVE-2024/CVE-2024-292xx/CVE-2024-29244.json diff --git a/CVE-2023/CVE-2023-477xx/CVE-2023-47715.json b/CVE-2023/CVE-2023-477xx/CVE-2023-47715.json new file mode 100644 index 00000000000..157eca63120 --- /dev/null +++ b/CVE-2023/CVE-2023-477xx/CVE-2023-47715.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2023-47715", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-03-21T15:15:07.593", + "lastModified": "2024-03-21T15:24:35.093", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Storage Protect Plus Server 10.1.0 through 10.1.16 could allow an authenticated user with read-only permissions to add or delete entries from an existing HyperVisor configuration. IBM X-Force ID: 271538." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-264" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/271538", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7144861", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1394.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1394.json index dd069085639..b5584687ad3 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1394.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1394.json @@ -2,13 +2,13 @@ "id": "CVE-2024-1394", "sourceIdentifier": "secalert@redhat.com", "published": "2024-03-21T13:00:08.037", - "lastModified": "2024-03-21T13:00:08.037", - "vulnStatus": "Received", + "lastModified": "2024-03-21T15:24:35.093", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs\u200b. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey\u200b and ctx\u200b. That function uses named return parameters to free pkey\u200b and ctx\u200b if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the \"return nil, nil, fail(...)\" pattern, meaning that pkey\u200b and ctx\u200b will be nil inside the deferred function that should free them." + "value": "A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs?. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey? and ctx?. That function uses named return parameters to free pkey? and ctx? if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the \"return nil, nil, fail(...)\" pattern, meaning that pkey? and ctx? will be nil inside the deferred function that should free them." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2463.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2463.json new file mode 100644 index 00000000000..176c489bf33 --- /dev/null +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2463.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2024-2463", + "sourceIdentifier": "cvd@cert.pl", + "published": "2024-03-21T15:16:54.417", + "lastModified": "2024-03-21T15:24:35.093", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Weak password recovery mechanism in CDeX application allows to retrieve\u00a0password\u00a0reset token.This issue affects CDeX application versions through 5.7.1.\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-640" + } + ] + } + ], + "references": [ + { + "url": "https://cdex.cloud/", + "source": "cvd@cert.pl" + }, + { + "url": "https://cert.pl/en/posts/2024/03/CVE-2024-2463/", + "source": "cvd@cert.pl" + }, + { + "url": "https://cert.pl/posts/2024/03/CVE-2024-2463/", + "source": "cvd@cert.pl" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2464.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2464.json new file mode 100644 index 00000000000..88aca066f38 --- /dev/null +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2464.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2024-2464", + "sourceIdentifier": "cvd@cert.pl", + "published": "2024-03-21T15:16:54.490", + "lastModified": "2024-03-21T15:24:35.093", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users.This issue affects CDeX application versions through 5.7.1.