From c8eaaa2ac46805f48f109c5322a1ec3816aa2e55 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 27 Mar 2024 05:03:27 +0000 Subject: [PATCH] Auto-Update: 2024-03-27T05:00:38.571559+00:00 --- CVE-2022/CVE-2022-382xx/CVE-2022-38223.json | 10 ++- CVE-2023/CVE-2023-305xx/CVE-2023-30590.json | 8 +- CVE-2023/CVE-2023-382xx/CVE-2023-38252.json | 10 ++- CVE-2023/CVE-2023-382xx/CVE-2023-38253.json | 10 ++- CVE-2023/CVE-2023-398xx/CVE-2023-39804.json | 28 +++++++ CVE-2023/CVE-2023-402xx/CVE-2023-40284.json | 24 ++++++ CVE-2023/CVE-2023-402xx/CVE-2023-40285.json | 24 ++++++ CVE-2023/CVE-2023-402xx/CVE-2023-40286.json | 24 ++++++ CVE-2023/CVE-2023-402xx/CVE-2023-40287.json | 24 ++++++ CVE-2023/CVE-2023-402xx/CVE-2023-40288.json | 24 ++++++ CVE-2023/CVE-2023-402xx/CVE-2023-40289.json | 24 ++++++ CVE-2023/CVE-2023-402xx/CVE-2023-40290.json | 24 ++++++ CVE-2023/CVE-2023-42xx/CVE-2023-4255.json | 10 ++- CVE-2023/CVE-2023-459xx/CVE-2023-45913.json | 28 +++++++ CVE-2023/CVE-2023-459xx/CVE-2023-45927.json | 24 ++++++ CVE-2023/CVE-2023-459xx/CVE-2023-45929.json | 24 ++++++ CVE-2023/CVE-2023-459xx/CVE-2023-45931.json | 24 ++++++ CVE-2024/CVE-2024-04xx/CVE-2024-0400.json | 55 ++++++++++++ CVE-2024/CVE-2024-15xx/CVE-2024-1532.json | 55 ++++++++++++ CVE-2024/CVE-2024-20xx/CVE-2024-2097.json | 43 ++++++++++ CVE-2024/CVE-2024-21xx/CVE-2024-2139.json | 47 +++++++++++ CVE-2024/CVE-2024-220xx/CVE-2024-22025.json | 6 +- CVE-2024/CVE-2024-22xx/CVE-2024-2203.json | 47 +++++++++++ CVE-2024/CVE-2024-22xx/CVE-2024-2210.json | 47 +++++++++++ CVE-2024/CVE-2024-243xx/CVE-2024-24334.json | 36 ++++++++ CVE-2024/CVE-2024-243xx/CVE-2024-24335.json | 36 ++++++++ CVE-2024/CVE-2024-253xx/CVE-2024-25388.json | 32 +++++++ CVE-2024/CVE-2024-253xx/CVE-2024-25389.json | 32 +++++++ CVE-2024/CVE-2024-253xx/CVE-2024-25390.json | 32 +++++++ CVE-2024/CVE-2024-253xx/CVE-2024-25391.json | 32 +++++++ CVE-2024/CVE-2024-253xx/CVE-2024-25392.json | 32 +++++++ CVE-2024/CVE-2024-253xx/CVE-2024-25393.json | 32 +++++++ CVE-2024/CVE-2024-253xx/CVE-2024-25394.json | 32 +++++++ CVE-2024/CVE-2024-253xx/CVE-2024-25395.json | 32 +++++++ CVE-2024/CVE-2024-255xx/CVE-2024-25580.json | 20 +++++ CVE-2024/CVE-2024-257xx/CVE-2024-25734.json | 24 ++++++ CVE-2024/CVE-2024-257xx/CVE-2024-25735.json | 24 ++++++ CVE-2024/CVE-2024-257xx/CVE-2024-25736.json | 24 ++++++ CVE-2024/CVE-2024-29xx/CVE-2024-2941.json | 92 +++++++++++++++++++++ CVE-2024/CVE-2024-29xx/CVE-2024-2942.json | 92 +++++++++++++++++++++ CVE-2024/CVE-2024-29xx/CVE-2024-2943.json | 92 +++++++++++++++++++++ CVE-2024/CVE-2024-29xx/CVE-2024-2944.json | 92 +++++++++++++++++++++ CVE-2024/CVE-2024-29xx/CVE-2024-2945.json | 92 +++++++++++++++++++++ README.md | 52 ++++++++---- _state.csv | 71 ++++++++++++---- 45 files changed, 1607 insertions(+), 40 deletions(-) create mode 100644 CVE-2023/CVE-2023-398xx/CVE-2023-39804.json create mode 100644 CVE-2023/CVE-2023-402xx/CVE-2023-40284.json create mode 100644 CVE-2023/CVE-2023-402xx/CVE-2023-40285.json create mode 100644 CVE-2023/CVE-2023-402xx/CVE-2023-40286.json create mode 100644 CVE-2023/CVE-2023-402xx/CVE-2023-40287.json create mode 100644 CVE-2023/CVE-2023-402xx/CVE-2023-40288.json create mode 100644 CVE-2023/CVE-2023-402xx/CVE-2023-40289.json create mode 100644 CVE-2023/CVE-2023-402xx/CVE-2023-40290.json create mode 100644 CVE-2023/CVE-2023-459xx/CVE-2023-45913.json create mode 100644 CVE-2023/CVE-2023-459xx/CVE-2023-45927.json create mode 100644 CVE-2023/CVE-2023-459xx/CVE-2023-45929.json create mode 100644 CVE-2023/CVE-2023-459xx/CVE-2023-45931.json create mode 100644 CVE-2024/CVE-2024-04xx/CVE-2024-0400.json create mode 100644 CVE-2024/CVE-2024-15xx/CVE-2024-1532.json create mode 100644 CVE-2024/CVE-2024-20xx/CVE-2024-2097.json create mode 100644 CVE-2024/CVE-2024-21xx/CVE-2024-2139.json create mode 100644 CVE-2024/CVE-2024-22xx/CVE-2024-2203.json create mode 100644 CVE-2024/CVE-2024-22xx/CVE-2024-2210.json create mode 100644 CVE-2024/CVE-2024-243xx/CVE-2024-24334.json create mode 100644 CVE-2024/CVE-2024-243xx/CVE-2024-24335.json create mode 100644 CVE-2024/CVE-2024-253xx/CVE-2024-25388.json create mode 100644 CVE-2024/CVE-2024-253xx/CVE-2024-25389.json create mode 100644 CVE-2024/CVE-2024-253xx/CVE-2024-25390.json create mode 100644 CVE-2024/CVE-2024-253xx/CVE-2024-25391.json create mode 100644 CVE-2024/CVE-2024-253xx/CVE-2024-25392.json create mode 100644 CVE-2024/CVE-2024-253xx/CVE-2024-25393.json create mode 100644 CVE-2024/CVE-2024-253xx/CVE-2024-25394.json create mode 100644 CVE-2024/CVE-2024-253xx/CVE-2024-25395.json create mode 100644 CVE-2024/CVE-2024-255xx/CVE-2024-25580.json create mode 100644 CVE-2024/CVE-2024-257xx/CVE-2024-25734.json create mode 100644 CVE-2024/CVE-2024-257xx/CVE-2024-25735.json create mode 100644 CVE-2024/CVE-2024-257xx/CVE-2024-25736.json create mode 100644 CVE-2024/CVE-2024-29xx/CVE-2024-2941.json create mode 100644 CVE-2024/CVE-2024-29xx/CVE-2024-2942.json create mode 100644 CVE-2024/CVE-2024-29xx/CVE-2024-2943.json create mode 100644 CVE-2024/CVE-2024-29xx/CVE-2024-2944.json create mode 100644 CVE-2024/CVE-2024-29xx/CVE-2024-2945.json diff --git a/CVE-2022/CVE-2022-382xx/CVE-2022-38223.json b/CVE-2022/CVE-2022-382xx/CVE-2022-38223.json index 607646b25f5..53da84f5c61 100644 --- a/CVE-2022/CVE-2022-382xx/CVE-2022-38223.json +++ b/CVE-2022/CVE-2022-382xx/CVE-2022-38223.json @@ -2,7 +2,7 @@ "id": "CVE-2022-38223", "sourceIdentifier": "cve@mitre.org", "published": "2022-08-15T11:21:43.557", - "lastModified": "2024-03-23T03:15:08.677", + "lastModified": "2024-03-27T03:15:10.003", "vulnStatus": "Modified", "descriptions": [ { @@ -109,9 +109,17 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKESIFZMWIFMI6DRGMUYOTVKBOSEKDXZ/", "source": "cve@mitre.org" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKFZQUK7FPWWJQYICDZZ4YWIPUPQ2D3R/", + "source": "cve@mitre.org" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NRRZMTLG3YT6U3PSGJOAMLDNLRF2EUOP/", "source": "cve@mitre.org" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TODROGVCWZ435HQIZE6ARQC5LPQLIA5C/", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-305xx/CVE-2023-30590.json b/CVE-2023/CVE-2023-305xx/CVE-2023-30590.json index c7fcea20a8d..c007f752071 100644 --- a/CVE-2023/CVE-2023-305xx/CVE-2023-30590.json +++ b/CVE-2023/CVE-2023-305xx/CVE-2023-30590.