From c6d3700ef2ee983ef0bac2d2f4f1fe27c61ddf61 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 6 Mar 2024 23:00:28 +0000 Subject: [PATCH] Auto-Update: 2024-03-06T23:00:24.910954+00:00 --- CVE-2023/CVE-2023-487xx/CVE-2023-48703.json | 4 +- CVE-2023/CVE-2023-501xx/CVE-2023-50167.json | 4 +- CVE-2023/CVE-2023-507xx/CVE-2023-50716.json | 4 +- CVE-2024/CVE-2024-203xx/CVE-2024-20346.json | 4 +- CVE-2024/CVE-2024-21xx/CVE-2024-2173.json | 4 +- CVE-2024/CVE-2024-21xx/CVE-2024-2174.json | 4 +- CVE-2024/CVE-2024-21xx/CVE-2024-2176.json | 4 +- CVE-2024/CVE-2024-22xx/CVE-2024-2215.json | 4 +- CVE-2024/CVE-2024-22xx/CVE-2024-2216.json | 4 +- CVE-2024/CVE-2024-22xx/CVE-2024-2236.json | 59 +++++++++++++++++++ CVE-2024/CVE-2024-247xx/CVE-2024-24761.json | 4 +- CVE-2024/CVE-2024-247xx/CVE-2024-24765.json | 4 +- CVE-2024/CVE-2024-247xx/CVE-2024-24766.json | 4 +- CVE-2024/CVE-2024-247xx/CVE-2024-24767.json | 4 +- CVE-2024/CVE-2024-251xx/CVE-2024-25111.json | 4 +- CVE-2024/CVE-2024-272xx/CVE-2024-27287.json | 4 +- CVE-2024/CVE-2024-272xx/CVE-2024-27288.json | 4 +- CVE-2024/CVE-2024-272xx/CVE-2024-27289.json | 4 +- CVE-2024/CVE-2024-273xx/CVE-2024-27302.json | 4 +- CVE-2024/CVE-2024-273xx/CVE-2024-27303.json | 4 +- CVE-2024/CVE-2024-273xx/CVE-2024-27304.json | 4 +- CVE-2024/CVE-2024-273xx/CVE-2024-27307.json | 4 +- CVE-2024/CVE-2024-273xx/CVE-2024-27308.json | 4 +- CVE-2024/CVE-2024-279xx/CVE-2024-27915.json | 4 +- CVE-2024/CVE-2024-279xx/CVE-2024-27917.json | 4 +- CVE-2024/CVE-2024-279xx/CVE-2024-27929.json | 4 +- CVE-2024/CVE-2024-281xx/CVE-2024-28110.json | 63 +++++++++++++++++++++ CVE-2024/CVE-2024-281xx/CVE-2024-28111.json | 59 +++++++++++++++++++ CVE-2024/CVE-2024-281xx/CVE-2024-28149.json | 4 +- CVE-2024/CVE-2024-281xx/CVE-2024-28150.json | 4 +- CVE-2024/CVE-2024-281xx/CVE-2024-28151.json | 4 +- CVE-2024/CVE-2024-281xx/CVE-2024-28152.json | 4 +- CVE-2024/CVE-2024-281xx/CVE-2024-28153.json | 4 +- CVE-2024/CVE-2024-281xx/CVE-2024-28154.json | 4 +- CVE-2024/CVE-2024-281xx/CVE-2024-28155.json | 4 +- CVE-2024/CVE-2024-281xx/CVE-2024-28156.json | 4 +- CVE-2024/CVE-2024-281xx/CVE-2024-28157.json | 4 +- CVE-2024/CVE-2024-281xx/CVE-2024-28158.json | 4 +- CVE-2024/CVE-2024-281xx/CVE-2024-28159.json | 4 +- CVE-2024/CVE-2024-281xx/CVE-2024-28160.json | 4 +- CVE-2024/CVE-2024-281xx/CVE-2024-28161.json | 4 +- CVE-2024/CVE-2024-281xx/CVE-2024-28162.json | 4 +- CVE-2024/CVE-2024-281xx/CVE-2024-28173.json | 4 +- CVE-2024/CVE-2024-281xx/CVE-2024-28174.json | 4 +- README.md | 54 +++++++++++------- 45 files changed, 296 insertions(+), 103 deletions(-) create mode 100644 CVE-2024/CVE-2024-22xx/CVE-2024-2236.json create mode 100644 CVE-2024/CVE-2024-281xx/CVE-2024-28110.json create mode 100644 CVE-2024/CVE-2024-281xx/CVE-2024-28111.json diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48703.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48703.json index 95a7b5ad164..fa4f170e014 100644 --- a/CVE-2023/CVE-2023-487xx/CVE-2023-48703.json +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48703.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48703", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-06T20:15:47.343", - "lastModified": "2024-03-06T20:15:47.343", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:48.053", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-501xx/CVE-2023-50167.json b/CVE-2023/CVE-2023-501xx/CVE-2023-50167.json index 6045f5bd96b..96a8afc140c 100644 --- a/CVE-2023/CVE-2023-501xx/CVE-2023-50167.json +++ b/CVE-2023/CVE-2023-501xx/CVE-2023-50167.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50167", "sourceIdentifier": "security@pega.com", "published": "2024-03-06T18:15:46.133", - "lastModified": "2024-03-06T18:15:46.133", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:54.697", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-507xx/CVE-2023-50716.json b/CVE-2023/CVE-2023-507xx/CVE-2023-50716.json index 472c4b2260f..fdab278701a 100644 --- a/CVE-2023/CVE-2023-507xx/CVE-2023-50716.json +++ b/CVE-2023/CVE-2023-507xx/CVE-2023-50716.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50716", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-06T18:15:46.360", - "lastModified": "2024-03-06T18:15:46.360", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:48.053", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20346.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20346.json index df217ce59bf..ab5c7c6e9be 100644 --- a/CVE-2024/CVE-2024-203xx/CVE-2024-20346.json +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20346.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20346", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-03-06T17:15:10.173", - "lastModified": "2024-03-06T17:15:10.173", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:54.697", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2173.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2173.json index 34a51a0fe28..8a2726812e8 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2173.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2173.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2173", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-03-06T19:15:08.973", - "lastModified": "2024-03-06T19:15:08.973", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:48.053", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2174.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2174.json index cc39731800c..cf00e8bd623 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2174.