\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], + "references": [ + { + "url": "https://cdex.cloud/", + "source": "cvd@cert.pl" + }, + { + "url": "https://cert.pl/en/posts/2024/03/CVE-2024-2463/", + "source": "cvd@cert.pl" + }, + { + "url": "https://cert.pl/posts/2024/03/CVE-2024-2463/", + "source": "cvd@cert.pl" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2465.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2465.json new file mode 100644 index 00000000000..69e77d9458e --- /dev/null +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2465.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2024-2465", + "sourceIdentifier": "cvd@cert.pl", + "published": "2024-03-21T15:16:54.553", + "lastModified": "2024-03-21T15:24:35.093", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Open redirection vulnerability in CDeX application\u00a0allows to redirect users to arbitrary websites via a specially crafted URL.This issue affects CDeX application versions through 5.7.1.\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://cdex.cloud/", + "source": "cvd@cert.pl" + }, + { + "url": "https://cert.pl/en/posts/2024/03/CVE-2024-2463/", + "source": "cvd@cert.pl" + }, + { + "url": "https://cert.pl/posts/2024/03/CVE-2024-2463/", + "source": "cvd@cert.pl" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2494.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2494.json index 30038cbe219..47025c2b476 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2494.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2494.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2494", "sourceIdentifier": "secalert@redhat.com", "published": "2024-03-21T14:15:10.350", - "lastModified": "2024-03-21T14:15:10.350", - "vulnStatus": "Received", + "lastModified": "2024-03-21T15:24:35.093", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27993.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27993.json new file mode 100644 index 00000000000..7872aa89ad2 --- /dev/null +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27993.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-27993", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-21T15:16:53.697", + "lastModified": "2024-03-21T15:24:35.093", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Typps Calendarista Basic Edition.This issue affects Calendarista Basic Edition: from n/a through 3.0.2.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/calendarista-basic-edition/wordpress-calendarista-basic-edition-plugin-3-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27994.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27994.json new file mode 100644 index 00000000000..42291812a88 --- /dev/null +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27994.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-27994", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-21T15:16:53.950", + "lastModified": "2024-03-21T15:24:35.093", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in YITH YITH WooCommerce Product Add-Ons allows Reflected XSS.This issue affects YITH WooCommerce Product Add-Ons: from n/a through 4.5.0.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/yith-woocommerce-product-add-ons/wordpress-yith-woocommerce-product-add-ons-plugin-4-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27995.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27995.json new file mode 100644 index 00000000000..015f3a02dda --- /dev/null +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27995.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-27995", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-21T15:16:54.133", + "lastModified": "2024-03-21T15:24:35.093", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Repute Infosystems ARMember \u2013 Membership Plugin, Content Restriction, Member Levels, User Profile & User signup allows Stored XSS.This issue affects ARMember \u2013 Membership Plugin, Content Restriction, Member Levels, User Profile & User signup: from n/a through 4.0.23.