From b9eae881ee57b15e4396660a172525e08cb0d58d Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 18 Mar 2024 07:03:25 +0000 Subject: [PATCH] Auto-Update: 2024-03-18T07:00:38.495956+00:00 --- CVE-2018/CVE-2018-250xx/CVE-2018-25099.json | 28 ++++++++++++++ CVE-2021/CVE-2021-471xx/CVE-2021-47154.json | 32 +++++++++++++++ CVE-2021/CVE-2021-471xx/CVE-2021-47155.json | 24 ++++++++++++ CVE-2021/CVE-2021-471xx/CVE-2021-47156.json | 28 ++++++++++++++ CVE-2021/CVE-2021-471xx/CVE-2021-47157.json | 24 ++++++++++++ CVE-2024/CVE-2024-291xx/CVE-2024-29151.json | 20 ++++++++++ CVE-2024/CVE-2024-291xx/CVE-2024-29154.json | 43 +++++++++++++++++++++ README.md | 24 ++++++------ _state.csv | 25 +++++++----- 9 files changed, 226 insertions(+), 22 deletions(-) create mode 100644 CVE-2018/CVE-2018-250xx/CVE-2018-25099.json create mode 100644 CVE-2021/CVE-2021-471xx/CVE-2021-47154.json create mode 100644 CVE-2021/CVE-2021-471xx/CVE-2021-47155.json create mode 100644 CVE-2021/CVE-2021-471xx/CVE-2021-47156.json create mode 100644 CVE-2021/CVE-2021-471xx/CVE-2021-47157.json create mode 100644 CVE-2024/CVE-2024-291xx/CVE-2024-29151.json create mode 100644 CVE-2024/CVE-2024-291xx/CVE-2024-29154.json diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25099.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25099.json new file mode 100644 index 00000000000..e45063ab90e --- /dev/null +++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25099.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2018-25099", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-18T05:15:06.007", + "lastModified": "2024-03-18T05:15:06.007", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In the CryptX module before 0.062 for Perl, gcm_decrypt_verify() and chacha20poly1305_decrypt_verify() do not verify the tag." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/DCIT/perl-CryptX/issues/47", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/libtom/libtomcrypt/pull/451", + "source": "cve@mitre.org" + }, + { + "url": "https://metacpan.org/dist/CryptX/changes", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47154.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47154.json new file mode 100644 index 00000000000..ff298e2da0a --- /dev/null +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47154.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2021-47154", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-18T05:15:06.140", + "lastModified": "2024-03-18T05:15:06.140", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Net::CIDR::Lite module before 0.22 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/stigtsp/Net-CIDR-Lite/commit/23b6ff0590dc279521863a502e890ef19a5a76fc", + "source": "cve@mitre.org" + }, + { + "url": "https://metacpan.org/dist/Net-CIDR-Lite/changes", + "source": "cve@mitre.org" + }, + { + "url": "https://metacpan.org/pod/Net::CIDR::Lite", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47155.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47155.json new file mode 100644 index 00000000000..7d0e767a9ab --- /dev/null +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47155.