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30590", "sourceIdentifier": "support@hackerone.com", "published": "2023-11-28T20:15:07.480", - "lastModified": "2023-12-04T17:39:07.437", - "vulnStatus": "Analyzed", + "lastModified": "2024-03-27T03:15:10.130", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -84,6 +84,10 @@ } ], "references": [ + { + "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00029.html", + "source": "support@hackerone.com" + }, { "url": "https://nodejs.org/en/blog/vulnerability/june-2023-security-releases", "source": "support@hackerone.com", diff --git a/CVE-2023/CVE-2023-382xx/CVE-2023-38252.json b/CVE-2023/CVE-2023-382xx/CVE-2023-38252.json index 009f5de8f06..6849e831c51 100644 --- a/CVE-2023/CVE-2023-382xx/CVE-2023-38252.json +++ b/CVE-2023/CVE-2023-382xx/CVE-2023-38252.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38252", "sourceIdentifier": "secalert@redhat.com", "published": "2023-07-14T18:15:10.990", - "lastModified": "2024-03-23T03:15:09.020", + "lastModified": "2024-03-27T03:15:10.220", "vulnStatus": "Modified", "descriptions": [ { @@ -146,6 +146,14 @@ { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AULOBQJLXE2KCT5UVQMKGEFL4GFIAOED/", "source": "secalert@redhat.com" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKFZQUK7FPWWJQYICDZZ4YWIPUPQ2D3R/", + "source": "secalert@redhat.com" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TODROGVCWZ435HQIZE6ARQC5LPQLIA5C/", + "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-382xx/CVE-2023-38253.json b/CVE-2023/CVE-2023-382xx/CVE-2023-38253.json index 322f550df85..fae17d16e3c 100644 --- a/CVE-2023/CVE-2023-382xx/CVE-2023-38253.json +++ b/CVE-2023/CVE-2023-382xx/CVE-2023-38253.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38253", "sourceIdentifier": "secalert@redhat.com", "published": "2023-07-14T18:15:11.047", - "lastModified": "2024-03-23T03:15:09.160", + "lastModified": "2024-03-27T03:15:10.390", "vulnStatus": "Modified", "descriptions": [ { @@ -146,6 +146,14 @@ { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AULOBQJLXE2KCT5UVQMKGEFL4GFIAOED/", "source": "secalert@redhat.com" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKFZQUK7FPWWJQYICDZZ4YWIPUPQ2D3R/", + "source": "secalert@redhat.com" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TODROGVCWZ435HQIZE6ARQC5LPQLIA5C/", + "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-398xx/CVE-2023-39804.json b/CVE-2023/CVE-2023-398xx/CVE-2023-39804.json new file mode 100644 index 00000000000..7c42e86847b --- /dev/null +++ b/CVE-2023/CVE-2023-398xx/CVE-2023-39804.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-39804", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-27T04:15:08.897", + "lastModified": "2024-03-27T04:15:08.897", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In GNU tar before 1.35, mishandled extension attributes in a PAX archive can lead to an application crash in xheader.c." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1058079", + "source": "cve@mitre.org" + }, + { + "url": "https://git.savannah.gnu.org/cgit/tar.git/commit/?id=a339f05cd269013fa133d2f148d73f6f7d4247e4", + "source": "cve@mitre.org" + }, + { + "url": "https://git.savannah.gnu.org/cgit/tar.git/tree/src/xheader.c?h=release_1_34#n1723", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40284.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40284.json new file mode 100644 index 00000000000..b8f8c6dfc14 --- /dev/null +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40284.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-40284", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-27T04:15:09.200", + "lastModified": "2024-03-27T04:15:09.200", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on Supermicro X11SSM-F, X11SAE-F, and X11SSE-F 1.66 devices. An attacker could exploit an XSS issue." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023", + "source": "cve@mitre.org" + }, + { + "url": "https://www.supermicro.com/en/support/security_center#%21advisories", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40285.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40285.json new file mode 100644 index 00000000000..2b9dd2d553e --- /dev/null +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40285.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-40285", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-27T04:15:09.440", + "lastModified": "2024-03-27T04:15:09.440", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on Supermicro X11SSM-F, X11SAE-F, and X11SSE-F 1.66 devices. An attacker could exploit an XSS issue." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023", + "source": "cve@mitre.org" + }, + { + "url": "https://www.supermicro.com/en/support/security_center#%21advisories", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40286.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40286.json new file mode 100644 index 00000000000..2f156b39b05 --- /dev/null +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40286.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-40286", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-27T04:15:09.643", + "lastModified": "2024-03-27T04:15:09.643", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on Supermicro X11SSM-F, X11SAE-F, and X11SSE-F 1.66 devices. An attacker could exploit an XSS issue." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023", + "source": "cve@mitre.org" + }, + { + "url": "https://www.supermicro.com/en/support/security_center#%21advisories", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40287.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40287.json new file mode 100644 index 00000000000..cdc6939e68c --- /dev/null +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40287.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-40287", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-27T04:15:09.833", + "lastModified": "2024-03-27T04:15:09.833", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on Supermicro X11SSM-F, X11SAE-F, and X11SSE-F 1.66 devices. An attacker could exploit an XSS issue." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023", + "source": "cve@mitre.org" + }, + { + "url": "https://www.supermicro.com/en/support/security_center#%21advisories", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40288.