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/armember-membership/wordpress-armember-plugin-4-0-23-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28834.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28834.json index 7c473b66594..5d8107a2f51 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28834.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28834.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28834", "sourceIdentifier": "secalert@redhat.com", "published": "2024-03-21T14:15:07.547", - "lastModified": "2024-03-21T14:15:07.547", - "vulnStatus": "Received", + "lastModified": "2024-03-21T15:24:35.093", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29243.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29243.json new file mode 100644 index 00000000000..82af935872c --- /dev/null +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29243.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-29243", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-21T15:16:54.320", + "lastModified": "2024-03-21T15:24:35.093", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Shenzhen Libituo Technology Co., Ltd LBT-T300-mini v1.2.9 was discovered to contain a buffer overflow via the vpn_client_ip parameter at /apply.cgi." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/AdamRitz/lbtvul/blob/main/t300mini-2.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29244.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29244.json new file mode 100644 index 00000000000..4ab2136f4ce --- /dev/null +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29244.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-29244", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-21T15:16:54.377", + "lastModified": "2024-03-21T15:24:35.093", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Shenzhen Libituo Technology Co., Ltd LBT-T300-mini v1.2.9 was discovered to contain a buffer overflow via the pin_code_3g parameter at /apply.cgi." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/AdamRitz/lbtvul/blob/main/t300mini-2.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29866.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29866.json index bd12d2ac8c9..3092a6581bf 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29866.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29866.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29866", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-21T14:15:07.810", - "lastModified": "2024-03-21T14:15:07.810", - "vulnStatus": "Received", + "lastModified": "2024-03-21T15:24:35.093", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29870.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29870.json index 87d5a4f8202..374c90ad6cc 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29870.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29870.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29870", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-03-21T14:15:07.867", - "lastModified": "2024-03-21T14:15:07.867", - "vulnStatus": "Received", + "lastModified": "2024-03-21T15:24:35.093", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29871.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29871.json index 5ec77bf6bf7..d826b6dece1 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29871.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29871.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29871", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-03-21T14:15:08.080", - "lastModified": "2024-03-21T14:15:08.080", - "vulnStatus": "Received", + "lastModified": "2024-03-21T15:24:35.093", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29872.