From b93a652e98d073cd951fe4f8311f20c41cc38fae Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 28 Mar 2024 03:03:20 +0000 Subject: [PATCH] Auto-Update: 2024-03-28T03:00:31.559275+00:00 --- CVE-2013/CVE-2013-41xx/CVE-2013-4184.json | 12 +- CVE-2023/CVE-2023-05xx/CVE-2023-0582.json | 4 +- CVE-2023/CVE-2023-474xx/CVE-2023-47438.json | 4 +- CVE-2024/CVE-2024-00xx/CVE-2024-0071.json | 4 +- CVE-2024/CVE-2024-00xx/CVE-2024-0073.json | 4 +- CVE-2024/CVE-2024-00xx/CVE-2024-0074.json | 4 +- CVE-2024/CVE-2024-00xx/CVE-2024-0075.json | 4 +- CVE-2024/CVE-2024-00xx/CVE-2024-0077.json | 4 +- CVE-2024/CVE-2024-00xx/CVE-2024-0078.json | 4 +- CVE-2024/CVE-2024-00xx/CVE-2024-0079.json | 4 +- CVE-2024/CVE-2024-09xx/CVE-2024-0980.json | 4 +- CVE-2024/CVE-2024-17xx/CVE-2024-1770.json | 47 ++++++++ CVE-2024/CVE-2024-203xx/CVE-2024-20307.json | 4 +- CVE-2024/CVE-2024-203xx/CVE-2024-20308.json | 4 +- CVE-2024/CVE-2024-21xx/CVE-2024-2110.json | 47 ++++++++ CVE-2024/CVE-2024-21xx/CVE-2024-2111.json | 47 ++++++++ CVE-2024/CVE-2024-234xx/CVE-2024-23451.json | 4 +- CVE-2024/CVE-2024-253xx/CVE-2024-25354.json | 4 +- CVE-2024/CVE-2024-280xx/CVE-2024-28005.json | 32 ++++++ CVE-2024/CVE-2024-280xx/CVE-2024-28006.json | 32 ++++++ CVE-2024/CVE-2024-280xx/CVE-2024-28007.json | 32 ++++++ CVE-2024/CVE-2024-280xx/CVE-2024-28008.json | 32 ++++++ CVE-2024/CVE-2024-280xx/CVE-2024-28009.json | 32 ++++++ CVE-2024/CVE-2024-280xx/CVE-2024-28010.json | 32 ++++++ CVE-2024/CVE-2024-280xx/CVE-2024-28011.json | 32 ++++++ CVE-2024/CVE-2024-280xx/CVE-2024-28012.json | 32 ++++++ CVE-2024/CVE-2024-280xx/CVE-2024-28013.json | 32 ++++++ CVE-2024/CVE-2024-280xx/CVE-2024-28014.json | 32 ++++++ CVE-2024/CVE-2024-280xx/CVE-2024-28015.json | 32 ++++++ CVE-2024/CVE-2024-280xx/CVE-2024-28016.json | 32 ++++++ CVE-2024/CVE-2024-280xx/CVE-2024-28085.json | 4 +- CVE-2024/CVE-2024-282xx/CVE-2024-28233.json | 4 +- CVE-2024/CVE-2024-282xx/CVE-2024-28247.json | 4 +- CVE-2024/CVE-2024-288xx/CVE-2024-28860.json | 4 +- CVE-2024/CVE-2024-298xx/CVE-2024-29886.json | 4 +- CVE-2024/CVE-2024-298xx/CVE-2024-29887.json | 4 +- CVE-2024/CVE-2024-298xx/CVE-2024-29888.json | 4 +- CVE-2024/CVE-2024-298xx/CVE-2024-29891.json | 4 +- CVE-2024/CVE-2024-298xx/CVE-2024-29892.json | 4 +- CVE-2024/CVE-2024-29xx/CVE-2024-2988.json | 4 +- CVE-2024/CVE-2024-29xx/CVE-2024-2989.json | 4 +- CVE-2024/CVE-2024-29xx/CVE-2024-2990.json | 4 +- CVE-2024/CVE-2024-29xx/CVE-2024-2991.json | 4 +- CVE-2024/CVE-2024-29xx/CVE-2024-2992.json | 4 +- CVE-2024/CVE-2024-29xx/CVE-2024-2993.json | 4 +- CVE-2024/CVE-2024-29xx/CVE-2024-2994.json | 4 +- CVE-2024/CVE-2024-29xx/CVE-2024-2995.json | 4 +- CVE-2024/CVE-2024-29xx/CVE-2024-2996.json | 4 +- CVE-2024/CVE-2024-29xx/CVE-2024-2997.json | 4 +- CVE-2024/CVE-2024-29xx/CVE-2024-2998.json | 4 +- CVE-2024/CVE-2024-29xx/CVE-2024-2999.json | 4 +- CVE-2024/CVE-2024-30xx/CVE-2024-3000.json | 4 +- CVE-2024/CVE-2024-30xx/CVE-2024-3001.json | 4 +- CVE-2024/CVE-2024-30xx/CVE-2024-3002.json | 4 +- CVE-2024/CVE-2024-30xx/CVE-2024-3003.json | 4 +- CVE-2024/CVE-2024-30xx/CVE-2024-3004.json | 4 +- CVE-2024/CVE-2024-30xx/CVE-2024-3006.json | 4 +- CVE-2024/CVE-2024-30xx/CVE-2024-3007.json | 4 +- CVE-2024/CVE-2024-30xx/CVE-2024-3008.json | 4 +- CVE-2024/CVE-2024-30xx/CVE-2024-3009.json | 4 +- CVE-2024/CVE-2024-30xx/CVE-2024-3010.json | 4 +- CVE-2024/CVE-2024-30xx/CVE-2024-3011.json | 4 +- CVE-2024/CVE-2024-30xx/CVE-2024-3012.json | 4 +- CVE-2024/CVE-2024-30xx/CVE-2024-3013.json | 92 ++++++++++++++++ CVE-2024/CVE-2024-30xx/CVE-2024-3014.json | 92 ++++++++++++++++ CVE-2024/CVE-2024-30xx/CVE-2024-3015.json | 92 ++++++++++++++++ CVE-2024/CVE-2024-30xx/CVE-2024-3024.json | 96 ++++++++++++++++ README.md | 65 ++++++++--- _state.csv | 115 ++++++++++++-------- 69 files changed, 1118 insertions(+), 159 deletions(-) create mode 100644 CVE-2024/CVE-2024-17xx/CVE-2024-1770.json create mode 100644 CVE-2024/CVE-2024-21xx/CVE-2024-2110.json create mode 100644 CVE-2024/CVE-2024-21xx/CVE-2024-2111.json create mode 100644 CVE-2024/CVE-2024-280xx/CVE-2024-28005.json create mode 100644 CVE-2024/CVE-2024-280xx/CVE-2024-28006.json create mode 100644 CVE-2024/CVE-2024-280xx/CVE-2024-28007.json create mode 100644 CVE-2024/CVE-2024-280xx/CVE-2024-28008.json create mode 100644 CVE-2024/CVE-2024-280xx/CVE-2024-28009.json create mode 100644 CVE-2024/CVE-2024-280xx/CVE-2024-28010.json create mode 100644 CVE-2024/CVE-2024-280xx/CVE-2024-28011.json create mode 100644 CVE-2024/CVE-2024-280xx/CVE-2024-28012.json create mode 100644 CVE-2024/CVE-2024-280xx/CVE-2024-28013.json create mode 100644 CVE-2024/CVE-2024-280xx/CVE-2024-28014.json create mode 100644 CVE-2024/CVE-2024-280xx/CVE-2024-28015.json create mode 100644 CVE-2024/CVE-2024-280xx/CVE-2024-28016.json create mode 100644 CVE-2024/CVE-2024-30xx/CVE-2024-3013.json create mode 100644 CVE-2024/CVE-2024-30xx/CVE-2024-3014.json create mode 100644 CVE-2024/CVE-2024-30xx/CVE-2024-3015.json create mode 100644 CVE-2024/CVE-2024-30xx/CVE-2024-3024.json diff --git a/CVE-2013/CVE-2013-41xx/CVE-2013-4184.json b/CVE-2013/CVE-2013-41xx/CVE-2013-4184.json index c26d69bc878..a689fdf6b04 100644 --- a/CVE-2013/CVE-2013-41xx/CVE-2013-4184.json +++ b/CVE-2013/CVE-2013-41xx/CVE-2013-4184.json @@ -2,8 +2,8 @@ "id": "CVE-2013-4184", "sourceIdentifier": "secalert@redhat.com", "published": "2019-12-10T15:15:11.573", - "lastModified": "2019-12-17T18:42:20.790", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-28T02:15:09.320", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -166,6 +166,14 @@ "VDB Entry" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3F2KOK2SM2LFI4BNFOVV2G2XVJQBIMZL/", + "source": "secalert@redhat.com" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DTKH3TWUOXBAAZST7364UVZ4UPH4CEO7/", + "source": "secalert@redhat.com" + }, { "url": "https://security-tracker.debian.org/tracker/CVE-2013-4184", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0582.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0582.json index e78cb940cbd..98bc43bbd04 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0582.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0582.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0582", "sourceIdentifier": "psirt@forgerock.com", "published": "2024-03-27T18:15:08.237", - "lastModified": "2024-03-27T18:15:08.237", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:21.693", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-474xx/CVE-2023-47438.json b/CVE-2023/CVE-2023-474xx/CVE-2023-47438.json index c27894f94e8..fb74da07bb7 100644 --- a/CVE-2023/CVE-2023-474xx/CVE-2023-47438.json +++ b/CVE-2023/CVE-2023-474xx/CVE-2023-47438.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47438", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-27T22:15:07.607", - "lastModified": "2024-03-27T22:15:07.607", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0071.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0071.json index 0bd6f0273fa..61f6a74fa95 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0071.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0071.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0071", "sourceIdentifier": "psirt@nvidia.com", "published": "2024-03-27T22:15:07.667", - "lastModified": "2024-03-27T22:15:07.667", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0073.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0073.json index a49421d326f..70760080a8a 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0073.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0073.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0073", "sourceIdentifier": "psirt@nvidia.com", "published": "2024-03-27T22:15:08.133", - "lastModified": "2024-03-27T22:15:08.133", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0074.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0074.json index 36bc8d3d844..181fd7b5a47 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0074.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0074.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0074", "sourceIdentifier": "psirt@nvidia.com", "published": "2024-03-27T22:15:08.617", - "lastModified": "2024-03-27T22:15:08.617", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0075.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0075.json index 14a609031e5..8fac26c28fc 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0075.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0075.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0075", "sourceIdentifier": "psirt@nvidia.com", "published": "2024-03-27T22:15:09.140", - "lastModified": "2024-03-27T22:15:09.140", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0077.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0077.json index ef41a8b68e8..7aa0b650dec 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0077.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0077.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0077", "sourceIdentifier": "psirt@nvidia.com", "published": "2024-03-27T22:15:09.510", - "lastModified": "2024-03-27T22:15:09.510", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0078.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0078.json index 7001c3b1e22..83f64010f3b 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0078.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0078.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0078", "sourceIdentifier": "psirt@nvidia.com", "published": "2024-03-27T22:15:09.700", - "lastModified": "2024-03-27T22:15:09.700", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0079.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0079.json index 5daa635b86f..592b31d084c 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0079.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0079.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0079", "sourceIdentifier": "psirt@nvidia.com", "published": "2024-03-27T22:15:09.897", - "lastModified": "2024-03-27T22:15:09.897", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0980.