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40288.json new file mode 100644 index 00000000000..815c4ea893c --- /dev/null +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40288.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-40288", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-27T04:15:10.027", + "lastModified": "2024-03-27T04:15:10.027", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on Supermicro X11SSM-F, X11SAE-F, and X11SSE-F 1.66 devices. An attacker could exploit an XSS issue." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023", + "source": "cve@mitre.org" + }, + { + "url": "https://www.supermicro.com/en/support/security_center#%21advisories", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40289.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40289.json new file mode 100644 index 00000000000..676bac42747 --- /dev/null +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40289.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-40289", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-27T04:15:10.220", + "lastModified": "2024-03-27T04:15:10.220", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A command injection issue was discovered on Supermicro X11SSM-F, X11SAE-F, and X11SSE-F 1.66 devices. An attacker can exploit this to elevate privileges from a user with BMC administrative privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023", + "source": "cve@mitre.org" + }, + { + "url": "https://www.supermicro.com/en/support/security_center#%21advisories", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40290.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40290.json new file mode 100644 index 00000000000..4e74164e1f0 --- /dev/null +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40290.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-40290", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-27T04:15:10.387", + "lastModified": "2024-03-27T04:15:10.387", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on Supermicro X11SSM-F, X11SAE-F, and X11SSE-F 1.66 devices. An attacker could exploit an XSS issue that affects Internet Explorer 11 on Windows." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023", + "source": "cve@mitre.org" + }, + { + "url": "https://www.supermicro.com/en/support/security_center#%21advisories", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4255.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4255.json index 596b98acc0b..4f5fe8b2d4b 100644 --- a/CVE-2023/CVE-2023-42xx/CVE-2023-4255.json +++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4255.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4255", "sourceIdentifier": "secalert@redhat.com", "published": "2023-12-21T16:15:10.017", - "lastModified": "2024-03-23T03:15:09.943", + "lastModified": "2024-03-27T03:15:10.537", "vulnStatus": "Modified", "descriptions": [ { @@ -163,6 +163,14 @@ { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AULOBQJLXE2KCT5UVQMKGEFL4GFIAOED/", "source": "secalert@redhat.com" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKFZQUK7FPWWJQYICDZZ4YWIPUPQ2D3R/", + "source": "secalert@redhat.com" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TODROGVCWZ435HQIZE6ARQC5LPQLIA5C/", + "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45913.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45913.json new file mode 100644 index 00000000000..e92d25930de --- /dev/null +++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45913.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-45913", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-27T04:15:10.590", + "lastModified": "2024-03-27T04:15:10.590", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Mesa v23.0.4 was discovered to contain a NULL pointer dereference via the function dri2GetGlxDrawableFromXDrawableId(). This vulnerability is triggered when the X11 server sends an DRI2_BufferSwapComplete event unexpectedly when the application is using DRI3. NOTE: this is disputed because there is no scenario in which the vulnerability was demonstrated." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://seclists.org/fulldisclosure/2024/Jan/28", + "source": "cve@mitre.org" + }, + { + "url": "https://gitlab.freedesktop.org/mesa/mesa/-/issues/9856", + "source": "cve@mitre.org" + }, + { + "url": "https://seclists.org/fulldisclosure/2024/Jan/71", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45927.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45927.json new file mode 100644 index 00000000000..cb8793d2db4 --- /dev/null +++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45927.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-45927", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-27T04:15:10.847", + "lastModified": "2024-03-27T04:15:10.847", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "S-Lang 2.3.2 was discovered to contain an arithmetic exception via the function tt_sprintf()." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://lists.jedsoft.org/lists/slang-users/2023/0000003.html", + "source": "cve@mitre.org" + }, + { + "url": "https://seclists.org/fulldisclosure/2024/Jan/55", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45929.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45929.json new file mode 100644 index 00000000000..c6062aeadca --- /dev/null +++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45929.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-45929", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-27T04:15:11.067", + "lastModified": "2024-03-27T04:15:11.067", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "S-Lang 2.3.2 was discovered to contain a segmentation fault via the function fixup_tgetstr()." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://lists.jedsoft.org/lists/slang-users/2023/0000002.html", + "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2024/Jan/57", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45931.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45931.json new file mode 100644 index 00000000000..b6b89595755 --- /dev/null +++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45931.