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29872.json index f56310da7fc..3cfa9f44eff 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29872.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29872.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29872", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-03-21T14:15:08.313", - "lastModified": "2024-03-21T14:15:08.313", - "vulnStatus": "Received", + "lastModified": "2024-03-21T15:24:35.093", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29873.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29873.json index a706f931242..6932dc88bb6 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29873.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29873.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29873", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-03-21T14:15:08.520", - "lastModified": "2024-03-21T14:15:08.520", - "vulnStatus": "Received", + "lastModified": "2024-03-21T15:24:35.093", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29874.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29874.json index 75169a30c2e..dbee661a0b0 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29874.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29874.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29874", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-03-21T14:15:08.767", - "lastModified": "2024-03-21T14:15:08.767", - "vulnStatus": "Received", + "lastModified": "2024-03-21T15:24:35.093", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29875.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29875.json index 1b308044be3..ba254605cb6 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29875.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29875.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29875", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-03-21T14:15:08.980", - "lastModified": "2024-03-21T14:15:08.980", - "vulnStatus": "Received", + "lastModified": "2024-03-21T15:24:35.093", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29876.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29876.json index 4455b2635df..1be59105b29 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29876.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29876.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29876", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-03-21T14:15:09.163", - "lastModified": "2024-03-21T14:15:09.163", - "vulnStatus": "Received", + "lastModified": "2024-03-21T15:24:35.093", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29877.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29877.json index 4a0c9d7a885..58b61ee6fa4 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29877.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29877.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29877", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-03-21T14:15:09.353", - "lastModified": "2024-03-21T14:15:09.353", - "vulnStatus": "Received", + "lastModified": "2024-03-21T15:24:35.093", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29878.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29878.json index 7a41934b26e..a7414a6c35f 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29878.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29878.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29878", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-03-21T14:15:09.593", - "lastModified": "2024-03-21T14:15:09.593", - "vulnStatus": "Received", + "lastModified": "2024-03-21T15:24:35.093", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29879.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29879.json index b7dca7cae74..ce924b23df9 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29879.