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2021-47155", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-18T05:15:06.203", + "lastModified": "2024-03-18T05:15:06.203", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Net::IPV4Addr module 0.10 for Perl does not properly consider extraneous zero characters in an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/#net-ipv4addrhttpsmetacpanorgreleasenet-ipv4addr", + "source": "cve@mitre.org" + }, + { + "url": "https://metacpan.org/release/Net-IPv4Addr", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47156.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47156.json new file mode 100644 index 00000000000..4e31d9e3325 --- /dev/null +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47156.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2021-47156", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-18T05:15:06.260", + "lastModified": "2024-03-18T05:15:06.260", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Net::IPAddress::Util module before 5.000 for Perl does not properly consider extraneous zero characters in an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/", + "source": "cve@mitre.org" + }, + { + "url": "https://metacpan.org/release/Net-IPAddress-Util", + "source": "cve@mitre.org" + }, + { + "url": "https://metacpan.org/release/PWBENNETT/Net-IPAddress-Util-5.000/changes", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47157.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47157.json new file mode 100644 index 00000000000..5a1041cbc48 --- /dev/null +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47157.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2021-47157", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-18T05:15:06.317", + "lastModified": "2024-03-18T05:15:06.317", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Kossy module before 0.60 for Perl allows JSON hijacking because of X-Requested-With mishandling." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/kazeburo/Kossy/pull/16", + "source": "cve@mitre.org" + }, + { + "url": "https://metacpan.org/dist/Kossy/changes", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29151.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29151.json new file mode 100644 index 00000000000..82b2acc119c --- /dev/null +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29151.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-29151", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-18T06:15:05.913", + "lastModified": "2024-03-18T06:15:05.913", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Rocket.Chat.Audit through 5ad78e8 depends on filecachetools, which does not exist in PyPI." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/RocketChat/Rocket.Chat.Audit/blob/5ad78e8017a9e190602e8257c22500ded0d931a9/requirements.txt#L3", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29154.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29154.json new file mode 100644 index 00000000000..7c12791b872 --- /dev/null +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29154.