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-45931", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-27T04:15:11.250", + "lastModified": "2024-03-27T04:15:11.250", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Mesa 23.0.4 was discovered to contain a NULL pointer dereference in check_xshm() for the has_error state. NOTE: this is disputed because there is no scenario in which the vulnerability was demonstrated." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gitlab.freedesktop.org/mesa/mesa/-/issues/9859", + "source": "cve@mitre.org" + }, + { + "url": "https://seclists.org/fulldisclosure/2024/Jan/71", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0400.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0400.json new file mode 100644 index 00000000000..821309ba672 --- /dev/null +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0400.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-0400", + "sourceIdentifier": "cybersecurity@hitachienergy.com", + "published": "2024-03-27T03:15:10.697", + "lastModified": "2024-03-27T03:15:10.697", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SCM Software is a client and server application. An Authenticated System manager client can execute LINQ query in the SCM server, for customized filtering. An Authenticated malicious client can send a specially crafted code to skip the validation and execute arbitrary code (RCE) on the SCM Server remotely. Malicious clients can execute any command by using this RCE vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000189&languageCode=en&Preview=true", + "source": "cybersecurity@hitachienergy.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1532.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1532.json new file mode 100644 index 00000000000..7b7ac1f7490 --- /dev/null +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1532.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-1532", + "sourceIdentifier": "cybersecurity@hitachienergy.com", + "published": "2024-03-27T03:15:10.933", + "lastModified": "2024-03-27T03:15:10.933", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability exists in the stb-language file handling that affects the RTU500 series product versions listed below. A malicious actor could enforce diagnostic texts being displayed as empty strings, if an authorized user uploads a specially crafted stb-language file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000190&languageCode=en&Preview=true", + "source": "cybersecurity@hitachienergy.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2097.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2097.json new file mode 100644 index 00000000000..a67978f2448 --- /dev/null +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2097.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2024-2097", + "sourceIdentifier": "cybersecurity@hitachienergy.com", + "published": "2024-03-27T03:15:12.290", + "lastModified": "2024-03-27T03:15:12.290", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Authenticated List control client can execute the LINQ query in SCM Server to present event as list for operator. An authenticated malicious client can send special LINQ query to execute arbitrary code remotely (RCE) on the SCM Server that an attacker otherwise does not have authorization to do." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000189&languageCode=en&Preview=true", + "source": "cybersecurity@hitachienergy.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2139.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2139.json new file mode 100644 index 00000000000..3aea262ccfc --- /dev/null +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2139.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2024-2139", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-03-27T03:15:12.510", + "lastModified": "2024-03-27T03:15:12.510", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Master Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Pricing Table widget in all versions up to, and including, 2.0.5.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3050636/master-addons", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8910b6f0-1bf4-4ac0-93b7-54db7c15392c?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22025.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22025.json index b993904dc97..47f1b10944e 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22025.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22025.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22025", "sourceIdentifier": "support@hackerone.com", "published": "2024-03-19T05:15:10.267", - "lastModified": "2024-03-19T13:26:46.000", + "lastModified": "2024-03-27T03:15:11.187", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -42,6 +42,10 @@ { "url": "https://hackerone.com/reports/2284065", "source": "support@hackerone.com" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00029.html", + "source": "support@hackerone.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2203.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2203.json new file mode 100644 index 00000000000..c011b5c0d7e --- /dev/null +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2203.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2024-2203", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-03-27T03:15:12.737", + "lastModified": "2024-03-27T03:15:12.737", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The The Plus Addons for Elementor plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 5.4.1 via the Clients widget. This makes it possible for authenticated attackers, with contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3056776/the-plus-addons-for-elementor-page-builder", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dc7ff863-3a8e-41cd-ae20-78bb4577c16a?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2210.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2210.json new file mode 100644 index 00000000000..711d1d7e866 --- /dev/null +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2210.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2024-2210", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-03-27T03:15:12.937", + "lastModified": "2024-03-27T03:15:12.937", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The The Plus Addons for Elementor plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 5.4.1 via the Team Member Listing widget. This makes it possible for authenticated attackers, with contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3056776/the-plus-addons-for-elementor-page-builder", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/30579058-54f4-4496-9275-078faf99823f?