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2174.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2174", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-03-06T19:15:09.037", - "lastModified": "2024-03-06T19:15:09.037", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:48.053", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2176.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2176.json index 0cf253bc3cc..bb9f122823d 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2176.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2176.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2176", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-03-06T19:15:09.090", - "lastModified": "2024-03-06T19:15:09.090", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:48.053", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2215.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2215.json index 7b7aa16b9d6..08c2fc8efc0 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2215.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2215.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2215", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-03-06T17:15:11.593", - "lastModified": "2024-03-06T17:15:11.593", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:54.697", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2216.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2216.json index e3782fdc6e3..38662bc0b06 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2216.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2216.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2216", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-03-06T17:15:11.640", - "lastModified": "2024-03-06T17:15:11.640", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:54.697", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2236.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2236.json new file mode 100644 index 00000000000..74a2ee4ba88 --- /dev/null +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2236.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-2236", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-03-06T22:15:57.977", + "lastModified": "2024-03-06T22:15:57.977", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-208" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2024-2236", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268268", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24761.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24761.json index 321f4a2a4a4..7ace8941f6f 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24761.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24761.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24761", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-06T18:15:46.620", - "lastModified": "2024-03-06T18:15:46.620", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:48.053", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24765.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24765.json index 628974db689..30592ae5713 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24765.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24765.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24765", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-06T18:15:46.807", - "lastModified": "2024-03-06T18:15:46.807", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:48.053", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24766.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24766.json index e1c40b0d785..a3d5fb68a08 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24766.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24766.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24766", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-06T19:15:07.290", - "lastModified": "2024-03-06T19:15:07.290", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:48.053", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24767.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24767.json index c8152509ec6..4a3dffa8428 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24767.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24767.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24767", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-06T18:15:46.983", - "lastModified": "2024-03-06T18:15:46.983", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:48.053", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25111.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25111.json index 4d93da61bf8..48c84e7b3e7 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25111.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25111.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25111", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-06T19:15:07.510", - "lastModified": "2024-03-06T19:15:07.510", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:48.053", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27287.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27287.json index a7556643fca..6b78cb135ee 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27287.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27287.