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29879.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29879", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-03-21T14:15:09.817", - "lastModified": "2024-03-21T14:15:09.817", - "vulnStatus": "Received", + "lastModified": "2024-03-21T15:24:35.093", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29880.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29880.json index 6306d380a83..2a0e498b3cc 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29880.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29880.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29880", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-03-21T14:15:10.077", - "lastModified": "2024-03-21T14:15:10.077", - "vulnStatus": "Received", + "lastModified": "2024-03-21T15:24:35.093", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/README.md b/README.md index 3c1ab23ef03..a3211303d42 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-03-21T15:01:01.490580+00:00 +2024-03-21T17:01:03.199130+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-03-21T14:15:10.350000+00:00 +2024-03-21T15:24:35.093000+00:00 ``` ### Last Data Feed Release @@ -29,33 +29,43 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -242338 +242347 ``` ### CVEs added in the last Commit -Recently added CVEs: `14` +Recently added CVEs: `9` -* [CVE-2024-2494](CVE-2024/CVE-2024-24xx/CVE-2024-2494.json) (`2024-03-21T14:15:10.350`) -* [CVE-2024-28834](CVE-2024/CVE-2024-288xx/CVE-2024-28834.json) (`2024-03-21T14:15:07.547`) -* [CVE-2024-29866](CVE-2024/CVE-2024-298xx/CVE-2024-29866.json) (`2024-03-21T14:15:07.810`) -* [CVE-2024-29870](CVE-2024/CVE-2024-298xx/CVE-2024-29870.json) (`2024-03-21T14:15:07.867`) -* [CVE-2024-29871](CVE-2024/CVE-2024-298xx/CVE-2024-29871.json) (`2024-03-21T14:15:08.080`) -* [CVE-2024-29872](CVE-2024/CVE-2024-298xx/CVE-2024-29872.json) (`2024-03-21T14:15:08.313`) -* [CVE-2024-29873](CVE-2024/CVE-2024-298xx/CVE-2024-29873.json) (`2024-03-21T14:15:08.520`) -* [CVE-2024-29874](CVE-2024/CVE-2024-298xx/CVE-2024-29874.json) (`2024-03-21T14:15:08.767`) -* [CVE-2024-29875](CVE-2024/CVE-2024-298xx/CVE-2024-29875.json) (`2024-03-21T14:15:08.980`) -* [CVE-2024-29876](CVE-2024/CVE-2024-298xx/CVE-2024-29876.json) (`2024-03-21T14:15:09.163`) -* [CVE-2024-29877](CVE-2024/CVE-2024-298xx/CVE-2024-29877.json) (`2024-03-21T14:15:09.353`) -* [CVE-2024-29878](CVE-2024/CVE-2024-298xx/CVE-2024-29878.json) (`2024-03-21T14:15:09.593`) -* [CVE-2024-29879](CVE-2024/CVE-2024-298xx/CVE-2024-29879.json) (`2024-03-21T14:15:09.817`) -* [CVE-2024-29880](CVE-2024/CVE-2024-298xx/CVE-2024-29880.json) (`2024-03-21T14:15:10.077`) +* [CVE-2023-47715](CVE-2023/CVE-2023-477xx/CVE-2023-47715.json) (`2024-03-21T15:15:07.593`) +* [CVE-2024-2463](CVE-2024/CVE-2024-24xx/CVE-2024-2463.json) (`2024-03-21T15:16:54.417`) +* [CVE-2024-2464](CVE-2024/CVE-2024-24xx/CVE-2024-2464.json) (`2024-03-21T15:16:54.490`) +* [CVE-2024-2465](CVE-2024/CVE-2024-24xx/CVE-2024-2465.json) (`2024-03-21T15:16:54.553`) +* [CVE-2024-27993](CVE-2024/CVE-2024-279xx/CVE-2024-27993.json) (`2024-03-21T15:16:53.697`) +* [CVE-2024-27994](CVE-2024/CVE-2024-279xx/CVE-2024-27994.json) (`2024-03-21T15:16:53.950`) +* [CVE-2024-27995](CVE-2024/CVE-2024-279xx/CVE-2024-27995.json) (`2024-03-21T15:16:54.133`) +* [CVE-2024-29243](CVE-2024/CVE-2024-292xx/CVE-2024-29243.json) (`2024-03-21T15:16:54.320`) +* [CVE-2024-29244](CVE-2024/CVE-2024-292xx/CVE-2024-29244.json) (`2024-03-21T15:16:54.377`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `15` +* [CVE-2024-1394](CVE-2024/CVE-2024-13xx/CVE-2024-1394.json) (`2024-03-21T15:24:35.093`) +* [CVE-2024-2494](CVE-2024/CVE-2024-24xx/CVE-2024-2494.json) (`2024-03-21T15:24:35.093