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24334.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24334.json new file mode 100644 index 00000000000..ac1636e4b0b --- /dev/null +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24334.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2024-24334", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-27T03:15:11.260", + "lastModified": "2024-03-27T03:15:11.260", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A heap buffer overflow occurs in dfs_v2 dfs_file in RT-Thread through 5.0.2." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://seclists.org/fulldisclosure/2024/Mar/28", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/RT-Thread/rt-thread/issues/8282", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/RT-Thread/rt-thread/pull/8305", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/hnsecurity/vulns/blob/main/HNS-2024-05-rt-thread.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://security.humanativaspa.it/multiple-vulnerabilities-in-rt-thread-rtos/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24335.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24335.json new file mode 100644 index 00000000000..59cb7feb740 --- /dev/null +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24335.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2024-24335", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-27T03:15:11.330", + "lastModified": "2024-03-27T03:15:11.330", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A heap buffer overflow occurs in the dfs_v2 romfs filesystem RT-Thread through 5.0.2." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/RT-Thread/rt-thread/issues/8271", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/RT-Thread/rt-thread/pull/8278", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/hnsecurity/vulns/blob/main/HNS-2024-05-rt-thread.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://seclists.org/fulldisclosure/2024/Mar/28", + "source": "cve@mitre.org" + }, + { + "url": "https://security.humanativaspa.it/multiple-vulnerabilities-in-rt-thread-rtos/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-253xx/CVE-2024-25388.json b/CVE-2024/CVE-2024-253xx/CVE-2024-25388.json new file mode 100644 index 00000000000..89b51558b6f --- /dev/null +++ b/CVE-2024/CVE-2024-253xx/CVE-2024-25388.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-25388", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-27T03:15:11.400", + "lastModified": "2024-03-27T03:15:11.400", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "drivers/wlan/wlan_mgmt,c in RT-Thread through 5.0.2 has an integer signedness error and resultant buffer overflow." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/RT-Thread/rt-thread/issues/8285", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/hnsecurity/vulns/blob/main/HNS-2024-05-rt-thread.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://seclists.org/fulldisclosure/2024/Mar/28", + "source": "cve@mitre.org" + }, + { + "url": "https://security.humanativaspa.it/multiple-vulnerabilities-in-rt-thread-rtos/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-253xx/CVE-2024-25389.json b/CVE-2024/CVE-2024-253xx/CVE-2024-25389.json new file mode 100644 index 00000000000..37d482412e4 --- /dev/null +++ b/CVE-2024/CVE-2024-253xx/CVE-2024-25389.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-25389", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-27T03:15:11.460", + "lastModified": "2024-03-27T03:15:11.460", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "RT-Thread through 5.0.2 generates random numbers with a weak algorithm of \"seed = 214013L * seed + 2531011L; return (seed >> 16) & 0x7FFF;\" in calc_random in drivers/misc/rt_random.c." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/RT-Thread/rt-thread/issues/8283", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/hnsecurity/vulns/blob/main/HNS-2024-05-rt-thread.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://seclists.org/fulldisclosure/2024/Mar/28", + "source": "cve@mitre.org" + }, + { + "url": "https://security.humanativaspa.it/multiple-vulnerabilities-in-rt-thread-rtos/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-253xx/CVE-2024-25390.json b/CVE-2024/CVE-2024-253xx/CVE-2024-25390.json new file mode 100644 index 00000000000..3dad3e25a0f --- /dev/null +++ b/CVE-2024/CVE-2024-253xx/CVE-2024-25390.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-25390", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-27T03:15:11.537", + "lastModified": "2024-03-27T03:15:11.537", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A heap buffer overflow occurs in finsh/msh_file.c and finsh/msh.c in RT-Thread through 5.0.2." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/RT-Thread/rt-thread/issues/8286", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/hnsecurity/vulns/blob/main/HNS-2024-05-rt-thread.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://seclists.org/fulldisclosure/2024/Mar/28", + "source": "cve@mitre.org" + }, + { + "url": "https://security.humanativaspa.it/multiple-vulnerabilities-in-rt-thread-rtos/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-253xx/CVE-2024-25391.json b/CVE-2024/CVE-2024-253xx/CVE-2024-25391.json new file mode 100644 index 00000000000..78efdbdad44 --- /dev/null +++ b/CVE-2024/CVE-2024-253xx/CVE-2024-25391.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-25391", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-27T03:15:11.603", + "lastModified": "2024-03-27T03:15:11.603", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A stack buffer overflow occurs in libc/posix/ipc/mqueue.c in RT-Thread through 5.0.2." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/RT-Thread/rt-thread/issues/8287", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/hnsecurity/vulns/blob/main/HNS-2024-05-rt-thread.