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27287", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-06T19:15:07.723", - "lastModified": "2024-03-06T19:15:07.723", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:48.053", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27288.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27288.json index f7a07faef6c..579e9ec675c 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27288.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27288.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27288", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-06T19:15:07.933", - "lastModified": "2024-03-06T19:15:07.933", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:48.053", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27289.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27289.json index cd2547d05a3..917e5231530 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27289.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27289.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27289", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-06T19:15:08.140", - "lastModified": "2024-03-06T19:15:08.140", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:48.053", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27302.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27302.json index 588d5826b34..c21f31587ab 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27302.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27302.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27302", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-06T19:15:08.330", - "lastModified": "2024-03-06T19:15:08.330", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:48.053", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27303.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27303.json index 6544f7a2e88..c2433833d66 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27303.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27303.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27303", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-06T19:15:08.553", - "lastModified": "2024-03-06T19:15:08.553", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:48.053", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27304.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27304.json index 28e9aef5253..b075cb4f0f0 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27304.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27304.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27304", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-06T19:15:08.767", - "lastModified": "2024-03-06T19:15:08.767", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:48.053", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27307.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27307.json index 569ba3c47a6..34f80f0ae94 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27307.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27307.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27307", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-06T20:15:47.537", - "lastModified": "2024-03-06T20:15:47.537", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:48.053", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27308.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27308.json index f7e9d0caccb..1df4f3467ad 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27308.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27308.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27308", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-06T20:15:47.730", - "lastModified": "2024-03-06T20:15:47.730", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:48.053", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27915.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27915.json index c4f1a507763..f499fa8ae2a 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27915.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27915.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27915", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-06T20:15:47.930", - "lastModified": "2024-03-06T20:15:47.930", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:48.053", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27917.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27917.json index 18760a86a4c..90426fc2186 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27917.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27917.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27917", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-06T20:15:48.120", - "lastModified": "2024-03-06T20:15:48.120", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:48.053", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27929.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27929.json index 96d157ab8c1..4e079e172ef 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27929.