`) +* [CVE-2024-28834](CVE-2024/CVE-2024-288xx/CVE-2024-28834.json) (`2024-03-21T15:24:35.093`) +* [CVE-2024-29866](CVE-2024/CVE-2024-298xx/CVE-2024-29866.json) (`2024-03-21T15:24:35.093`) +* [CVE-2024-29870](CVE-2024/CVE-2024-298xx/CVE-2024-29870.json) (`2024-03-21T15:24:35.093`) +* [CVE-2024-29871](CVE-2024/CVE-2024-298xx/CVE-2024-29871.json) (`2024-03-21T15:24:35.093`) +* [CVE-2024-29872](CVE-2024/CVE-2024-298xx/CVE-2024-29872.json) (`2024-03-21T15:24:35.093`) +* [CVE-2024-29873](CVE-2024/CVE-2024-298xx/CVE-2024-29873.json) (`2024-03-21T15:24:35.093`) +* [CVE-2024-29874](CVE-2024/CVE-2024-298xx/CVE-2024-29874.json) (`2024-03-21T15:24:35.093`) +* [CVE-2024-29875](CVE-2024/CVE-2024-298xx/CVE-2024-29875.json) (`2024-03-21T15:24:35.093`) +* [CVE-2024-29876](CVE-2024/CVE-2024-298xx/CVE-2024-29876.json) (`2024-03-21T15:24:35.093`) +* [CVE-2024-29877](CVE-2024/CVE-2024-298xx/CVE-2024-29877.json) (`2024-03-21T15:24:35.093`) +* [CVE-2024-29878](CVE-2024/CVE-2024-298xx/CVE-2024-29878.json) (`2024-03-21T15:24:35.093`) +* [CVE-2024-29879](CVE-2024/CVE-2024-298xx/CVE-2024-29879.json) (`2024-03-21T15:24:35.093`) +* [CVE-2024-29880](CVE-2024/CVE-2024-298xx/CVE-2024-29880.json) (`2024-03-21T15:24:35.093`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 0ef4a3652f8..d6f6e2284a1 100644 --- a/_state.csv +++ b/_state.csv @@ -233215,6 +233215,7 @@ CVE-2023-47705,0,0,e3d4b068cec26511f3145778a695a8a2080173336ca900c2cb1d02fe4260e CVE-2023-47706,0,0,0cfaecc187d4236dd38d13dc0e25752f35e7adc63caac950330b0f64c0b0d36d,2023-12-22T10:11:40.633000 CVE-2023-47707,0,0,c0b40bcf5eaa712d14fa41e4477281db7d00ecb46e35f8e08b13ff46eeb7db79,2023-12-22T10:00:51.667000 CVE-2023-4771,0,0,d0a9b68633cdbf963bbdd2b3878793c4ef1f150510595f6b4aa4f9d063a414b2,2023-11-28T19:09:05.517000 +CVE-2023-47715,1,1,0c6694596606d941ea5afe5ea7b27770e5a0d9728d61ef06d70df0e6fcec99f2,2024-03-21T15:24:35.093000 CVE-2023-47716,0,0,62bb7b17d2839b029f6ac267e0b09b92e0e697ce278d1faccc537c28ae26ec06,2024-03-01T14:04:26.010000 CVE-2023-47718,0,0,c741441681738efc3979d67da4409868f353d29cc92314f5037f92d0809304bd,2024-01-24T21:23:15.540000 CVE-2023-4772,0,0,cfd718e5f5f861c90ad1b1b61b69dbfa920c9351e02c2667625b5fa349288ce0,2023-11-07T04:22:57.827000 @@ -238774,7 +238775,7 @@ CVE-2024-1390,0,0,760bcdaac2db269a3249aaa20e58e1659b2977bdb995748ef5e46a1ecb8544 CVE-2024-1391,0,0,d263861df201411e95604a0f8dea4a32aa5aa465f14e9d3ee26c7cf1dddcea30,2024-03-13T18:15:58.530000 CVE-2024-1392,0,0,854e6aa0a85eb7f6e01984f9f2b39f09c3e464c67a90f670cafc735773e56736,2024-03-13T18:15:58.530000 CVE-2024-1393,0,0,139d32a27df25f29abc2bcda3159db69b338e05c68d7680abed80afd815e8ff5,2024-03-13T18:15:58.530000 -CVE-2024-1394,0,0,0a23089c4be2fb9578409d22ba1cb72a18b442f1853d1ebf0f27f82a8e874c2f,2024-03-21T13:00:08.037000 +CVE-2024-1394,0,1,294b053d2ffc51433a2d64e8d98c3ac8a415fb04eaae593428f7a34b72b8edc5,2024-03-21T15:24:35.093000 CVE-2024-1397,0,0,e6d8c9c2beca75d3fdc5f918cb423cf21913a9c807f46126d5b49c29c7bd60f0,2024-03-13T12:33:51.697000 CVE-2024-1398,0,0,7a7783e481aa897afa83bd125da0d53c431d5a5a9d43f1ade8b1e715449f59a0,2024-03-04T13:58:23.447000 CVE-2024-1400,0,0,295a10f36c3e13d694d09cafc6872c0c48f9e2b4c87da0889327ecdac7abe4ac,2024-03-12T12:40:13.500000 @@ -240882,6 +240883,9 @@ CVE-2024-24593,0,0,155720893bd9aa302467d506c561d7f3174f3ae580a95d8dad9c1ee6fc9e6 CVE-2024-24594,0,0,2d1d6ef3edb6eea27d760a77187cf0f21d8b0e3aa5e2b1e9eb45515b37617cb4,2024-02-15T16:47:17.213000 CVE-2024-24595,0,0,53aa45116d4573f7c0b646b17e4787137c5ab03b6e722457f3ddd917489c99e4,2024-02-13T14:08:55.650000 CVE-2024-2460,0,0,ae8df8f819284d0f0ea1a2589261357f393234fec195be42118065d37d02123d,2024-03-20T13:00:16.367000 +CVE-2024-2463,1,1,d32eed22bf8a5fcf19609631d56de6b5b6d90eae3a6bf9f710f87e5bdc1555f5,2024-03-21T15:24:35.093000 +CVE-2024-2464,1,1,56f44447e0d256990841443a68df981cd7582a3850793a83bd5ba95f65e47e1c,2024-03-21T15:24:35.093000 +CVE-2024-2465,1,1,2a77d33e3025e3f4f2328d9cfb33df2ea3c6a07d249ae9c526b18aebbde46668,2024-03-21T15:24:35.093000 CVE-2024-24680,0,0,00c6b06cbd399fac9a1cb69a45fdeee991ea9572aae73c195704c3555b436eb7,2024-02-15T18:46:48.693000 CVE-2024-24681,0,0,705110c1a0575ef95794934b23101ccc4a6f384f7c61c4db9f4dbf9a8c528dd4,2024-02-26T13:42:22.567000 CVE-2024-24683,0,0,5dcfcb131b936f6ead6cae5418b28b2fe1bb1011c1c921fe73c5d9bd261bf34a,2024-03-19T13:26:46 @@ -241057,7 +241061,7 @@ CVE-2024-24936,0,0,b40cba45486310464826445db58797cda9708090ef629993d6b65c1322a94 CVE-2024-24937,0,0,c158a1376665515fcdd077ebbbc61196266e17dfca3642cdd3f2b284922e7576,2024-02-09T01:05:30.783000 CVE-2024-24938,0,0,919f0844348072e68674027ea0a3644c0c8fc392a786b352b8f3abde920f1f60,2024-02-09T01:05:13.527000 CVE-2024-24939,0,0,b2b5d03f9e7db36f290b4e039454a0e87440b3b4044776d74739544bb234180a,2024-02-09T01:04:16.577000 -CVE-2024-2494,1,1,63f261f20581d4b36948213d752abea41e22762bf93a52da0bccbbbbb8d98c6b,2024-03-21T14:15:10.350000 +CVE-2024-2494,0,1,84ede45321bf48443a2c564f3d4c5fb0def59051719248e3d2f74255b0f14448,2024-03-21T15:24:35.093000 CVE-2024-24940,0,0,3b807f9711835fcb1381b61d94808660dccf6fdaaa44b568b18928314f306783,2024-02-07T23:45:31.493000 CVE-2024-24941,0,0,3ce7539cc2c00ca21eaf8843bb8dfa494f8daac6c677d25fe85a072b680aec63,2024-02-09T01:05:05.250000 CVE-2024-24942,0,0,98967e5f253d2f0e2d6c9adde01d5feb324664bac3fce3b7b875de585c5550eb,2024-02-09T01:03:13.453000 @@ -242053,6 +242057,9 @@ CVE-2024-27961,0,0,3162bfbc67900a83a9b4114dba265e7189f0bad8c0ddf2d85f6724674d135 CVE-2024-27974,0,0,c5d12161a6a294fb4d33a068888d07d2dec693f9073d8d47f06182bf4fe2779a,2024-03-18T12:38:25.490000 CVE-2024-27986,0,0,221ac31a72264e8303bc0dc716d0bcad27f92aa2e3b64824247f9d02601983b8,2024-03-14T12:52:09.877000 CVE-2024-27987,0,0,ce6fd0b1730cd837f285c0aaaa1258cf6aa8505469e7f313401adb363ee7f395,2024-03-15T12:53:06.423000 +CVE-2024-27993,1,1,b4c5383b47399ec74c3480cf4f572eb4d9bdde4b0737cbc8bf7ed8cbe49e4ed8,2024-03-21T15:24:35.093000 +CVE-2024-27994,1,1,e85e7bc4f691478aca76ee076ff4f9f23d2d33165eac31a30e8922db5bb9bf99,2024-03-21T15:24:35.093000 +CVE-2024-27995,1,1,31db9c3046ef3b6826fd04aab15586376d26e0b529bdf84ce7eba17bac569f0a,2024-03-21T15:24:35.093000 CVE-2024-27996,0,0,79cff30308b011c07df476cb18acc5ff1830e7bf17b14d1ca5a0d9446fa716b8,2024-03-20T13:00:16.367000 CVE-2024-27997,0,0,b42c7cf4751e4a11a6e5eeb90c0df264fce89958ee556b8b06894cd2e68b11ce,2024-03-20T13:00:16.367000 CVE-2024-27998,0,0,325b1a8419d02931fcb08c1286afe5c33e53c5bf8527e201a365155e360914cf,2024-03-20T13:00:16.367000 @@ -242239,7 +242246,7 @@ CVE-2024-28754,0,0,9281349f951cf3fa92b3f484f1e5f3e3b9f20229dcabe6872ba34e9bebaf3 CVE-2024-28757,0,0,83cb6aefc1d6f4ccc5441198cdfc19ec27b4e109d2bc2864c936baa137f8e197,2024-03-19T03:15:06.893000 CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000 CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e9dc,2024-03-11T12:47:42.653000 -CVE-2024-28834,1,1,49dd8c5bce1ef5354057f5beed8f9118273750b7ba7af3f57c721b8c69f2dbe9,2024-03-21T14:15:07.547000 +CVE-2024-28834,0,1,841718fd8fddff124f231102263dad7d394e02b19e9697b20d411d85f567df2c,2024-03-21T15:24:35.093000 CVE-2024-28835,0,0,807354fa6b4609be92d801df299988ca81259642594a0e94cba8cafe4de90346,2024-03-21T12:58:51.093000 CVE-2024-28847,0,0,77ca7298b6799783b77992e414cebfaaf69a1bd2c05124cbdf6b914d3e0bb310,2024-03-17T22:38:29.433000 CVE-2024-28848,0,0,f738fe56a5bc4cdb728fabdb4b9cb52618afbf9827db3dbc12ec3f1fb91169bf,2024-03-21T02:52:25.197000 @@ -242313,6 +242320,8 @@ CVE-2024-29143,0,0,a3f92e2c9ae6aaf4168f841be16c13a544cace199faa049656661980aa53e CVE-2024-29151,0,0,ef852a662e1eaee7e15d971ee7451f2c3e954b3d808a30cb9a36bbe68bb24c8f,2024-03-18T12:38:25.490000 CVE-2024-29154,0,0,dab131c9ff393e828252009730d8617a5e1a4fb5cfb7f2db054056bc6f27c2ba,2024-03-18T12:38:25.490000 CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2326,2024-03-18T12:38:25.490000 +CVE-2024-29243,1,1,80b3eab65af2d9fbeb7b6048e074697688a19de63e1138c377d0b826523dd7db,2024-03-21T15:24:35.093000 +CVE-2024-29244,1,1,ab4dadc4ff7b45a2c285edb922de956bae0828f007627c62339f15145e95a7b7,2024-03-21T15:24:35.093000 CVE-2024-29419,0,0,1f113c646466febbefbd1317ecc5036f9bdf6e219db156971cfdda70e05f32f0,2024-03-20T17:18:21.343000 CVE-2024-29469,0,0,acf93e04574e9669a29498319a75720c9b5a03ff4de2c06070b1f52ac9f365b7,2024-03-21T12:58:51.093000 CVE-2024-29470,0,0,ec8cc83a60b9ef7edaa49e0605acc097203825f31a2e1ca35494b606ac2473df,2024-03-21T12:58:51.093000 @@ -242325,15 +242334,15 @@ CVE-2024-29858,0,0,585719d860c91771e96e52d882eed744121f21e899f727afe6b381f4ffbb3 CVE-2024-29859,0,0,6ebff5730a73f542ffebf0a56f74146bb69314ac3f95118519ec4b678666f245,2024-03-21T12:58:51.093000 CVE-2024-29862,0,0,78f62d6320f790cb50cb5767943bbca91d7f9763b83315a1495201af3fd41026,2024-03-21T12:58:51.093000 CVE-2024-29864,0,0,3c9560ffae0fa16acac4cf8327bf4ae3182996a8c684b25430908ed832b73c71,2024-03-21T12:58:51.093000 -CVE-2024-29866,1,1,b7aae42ff0f8d26ef8d271f21c3bcba0c2676fb462916aab4cad2c78bb4e36f6,2024-03-21T14:15:07.810000 -CVE-2024-29870,1,1,3505d6d3160d8f477a76dce538125c3d05fda98fea30d8cd2e776d2473790f7b,2024-03-21T14:15:07.867000 -CVE-2024-29871,1,1,51c0f159938b8d9421ca76e3f560a6524eebd96fc5429c06757e4fcf784a6a98,2024-03-21T14:15:08.080000 -CVE-2024-29872,1,1,51d8118ac7521ab72274e141dd426302a1a73491662744fcfdd12a6a22088085,2024-03-21T14:15:08.313000 -CVE-2024-29873,1,1,08125b51ba63d3bf83ff2f8bb90c7ac43bee6fac5baf9c26bb47fd37946337d5,2024-03-21T14:15:08.520000 -CVE-2024-29874,1,1,fcda0ac7dc303bbb7de5a3ffab12518861a224ac3ce1bd6053196d247e119c54,2024-03-21T14:15:08.767000 -CVE-2024-29875,1,1,2d19c9eba5f8ffdc8816cd88cf5875cf8467329b3b7a945d029634e127a6f65f,2024-03-21T14:15:08.980000 -CVE-2024-29876,1,1,2d4adfc531f81e22dcdb8d233db5ac43ff28b8756f3e2e97e2833a22df6dd30b,2024-03-21T14:15:09.163000 -CVE-2024-29877,1,1,ae3711f0c18f7d645ce821470e00e41ff5a2fe70c0c6c066e4af620364c05194,2024-03-21T14:15:09.353000 -CVE-2024-29878,1,1,d3448c7485a0c9c8d93283db8afe376c3d6d03a15eecf21f3d06cf15c244fd20,2024-03-21T14:15:09.593000 -CVE-2024-29879,1,1,e7f8f9b502882e6d22482da09d9455e94a91e17212b7ad15ca68fcc8faaf940e,2024-03-21T14:15:09.817000 -CVE-2024-29880,1,1,1bf20db2449227eb571e21d9b9932fbc8ffafb226464106d6cf267f6fb063df8,2024-03-21T14:15:10.077000 +CVE-2024-29866,0,1,d3474a4cb7339082dcfbd889d056a2a906f051d7c933d6576013f44ee70632b2,2024-03-21T15:24:35.093000 +CVE-2024-29870,0,1,04eec461d26d3928388aa1ebeda7f3889d70d7fb805b862b11fc37cdb9c73805,2024-03-21T15:24:35.093000 +CVE-2024-29871,0,1,e7b820291fe87f3c68126b9e66a3cb2071635a1781039b23d1340b3ec50d7104,2024-03-21T15:24:35.093000 +CVE-2024-29872,0,1,2ed0e31c2aeb7a79b11a328bd37ec6ac592cb7ae8ad49b21b1fd6587d921da01,2024-03-21T15:24:35.093000 +CVE-2024-29873,0,1,4c88c2b5d7ca113616f149d7c91b297271846cd8b9ee3b6472184ffa855db09d,2024-03-21T15:24:35.093000 +CVE-2024-29874,0,1,5f5afb1bffc520634cc09fd8c228b7ee62224828af0f713d405da9c49edc2676,2024-03-21T15:24:35.093000 +CVE-2024-29875,0,1,36d66cc7949cb01f56ec16bc1f171847efe7ceac006d82066a5f62664aaf8bbb,2024-03-21T15:24:35.093000 +CVE-2024-29876,0,1,81e9b92db68fe1869c86668a1e00f2a9ff624f59839df1fbe18d8e987774c206,2024-03-21T15:24:35.093000 +CVE-2024-29877,0,1,5b6a7271e346dceec62c9141f9ae12b0e5342a31cc26366c653fe20c26c8bc21,2024-03-21T15:24:35.093000 +CVE-2024-29878,0,1,59bd69937e12e8238cdc5eae96014d85a453bedc37861446ca2ffcb7373dda8d,2024-03-21T15:24:35.093000 +CVE-2024-29879,0,1,f281e5565c18f62981e30c243c39ad05583d9bbab1631a620c93b3c78846e1db,2024-03-21T15:24:35.093000 +CVE-2024-29880,0,1,e4ba47a3336aba44b26bc2b767c682c9997cfe6f0e16a9457e7fe50a3abeaa1c,2024-03-21T15:24:35.093000