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://seclists.org/fulldisclosure/2024/Mar/28", + "source": "cve@mitre.org" + }, + { + "url": "https://security.humanativaspa.it/multiple-vulnerabilities-in-rt-thread-rtos/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-253xx/CVE-2024-25392.json b/CVE-2024/CVE-2024-253xx/CVE-2024-25392.json new file mode 100644 index 00000000000..31974372c94 --- /dev/null +++ b/CVE-2024/CVE-2024-253xx/CVE-2024-25392.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-25392", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-27T03:15:11.667", + "lastModified": "2024-03-27T03:15:11.667", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An out-of-bounds access occurs in utilities/var_export/var_export.c in RT-Thread through 5.0.2." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/RT-Thread/rt-thread/issues/8290", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/hnsecurity/vulns/blob/main/HNS-2024-05-rt-thread.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://seclists.org/fulldisclosure/2024/Mar/28", + "source": "cve@mitre.org" + }, + { + "url": "https://security.humanativaspa.it/multiple-vulnerabilities-in-rt-thread-rtos/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-253xx/CVE-2024-25393.json b/CVE-2024/CVE-2024-253xx/CVE-2024-25393.json new file mode 100644 index 00000000000..49720a8145d --- /dev/null +++ b/CVE-2024/CVE-2024-253xx/CVE-2024-25393.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-25393", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-27T03:15:11.730", + "lastModified": "2024-03-27T03:15:11.730", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A stack buffer overflow occurs in net/at/src/at_server.c in RT-Thread through 5.0.2." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/RT-Thread/rt-thread/issues/8288", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/hnsecurity/vulns/blob/main/HNS-2024-05-rt-thread.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://seclists.org/fulldisclosure/2024/Mar/28", + "source": "cve@mitre.org" + }, + { + "url": "https://security.humanativaspa.it/multiple-vulnerabilities-in-rt-thread-rtos/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-253xx/CVE-2024-25394.json b/CVE-2024/CVE-2024-253xx/CVE-2024-25394.json new file mode 100644 index 00000000000..8c9b9d69ecc --- /dev/null +++ b/CVE-2024/CVE-2024-253xx/CVE-2024-25394.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-25394", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-27T03:15:11.830", + "lastModified": "2024-03-27T03:15:11.830", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A buffer overflow occurs in utilities/ymodem/ry_sy.c in RT-Thread through 5.0.2 because of an incorrect sprintf call or a missing '\\0' character." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/RT-Thread/rt-thread/issues/8291", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/hnsecurity/vulns/blob/main/HNS-2024-05-rt-thread.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://seclists.org/fulldisclosure/2024/Mar/28", + "source": "cve@mitre.org" + }, + { + "url": "https://security.humanativaspa.it/multiple-vulnerabilities-in-rt-thread-rtos/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-253xx/CVE-2024-25395.json b/CVE-2024/CVE-2024-253xx/CVE-2024-25395.json new file mode 100644 index 00000000000..2bd972ef16d --- /dev/null +++ b/CVE-2024/CVE-2024-253xx/CVE-2024-25395.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-25395", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-27T03:15:11.927", + "lastModified": "2024-03-27T03:15:11.927", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A buffer overflow occurs in utilities/rt-link/src/rtlink.c in RT-Thread through 5.0.2." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/RT-Thread/rt-thread/issues/8289", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/hnsecurity/vulns/blob/main/HNS-2024-05-rt-thread.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://seclists.org/fulldisclosure/2024/Mar/28", + "source": "cve@mitre.org" + }, + { + "url": "https://security.humanativaspa.it/multiple-vulnerabilities-in-rt-thread-rtos/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25580.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25580.json new file mode 100644 index 00000000000..2c523aa5ae6 --- /dev/null +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25580.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25580", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-27T03:15:12.007", + "lastModified": "2024-03-27T03:15:12.007", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in gui/util/qktxhandler.cpp in Qt before 5.15.17, 6.x before 6.2.12, 6.3.x through 6.5.x before 6.5.5, and 6.6.x before 6.6.2. A buffer overflow and application crash can occur via a crafted KTX image file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.qt.io/blog/security-advisory-potential-buffer-overflow-when-reading-ktx-images", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25734.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25734.json new file mode 100644 index 00000000000..c3b537623fc --- /dev/null +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25734.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-25734", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-27T03:15:12.077", + "lastModified": "2024-03-27T03:15:12.077", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on WyreStorm Apollo VX20 devices before 1.3.58. The TELNET service prompts for a password only after a valid username is entered, which might make it easier for remote attackers to enumerate user accounts." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://packetstormsecurity.com/files/177081", + "source": "cve@mitre.org" + }, + { + "url": "https://hyp3rlinx.altervista.org", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25735.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25735.json new file mode 100644 index 00000000000..47bbe7578ec --- /dev/null +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25735.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-25735", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-27T03:15:12.150", + "lastModified": "2024-03-27T03:15:12.150", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on WyreStorm Apollo VX20 devices before 1.3.58. Remote attackers can discover cleartext passwords via a SoftAP /device/config GET request." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://packetstormsecurity.com/files/177082", + "source": "cve@mitre.org" + }, + { + "url": "https://hyp3rlinx.altervista.org", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25736.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25736.json new file mode 100644 index 00000000000..2414e9f593b --- /dev/null +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25736.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-25736", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-27T03:15:12.220", + "lastModified": "2024-03-27T03:15:12.220", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on WyreStorm Apollo VX20 devices before 1.3.58. Remote attackers can restart the device via a /device/reboot GET request." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://packetstormsecurity.com/files/177083", + "source": "cve@mitre.org" + }, + { + "url": "https://hyp3rlinx.altervista.org", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2941.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2941.json new file mode 100644 index 00000000000..f6445f82239 --- /dev/null +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2941.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-2941", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-27T03:15:13.160", + "lastModified": "2024-03-27T03:15:13.160", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in Campcodes Online Examination System 1.0. Affected by this issue is some unknown functionality of the file /adminpanel/admin/query/loginExe.php. The manipulation of the argument pass leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258032." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Examination%20System/Online%20Examination%20System%20-%20vuln%201.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.258032", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.258032", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.304757", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2942.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2942.json new file mode 100644 index 00000000000..4024be2de2a --- /dev/null +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2942.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-2942", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-27T03:15:13.490", + "lastModified": "2024-03-27T03:15:13.490", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in Campcodes Online Examination System 1.0. This affects an unknown part of the file /adminpanel/admin/query/deleteQuestionExe.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258033 was assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Examination%20System/Online%20Examination%20System%20-%20vuln%202.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.258033", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.258033", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.304758", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2943.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2943.json new file mode 100644 index 00000000000..4099a3ebeaf --- /dev/null +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2943.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-2943", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-27T03:15:13.820", + "lastModified": "2024-03-27T03:15:13.820", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in Campcodes Online Examination System 1.0 and classified as critical. This vulnerability affects unknown code of the file /adminpanel/admin/query/deleteExamExe.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-258034 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Examination%20System/Online%20Examination%20System%20-%20vuln%203.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.258034", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.258034", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.304759", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2944.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2944.json new file mode 100644 index 00000000000..eb1ba65f638 --- /dev/null +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2944.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-2944", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-27T03:15:14.160", + "lastModified": "2024-03-27T03:15:14.160", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Campcodes Online Examination System 1.0 and classified as critical. This issue affects some unknown processing of the file /adminpanel/admin/query/deleteCourseExe.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258035." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Examination%20System/Online%20Examination%20System%20-%20vuln%204.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.258035", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.258035", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.304760", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2945.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2945.json new file mode 100644 index 00000000000..9ae16c1768d --- /dev/null +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2945.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-2945", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-27T03:15:14.477", + "lastModified": "2024-03-27T03:15:14.477", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Campcodes Online Examination System 1.0. It has been classified as critical. Affected is an unknown function of the file /adminpanel/admin/facebox_modal/updateExaminee.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258036." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Examination%20System/Online%20Examination%20System%20-%20vuln%205.