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0980.json index 319eef4bcaa..34e17ae36f5 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0980.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0980.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0980", "sourceIdentifier": "psirt@okta.com", "published": "2024-03-28T00:15:07.867", - "lastModified": "2024-03-28T00:15:07.867", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1770.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1770.json new file mode 100644 index 00000000000..4aa785204ec --- /dev/null +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1770.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2024-1770", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-03-28T02:15:09.573", + "lastModified": "2024-03-28T02:15:09.573", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Meta Tag Manager plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.0.2 via deserialization of untrusted input in the get_post_data function. This makes it possible for authenticated attackers, with contributor access or higher, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3054910/meta-tag-manager/trunk/meta-tag-manager.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9ec1aed2-d299-4fa9-add6-10b63ed6aa30?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20307.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20307.json index eac21feac9b..b9d03f8d0c5 100644 --- a/CVE-2024/CVE-2024-203xx/CVE-2024-20307.json +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20307.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20307", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-03-27T18:15:09.357", - "lastModified": "2024-03-27T18:15:09.357", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:21.693", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20308.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20308.json index af3f5e6634d..3694bde2f3c 100644 --- a/CVE-2024/CVE-2024-203xx/CVE-2024-20308.json +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20308.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20308", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-03-27T18:15:09.853", - "lastModified": "2024-03-27T18:15:09.853", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:21.693", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2110.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2110.json new file mode 100644 index 00000000000..1f115a7e712 --- /dev/null +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2110.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2024-2110", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-03-28T02:15:09.990", + "lastModified": "2024-03-28T02:15:09.990", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Events Manager \u2013 Calendar, Bookings, Tickets, and more! plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 6.4.7.1. This is due to missing or incorrect nonce validation on several actions. This makes it possible for unauthenticated attackers to modify booking statuses via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3054883/events-manager/trunk/classes/em-bookings-table.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c0538999-0a09-4d24-a530-a32fb5b4e5e6?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2111.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2111.json new file mode 100644 index 00000000000..afd3942cd96 --- /dev/null +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2111.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2024-2111", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-03-28T02:15:10.397", + "lastModified": "2024-03-28T02:15:10.397", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Events Manager \u2013 Calendar, Bookings, Tickets, and more! plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the physical location value in all versions up to, and including, 6.4.7.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3054883%40events-manager&new=3054883%40events-manager&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/95ded4bf-9964-4bb3-b6e5-5ad37360f87d?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-234xx/CVE-2024-23451.json b/CVE-2024/CVE-2024-234xx/CVE-2024-23451.json index 0c71b2b3be0..38789559a50 100644 --- a/CVE-2024/CVE-2024-234xx/CVE-2024-23451.json +++ b/CVE-2024/CVE-2024-234xx/CVE-2024-23451.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23451", "sourceIdentifier": "bressers@elastic.co", "published": "2024-03-27T18:15:10.330", - "lastModified": "2024-03-27T18:15:10.330", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:21.693", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-253xx/CVE-2024-25354.json b/CVE-2024/CVE-2024-253xx/CVE-2024-25354.json index d1f1d111cf3..5ecb430246c 100644 --- a/CVE-2024/CVE-2024-253xx/CVE-2024-25354.json +++ b/CVE-2024/CVE-2024-253xx/CVE-2024-25354.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25354", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-27T22:15:10.093", - "lastModified": "2024-03-27T22:15:10.093", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28005.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28005.json new file mode 100644 index 00000000000..4a5cde76223 --- /dev/null +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28005.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-28005", + "sourceIdentifier": "psirt-info@cyber.jp.nec.com", + "published": "2024-03-28T01:15:47.100", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN and MR02LN all versions allows a attacker who has obtained high privileges can execute arbitrary scripts." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt-info@cyber.jp.nec.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-250" + } + ] + } + ], + "references": [ + { + "url": "https://https://jpn.nec.com/security-info/secinfo/nv24-001_en.html", + "source": "psirt-info@cyber.jp.nec.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28006.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28006.json new file mode 100644 index 00000000000..493f0169970 --- /dev/null +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28006.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-28006", + "sourceIdentifier": "psirt-info@cyber.jp.nec.com", + "published": "2024-03-28T01:15:47.177", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper authentication vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN and MR02LN all versions allows a attacker to view device information." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt-info@cyber.jp.nec.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://https://jpn.nec.com/security-info/secinfo/nv24-001_en.html", + "source": "psirt-info@cyber.jp.nec.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28007.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28007.json new file mode 100644 index 00000000000..649d0e83629 --- /dev/null +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28007.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-28007", + "sourceIdentifier": "psirt-info@cyber.jp.nec.com", + "published": "2024-03-28T01:15:47.250", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper authentication vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN and MR02LN all versions allows a attacker to execute an arbitrary command with the root privilege via the internet." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt-info@cyber.jp.nec.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://https://jpn.nec.com/security-info/secinfo/nv24-001_en.html", + "source": "psirt-info@cyber.jp.nec.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28008.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28008.json new file mode 100644 index 00000000000..cee58721c7e --- /dev/null +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28008.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-28008", + "sourceIdentifier": "psirt-info@cyber.jp.nec.com", + "published": "2024-03-28T01:15:47.327", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Active Debug Code in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN and MR02LN all versions allows a attacker to execute an arbitrary OS command via the internet." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt-info@cyber.jp.nec.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-489" + } + ] + } + ], + "references": [ + { + "url": "https://https://jpn.nec.com/security-info/secinfo/nv24-001_en.html", + "source": "psirt-info@cyber.jp.nec.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28009.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28009.json new file mode 100644 index 00000000000..3071dc1abaf --- /dev/null +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28009.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-28009", + "sourceIdentifier": "psirt-info@cyber.jp.nec.com", + "published": "2024-03-28T01:15:47.400", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper authentication vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN and MR02LN all versions allows a attacker to execute an arbitrary command with the root privilege via the internet." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt-info@cyber.jp.nec.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://https://jpn.nec.com/security-info/secinfo/nv24-001_en.html", + "source": "psirt-info@cyber.jp.nec.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28010.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28010.json new file mode 100644 index 00000000000..a8e84c0a4cf --- /dev/null +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28010.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-28010", + "sourceIdentifier": "psirt-info@cyber.jp.nec.com", + "published": "2024-03-28T01:15:47.470", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Use of Hard-coded Password in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN and MR02LN all versions allows a attacker to execute an arbitrary OS command via the internet." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt-info@cyber.jp.nec.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-259" + } + ] + } + ], + "references": [ + { + "url": "https://https://jpn.nec.com/security-info/secinfo/nv24-001_en.html", + "source": "psirt-info@cyber.jp.nec.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28011.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28011.json new file mode 100644 index 00000000000..34742841387 --- /dev/null +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28011.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-28011", + "sourceIdentifier": "psirt-info@cyber.jp.nec.com", + "published": "2024-03-28T01:15:47.550", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Hidden Functionality vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN and MR02LN all versions allows a attacker to execute an arbitrary OS command with the root privilege via the internet" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt-info@cyber.jp.nec.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-912" + } + ] + } + ], + "references": [ + { + "url": "https://https://jpn.nec.com/security-info/secinfo/nv24-001_en.html", + "source": "psirt-info@cyber.jp.nec.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28012.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28012.json new file mode 100644 index 00000000000..26d42368203 --- /dev/null +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28012.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-28012", + "sourceIdentifier": "psirt-info@cyber.jp.nec.com", + "published": "2024-03-28T01:15:47.620", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper authentication vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN and MR02LN all versions allows a attacker to execute an arbitrary command with the root privilege via the internet." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt-info@cyber.jp.nec.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://https://jpn.nec.com/security-info/secinfo/nv24-001_en.html", + "source": "psirt-info@cyber.jp.nec.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28013.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28013.json new file mode 100644 index 00000000000..60f332f2bc6 --- /dev/null +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28013.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-28013", + "sourceIdentifier": "psirt-info@cyber.jp.nec.com", + "published": "2024-03-28T01:15:47.693", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Use of Insufficiently Random Values vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN and MR02LN all versions allows a attacker to change settings via the internet." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt-info@cyber.jp.nec.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-330" + } + ] + } + ], + "references": [ + { + "url": "https://https://jpn.nec.com/security-info/secinfo/nv24-001_en.html", + "source": "psirt-info@cyber.jp.nec.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28014.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28014.json new file mode 100644 index 00000000000..6a36c94beaa --- /dev/null +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28014.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-28014", + "sourceIdentifier": "psirt-info@cyber.jp.nec.com", + "published": "2024-03-28T01:15:47.773", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Stack-based Buffer Overflow vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN and MR02LN all versions allows a attacker to execute an arbitrary command via the internet." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt-info@cyber.jp.nec.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://https://jpn.nec.com/security-info/secinfo/nv24-001_en.html", + "source": "psirt-info@cyber.jp.nec.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28015.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28015.json new file mode 100644 index 00000000000..7c4660b6d44 --- /dev/null +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28015.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-28015", + "sourceIdentifier": "psirt-info@cyber.jp.nec.com", + "published": "2024-03-28T01:15:47.843", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an OS Command vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN and MR02LN all versions allows a attacker to execute an arbitrary OS command with the root privilege via the internet." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt-info@cyber.jp.nec.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://https://jpn.nec.com/security-info/secinfo/nv24-001_en.html", + "source": "psirt-info@cyber.jp.nec.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28016.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28016.json new file mode 100644 index 00000000000..fe4f3c04bee --- /dev/null +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28016.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-28016", + "sourceIdentifier": "psirt-info@cyber.jp.nec.com", + "published": "2024-03-28T01:15:47.923", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Access Controlvulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN and MR02LN all versions allows a attacker to get device informations via the internet." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt-info@cyber.jp.nec.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://https://jpn.nec.com/security-info/secinfo/nv24-001_en.html", + "source": "psirt-info@cyber.jp.nec.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28085.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28085.json index 1301ec5fc8e..ae2da350db3 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28085.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28085.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28085", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-27T19:15:48.367", - "lastModified": "2024-03-27T19:15:48.367", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:21.693", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-282xx/CVE-2024-28233.json b/CVE-2024/CVE-2024-282xx/CVE-2024-28233.json index 00cfd5656d3..aea6b0d3d7a 100644 --- a/CVE-2024/CVE-2024-282xx/CVE-2024-28233.json +++ b/CVE-2024/CVE-2024-282xx/CVE-2024-28233.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28233", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-27T19:15:48.430", - "lastModified": "2024-03-27T19:15:48.430", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:21.693", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-282xx/CVE-2024-28247.json b/CVE-2024/CVE-2024-282xx/CVE-2024-28247.json index 0b3d85990de..e5c80ec22c2 100644 --- a/CVE-2024/CVE-2024-282xx/CVE-2024-28247.json +++ b/CVE-2024/CVE-2024-282xx/CVE-2024-28247.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28247", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-27T19:15:48.637", - "lastModified": "2024-03-27T19:15:48.637", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:21.693", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28860.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28860.json index 67d28716b9f..d57b3d2715a 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28860.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28860.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28860", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-27T19:15:48.827", - "lastModified": "2024-03-27T19:15:48.827", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:21.693", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29886.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29886.json index b814de0a404..2c99eeee914 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29886.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29886.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29886", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-27T19:15:49.023", - "lastModified": "2024-03-27T19:15:49.023", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:21.693", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29887.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29887.json index 375d7094d52..30e4e62b7e1 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29887.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29887.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29887", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-27T19:15:49.230", - "lastModified": "2024-03-27T19:15:49.230", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29888.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29888.json index c7dc1f3ca07..aff246c383e 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29888.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29888.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29888", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-27T19:15:49.410", - "lastModified": "2024-03-27T19:15:49.410", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29891.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29891.json index 923fd0d84aa..2003dd17857 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29891.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29891.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29891", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-27T20:15:07.780", - "lastModified": "2024-03-27T20:15:07.780", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29892.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29892.json index f43600ee9d8..9943d6930db 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29892.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29892.