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27929.json @@ -2,12 +2,12 @@ "id": "CVE-2024-27929", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-05T17:15:07.097", - "lastModified": "2024-03-05T18:50:18.333", + "lastModified": "2024-03-06T22:15:57.473", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "ImageSharp is a managed, cross-platform, 2D graphics library. A heap-use-after-free flaw was found in ImageSharp's InitializeImage() function of PngDecoderCore.cs file. This vulnerability is triggered when an attacker passes a specially crafted PNG image file to ImageSharp for conversion, potentially leading to information disclosure. This issue has been patched in version 3.1.3." + "value": "ImageSharp is a managed, cross-platform, 2D graphics library. A heap-use-after-free flaw was found in ImageSharp's InitializeImage() function of PngDecoderCore.cs file. This vulnerability is triggered when an attacker passes a specially crafted PNG image file to ImageSharp for conversion, potentially leading to information disclosure. This issue has been patched in versions 3.1.3 and 2.1.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28110.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28110.json new file mode 100644 index 00000000000..160928e727a --- /dev/null +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28110.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2024-28110", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-03-06T22:15:57.550", + "lastModified": "2024-03-06T22:15:57.550", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Go SDK for CloudEvents is the official CloudEvents SDK to integrate applications with CloudEvents. Prior to version 2.15.2, using cloudevents.WithRoundTripper to create a cloudevents.Client with an authenticated http.RoundTripper causes the go-sdk to leak credentials to arbitrary endpoints. When the transport is populated with an authenticated transport, then http.DefaultClient is modified with the authenticated transport and will start to send Authorization tokens to any endpoint it is used to contact. Version 2.15.2 patches this issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/cloudevents/sdk-go/blob/67e389964131d55d65cd14b4eb32d57a47312695/v2/protocol/http/protocol.go#L104-L110", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/cloudevents/sdk-go/commit/de2f28370b0d2a0f64f92c0c6139fa4b8a7c3851", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/cloudevents/sdk-go/security/advisories/GHSA-5pf6-2qwx-pxm2", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28111.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28111.json new file mode 100644 index 00000000000..3aae622a793 --- /dev/null +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28111.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-28111", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-03-06T22:15:57.780", + "lastModified": "2024-03-06T22:15:57.780", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Canarytokens helps track activity and actions on a network. Canarytokens.org supports exporting the history of a Canarytoken's incidents in CSV format. The generation of these CSV files is vulnerable to a CSV Injection vulnerability. This flaw can be used by an attacker who discovers an HTTP-based Canarytoken to target the Canarytoken's owner, if the owner exports the incident history to CSV and opens in a reader application such as Microsoft Excel. The impact is that this issue could lead to code execution on the machine on which the CSV file is opened. Version sha-c595a1f8 contains a fix for this issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1236" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/thinkst/canarytokens/commit/c595a1f884b986da2ca05aa5bff9ae5f93c6a4aa", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/thinkst/canarytokens/security/advisories/GHSA-fqh6-v4qp-65fv", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28149.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28149.json index 1d03c0de20a..873d2740fab 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28149.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28149.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28149", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-03-06T17:15:10.450", - "lastModified": "2024-03-06T17:15:10.450", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:54.697", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28150.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28150.json index abfe1445390..2e38471944a 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28150.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28150.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28150", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-03-06T17:15:10.510", - "lastModified": "2024-03-06T17:15:10.510", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:54.697", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28151.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28151.json index 8387268fb0f..9c33ec79723 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28151.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28151.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28151", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-03-06T17:15:10.570", - "lastModified": "2024-03-06T17:15:10.570", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:54.697", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28152.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28152.json index 8aad9f2fe9b..920bfaf4006 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28152.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28152.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28152", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-03-06T17:15:10.637", - "lastModified": "2024-03-06T17:15:10.637", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:54.697", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28153.