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2024-29154", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-18T06:15:06.080", + "lastModified": "2024-03-18T06:15:06.080", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "danielmiessler fabric through 1.3.0 allows installer/client/gui/static/js/index.js XSS because of innerHTML mishandling, such as in htmlToPlainText." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 3.7 + } + ] + }, + "references": [ + { + "url": "https://sec1.io/security-advisories/cross-site-scripting-xss/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index cb36c4a1e1a..bdf5f38ece8 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-03-18T05:00:38.548964+00:00 +2024-03-18T07:00:38.495956+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-03-18T04:15:09.987000+00:00 +2024-03-18T06:15:06.080000+00:00 ``` ### Last Data Feed Release @@ -29,28 +29,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -241767 +241774 ``` ### CVEs added in the last Commit Recently added CVEs: `7` -* [CVE-2022-47036](CVE-2022/CVE-2022-470xx/CVE-2022-47036.json) (`2024-03-18T03:15:05.957`) -* [CVE-2022-47037](CVE-2022/CVE-2022-470xx/CVE-2022-47037.json) (`2024-03-18T03:15:06.017`) -* [CVE-2024-24539](CVE-2024/CVE-2024-245xx/CVE-2024-24539.json) (`2024-03-18T03:15:06.067`) -* [CVE-2024-2577](CVE-2024/CVE-2024-25xx/CVE-2024-2577.json) (`2024-03-18T03:15:06.123`) -* [CVE-2024-2581](CVE-2024/CVE-2024-25xx/CVE-2024-2581.json) (`2024-03-18T03:15:06.380`) -* [CVE-2024-27757](CVE-2024/CVE-2024-277xx/CVE-2024-27757.json) (`2024-03-18T04:15:09.667`) -* [CVE-2024-28745](CVE-2024/CVE-2024-287xx/CVE-2024-28745.json) (`2024-03-18T04:15:09.987`) +* [CVE-2018-25099](CVE-2018/CVE-2018-250xx/CVE-2018-25099.json) (`2024-03-18T05:15:06.007`) +* [CVE-2021-47154](CVE-2021/CVE-2021-471xx/CVE-2021-47154.json) (`2024-03-18T05:15:06.140`) +* [CVE-2021-47155](CVE-2021/CVE-2021-471xx/CVE-2021-47155.json) (`2024-03-18T05:15:06.203`) +* [CVE-2021-47156](CVE-2021/CVE-2021-471xx/CVE-2021-47156.json) (`2024-03-18T05:15:06.260`) +* [CVE-2021-47157](CVE-2021/CVE-2021-471xx/CVE-2021-47157.json) (`2024-03-18T05:15:06.317`) +* [CVE-2024-29151](CVE-2024/CVE-2024-291xx/CVE-2024-29151.json) (`2024-03-18T06:15:05.913`) +* [CVE-2024-29154](CVE-2024/CVE-2024-291xx/CVE-2024-29154.json) (`2024-03-18T06:15:06.080`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `0` -* [CVE-2023-51104](CVE-2023/CVE-2023-511xx/CVE-2023-51104.json) (`2024-03-18T04:15:08.670`) -* [CVE-2023-51106](CVE-2023/CVE-2023-511xx/CVE-2023-51106.json) (`2024-03-18T04:15:08.790`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 276dc7dda86..b1fb172eedf 100644 --- a/_state.csv +++ b/_state.csv @@ -121368,6 +121368,7 @@ CVE-2018-25095,0,0,fb73a2ca07bc0b1c3648dd352ef5d63d5e38141d3163c348c092eb2180763 CVE-2018-25096,0,0,65946b951ad2c28cc99779b55c9189a3eff50639dbf842e942c8a91e53b437eb,2024-02-29T01:23:15.437000 CVE-2018-25097,0,0,2c5fa32a0d772992a56fb020de703568956d2982c6480d087346ecda7afe11fd,2024-02-29T01:23:15.543000 CVE-2018-25098,0,0,37d4c449b9e769fa372d3a284d5f7c94226d641b16e61e76e9d5cd58b62d1343,2024-02-29T01:23:15.647000 +CVE-2018-25099,1,1,ecd7dfac4689d31b78533455ca24a9939b8794d81bc98ef23cf13bf85a2f0f57,2024-03-18T05:15:06.007000 CVE-2018-2515,0,0,158f882e4275a7485a2b9ce17e7e57c4ea22cf74c55a78a9900c73a4caa327c0,2023-11-07T02:57:57.887000 CVE-2018-2560,0,0,0bb1a26d6c05fddeb488697adb0bbe667a3dd77c1a5bc7af495c8721df5b1197,2020-08-24T17:37:01.140000 CVE-2018-2561,0,0,b76feaa260e2f54fc8eeb8d50d578ffdd22b603f486ac4f8f5b3bc42df22fa45,2018-01-25T13:53:15.120000 @@ -186839,6 +186840,10 @@ CVE-2021-47132,0,0,1547d2dc3a369b3f7e76a4c03ab3a2a4cba2c1bffe45a54c111488733e6a6 CVE-2021-47133,0,0,7b6345e898b3e10a871129b85c8e095f10e5f051f1b15bf60f334c8709116bdd,2024-03-17T22:38:29.433000 CVE-2021-47134,0,0,8a7c141a2170c4a86e59cf8803a362f8506e9aca7f6918b58c8cce087c1666ed,2024-03-17T22:38:29.433000 CVE-2021-47135,0,0,a29c3bbac0a96b9549a1fb1c3113013df387a88d8966ee7b2759c5051b5c4adf,2024-03-17T22:38:29.433000 +CVE-2021-47154,1,1,5e15afa228cb7c4a5090cc44bbb98f6da5085390666542753115a7e8b02a7679,2024-03-18T05:15:06.140000 +CVE-2021-47155,1,1,71b3ab778c2ec575952faee8d383c5ecbb1e2626f5a83aefc2641eccdfa77ae2,2024-03-18T05:15:06.203000 +CVE-2021-47156,1,1,c96a781c45f67e4a33fa315e21c1e4dbf3e2bf8222c513ca19d93fc27237c58e,2024-03-18T05:15:06.260000 +CVE-2021-47157,1,1,212dafd9cdc2c9edf3fb0934adbba9140a4a5dd9a0c761aaceb0aa74dde8aa68,2024-03-18T05:15:06.317000 CVE-2022-0001,0,0,eef83f8ee034200b042b5eda26b679b982266672cf1407daf8d9fbe1ba7937b5,2022-08-19T12:28:32.903000 CVE-2022-0002,0,0,4ba989879ca817729e7cddc36d35dc20834fb13fd71d0cce189890fe2defbd53,2022-08-19T12:28:50.667000 CVE-2022-0004,0,0,4891f62a2edc2f307dec62ec3f2089232f3fddba4652b7ef635786ed0f8a2286,2022-06-10T20:52:37.810000 @@ -210325,8 +210330,8 @@ CVE-2022-47029,0,0,6711d7ceb115fd6a5fbadd5fd10d1d6bf8dce32543d421aee1cee97e3de99 CVE-2022-4703,0,0,04fd529fd214a0ee7797e781b2cb706147a8cd1fa8d3cd1a0b2b027baebf6129,2023-11-07T03:58:37.930000 CVE-2022-47034,0,0,5ac67aa163553be867a866364afa18b92dc4bc7f840a7a175875590efa8c950d,2023-02-22T20:14:11.913000 CVE-2022-47035,0,0,aa806af6e8b40d416e03065c0212e2a0473d848363c34ed069117e45409d8bfd,2023-02-07T21:48:39.107000 -CVE-2022-47036,1,1,712b2d752195991270c0d018b0cbec8e88bfed191acb4f7fab9be1a524adeda3,2024-03-18T04:15:08.400000 -CVE-2022-47037,1,1,9998cdfb32a03dcbd235f2220286548ce939ef5b688176017ac8aaa10119e5df,2024-03-18T03:15:06.017000 +CVE-2022-47036,0,0,712b2d752195991270c0d018b0cbec8e88bfed191acb4f7fab9be1a524adeda3,2024-03-18T04:15:08.400000 +CVE-2022-47037,0,0,9998cdfb32a03dcbd235f2220286548ce939ef5b688176017ac8aaa10119e5df,2024-03-18T03:15:06.017000 CVE-2022-4704,0,0,84b343d6897ec65299cf51bae586ccb120c16f50abcda275762c71d63050680b,2023-11-07T03:58:38.160000 CVE-2022-47040,0,0,9ae2dd2965fd1fe7d23b5e824c080ca835a2b6315c4b7e40e407cf6ffc8d9ff4,2023-02-06T16:23:30.867000 CVE-2022-47042,0,0,23eeda5f6d3ef78633c762345fe7efe3a9fda0099f5033544f0151a84183269c,2023-02-01T15:55:27.787000 @@ -235202,9 +235207,9 @@ CVE-2023-51100,0,0,a4131e6c440f588b64e248645152e6e6454ab203871157c89e2ac0e8f59db CVE-2023-51101,0,0,715bd2375e465539f78b9589de724a3b44b5b751f2a2bdeeadbb172b19954d10,2023-12-30T03:19:13.923000 