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29892", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-27T20:15:08.303", - "lastModified": "2024-03-27T20:15:08.303", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2988.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2988.json index 61d45e50487..eabcc088cea 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2988.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2988.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2988", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T18:15:10.757", - "lastModified": "2024-03-27T18:15:10.757", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:21.693", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2989.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2989.json index c9ba1ae20c3..d7803384b7b 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2989.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2989.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2989", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T18:15:11.293", - "lastModified": "2024-03-27T18:15:11.293", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:21.693", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2990.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2990.json index fa6ca04a2fb..aec61ffc01f 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2990.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2990.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2990", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T19:15:49.710", - "lastModified": "2024-03-27T19:15:49.710", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2991.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2991.json index 2f21d4d7fa9..d9ff1468350 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2991.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2991.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2991", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T19:15:49.940", - "lastModified": "2024-03-27T19:15:49.940", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2992.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2992.json index 34136ce42b2..a4cdd915d2d 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2992.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2992.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2992", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T19:15:50.173", - "lastModified": "2024-03-27T19:15:50.173", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2993.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2993.json index 88b246ddffb..f418c2e32a7 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2993.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2993.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2993", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T20:15:08.780", - "lastModified": "2024-03-27T20:15:08.780", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2994.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2994.json index 588ebb0f278..88188c4ac67 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2994.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2994.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2994", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T20:15:09.337", - "lastModified": "2024-03-27T20:15:09.337", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2995.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2995.json index 4ed3b237be4..44ab4a80343 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2995.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2995.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2995", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T20:15:09.903", - "lastModified": "2024-03-27T20:15:09.903", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2996.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2996.json index 7894ba1d45a..c2943d4c35b 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2996.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2996.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2996", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T20:15:10.507", - "lastModified": "2024-03-27T20:15:10.507", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2997.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2997.json index cc98e313bee..a7708d939cc 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2997.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2997.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2997", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T21:15:48.897", - "lastModified": "2024-03-27T21:15:48.897", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2998.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2998.json index cde55fb0f50..9c2f685fbe6 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2998.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2998.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2998", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T21:15:49.127", - "lastModified": "2024-03-27T21:15:49.127", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2999.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2999.json index d186690618b..0213e17525e 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2999.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2999.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2999", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T21:15:49.407", - "lastModified": "2024-03-27T21:15:49.407", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3000.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3000.json index 08003e73ed2..9e4be868f70 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3000.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3000.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3000", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T22:15:10.150", - "lastModified": "2024-03-27T22:15:10.150", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3001.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3001.json index acf50ee42f4..237dc7a3060 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3001.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3001.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3001", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T22:15:10.673", - "lastModified": "2024-03-27T22:15:10.673", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3002.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3002.json index 73e2dfb434a..4ec6e098238 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3002.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3002.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3002", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T22:15:11.300", - "lastModified": "2024-03-27T22:15:11.300", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3003.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3003.json index 845c0f2cb2f..748e803c890 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3003.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3003.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3003", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T22:15:11.880", - "lastModified": "2024-03-27T22:15:11.880", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3004.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3004.json index 8a92098b7b8..f034e166f12 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3004.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3004.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3004", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T23:15:46.637", - "lastModified": "2024-03-27T23:15:46.637", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3006.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3006.json index 825accaf192..96f61f9681d 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3006.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3006.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3006", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T23:15:46.880", - "lastModified": "2024-03-27T23:15:46.880", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3007.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3007.json index aa6331d679d..114ca3cf086 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3007.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3007.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3007", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T23:15:47.110", - "lastModified": "2024-03-27T23:15:47.110", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3008.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3008.json index 737ded4cfe2..3c44fc531f3 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3008.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3008.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3008", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T23:15:47.340", - "lastModified": "2024-03-27T23:15:47.340", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3009.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3009.json index 678356ef462..4b13bbb0615 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3009.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3009.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3009", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-28T00:15:07.993", - "lastModified": "2024-03-28T00:15:07.993", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3010.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3010.json index d3a25ddc457..1913462f545 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3010.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3010.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3010", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-28T00:15:08.250", - "lastModified": "2024-03-28T00:15:08.250", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3011.