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28153.json index 9869c6fcd3c..d06c24871d2 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28153.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28153.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28153", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-03-06T17:15:10.687", - "lastModified": "2024-03-06T17:15:10.687", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:54.697", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28154.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28154.json index 93c4fe34667..53620644b52 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28154.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28154.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28154", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-03-06T17:15:10.733", - "lastModified": "2024-03-06T17:15:10.733", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:54.697", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28155.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28155.json index 4d7cb0a0687..06e77541547 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28155.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28155.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28155", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-03-06T17:15:10.787", - "lastModified": "2024-03-06T17:15:10.787", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:54.697", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28156.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28156.json index 07a5314e8c2..fddaeaeb09a 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28156.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28156.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28156", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-03-06T17:15:10.837", - "lastModified": "2024-03-06T17:15:10.837", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:54.697", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28157.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28157.json index 62ca8d68092..156f2752063 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28157.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28157.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28157", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-03-06T17:15:10.890", - "lastModified": "2024-03-06T17:15:10.890", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:54.697", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28158.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28158.json index 1ec6d106681..523a06ee170 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28158.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28158.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28158", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-03-06T17:15:10.940", - "lastModified": "2024-03-06T17:15:10.940", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:54.697", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28159.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28159.json index 4269fdf57e9..89ba0c40317 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28159.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28159.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28159", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-03-06T17:15:10.987", - "lastModified": "2024-03-06T17:15:10.987", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:54.697", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28160.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28160.json index 48f5e68cfdc..6550fce7f64 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28160.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28160.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28160", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-03-06T17:15:11.040", - "lastModified": "2024-03-06T17:15:11.040", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:54.697", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28161.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28161.json index fae23e3f3e5..1484082820b 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28161.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28161.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28161", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-03-06T17:15:11.090", - "lastModified": "2024-03-06T17:15:11.090", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:54.697", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28162.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28162.json index be419d7af49..709c7e1ad14 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28162.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28162.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28162", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-03-06T17:15:11.140", - "lastModified": "2024-03-06T17:15:11.140", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:54.697", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28173.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28173.json index e7125ee8108..6ed2b1ac27e 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28173.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28173.