CVE-2023-51102,0,0,43e4885799f2da8dffd65a72e501f08b192ea7fe94ed89bfde6db81b2efa7f22,2023-12-30T03:19:15.973000 CVE-2023-51103,0,0,71cf8eb36c512e4486b80f2008e48d245df5f090a9237a985a5b7ec951e695d4,2024-01-05T16:25:15.997000 -CVE-2023-51104,0,1,198c9fc2d1f06c07a7e811dff64eefb4c4615dfccb0be4aa7a129d38189d95d6,2024-03-18T04:15:08.670000 +CVE-2023-51104,0,0,198c9fc2d1f06c07a7e811dff64eefb4c4615dfccb0be4aa7a129d38189d95d6,2024-03-18T04:15:08.670000 CVE-2023-51105,0,0,48bf93efae302420ac1254e8c1e30a85a4c50863b0a6e29ebabdfeed8ef70103,2024-01-05T17:18:11.490000 -CVE-2023-51106,0,1,2ad42e3fc60bf937fccd789a94702f6663bceff82ffdd09e8001ab565c4bd666,2024-03-18T04:15:08.790000 +CVE-2023-51106,0,0,2ad42e3fc60bf937fccd789a94702f6663bceff82ffdd09e8001ab565c4bd666,2024-03-18T04:15:08.790000 CVE-2023-51107,0,0,c5d5f3f75be31a12b33532bfd4bfc63c33f71406b1ed3956b0081dc9f8320e93,2024-01-05T17:14:48.820000 CVE-2023-5111,0,0,9aa75e6a8b2cdd2372d791a9a0def8ce9e9d4923ff9c71c4dfed5da5d92d1561,2023-10-06T17:58:29.377000 CVE-2023-5112,0,0,d81fb9dddba12fffd3f0f7638c38afa8e9a05dbf23a9ba002cb4caee7a6d6442,2023-10-19T20:31:22.843000 @@ -240636,7 +240641,7 @@ CVE-2024-24512,0,0,03c51f88444f0be6fcfaff8e371681e3a1a1d007832a9bf8fa7088f13cfe5 CVE-2024-24524,0,0,40ecb02cd326bdc34833c61cf5eb3e9f45f526d45502f51591361c36d1938c63,2024-02-09T16:30:43.830000 CVE-2024-24525,0,0,13b50b322b70c1ba78c523473a9882b44cc13b59455e3e47dd336806a91a1148,2024-02-29T13:49:29.390000 CVE-2024-24528,0,0,184f3e16e059f6b990b79bbe85c13104f1b7059f71d8a1713060531c24aa2c42,2024-02-26T19:15:07.247000 -CVE-2024-24539,1,1,a272d51552049f1d1c59054e6c8b9ecaadcd41c34640ff79e6925b73f4ec2911,2024-03-18T03:15:06.067000 +CVE-2024-24539,0,0,a272d51552049f1d1c59054e6c8b9ecaadcd41c34640ff79e6925b73f4ec2911,2024-03-18T03:15:06.067000 CVE-2024-24543,0,0,f516e88d85199344e1e2c4ae69468b4de7248951f71da4710fc97171a286ff1a,2024-02-14T17:13:32.827000 CVE-2024-24548,0,0,9dbe1af5af4a9b865bf88b2a305b739ac231a7ce95c9c8ed04344b3144708c91,2024-02-08T18:53:14.107000 CVE-2024-24549,0,0,40c63234666e6fbd8dd5cc33724c32e6d1287bfca86653230a25093c5deda2c2,2024-03-13T18:15:58.530000 @@ -241167,11 +241172,11 @@ CVE-2024-25760,0,0,255ca6230bb354f98509c01959da5b0923f549858d798f3db2290377395c8 CVE-2024-25763,0,0,449253544ddeb38e4327642a9711026d85e9fd1e23016db2d903615337918cb9,2024-02-26T16:32:25.577000 CVE-2024-25767,0,0,5e5d85efb5a949e2d407dc5470a1026f931741e6d3d19a638a7a6f425b54dab9,2024-02-26T22:10:40.463000 CVE-2024-25768,0,0,80ced9e42f994d6a00a0057cb00581829176f61a4dfa1e97abbae3afb8561c8a,2024-02-26T22:10:40.463000 -CVE-2024-2577,1,1,ad8451afd1390137a3b983f02220f15d6718eec310abed7ecf664e064735c063,2024-03-18T03:15:06.123000 +CVE-2024-2577,0,0,ad8451afd1390137a3b983f02220f15d6718eec310abed7ecf664e064735c063,2024-03-18T03:15:06.123000 CVE-2024-25770,0,0,d105bd95abb6afbf92cef5c1765f81d4416c38d2a6067fe6216eb1ee17388748,2024-02-26T22:10:40.463000 CVE-2024-25801,0,0,86d0a2f88d637a38d728e68507deae5ad1ee66b74383784e4b403b33b5149a86,2024-02-22T19:07:27.197000 CVE-2024-25802,0,0,cb029cdbf03ee0051152f36415381bb55ee304fcb50819490e22f017c52403c6,2024-02-22T19:07:27.197000 -CVE-2024-2581,1,1,15b7d09b477f0aab6030373480de1a5accd1c6a98f933506472a280ef354e4ce,2024-03-18T03:15:06.380000 +CVE-2024-2581,0,0,15b7d09b477f0aab6030373480de1a5accd1c6a98f933506472a280ef354e4ce,2024-03-18T03:15:06.380000 CVE-2024-25817,0,0,8244c17ffec667dd25976664571f96aed86930fb569e330976ea19223cb10648,2024-03-06T15:18:08.093000 CVE-2024-25828,0,0,92587cac273321dd48e48a5d2c154576da6b3b44017a5ef2ceb5bc8263a5b565,2024-02-22T19:07:27.197000 CVE-2024-25830,0,0,a69b2c428d084da5de639d84fab9ebf1369360f9dfa15a26056f1d306db52180,2024-02-29T13:49:29.390000 @@ -241601,7 +241606,7 @@ CVE-2024-27744,0,0,c100d4ba8f49a307e8f166c43dcf72396c641c27bc5c30f424e004f4b4c33 CVE-2024-27746,0,0,6f3ddced2e2b26bef51987507b4e7466957a803a9da415c8c1c8b245cafe1423,2024-03-13T07:15:36.470000 CVE-2024-27747,0,0,eff635f872515818dfe20352d610bb047327d7f6971e953c63bc92feb6bf3ebe,2024-03-13T07:15:36.523000 CVE-2024-27756,0,0,aebfc12c95eee1aa3d95acbf6fc8b0650b6e3d2e490fe1817d1c49f0782fe0c7,2024-03-15T12:53:06.423000 -CVE-2024-27757,1,1,9fc4fdc29f1d4f5e16510e2511fd17d66162c940abcce562b2566788a91519b3,2024-03-18T04:15:09.667000 +CVE-2024-27757,0,0,9fc4fdc29f1d4f5e16510e2511fd17d66162c940abcce562b2566788a91519b3,2024-03-18T04:15:09.667000 CVE-2024-27758,0,0,6abe87e0a8905ac150ade2fec85250ff5e7fbf580c101c16b193b98f7d58141f,2024-03-12T17:46:17.273000 CVE-2024-27764,0,0,a6da085213081f41482d74001d5b27250ddae1567bc465fa0f4b1023f8322f06,2024-03-06T15:18:08.093000 CVE-2024-27765,0,0,c9283b485df441e5cf44e98a2bcaa6921e6b7ae7825314dc1fd3bb862197fb6e,2024-03-06T15:18:08.093000 @@ -241751,7 +241756,7 @@ CVE-2024-28681,0,0,ed8a4fd064b6b3346412990e6226cbe04bee8a6bd2aaad4671fdcd0478ce5 CVE-2024-28682,0,0,2c53ed716809a76ded005fd10ac6d93891dbf2dd9f02238c66f1445af60cb8e7,2024-03-13T18:15:58.530000 CVE-2024-28683,0,0,14fce1fb8fe5dd3fb68153125dd387047f48de59cd587ce41acfe8b0e8fa04c2,2024-03-13T18:15:58.530000 CVE-2024-28684,0,0,df89c702874c46527da5dc5bf33ec252c05a69f53466623f5ca04f0566a6cd25,2024-03-13T14:28:45.217000 -CVE-2024-28745,1,1,e8f06f0723d0e34bc09fa894347df18111e8e083b0fdc8acc056c0d9c0cb66dc,2024-03-18T04:15:09.987000 +CVE-2024-28745,0,0,e8f06f0723d0e34bc09fa894347df18111e8e083b0fdc8acc056c0d9c0cb66dc,2024-03-18T04:15:09.987000 CVE-2024-28746,0,0,4e08f19b517756fb15fbaf966494c1aeec3b9803b4e2b615b4d5a557eb48c84a,2024-03-14T12:52:09.877000 CVE-2024-28752,0,0,b6856abb589c0fed02798f341901c4f3025e287fced11706e9fa0c89b392cd6a,2024-03-15T12:53:06.423000 CVE-2024-28753,0,0,73ca850c1b6879daba607bc61d7d16457b56173a47004b8bff799b514a526c36,2024-03-11T01:32:39.697000 @@ -241766,3 +241771,5 @@ CVE-2024-28851,0,0,f15187ac52243f1288d6dabed456ab5bd2287b2db60c97a538d0582f4f0ba CVE-2024-28854,0,0,8cb03aded6b194ffbf5e93b6a999bfbf01ac8f736343c4fc752b0e38a8bc9f90,2024-03-17T22:38:29.433000 CVE-2024-28859,0,0,2d0407c7b83f2786a493b842ae3fe3ce3f906494adee8b0e0f61c75557fcb17c,2024-03-17T22:38:29.433000 CVE-2024-28862,0,0,b0dc40150b0e5f15633ecb26c2614b37fe6eefbb423911349887989b36d78640,2024-03-17T22:38:29.433000 +CVE-2024-29151,1,1,5ec903f1e83fe9ef91dd8fa281d0d9249de67095eb219c2fefc315dc2fd25383,2024-03-18T06:15:05.913000 +CVE-2024-29154,1,1,27deb04035bee400856eb7d08b4f1bd8e0f3cd03c5a26708ab341cdb537485b4,2024-03-18T06:15:06.080000