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3011.json index a63457eef56..6097a80ade9 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3011.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3011.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3011", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-28T00:15:08.500", - "lastModified": "2024-03-28T00:15:08.500", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3012.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3012.json index 68100c36916..9fc5f4a218b 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3012.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3012.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3012", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-28T00:15:08.773", - "lastModified": "2024-03-28T00:15:08.773", - "vulnStatus": "Received", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3013.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3013.json new file mode 100644 index 00000000000..ad715e9d625 --- /dev/null +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3013.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-3013", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-28T01:15:47.997", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in FLIR AX8 up to 1.46.16. It has been rated as critical. This issue affects some unknown processing of the file /tools/test_login.php?action=register of the component User Registration. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258299. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://h0e4a0r1t.github.io/2024/vulns/FLIR-AX8%20Fixed%20Thermal%20Cameras%20Register%20any%20user%20in%20the%20background--test_login.php.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.258299", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.258299", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.301588", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3014.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3014.json new file mode 100644 index 00000000000..7aac8db310e --- /dev/null +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3014.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-3014", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-28T01:15:48.227", + "lastModified": "2024-03-28T02:01:13.303", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in SourceCodester Simple Subscription Website 1.0. Affected is an unknown function of the file Actions.php. The manipulation of the argument title leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258300." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Viciglu/cvehub/blob/main/Simple%20Subscription%20Website%20with%20Admin%20System%20Actions.php%20has%20Sqlinjection.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.258300", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.258300", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.305648", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3015.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3015.json new file mode 100644 index 00000000000..1c0d1ba8158 --- /dev/null +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3015.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-3015", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-28T02:15:10.813", + "lastModified": "2024-03-28T02:15:10.813", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in SourceCodester Simple Subscription Website 1.0. Affected by this vulnerability is an unknown functionality of the file manage_plan.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258301 was assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Viciglu/cvehub/blob/main/Simple%20Subscription%20Website%20with%20Admin%20System%20manage_plan.php%20has%20Sqlinjection.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.258301", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.258301", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.305649", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3024.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3024.json new file mode 100644 index 00000000000..936284106d3 --- /dev/null +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3024.json @@ -0,0 +1,96 @@ +{ + "id": "CVE-2024-3024", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-28T02:15:11.337", + "lastModified": "2024-03-28T02:15:11.337", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in appneta tcpreplay up to 4.4.4. It has been classified as problematic. This affects the function get_layer4_v6 of the file /tcpreplay/src/common/get.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier VDB-258333 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 4.3 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 3.1, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://docs.google.com/document/d/1wCIrViAJwGsO5afPBLLjRhO5RClsoUo3J9q1psLs84s/edit?usp=sharing", + "source": "cna@vuldb.com" + }, + { + "url": "https://drive.google.com/file/d/1zV9MSkfYLIrdtK3yczy1qbsJr_yN2fwH/view", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.258333", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.258333", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.297866", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index d3a4eeb5454..81cf623aa1b 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-03-28T00:55:29.902562+00:00 +2024-03-28T03:00:31.559275+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-03-28T00:15:08.773000+00:00 +2024-03-28T02:15:11.337000+00:00 ``` ### Last Data Feed Release @@ -27,34 +27,69 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-03-27T01:00:20.271570+00:00 +2024-03-28T01:00:20.267440+00:00 ``` ### Total Number of included CVEs ```plain -243083 +243102 ``` ### CVEs added in the last Commit -Recently added CVEs: `9` +Recently added CVEs: `19` -- [CVE-2024-0980](CVE-2024/CVE-2024-09xx/CVE-2024-0980.json) (`2024-03-28T00:15:07.867`) -- [CVE-2024-3004](CVE-2024/CVE-2024-30xx/CVE-2024-3004.json) (`2024-03-27T23:15:46.637`) -- [CVE-2024-3006](CVE-2024/CVE-2024-30xx/CVE-2024-3006.json) (`2024-03-27T23:15:46.880`) -- [CVE-2024-3007](CVE-2024/CVE-2024-30xx/CVE-2024-3007.json) (`2024-03-27T23:15:47.110`) -- [CVE-2024-3008](CVE-2024/CVE-2024-30xx/CVE-2024-3008.json) (`2024-03-27T23:15:47.340`) -- [CVE-2024-3009](CVE-2024/CVE-2024-30xx/CVE-2024-3009.json) (`2024-03-28T00:15:07.993`) -- [CVE-2024-3010](CVE-2024/CVE-2024-30xx/CVE-2024-3010.json) (`2024-03-28T00:15:08.250`) -- [CVE-2024-3011](CVE-2024/CVE-2024-30xx/CVE-2024-3011.json) (`2024-03-28T00:15:08.500`) -- [CVE-2024-3012](CVE-2024/CVE-2024-30xx/CVE-2024-3012.json) (`2024-03-28T00:15:08.773`) +- [CVE-2024-1770](CVE-2024/CVE-2024-17xx/CVE-2024-1770.json) (`2024-03-28T02:15:09.573`) +- [CVE-2024-2110](CVE-2024/CVE-2024-21xx/CVE-2024-2110.json) (`2024-03-28T02:15:09.990`) +- [CVE-2024-2111](CVE-2024/CVE-2024-21xx/CVE-2024-2111.json) (`2024-03-28T02:15:10.397`) +- [CVE-2024-28005](CVE-2024/CVE-2024-280xx/CVE-2024-28005.json) (`2024-03-28T01:15:47.100`) +- [CVE-2024-28006](CVE-2024/CVE-2024-280xx/CVE-2024-28006.json) (`2024-03-28T01:15:47.177`) +- [CVE-2024-28007](CVE-2024/CVE-2024-280xx/CVE-2024-28007.json) (`2024-03-28T01:15:47.250`) +- [CVE-2024-28008](CVE-2024/CVE-2024-280xx/CVE-2024-28008.json) (`2024-03-28T01:15:47.327`) +- [CVE-2024-28009](CVE-2024/CVE-2024-280xx/CVE-2024-28009.json) (`2024-03-28T01:15:47.400`) +- [CVE-2024-28010](CVE-2024/CVE-2024-280xx/CVE-2024-28010.json) (`2024-03-28T01:15:47.470`) +- [CVE-2024-28011](CVE-2024/CVE-2024-280xx/CVE-2024-28011.json) (`2024-03-28T01:15:47.550`) +- [CVE-2024-28012](CVE-2024/CVE-2024-280xx/CVE-2024-28012.json) (`2024-03-28T01:15:47.620`) +- [CVE-2024-28013](CVE-2024/CVE-2024-280xx/CVE-2024-28013.json) (`2024-03-28T01:15:47.693`) +- [CVE-2024-28014](CVE-2024/CVE-2024-280xx/CVE-2024-28014.json) (`2024-03-28T01:15:47.773`) +- [CVE-2024-28015](CVE-2024/CVE-2024-280xx/CVE-2024-28015.json) (`2024-03-28T01:15:47.843`) +- [CVE-2024-28016](CVE-2024/CVE-2024-280xx/CVE-2024-28016.json) (`2024-03-28T01:15:47.923`) +- [CVE-2024-3013](CVE-2024/CVE-2024-30xx/CVE-2024-3013.json) (`2024-03-28T01:15:47.997`) +- [CVE-2024-3014](CVE-2024/CVE-2024-30xx/CVE-2024-3014.json) (`2024-03-28T01:15:48.227`) +- [CVE-2024-3015](CVE-2024/CVE-2024-30xx/CVE-2024-3015.json) (`2024-03-28T02:15:10.813`) +- [CVE-2024-3024](CVE-2024/CVE-2024-30xx/CVE-2024-3024.json) (`2024-03-28T02:15:11.337`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `48` +- [CVE-2024-2989](CVE-2024/CVE-2024-29xx/CVE-2024-2989.json) (`2024-03-28T02:01:21.693`) +- [CVE-2024-29891](CVE-2024/CVE-2024-298xx/CVE-2024-29891.json) (`2024-03-28T02:01:13.303`) +- [CVE-2024-29892](CVE-2024/CVE-2024-298xx/CVE-2024-29892.json) (`2024-03-28T02:01:13.303`) +- [CVE-2024-2990](CVE-2024/CVE-2024-29xx/CVE-2024-2990.json) (`2024-03-28T02:01:13.303`) +- [CVE-2024-2991](CVE-2024/CVE-2024-29xx/CVE-2024-2991.json) (`2024-03-28T02:01:13.303`) +- [CVE-2024-2992](CVE-2024/CVE-2024-29xx/CVE-2024-2992.json) (`2024-03-28T02:01:13.303`) +- [CVE-2024-2993](CVE-2024/CVE-2024-29xx/CVE-2024-2993.json) (`2024-03-28T02:01:13.303`) +- [CVE-2024-2994](CVE-2024/CVE-2024-29xx/CVE-2024-2994.json) (`2024-03-28T02:01:13.303`) +- [CVE-2024-2995](CVE-2024/CVE-2024-29xx/CVE-2024-2995.json) (`2024-03-28T02:01:13.303`) +- [CVE-2024-2996](CVE-2024/CVE-2024-29xx/CVE-2024-2996.json) (`2024-03-28T02:01:13.303`) +- [CVE-2024-2997](CVE-2024/CVE-2024-29xx/CVE-2024-2997.json) (`2024-03-28T02:01:13.303`) +- [CVE-2024-2998](CVE-2024/CVE-2024-29xx/CVE-2024-2998.json) (`2024-03-28T02:01:13.303`) +- [CVE-2024-2999](CVE-2024/CVE-2024-29xx/CVE-2024-2999.json) (`2024-03-28T02:01:13.303`) +- [CVE-2024-3000](CVE-2024/CVE-2024-30xx/CVE-2024-3000.json) (`2024-03-28T02:01:13.303`) +- [CVE-2024-3001](CVE-2024/CVE-2024-30xx/CVE-2024-3001.json) (`2024-03-28T02:01:13.303`) +- [CVE-2024-3002](CVE-2024/CVE-2024-30xx/CVE-2024-3002.json) (`2024-03-28T02:01:13.303`) +- [CVE-2024-3003](CVE-2024/CVE-2024-30xx/CVE-2024-3003.json) (`2024-03-28T02:01:13.303`) +- [CVE-2024-3004](CVE-2024/CVE-2024-30xx/CVE-2024-3004.json) (`2024-03-28T02:01:13.303`) +- [CVE-2024-3006](CVE-2024/CVE-2024-30xx/CVE-2024-3006.json) (`2024-03-28T02:01:13.303`) +- [CVE-2024-3007](CVE-2024/CVE-2024-30xx/CVE-2024-3007.json) (`2024-03-28T02:01:13.303`) +- [CVE-2024-3008](CVE-2024/CVE-2024-30xx/CVE-2024-3008.json) (`2024-03-28T02:01:13.303`) +- [CVE-2024-3009](CVE-2024/CVE-2024-30xx/CVE-2024-3009.json) (`2024-03-28T02:01:13.303`) +- [CVE-2024-3010](CVE-2024/CVE-2024-30xx/CVE-2024-3010.json) (`2024-03-28T02:01:13.303`) +- [CVE-2024-3011](CVE-2024/CVE-2024-30xx/CVE-2024-3011.json) (`2024-03-28T02:01:13.303`) +- [CVE-2024-3012](CVE-2024/CVE-2024-30xx/CVE-2024-3012.json) (`2024-03-28T02:01:13.303`) ## Download