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28173", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-03-06T17:15:11.190", - "lastModified": "2024-03-06T17:15:11.190", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:54.697", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28174.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28174.json index 4b95d0f2ba4..7741f04ea76 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28174.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28174.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28174", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-03-06T17:15:11.397", - "lastModified": "2024-03-06T17:15:11.397", - "vulnStatus": "Received", + "lastModified": "2024-03-06T21:42:54.697", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index 5141a642006..429738b03d1 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-03-06T21:00:24.297999+00:00 +2024-03-06T23:00:24.910954+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-03-06T20:15:48.120000+00:00 +2024-03-06T22:15:57.977000+00:00 ``` ### Last Data Feed Release @@ -29,35 +29,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -240712 +240715 ``` ### CVEs added in the last Commit -Recently added CVEs: `16` +Recently added CVEs: `3` -* [CVE-2023-48703](CVE-2023/CVE-2023-487xx/CVE-2023-48703.json) (`2024-03-06T20:15:47.343`) -* [CVE-2024-24766](CVE-2024/CVE-2024-247xx/CVE-2024-24766.json) (`2024-03-06T19:15:07.290`) -* [CVE-2024-25111](CVE-2024/CVE-2024-251xx/CVE-2024-25111.json) (`2024-03-06T19:15:07.510`) -* [CVE-2024-27287](CVE-2024/CVE-2024-272xx/CVE-2024-27287.json) (`2024-03-06T19:15:07.723`) -* [CVE-2024-27288](CVE-2024/CVE-2024-272xx/CVE-2024-27288.json) (`2024-03-06T19:15:07.933`) -* [CVE-2024-27289](CVE-2024/CVE-2024-272xx/CVE-2024-27289.json) (`2024-03-06T19:15:08.140`) -* [CVE-2024-27302](CVE-2024/CVE-2024-273xx/CVE-2024-27302.json) (`2024-03-06T19:15:08.330`) -* [CVE-2024-27303](CVE-2024/CVE-2024-273xx/CVE-2024-27303.json) (`2024-03-06T19:15:08.553`) -* [CVE-2024-27304](CVE-2024/CVE-2024-273xx/CVE-2024-27304.json) (`2024-03-06T19:15:08.767`) -* [CVE-2024-2173](CVE-2024/CVE-2024-21xx/CVE-2024-2173.json) (`2024-03-06T19:15:08.973`) -* [CVE-2024-2174](CVE-2024/CVE-2024-21xx/CVE-2024-2174.json) (`2024-03-06T19:15:09.037`) -* [CVE-2024-2176](CVE-2024/CVE-2024-21xx/CVE-2024-2176.json) (`2024-03-06T19:15:09.090`) -* [CVE-2024-27307](CVE-2024/CVE-2024-273xx/CVE-2024-27307.json) (`2024-03-06T20:15:47.537`) -* [CVE-2024-27308](CVE-2024/CVE-2024-273xx/CVE-2024-27308.json) (`2024-03-06T20:15:47.730`) -* [CVE-2024-27915](CVE-2024/CVE-2024-279xx/CVE-2024-27915.json) (`2024-03-06T20:15:47.930`) -* [CVE-2024-27917](CVE-2024/CVE-2024-279xx/CVE-2024-27917.json) (`2024-03-06T20:15:48.120`) +* [CVE-2024-28110](CVE-2024/CVE-2024-281xx/CVE-2024-28110.json) (`2024-03-06T22:15:57.550`) +* [CVE-2024-28111](CVE-2024/CVE-2024-281xx/CVE-2024-28111.json) (`2024-03-06T22:15:57.780`) +* [CVE-2024-2236](CVE-2024/CVE-2024-22xx/CVE-2024-2236.json) (`2024-03-06T22:15:57.977`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `41` +* [CVE-2024-2176](CVE-2024/CVE-2024-21xx/CVE-2024-2176.json) (`2024-03-06T21:42:48.053`) +* [CVE-2024-27307](CVE-2024/CVE-2024-273xx/CVE-2024-27307.json) (`2024-03-06T21:42:48.053`) +* [CVE-2024-27308](CVE-2024/CVE-2024-273xx/CVE-2024-27308.json) (`2024-03-06T21:42:48.053`) +* [CVE-2024-27915](CVE-2024/CVE-2024-279xx/CVE-2024-27915.json) (`2024-03-06T21:42:48.053`) +* [CVE-2024-27917](CVE-2024/CVE-2024-279xx/CVE-2024-27917.json) (`2024-03-06T21:42:48.053`) +* [CVE-2024-20346](CVE-2024/CVE-2024-203xx/CVE-2024-20346.json) (`2024-03-06T21:42:54.697`) +* [CVE-2024-28149](CVE-2024/CVE-2024-281xx/CVE-2024-28149.json) (`2024-03-06T21:42:54.697`) +* [CVE-2024-28150](CVE-2024/CVE-2024-281xx/CVE-2024-28150.json) (`2024-03-06T21:42:54.697`) +* [CVE-2024-28151](CVE-2024/CVE-2024-281xx/CVE-2024-28151.json) (`2024-03-06T21:42:54.697`) +* [CVE-2024-28152](CVE-2024/CVE-2024-281xx/CVE-2024-28152.json) (`2024-03-06T21:42:54.697`) +* [CVE-2024-28153](CVE-2024/CVE-2024-281xx/CVE-2024-28153.json) (`2024-03-06T21:42:54.697`) +* [CVE-2024-28154](CVE-2024/CVE-2024-281xx/CVE-2024-28154.json) (`2024-03-06T21:42:54.697`) +* [CVE-2024-28155](CVE-2024/CVE-2024-281xx/CVE-2024-28155.json) (`2024-03-06T21:42:54.697`) +* [CVE-2024-28156](CVE-2024/CVE-2024-281xx/CVE-2024-28156.json) (`2024-03-06T21:42:54.697`) +* [CVE-2024-28157](CVE-2024/CVE-2024-281xx/CVE-2024-28157.json) (`2024-03-06T21:42:54.697`) +* [CVE-2024-28158](CVE-2024/CVE-2024-281xx/CVE-2024-28158.json) (`2024-03-06T21:42:54.697`) +* [CVE-2024-28159](CVE-2024/CVE-2024-281xx/CVE-2024-28159.json) (`2024-03-06T21:42:54.697`) +* [CVE-2024-28160](CVE-2024/CVE-2024-281xx/CVE-2024-28160.json) (`2024-03-06T21:42:54.697`) +* [CVE-2024-28161](CVE-2024/CVE-2024-281xx/CVE-2024-28161.json) (`2024-03-06T21:42:54.697`) +* [CVE-2024-28162](CVE-2024/CVE-2024-281xx/CVE-2024-28162.json) (`2024-03-06T21:42:54.697`) +* [CVE-2024-28173](CVE-2024/CVE-2024-281xx/CVE-2024-28173.json) (`2024-03-06T21:42:54.697`) +* [CVE-2024-28174](CVE-2024/CVE-2024-281xx/CVE-2024-28174.json) (`2024-03-06T21:42:54.697`) +* [CVE-2024-2215](CVE-2024/CVE-2024-22xx/CVE-2024-2215.json) (`2024-03-06T21:42:54.697`) +* [CVE-2024-2216](CVE-2024/CVE-2024-22xx/CVE-2024-2216.json) (`2024-03-06T21:42:54.697`) +* [CVE-2024-27929](CVE-2024/CVE-2024-279xx/CVE-2024-27929.json) (`2024-03-06T22:15:57.473`) ## Download and Usage