and Usage diff --git a/_state.csv b/_state.csv index a72dad37c51..3b9539ee816 100644 --- a/_state.csv +++ b/_state.csv @@ -61558,7 +61558,7 @@ CVE-2013-4180,0,0,78a63c637611db22fa46f611204e6fd6139c219e97f0f5547c042e0d69c20c CVE-2013-4181,0,0,2eb362951baf4cca44bb9432679cacd4248a3a6611d36532071864132e3930e4,2023-02-13T04:45:01.727000 CVE-2013-4182,0,0,13c9d69cf7b0abd3d794ab735a9605061c330b1ead46dd7a79e1cd18b5538450,2023-02-13T04:45:02.247000 CVE-2013-4183,0,0,52c30707c5f18711de1e5620d781ac5fad4e95114d76a83126a0dcdc773515ad,2013-10-31T03:34:49.813000 -CVE-2013-4184,0,0,a99d2743637b65b74ed791b4321e80bf71ca063cde11b879be9c770193c058ed,2019-12-17T18:42:20.790000 +CVE-2013-4184,0,1,b9f8f2c9f1c18d97b815f3e7483f062ba7383a1820c19d6f58c21970cbc3a0bc,2024-03-28T02:15:09.320000 CVE-2013-4185,0,0,5265ccf51b00a73e4fed0ec6285046513fb02fd76b63e477c7d96cb9eed9423d,2018-11-15T18:34:48.107000 CVE-2013-4186,0,0,d2d0cc318dc321327f00c03cb9d150b92782acb31a953a447cb9ce9be93bb364,2023-11-07T02:16:09.143000 CVE-2013-4187,0,0,3dae0ca9ef467b5832ba7c7549e1ab2720d40b93fa83116402eb724e14fabd03,2020-02-06T15:12:57.383000 @@ -212065,7 +212065,7 @@ CVE-2023-0578,0,0,c2cf10d09529bf342567ff561ff5fc5b2abe259e50445b77cdf258d0a115db CVE-2023-0579,0,0,504b4338f864e933aa44e888a09084f9d604fd2edb1bc93c969428fcc9526d01,2023-11-07T04:00:52.513000 CVE-2023-0580,0,0,496b4aaf459be8082f40af9709a8d52cae4c41b641bd7ca2e1f477b04712ed00,2023-11-07T04:00:52.727000 CVE-2023-0581,0,0,80d4f5ae1b34ea0255629d958cda2cdcf146f8044343eecb0200e915f691c351,2023-11-07T04:00:52.963000 -CVE-2023-0582,0,0,b3d8f7c84b265316b7e893995a48113564e6ef297a2eb81dadb43454ece92941,2024-03-27T18:15:08.237000 +CVE-2023-0582,0,1,e507bc1e5bfba860f5547b55816ff5405f59aa76a3b833f5f6eb6cc3a6a61a84,2024-03-28T02:01:21.693000 CVE-2023-0583,0,0,ce927582782be4db333475ecc49caef43ac381b8ee355357a8ae6188916854c1,2023-11-07T04:00:53.253000 CVE-2023-0584,0,0,661ecf0e0e258efd0247b994949d777aeb58bd9b6fb3f10f25ebfe1d0595391a,2023-11-07T04:00:53.487000 CVE-2023-0585,0,0,e90d02e3a14ec76a3f74d6f239a409836679ba4da0fdac7466ba614a8fa9d16d,2023-11-07T04:00:53.740000 @@ -233151,7 +233151,7 @@ CVE-2023-47422,0,0,53e4ba62d7fd0242ce1870b57522bcebcee34260151a2b5b738b7621b64d4 CVE-2023-4743,0,0,7bfbdabe8b9425296f1d631d292f0a9fb2f878bdfac9a0c89327f6098a11bb34,2024-03-21T02:49:52.253000 CVE-2023-47430,0,0,e6a5754bab3f4151de611d77cd2c885bddd03b736d05dd3ab604542d22404cc3,2024-03-26T12:55:05.010000 CVE-2023-47437,0,0,6e79bd1227b77bbb4f11ccfeeaa138eb5ff31bfe22e27fcab2f47ad374baaeca,2023-12-01T19:48:29.537000 -CVE-2023-47438,0,0,522d6ee1fc05d0946ab2173f13d638b091448082f51d8de059dae7edd97b3bd1,2024-03-27T22:15:07.607000 +CVE-2023-47438,0,1,e19cf49c88db0c67b3c3ac69fce63c6471c5ddbd88ae8bf9e6b62af83c69e9d4,2024-03-28T02:01:13.303000 CVE-2023-4744,0,0,f33e2f57712194685c3dca3e1493ab9255a824e0935438d389efcbddb6e95f44,2024-03-21T02:49:52.340000 CVE-2023-47440,0,0,b65a22d6ec75b9b58933b07ceb717cde5ccdee4dab3cc2632d1662455c5a9b4d,2023-12-12T18:06:36.190000 CVE-2023-47444,0,0,75fffcc4c2ccad6cbd523a225547a38913fed508632c010f0070b3ffb755f791,2023-11-21T01:02:43.800000 @@ -237960,13 +237960,13 @@ CVE-2024-0057,0,0,e4dc663a42ac696d9f4ea85b4eec7c26c470f055092858eb6ffdd99343f4d6 CVE-2024-0068,0,0,29054351872f671ffd0afada76da136d48518b88acaefb639ccc6c169ead07a3,2024-03-01T14:04:26.010000 CVE-2024-0069,0,0,fcda9c827a68481a563f617244a09b1d788f56c62c31734c572fbfe1a75ea718,2023-11-28T00:15:07.140000 CVE-2024-0070,0,0,f5edfa828dbd64ca40da0463d8d67355f807a2f6d8ea2e049578dd15434f1821,2023-11-28T00:15:07.183000 -CVE-2024-0071,0,0,30a428905c67c7adb95d2412a9689eb89a21c088a6addc56bfe101ff63aadc6e,2024-03-27T22:15:07.667000 -CVE-2024-0073,0,0,880cf04fc43f0cfad9e2d59cff6705bb4a9889733cf925e4ff2ffdb354927c7e,2024-03-27T22:15:08.133000 -CVE-2024-0074,0,0,75bd56d00f0ec411ef82bce7d8ebe09e0783e167c1f0d15a390a1d7b477ad2e2,2024-03-27T22:15:08.617000 -CVE-2024-0075,0,0,a4a1cddb3e5e73443b6db68fcdc803a1d517a7ec139e4f9fd304639e870d9ce9,2024-03-27T22:15:09.140000 -CVE-2024-0077,0,0,c78e3005696d3d73c5dab0fe61f2c93ea360e3ee2dac536997251669e079dfc1,2024-03-27T22:15:09.510000 -CVE-2024-0078,0,0,cbef8e60b1078c0b436b75294924dc6c05ec75db357c01d5117d20285417c736,2024-03-27T22:15:09.700000 -CVE-2024-0079,0,0,c2d3ae39b02554c9afe92817ff9cd9f4e84911e27a55abdf769773a6746f8f33,2024-03-27T22:15:09.897000 +CVE-2024-0071,0,1,3c378887eeaa6b11db2b19d4595e7c0cd53509985d1c9d98774f1aebb8c59b80,2024-03-28T02:01:13.303000 +CVE-2024-0073,0,1,71dca8455bfd5b8c3378a88f2fbf329de69dbdef467620d938e3e37f25db95cf,2024-03-28T02:01:13.303000 +CVE-2024-0074,0,1,b90c1b008436f10bec0ffec9ce1a7d33a04ae5e63b2f2bb9e311d102f045f060,2024-03-28T02:01:13.303000 +CVE-2024-0075,0,1,2d9eb533d1befa0362cd71e816e50a3e6da65e89da52195d8b4a42d8d2dc2502,2024-03-28T02:01:13.303000 +CVE-2024-0077,0,1,bdf0c108d3ee1d8bf315e6b9cd05e08015440b0ddbfb885d17680a79f074465e,2024-03-28T02:01:13.303000 +CVE-2024-0078,0,1,6621a60a53ce37e266eb25f99012c87dc7679be246eb19ae41d9218e5094e5f6,2024-03-28T02:01:13.303000 +CVE-2024-0079,0,1,f4767fa11332039161d4216c5e55ec4d198329b07073d82b7244b84c097d8516,2024-03-28T02:01:13.303000 CVE-2024-0154,0,0,503aed517e3c557edd7cd4a234585f8e223bdcb46afc8dd52a7284b4bb324992,2024-03-13T18:15:58.530000 CVE-2024-0155,0,0,a75d6b44d8976b9f082fed092efd11db077fc0559b3b5c46ef337c5d8f761d3f,2024-03-04T13:58:23.447000 CVE-2024-0156,0,0,978a8cd7f1acaeac5930d83f177d0fbfbff728a7123e5197399066e9731cb1b4,2024-03-04T13:58:23.447000 @@ -238636,7 +238636,7 @@ CVE-2024-0975,0,0,91c0791baf9b48c9c245a77636f61287ad592fe47de1863701c5fe6e61c0d6 CVE-2024-0976,0,0,161140e9c1a200eff62ad44296dc49a8303a23be090ab83243cad7c797f8f82d,2024-03-13T18:16:18.563000 CVE-2024-0977,0,0,265a9a088dbf9179612f3eba4d6866f7160bf19014cca832dc6a54c521c233b7,2024-02-14T18:46:52.707000 CVE-2024-0978,0,0,bd9486fab4a038f4e847f9788adcccd45ac34e1994eb8b3f3f5dba77cc4513b0,2024-02-29T13:49:29.390000 -CVE-2024-0980,1,1,b3fa7be79647782a2f5a91ddd509e8ef36876e86b6b47d209cfae1efa6c4141b,2024-03-28T00:15:07.867000 +CVE-2024-0980,0,1,da28e8102b3bd45e94607e62ff3413eb1f6e0ab8b1e2566ed2a18e6cb2f6aa98,2024-03-28T02:01:13.303000 CVE-2024-0983,0,0,bb1cce9780d9afeb412811ada7cb9acefd8863ec35c930bdc009e174d02d368f,2024-02-29T13:49:29.390000 CVE-2024-0984,0,0,6080915a3c285e627ed886246e31c6de8d5b3ffea571b8480ecb0516c7add805,2024-02-29T13:49:29.390000 CVE-2024-0985,0,0,7f62d4f229f42e211d79e54ca95fbe4e7e170d1291d382df953b17f7c27d2355,2024-03-18T17:15:06.070000 @@ -239176,6 +239176,7 @@ CVE-2024-1764,0,0,c434e7eb3867d4e9c121215628110f61b78b54be2a078e3d4abbb0d2595e24 CVE-2024-1765,0,0,9393650a3716a95a879e579180f18ed4907e1cef3b587b0e572b47942072153d,2024-03-13T12:33:51.697000 CVE-2024-1767,0,0,164cfb2f79cabfa462770ec4a455f8e91d058d9fb18bef76ee945606225fec24,2024-03-11T01:32:39.697000 CVE-2024-1769,0,0,4b17a6efe485c004cbf1cc71fd32ae864ff319587ea6998c7a1ad28d6dff65e5,2024-03-05T13:41:01.900000 +CVE-2024-1770,1,1,9281c6af1a99a418595299dd2676ee054fda1e9647084c1aca476ff988b536ee,2024-03-28T02:15:09.573000 CVE-2024-1771,0,0,cc7280a085dd6f03eb9687c2eff5425926f2bc0e4a81dde799379b7786c7a87e,2024-03-06T15:18:08.093000 CVE-2024-1772,0,0,0b326d9510559c6067c267d36e9a70471b8bb7ef9e6a03b194bff9465ff37901,2024-03-13T18:15:58.530000 CVE-2024-1773,0,0,eea85e1a4bb87da89a486d39c94ff7ae4042032c41aee54c0645824074a798c9,2024-03-08T14:02:57.420000 @@ -239395,8 +239396,8 @@ CVE-2024-20301,0,0,5731f674f5ae2bcf96420fc328e70e5146901802d1ab3db25461c019cd209 CVE-2024-20303,0,0,e5ac9d50052f4c4c8ef804ccaefc800a16509a09aa16e231d189818adcc2e3c2,2024-03-27T17:48:21.140000 CVE-2024-20305,0,0,ab61a4ab7882e267880cc2c0e6b3ec1ab9c8b4d0dadf3a4832bdf14ae2ae012d,2024-02-15T19:56:38.910000 CVE-2024-20306,0,0,7ce4ce882880d6a48a5bc5e41b86d2467b57bc87bd8f78243b3657e3eec48482,2024-03-27T17:48:21.140000 -CVE-2024-20307,0,0,6e057a049f344ad501317a246d37c6a97da44c74d43554b7afa1d19dde729fe3,2024-03-27T18:15:09.357000 -CVE-2024-20308,0,0,5982f15762a09863ecfc1c3105619d4c65dd988fdcec0e1b0f62fbfed1430f39,2024-03-27T18:15:09.853000 +CVE-2024-20307,0,1,cfac14e2d03f5d2ce0658f69db5b5fd1610287e2ff1d64a236d9cbc4d290f6bb,2024-03-28T02:01:21.693000 +CVE-2024-20308,0,1,af0b2c931d159b241294b59c6f7af8dddd60840a0fc7fa6b1fc4c79e4a4631f3,2024-03-28T02:01:21.693000 CVE-2024-20309,0,0,e1a5a828e0a9998a91a0f24ce922d605b9c5494ea6372c8e56a89d1b0cae6848,2024-03-27T17:48:21.140000 CVE-2024-2031,0,0,8c1bcd6bbcf916842768e08303dd42fc425614624a1e3216d105b6a1ddb5c8c0,2024-03-13T12:33:51.697000 CVE-2024-20311,0,0,c693e0e2ebd0ccff4af9c3de016bddd629d8a55f7bab90eb59f830d5f1210bde,2024-03-27T17:48:21.140000 @@ -239676,6 +239677,8 @@ CVE-2024-20986,0,0,55fd916bbc66a048aba24029df1cdbff6d17cbdc5963bc85efdc3f349c48d CVE-2024-20987,0,0,e6a4199f934ca8909c51db00ae903048e2b51791ebdf6565c06b10750c7af3ef,2024-01-20T18:30:16.877000 CVE-2024-2106,0,0,36a22e42a96a914c41992c81c774d6efd7bfa3b0b0b3c330a2d2cbc45a2a449b,2024-03-13T18:15:58.530000 CVE-2024-2107,0,0,b116f601239eee1477d732dcdf4bd402d2ca5c711c20a89df0a8e9dd54cd4cd1,2024-03-13T12:33:51.697000 +CVE-2024-2110,1,1,98901d9ed02484f2b53c16b0465c0dbe1ecb16bc867b94090e8f842ba0641aba,2024-03-28T02:15:09.990000 +CVE-2024-2111,1,1,64df82b18b96c74f73d8db51669d22a82054cda6f44d598fdf2fd62828a1828f,2024-03-28T02:15:10.397000 CVE-2024-2120,0,0,d869e2d6a05f40fd099ef5d11b57f9e00d7f0b266e38148b71c8a447ce60ab1d,2024-03-27T12:29:30.307000 CVE-2024-2121,0,0,4e86b6ec3433d288b50b9e9c9587d6707962f4c2d7ff92215a6366c5fd16dc6b,2024-03-27T12:29:30.307000 CVE-2024-2123,0,0,73501544f7a3558963420aa67d952b80e94655e9088396c3288ccd604d8029fd,2024-03-13T12:33:51.697000 @@ -240664,7 +240667,7 @@ CVE-2024-23446,0,0,250d55c97e03f858281f4b571f5417bd7430f2eb75d812ec1a5460363cd23 CVE-2024-23447,0,0,d914699914a1032e2f26c2be4fcf7737ff60c4d99dbe7a58145b0312508d8818,2024-02-14T20:02:00.753000 CVE-2024-23448,0,0,9b1c1e9aca41646e9bc0b5aea887714df628a3eafb241e1a8858ac207b41bd27,2024-02-15T15:39:14.317000 CVE-2024-23450,0,0,6ff242ba8621158a6fc5bf1e14cebaff80a919a65abf5fe5c94bac3fd2cfef43,2024-03-27T17:48:21.140000 -CVE-2024-23451,0,0,396a36e96f019a84ce41421d631ed0347d8e4d3267d4975e6f03c5a130a41249,2024-03-27T18:15:10.330000 +CVE-2024-23451,0,1,f3b5a24f7da83e111444dc1acc1868313e949f20ef4570c22f64673b983cb9ff,2024-03-28T02:01:21.693000 CVE-2024-23452,0,0,aaa529ca6e03eefd16006bb57cfd95647fc8b44bb3a3176fd8a83e06021cb7e9,2024-02-29T01:44:08.877000 CVE-2024-23453,0,0,ab3a22284e10fea1933712f86026a2e7792304e1f83321557a4d02140679b266,2024-01-29T22:58:07.777000 CVE-2024-23476,0,0,e3d84cdb88c20fc5ad4183c7e154fd4eb94d6574a64f56328103056889f0fc9e,2024-02-20T20:39:10.033000 @@ -241544,7 +241547,7 @@ CVE-2024-25344,0,0,5140bac0aef452b65d54f79c6217b05ec44dd1a460f10a2ceaa1e65877e2e CVE-2024-2535,0,0,0dd9e1bc0e1cb89bd4d5eca9981e8a4999a84b5f3fcccfdbdcf3cfa421537713,2024-03-21T02:52:37.310000 CVE-2024-25350,0,0,3b5e1a464fb4fcd28f6d7166045a369486403df18ae61c0e2fab4e4e5871d428,2024-02-29T13:49:47.277000 CVE-2024-25351,0,0,28c4ca40865cd756499ab4d2ad9d55bb73b890cae2259528816b47b2a536dca5,2024-02-29T13:49:47.277000 -CVE-2024-25354,0,0,8ffa14e65dad44e455c11c6e3bac91e7d99dc2f81dd850ad2377a545aef5694f,2024-03-27T22:15:10.093000 +CVE-2024-25354,0,1,a12b2d299fce99ca8082ea1fd30c459ccbbfd96e0b721c0145b84f55090dd048,2024-03-28T02:01:13.303000 CVE-2024-25359,0,0,9c7e950ef54f547e29dbfe7e3905d1cbbbe8e0be6e3cf6f262ec35911e4dc9e2,2024-03-21T12:58:51.093000 CVE-2024-25360,0,0,3e224bc7b3e9e14e80fd4bf018fb256496be6af2f44b523d9f71f67e98675039,2024-02-12T17:31:21.670000 CVE-2024-25366,0,0,dee495aa8a0f0bbcbead8039fddcd3f716b7e5ed2944c5a0aca4a92e1be3c151,2024-02-20T19:50:53.960000 @@ -242450,6 +242453,18 @@ CVE-2024-27995,0,0,31db9c3046ef3b6826fd04aab15586376d26e0b529bdf84ce7eba17bac569 CVE-2024-27996,0,0,79cff30308b011c07df476cb18acc5ff1830e7bf17b14d1ca5a0d9446fa716b8,2024-03-20T13:00:16.367000 CVE-2024-27997,0,0,b42c7cf4751e4a11a6e5eeb90c0df264fce89958ee556b8b06894cd2e68b11ce,2024-03-20T13:00:16.367000 CVE-2024-27998,0,0,325b1a8419d02931fcb08c1286afe5c33e53c5bf8527e201a365155e360914cf,2024-03-20T13:00:16.367000 +CVE-2024-28005,1,1,8683f5c2a8105ad701e313b14e0701e07109091805a7494e1e3a66bd4dc47ae5,2024-03-28T02:01:13.303000 +CVE-2024-28006,1,1,f88c502d4a65d1f66cc70843b883d7246320056be031b7f1a8e9c1929111a63a,2024-03-28T02:01:13.303000 +CVE-2024-28007,1,1,eeaa3124554634dbe3aa791e9381e85b397525258e1205e3ad612c93c3d4926d,2024-03-28T02:01:13.303000 +CVE-2024-28008,1,1,4ab2d90baecd4ac275519b421b0807a78662a112314e89d8dc6953cd05b64727,2024-03-28T02:01:13.303000 +CVE-2024-28009,1,1,e1c3e4fa24cd04cd8c467609d26d27e72f11993ac4c36c700f27746cdd0ae07c,2024-03-28T02:01:13.303000 +CVE-2024-28010,1,1,d6b058bc281ac248ea38e84579789c0636ce5372c40f0ca078aa2d6659d9f0a7,2024-03-28T02:01:13.303000 +CVE-2024-28011,1,1,2c6fa266dd1c65d935074c5d457daa7b9a6d8d5c8359b69f36eab79706d44e51,2024-03-28T02:01:13.303000 +CVE-2024-28012,1,1,cc1bd50e1c07bef900959872f35ca6f528ba778dc6bf5c9e1f79469d29bfd25a,2024-03-28T02:01:13.303000 +CVE-2024-28013,1,1,5b1ea81b724b32bbc27814407c9aeab9d56b1feae6a99f2edfe2bf7cb69c2824,2024-03-28T02:01:13.303000 +CVE-2024-28014,1,1,2766d243cce4e440bd7bf9e6afb16a2018c8b35e3aa83a9fe5a882f1973daab5,2024-03-28T02:01:13.303000 +CVE-2024-28015,1,1,e94184d7384bc0cddf6a652e35600ae00fd000a34a504d303eb07e1147272be1,2024-03-28T02:01:13.303000 +CVE-2024-28016,1,1,70725e6369abb30b9e296b010e5e3a25e39825a8553c40bab8c10cd665f2a8f3,2024-03-28T02:01:13.303000 CVE-2024-2802,0,0,3b7ed9aefbc68681b0633b6ab16c0b3db6db844ee4c655f6c7e6863ac6e1f543,2024-03-26T15:15:49.677000 CVE-2024-28029,0,0,9e465d515603ce2b4056e1d4099525822960990d4afbdcda109cb1a09fe772c2,2024-03-25T16:06:44.403000 CVE-2024-28033,0,0,d380f707343e80ca8a48383d7130e8455ae81fc182e0d67c36374f1eb571652f,2024-03-26T12:55:05.010000 @@ -242468,7 +242483,7 @@ CVE-2024-2807,0,0,47b8a7021ebbb15acc350203dd3081726f7b96c650b8d998414fd135c1027f CVE-2024-28070,0,0,d9b3309fdc4db05937449ae85d6df93a299898f40c2c79f5bb7988f4ebb25838,2024-03-17T22:38:29.433000 CVE-2024-2808,0,0,a0621aec3e17f906967cd04e2f75551ea2d13f29c3ece6e8f56dccb94d17afe1,2024-03-26T03:13:36.183000 CVE-2024-28084,0,0,e855eaf3201adbee7f29bca688e63324787cf32844050753a9cd1965f8c4b542,2024-03-23T03:15:11.583000 -CVE-2024-28085,0,0,98bf8795c0110d4df8052feb8dcd9584d06668c2d76d6af8803048daa3592c71,2024-03-27T19:15:48.367000 +CVE-2024-28085,0,1,0844fa2b1529f2eeab96b834f8c50db7faab0f274d17fe55fe3f3354648f9ded,2024-03-28T02:01:21.693000 CVE-2024-28088,0,0,d2f20b1069b24ba10d21e8bf3b61c2c6a1c6b345ff59786676752b80abbde7a4,2024-03-13T21:16:00.380000 CVE-2024-28089,0,0,830991c1dd5898b6a817a3f8bb8784922af3636f20b8b62ba1c918d5d83f6f10,2024-03-11T01:32:29.610000 CVE-2024-2809,0,0,16a24c41619de5ba8d47e944f4573d2f7981695d1c5bec0e5f48dbb2fc9c9b69,2024-03-26T03:13:47.830000 @@ -242561,7 +242576,7 @@ CVE-2024-28229,0,0,7bfc3b59e790a5126732ec4d8d480f9938166a41475488b32e066c1e064cc CVE-2024-2823,0,0,1867dc09c5e833da359a0c14ac91c9482d72bb78f2ce80c84c0309fdaa923bfc,2024-03-22T19:02:10.300000 CVE-2024-28230,0,0,3036aa70102b53b9cc695265dc4a11e5a4f5b8d26f6120835dbd1a9c3d93e7ec,2024-03-07T13:52:27.110000 CVE-2024-28231,0,0,f41f4c1605399e97b52547261c763ca0d059815d5c55e921912a149cd091acde,2024-03-21T12:58:51.093000 -CVE-2024-28233,0,0,6e7adbfcda365f18ba124f94907710cd713a299e802391a71f30620ea74e66ca,2024-03-27T19:15:48.430000 +CVE-2024-28233,0,1,accd19653e4fb87965492361d5e3e83a58cd9545ef54fcd1230d21b32b8e2d7d,2024-03-28T02:01:21.693000 CVE-2024-28236,0,0,ea7d34bffb060eb0191757ceb4c446ee8bfa4166cb7d1e0d8e67e75c651ba966,2024-03-13T12:33:51.697000 CVE-2024-28237,0,0,e54564ebce9f53fbf47a1a617d4c2539d1d06a16522000543afac14f934cf25f,2024-03-19T13:26:46 CVE-2024-28238,0,0,38219e010007b7fe5426826144cd2eabd2e22d36d31c50aa8471901674b524b3,2024-03-13T12:33:51.697000 @@ -242572,7 +242587,7 @@ CVE-2024-28243,0,0,b62121443f467a21df9a72e6de805a7094f659c79fc9b69ca113c6cd74783 CVE-2024-28244,0,0,8a0b0822374c9608b1ee3be4ddc31140538b510b0fd28061fd05bdbdf794fae2,2024-03-26T12:55:05.010000 CVE-2024-28245,0,0,ad5a09bb643469edf06f460630cbf65a15180867ced005dc01d0df0098be8f11,2024-03-26T12:55:05.010000 CVE-2024-28246,0,0,cd369a06f7ae7fd9ab35271cb07a672352ca99976424cd04633d8a0d97406151,2024-03-26T12:55:05.010000 -CVE-2024-28247,0,0,4c1010e8b1387a3575ae9cc58499c5ad2d20c679556fbdf0aedbea77747fa924,2024-03-27T19:15:48.637000 +CVE-2024-28247,0,1,87b4f0566478ba31d229d1c04aaf30844c7556166681b4cd3694403f3487669f,2024-03-28T02:01:21.693000 CVE-2024-28248,0,0,b617812c524b85d27f2a46b3a739648463fa9ffb5a6e46ea47ba0c68bd3fa409,2024-03-19T13:26:46 CVE-2024-28249,0,0,7f01b3731d6ed3594265964b9061da88eb89dfe99b6d59bfec8413859c3ac454,2024-03-19T13:26:46 CVE-2024-2825,0,0,731d564e18c15016bfac25b783d866bfc2b3073e42c4b54f0ca736209097bfbb,2024-03-25T01:51:01.223000 @@ -242731,7 +242746,7 @@ CVE-2024-28854,0,0,8cb03aded6b194ffbf5e93b6a999bfbf01ac8f736343c4fc752b0e38a8bc9 CVE-2024-28855,0,0,2384a3330fde47f752f152bfa13a6226cb6b236bb18ff2466f5e886c7d3e893c,2024-03-19T13:26:46 CVE-2024-28859,0,0,2d0407c7b83f2786a493b842ae3fe3ce3f906494adee8b0e0f61c75557fcb17c,2024-03-17T22:38:29.433000 CVE-2024-2886,0,0,6e2c93ce5d4e26c4d3323ffd43f5daeef03c7e577cbecbc4edf8fb5cb68f2687,2024-03-27T12:29:30.307000 -CVE-2024-28860,0,0,8530891db4a7f991deeb8743eda677f9aafce06f98a8d822a07506287d8e28eb,2024-03-27T19:15:48.827000 +CVE-2024-28860,0,1,2922536757c7a9c3be62061c37c7cfc0e4757a979c8cb3f1c58b90b8c5136336,2024-03-28T02:01:21.693000 CVE-2024-28861,0,0,614b056391803730ffc563205182a9ac310eb6811e0e407400ba2dc4b494f050,2024-03-22T19:02:10.300000 CVE-2024-28862,0,0,b0dc40150b0e5f15633ecb26c2614b37fe6eefbb423911349887989b36d78640,2024-03-17T22:38:29.433000 CVE-2024-28863,0,0,ad7818a88579939a8a2c9b467548624411262308646c7865759640aa6d437826,2024-03-22T12:45:36.130000 @@ -242983,22 +242998,22 @@ CVE-2024-29876,0,0,81e9b92db68fe1869c86668a1e00f2a9ff624f59839df1fbe18d8e987774c CVE-2024-29877,0,0,5b6a7271e346dceec62c9141f9ae12b0e5342a31cc26366c653fe20c26c8bc21,2024-03-21T15:24:35.093000 CVE-2024-29878,0,0,59bd69937e12e8238cdc5eae96014d85a453bedc37861446ca2ffcb7373dda8d,2024-03-21T15:24:35.093000 CVE-2024-29879,0,0,f281e5565c18f62981e30c243c39ad05583d9bbab1631a620c93b3c78846e1db,2024-03-21T15:24:35.093000 -CVE-2024-2988,0,0,44a505017c98ed38c8d5dc5d8e011605d3c9f7895e5eca811eae32b18fc8f7bb,2024-03-27T18:15:10.757000 +CVE-2024-2988,0,1,095fa6458e008f6f7d69334248969b0501d37383db72dc8bee93560edc741f88,2024-03-28T02:01:21.693000 CVE-2024-29880,0,0,e4ba47a3336aba44b26bc2b767c682c9997cfe6f0e16a9457e7fe50a3abeaa1c,2024-03-21T15:24:35.093000 CVE-2024-29881,0,0,7eaff78a6eecd508372203508f2ecab97ebc62cfd94b7af6101b5d7b6ca209b2,2024-03-26T17:09:53.043000 CVE-2024-29883,0,0,2444d321a867d6f4cdf63bf8a1bc6af3b407752f2134c1f64a1d02545242c426,2024-03-26T17:09:53.043000 -CVE-2024-29886,0,0,1adbb5073cba9b65593ecf8998a22e2a5d29436a3607268c528bf401c023cbf4,2024-03-27T19:15:49.023000 -CVE-2024-29887,0,0,d4e3377385744fa243f8c752377b78d10fb04f6b3cf56c3bd0fe2bd96f11984d,2024-03-27T19:15:49.230000 -CVE-2024-29888,0,0,816e1902566b12dbf24377b613baef5b79a414fcea833a258cf044d46f30bd51,2024-03-27T19:15:49.410000 -CVE-2024-2989,0,0,28b7dcd865137d9f2b8b08b53206e10e337ffacc5ed400750f6a854bac66dab1,2024-03-27T18:15:11.293000 -CVE-2024-29891,0,0,7f9df39928cbbf99e5030accf6dd8020531a4366a49ed903a14fbbd277432a72,2024-03-27T20:15:07.780000 -CVE-2024-29892,0,0,11a2de43764af3b9fd0910af9f11c950352c98e69bb104177454ad296186dea9,2024-03-27T20:15:08.303000 -CVE-2024-2990,0,0,29d47249dc9edae8b71b72a27ada065a3a8487192facbacb3019e2adced6a348,2024-03-27T19:15:49.710000 +CVE-2024-29886,0,1,3f88cfdb4cfb88186dd10b00ca51e7380d7eb2a0a458754ea1dfe21c4512300e,2024-03-28T02:01:21.693000 +CVE-2024-29887,0,1,f387f1fcc31e0714aa90eb378be59a2d52ee246f68fe9dafd34624693c2abecd,2024-03-28T02:01:13.303000 +CVE-2024-29888,0,1,e6980a084f851bc0c8ffe0d4edac384e7194ab82af737faf570a62d329543dbf,2024-03-28T02:01:13.303000 +CVE-2024-2989,0,1,7bf7e9a03ba8c5d37e74d436f6afb4547ab8035499b1c3a92009f461628a8bf5,2024-03-28T02:01:21.693000 +CVE-2024-29891,0,1,8db13a694d94d9c0ea356374520c4ec758a3562c2da8a21f831daea1cc8fa44b,2024-03-28T02:01:13.303000 +CVE-2024-29892,0,1,59c6b24496fc40dcb3fc7fa651d54d9a835514ae28a8bca0877d6fdd02e37f42,2024-03-28T02:01:13.303000 +CVE-2024-2990,0,1,7b8bc4275f049749984166beead5725a3bf23799e4803482e7e47aaa1bac7e25,2024-03-28T02:01:13.303000 CVE-2024-29906,0,0,5e6afa8dbe77b2ceaee29629c66d8bdf273caddf4f38f955d682aeefe9beab4c,2024-03-27T12:29:30.307000 CVE-2024-29907,0,0,95ebf1e66704307f93559559f18923b10f644f7f3c6486fedede31060b34f004,2024-03-27T12:29:30.307000 CVE-2024-29908,0,0,e8d16098eaf081188862f8dc959904187f56568ff6eac559fa0228e1e293cd7d,2024-03-27T12:29:30.307000 CVE-2024-29909,0,0,e35d692490bf4e850bd9c44310b2bcdc71d1e19ea89b9513c3662fc2e536f1c8,2024-03-27T12:29:30.307000 -CVE-2024-2991,0,0,014fa0679cec95d7a2a8ad346f5e226ee43d3aeec7d3d19682b1d957d0dafc70,2024-03-27T19:15:49.940000 +CVE-2024-2991,0,1,28194ab52dc1533fb7cd9475b7ea52373eb0e89e0809cf242b249c7cd9338c9e,2024-03-28T02:01:13.303000 CVE-2024-29910,0,0,95e0ced080c2415c20a79532702b8302d4b33d6cd325a6b1a825844244f8d827,2024-03-27T12:29:30.307000 CVE-2024-29911,0,0,4092008a0663d92018dc076934d26b4252495c9f0c609c40c7a0a9cb7408115c,2024-03-27T12:29:30.307000 CVE-2024-29912,0,0,d4e137e215b0b00b25a8930ce0d0657c6dd7b00bfc0db6a92606d9a19e62f5d7,2024-03-27T12:29:30.307000 @@ -243009,7 +243024,7 @@ CVE-2024-29916,0,0,dd300e18b662f862d3dd0881eace85d81be3f3aaeb79c908bcef100a80a89 CVE-2024-29917,0,0,95c3e445522199a26b83d938184afd90a1d9b3b2a8bc319b5dd0b9abf802413e,2024-03-27T12:29:30.307000 CVE-2024-29918,0,0,c4d24a04c4f4c9971aa2b61b2b16b6699727fc3170e99022d4d427890c1308f4,2024-03-27T12:29:30.307000 CVE-2024-29919,0,0,817229c260cd52d55a65e42df611e748e6f73b9a57660f2c28863f6cf3622c00,2024-03-27T12:29:30.307000 -CVE-2024-2992,0,0,2d65220d2b906672bb98850be6a500c5b6a513172eb7363240df1e5290ef793c,2024-03-27T19:15:50.173000 +CVE-2024-2992,0,1,9219d051f876e9941f510c639a9b5b2cc6f24f0362001ef7f916e18c91fe6287,2024-03-28T02:01:13.303000 CVE-2024-29920,0,0,ef33728d425fa66d6d618e2c1f88f50e442af75e655f18f6b3eeb620b9fc8dc0,2024-03-27T12:29:30.307000 CVE-2024-29921,0,0,d005f56290a07c8d41af4f88ae2cfe5cc38df315cb7fe36491d361da55105483,2024-03-27T12:29:30.307000 CVE-2024-29922,0,0,43b2a415461fb932606c7e442074762fc1c7f75ddb5f3011fe888c9d97612372,2024-03-27T12:29:30.307000 @@ -243020,7 +243035,7 @@ CVE-2024-29926,0,0,a774ce80509ca41dda348dca084b78d2d28da05a59a7cf4caade3a676403d CVE-2024-29927,0,0,be07820d91f38299d9fb6d4df08336e2d6d59401fb34adcc97e6c8bfc54c88ce,2024-03-27T12:29:30.307000 CVE-2024-29928,0,0,af15186b7473fc265776521d890548138671a1bf67efd8d69ad310a551d30c19,2024-03-27T12:29:30.307000 CVE-2024-29929,0,0,27716aabdc6516c3ef94065c2b993ed5b5982de82d07dca6a414e351d3ba3758,2024-03-27T12:29:30.307000 -CVE-2024-2993,0,0,4a6a8a4998f75a6ef469a63cfb2c694f28f2ad841535ff48deca75494d13eed3,2024-03-27T20:15:08.780000 +CVE-2024-2993,0,1,19fb072ccdbbe3c6f13615b4b61686a3a806880bbe254abf203e1109d2e68c8c,2024-03-28T02:01:13.303000 CVE-2024-29930,0,0,6fcc220221700641e9da16e849b0714ef9f33840931a344748681165e2c7f58e,2024-03-27T12:29:30.307000 CVE-2024-29931,0,0,5fa913a409729523af37223992622bba3903bd19b9d545f7af9b777e9cbf348b,2024-03-27T12:29:30.307000 CVE-2024-29932,0,0,5d75cdd8ba02e2819991be48064230f949a31f4f4858cf3f43a7fca421016a8e,2024-03-27T12:29:30.307000 @@ -243028,28 +243043,31 @@ CVE-2024-29933,0,0,dedf4a0436c982230abe9b7179ec1be71724b7f64030e788ba0f8ea6283ee CVE-2024-29934,0,0,ca29550acd62f197f05fb73019cfe7d9a35aa76590a642b08535ea1b8d4c335b,2024-03-27T12:29:30.307000 CVE-2024-29935,0,0,be0415ab39e2424d7707b3e026043937bddf40f9f881b75f312fe4db29a7520f,2024-03-27T12:29:30.307000 CVE-2024-29936,0,0,a0aa951ea6a61ca1da8503010b43db132d71646708e0e57d95e11fe2a44ec10b,2024-03-27T12:29:30.307000 -CVE-2024-2994,0,0,9187e6071eddb36de6c79beb98a55c89d0ec8e6a41098ca1d49256ced96f9544,2024-03-27T20:15:09.337000 +CVE-2024-2994,0,1,01df9e0e701aa4c00b07aa8699ff96f5f299daeb7fd543137b2bb411af05f8be,2024-03-28T02:01:13.303000 CVE-2024-29943,0,0,39d573a490fc5d2b219e8af270d3feeff9aa72e4341ddd52f10b0ddfa677f78e,2024-03-22T15:34:43.663000 CVE-2024-29944,0,0,4d21f9c7c1ab1ff30cce77b261f7b06b8e28526248b968d986726dab452f24fc,2024-03-25T17:15:51.670000 CVE-2024-29945,0,0,d468839ff8eda4d8c6f46306d679b186fb3a35cb164da7996268d3c3b56c2c95,2024-03-27T19:15:49.607000 CVE-2024-29946,0,0,1dcd38a0ed008144b587f71b29e9f0373aec4787ad19668521370ecc593e8a2d,2024-03-27T17:48:21.140000 -CVE-2024-2995,0,0,4626bf177e733f40a1ea9f83594ae62ce4072729d8dd6b6a61f3df0501cb44a7,2024-03-27T20:15:09.903000 -CVE-2024-2996,0,0,e21e31a1014d7574fca474fe1e8c11dded480086d1946ee193f1b733f7350546,2024-03-27T20:15:10.507000 -CVE-2024-2997,0,0,5c3b6b4ce06af38af512caba97a7c7ae74fa11b39083401d1d2075e5a6abd3a5,2024-03-27T21:15:48.897000 -CVE-2024-2998,0,0,cd5705d6b026d396871ca4e95d4b7f9a86838b3d78e397cd9761907425fce04e,2024-03-27T21:15:49.127000 -CVE-2024-2999,0,0,afb3d73c91581365be63fa5ad0aeb88c569b47d42295c65beb15f1f5f4da51b8,2024-03-27T21:15:49.407000 -CVE-2024-3000,0,0,9b22952ee64e5e87fc79d5099df1aa4069802e8b7a1f4268d0cc87031d41285f,2024-03-27T22:15:10.150000 -CVE-2024-3001,0,0,682d2044f9a3a30255eeea942d0bec4a353ff887fcb100216ed3c8742fc3f068,2024-03-27T22:15:10.673000 -CVE-2024-3002,0,0,55dfa15a59deb16ce7a61101429cb6a8191bd094bf0dd573efdf4afe24cfc945,2024-03-27T22:15:11.300000 -CVE-2024-3003,0,0,56f5a4cff6fc6f04e203cdc8d50b76613ad1ba3c8ec74b96104c067150748f8c,2024-03-27T22:15:11.880000 -CVE-2024-3004,1,1,606d1f0aa8668c78ba578e749fbb4dc419dcd7c2b7c096f394756340a48c333b,2024-03-27T23:15:46.637000 -CVE-2024-3006,1,1,b11495a55d0cd29c3ed7b43bfa3a9ba78c9c7973b037290d36617d18ec58efab,2024-03-27T23:15:46.880000 -CVE-2024-3007,1,1,bc66cda1d8770250fca6580b74df2bfa28ab43f5007732e2d7025c69fba10414,2024-03-27T23:15:47.110000 -CVE-2024-3008,1,1,50fca93d9a2d37b182d9c6595996d4602fc230762a1497844317c339a776e2db,2024-03-27T23:15:47.340000 -CVE-2024-3009,1,1,d2b61b9d4ba9193e8061eaf543ce59ab4ac7f530b350b764963338ee5f1a011c,2024-03-28T00:15:07.993000 -CVE-2024-3010,1,1,45ebde3dd088c947f711d3eed73d4f214f69f041f5b4264e6d7fdda078526e5b,2024-03-28T00:15:08.250000 -CVE-2024-3011,1,1,31ee23f5891c25a234edbee875fdb131fd96ed37bae73293ae67f6e74ebae19c,2024-03-28T00:15:08.500000 -CVE-2024-3012,1,1,b138b64b62478c2d40769e68357ff0f5228d86d81849bfaa053d881f32f63560,2024-03-28T00:15:08.773000 +CVE-2024-2995,0,1,6938b04394412a984b03c3b3f2aae9a80d546f606dc78bd3c0d765c908d4e00d,2024-03-28T02:01:13.303000 +CVE-2024-2996,0,1,a33827e06c0891f964663494f7bcb2f8e84df325c8f21a7c33767ff93c651a34,2024-03-28T02:01:13.303000 +CVE-2024-2997,0,1,edf54a0b2200417f8f2161eecc7e05836af23a7a14234d037fa87fe37094f10d,2024-03-28T02:01:13.303000 +CVE-2024-2998,0,1,29e7e756b2f4afa97646ced006d2335e8d1283d2dad0e7404736374e946fe6f8,2024-03-28T02:01:13.303000 +CVE-2024-2999,0,1,b7f6186b496208d85a602fa4826f0ddb59ffb865a352724ee454d2fd5dcc1a52,2024-03-28T02:01:13.303000 +CVE-2024-3000,0,1,63ab755d7f6ac81083e0c5233def11665816dd389e8c671c2abd93b07292d136,2024-03-28T02:01:13.303000 +CVE-2024-3001,0,1,b0a4d94d810b3b5ce203967d5d4f192906775734fe22a601ae42fa09b4614872,2024-03-28T02:01:13.303000 +CVE-2024-3002,0,1,72379fcb06b968b866e87b09abf565f7f1b9c210012d38abd054c283ba39f429,2024-03-28T02:01:13.303000 +CVE-2024-3003,0,1,0c7db0454eb65bd6813f92fabacfe6818ad9b3811de3bddd8af2c028d374d479,2024-03-28T02:01:13.303000 +CVE-2024-3004,0,1,1ed2e312bfd69d62a979910fb81949ea2c0f19fc22049e794e7c6c166d721ee1,2024-03-28T02:01:13.303000 +CVE-2024-3006,0,1,19131dc4e80d3e35b5a5630a8a59b6a59e2c322457df664736e6101b500ccd96,2024-03-28T02:01:13.303000 +CVE-2024-3007,0,1,e24dc48f046385a605302d5cc27ea771dce08a7f050daff2a52f236e98628db4,2024-03-28T02:01:13.303000 +CVE-2024-3008,0,1,980a9dd754f4dffebc503825af6cc97086497abcad051206431fa223da1c02af,2024-03-28T02:01:13.303000 +CVE-2024-3009,0,1,4cffd8d9e8f2a2f7b01296b73439a1025174aff1fdfbe526a7febd47ef374640,2024-03-28T02:01:13.303000 +CVE-2024-3010,0,1,1d79c6735c24633a8cac524b82b7024ac823a23d87ef87f8c3e5dc24ef21d531,2024-03-28T02:01:13.303000 +CVE-2024-3011,0,1,a80a297d10b8f124e8428966475875e7d47253f91e3c2fcc2d74dc76bcf01fe5,2024-03-28T02:01:13.303000 +CVE-2024-3012,0,1,e828f82506d2cce05b2f55b2fe4a731b5432f75e82c24d919f208e00ece9c7f9,2024-03-28T02:01:13.303000 +CVE-2024-3013,1,1,db364a22fe20e2d060338b4b3367ff26d00c44da0eb170a2568b3193dd990911,2024-03-28T02:01:13.303000 +CVE-2024-3014,1,1,57dd337802948c0c36abeb7862e4d697d25a39c1914e60d6e237ec085f38c22e,2024-03-28T02:01:13.303000 +CVE-2024-3015,1,1,8a30b4b1ce42c6dc8701b41d326d2dd150d690f1c908172c7e205b75748707f6,2024-03-28T02:15:10.813000 CVE-2024-30156,0,0,aff0cd27a6d4ebd55e03f44f61cc23ee9163e094843acbac5af736e684ab9391,2024-03-25T01:51:01.223000 CVE-2024-30161,0,0,f6d00094643508d05d1e5626fca4ef83c82ab69ba4696adb329c49eff6d0ab4a,2024-03-25T01:51:01.223000 CVE-2024-30177,0,0,ce7cec2fca67508ea4a8b86ac0339410ad9c9cb05c2afad1960db626913e7789,2024-03-27T12:29:30.307000 @@ -243082,3 +243100,4 @@ CVE-2024-30233,0,0,4c2695d2f3b076c7408bd91fee17c2a607f64636c8c0001f359b0796de1d2 CVE-2024-30234,0,0,a6be244378f8a1646e756d1cd111fc8fb568601f74deb65508c56b004a03b137,2024-03-26T17:09:53.043000 CVE-2024-30235,0,0,ef6f7f84deca979173abd2d122dde5dfb4f5568a80e848e8fa95eae1319c946f,2024-03-26T17:09:53.043000 CVE-2024-30238,0,0,33e85580fdd0a4e3fa2eff1ee3b65f63c015d9c54bc4af4192eb2ee2204281b7,2024-03-27T15:49:41.437000 +CVE-2024-3024,1,1,5dbf5f2d941f96943d3fea061836a41f326705e3244e22070d3d45564f39691e,2024-03-28T02:15:11.337000