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.258036", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.258036", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.304762", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index ff3a5769958..85fb91cd3df 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-03-27T03:00:37.632112+00:00 +2024-03-27T05:00:38.571559+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-03-27T02:15:11.620000+00:00 +2024-03-27T04:15:11.250000+00:00 ``` ### Last Data Feed Release @@ -33,30 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -242804 +242841 ``` ### CVEs added in the last Commit -Recently added CVEs: `9` +Recently added CVEs: `37` -\* [CVE-2024-1531](CVE-2024/CVE-2024-15xx/CVE-2024-1531.json) (`2024-03-27T02:15:11.177`) -\* [CVE-2024-2206](CVE-2024/CVE-2024-22xx/CVE-2024-2206.json) (`2024-03-27T01:15:46.613`) -\* [CVE-2024-2244](CVE-2024/CVE-2024-22xx/CVE-2024-2244.json) (`2024-03-27T02:15:11.417`) -\* [CVE-2024-2932](CVE-2024/CVE-2024-29xx/CVE-2024-2932.json) (`2024-03-27T01:15:46.830`) -\* [CVE-2024-2934](CVE-2024/CVE-2024-29xx/CVE-2024-2934.json) (`2024-03-27T01:15:47.100`) -\* [CVE-2024-2935](CVE-2024/CVE-2024-29xx/CVE-2024-2935.json) (`2024-03-27T01:15:47.360`) -\* [CVE-2024-2938](CVE-2024/CVE-2024-29xx/CVE-2024-2938.json) (`2024-03-27T01:15:47.630`) -\* [CVE-2024-2939](CVE-2024/CVE-2024-29xx/CVE-2024-2939.json) (`2024-03-27T01:15:47.903`) -\* [CVE-2024-2940](CVE-2024/CVE-2024-29xx/CVE-2024-2940.json) (`2024-03-27T02:15:11.620`) +\* [CVE-2024-0400](CVE-2024/CVE-2024-04xx/CVE-2024-0400.json) (`2024-03-27T03:15:10.697`) +\* [CVE-2024-1532](CVE-2024/CVE-2024-15xx/CVE-2024-1532.json) (`2024-03-27T03:15:10.933`) +\* [CVE-2024-2097](CVE-2024/CVE-2024-20xx/CVE-2024-2097.json) (`2024-03-27T03:15:12.290`) +\* [CVE-2024-2139](CVE-2024/CVE-2024-21xx/CVE-2024-2139.json) (`2024-03-27T03:15:12.510`) +\* [CVE-2024-2203](CVE-2024/CVE-2024-22xx/CVE-2024-2203.json) (`2024-03-27T03:15:12.737`) +\* [CVE-2024-2210](CVE-2024/CVE-2024-22xx/CVE-2024-2210.json) (`2024-03-27T03:15:12.937`) +\* [CVE-2024-24334](CVE-2024/CVE-2024-243xx/CVE-2024-24334.json) (`2024-03-27T03:15:11.260`) +\* [CVE-2024-24335](CVE-2024/CVE-2024-243xx/CVE-2024-24335.json) (`2024-03-27T03:15:11.330`) +\* [CVE-2024-25388](CVE-2024/CVE-2024-253xx/CVE-2024-25388.json) (`2024-03-27T03:15:11.400`) +\* [CVE-2024-25389](CVE-2024/CVE-2024-253xx/CVE-2024-25389.json) (`2024-03-27T03:15:11.460`) +\* [CVE-2024-25390](CVE-2024/CVE-2024-253xx/CVE-2024-25390.json) (`2024-03-27T03:15:11.537`) +\* [CVE-2024-25391](CVE-2024/CVE-2024-253xx/CVE-2024-25391.json) (`2024-03-27T03:15:11.603`) +\* [CVE-2024-25392](CVE-2024/CVE-2024-253xx/CVE-2024-25392.json) (`2024-03-27T03:15:11.667`) +\* [CVE-2024-25393](CVE-2024/CVE-2024-253xx/CVE-2024-25393.json) (`2024-03-27T03:15:11.730`) +\* [CVE-2024-25394](CVE-2024/CVE-2024-253xx/CVE-2024-25394.json) (`2024-03-27T03:15:11.830`) +\* [CVE-2024-25395](CVE-2024/CVE-2024-253xx/CVE-2024-25395.json) (`2024-03-27T03:15:11.927`) +\* [CVE-2024-25580](CVE-2024/CVE-2024-255xx/CVE-2024-25580.json) (`2024-03-27T03:15:12.007`) +\* [CVE-2024-25734](CVE-2024/CVE-2024-257xx/CVE-2024-25734.json) (`2024-03-27T03:15:12.077`) +\* [CVE-2024-25735](CVE-2024/CVE-2024-257xx/CVE-2024-25735.json) (`2024-03-27T03:15:12.150`) +\* [CVE-2024-25736](CVE-2024/CVE-2024-257xx/CVE-2024-25736.json) (`2024-03-27T03:15:12.220`) +\* [CVE-2024-2941](CVE-2024/CVE-2024-29xx/CVE-2024-2941.json) (`2024-03-27T03:15:13.160`) +\* [CVE-2024-2942](CVE-2024/CVE-2024-29xx/CVE-2024-2942.json) (`2024-03-27T03:15:13.490`) +\* [CVE-2024-2943](CVE-2024/CVE-2024-29xx/CVE-2024-2943.json) (`2024-03-27T03:15:13.820`) +\* [CVE-2024-2944](CVE-2024/CVE-2024-29xx/CVE-2024-2944.json) (`2024-03-27T03:15:14.160`) +\* [CVE-2024-2945](CVE-2024/CVE-2024-29xx/CVE-2024-2945.json) (`2024-03-27T03:15:14.477`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `6` -\* [CVE-2023-24955](CVE-2023/CVE-2023-249xx/CVE-2023-24955.json) (`2024-03-27T01:00:01.353`) -\* [CVE-2024-1753](CVE-2024/CVE-2024-17xx/CVE-2024-1753.json) (`2024-03-27T01:15:46.480`) +\* [CVE-2022-38223](CVE-2022/CVE-2022-382xx/CVE-2022-38223.json) (`2024-03-27T03:15:10.003`) +\* [CVE-2023-30590](CVE-2023/CVE-2023-305xx/CVE-2023-30590.json) (`2024-03-27T03:15:10.130`) +\* [CVE-2023-38252](CVE-2023/CVE-2023-382xx/CVE-2023-38252.json) (`2024-03-27T03:15:10.220`) +\* [CVE-2023-38253](CVE-2023/CVE-2023-382xx/CVE-2023-38253.json) (`2024-03-27T03:15:10.390`) +\* [CVE-2023-4255](CVE-2023/CVE-2023-42xx/CVE-2023-4255.json) (`2024-03-27T03:15:10.537`) +\* [CVE-2024-22025](CVE-2024/CVE-2024-220xx/CVE-2024-22025.json) (`2024-03-27T03:15:11.187`) ## Download and Usage diff --git a/_state.csv b/_state.csv index b9f62939162..fa93d7c042e 100644 --- a/_state.csv +++ b/_state.csv @@ -203979,7 +203979,7 @@ CVE-2022-3822,0,0,433abf5e765cfb25dcdf448af8829eb1cabd894656ab4ac3ba7ebbfcda7f9a CVE-2022-38220,0,0,6933d0b94a2d80150bf4bcb0725dd7bf6c0f2f52153f5903a8de24c7cdda2fbe,2023-03-06T14:39:49.140000 CVE-2022-38221,0,0,33821578dac6e1c0c610046ee5aadec725e480b3c50ded3b2e27e7e0adc4ee65,2022-08-17T14:23:55.047000 CVE-2022-38222,0,0,bbb00b83987c51929fe7ea6a8e2bfa92e50eba56e41981c0e82175bae5bc0b93,2022-09-30T18:28:57.477000 -CVE-2022-38223,0,0,91f786f63c3aa4a211d6c8487d67c859190d7e24a4313a27b18d3de560eeabde,2024-03-23T03:15:08.677000 +CVE-2022-38223,0,1,0aab8c0a8c50523c6f7c8151f9fe89103b2282718e89a5cb5c29964b54c4f2a7,2024-03-27T03:15:10.003000 CVE-2022-38227,0,0,98136c9e191bcc58e52febf275e766912cf3d21d900140b728529607452f67c9,2022-08-18T14:06:13.117000 CVE-2022-38228,0,0,7697abc492f89a75c252cfdc4eb82f135432f223e52536f06db6b821c549ffb6,2022-08-18T14:05:42.210000 CVE-2022-38229,0,0,e2dfc346fabdb0c1a262c052db6493172811022520d51774324521bba8d1b57f,2022-08-18T14:05:12.780000 @@ -217475,7 +217475,7 @@ CVE-2023-2495,0,0,dfd1a392bcf660c677b7a2f51836d125548b275f4910763dbe264716f127a8 CVE-2023-24950,0,0,aba7d46e2fab0b4bf8ef26a97c046f5ed7d5599ebeb8d4fc7329ed20be674b8d,2023-05-15T19:15:22.023000 CVE-2023-24953,0,0,6484952930a03e26efce4b4d577add34c742d93b62376aad10e90d4dc73282d7,2023-05-16T16:16:11.117000 CVE-2023-24954,0,0,9b1818e95d46ee16337d4e80c289dd527401018467d39c959bd7d48302bdaa3d,2023-05-16T16:10:02.777000 -CVE-2023-24955,0,1,bfae13e6a95728093cea6a58e8b897280473e078030dffb82ac1e673f194e1a2,2024-03-27T01:00:01.353000 +CVE-2023-24955,0,0,bfae13e6a95728093cea6a58e8b897280473e078030dffb82ac1e673f194e1a2,2024-03-27T01:00:01.353000 CVE-2023-24956,0,0,1da8da3e51362f60e5179f02e279e2b4ff004d81d3c8cbf5d56a4c97ce48d9ca,2023-02-07T22:01:46.687000 CVE-2023-24957,0,0,c696bdeca7edb7c1625b42ea5aa1c4840b98e9c99ffacc2b9a35c802c45f2b36,2023-05-15T16:40:11.497000 CVE-2023-24958,0,0,5262545e917ec1a3ead40e9a3fbaa2bf73829c1746dff5c3857c10112637af5c,2023-05-10T16:20:12.727000 @@ -221765,7 +221765,7 @@ CVE-2023-30586,0,0,8d65f8501b9a164e088e859e6a227372220009a1a64d090c22453b9c0c78b CVE-2023-30588,0,0,7a9bc492f6823c53e3ac620aea01a05b589b62f437e50b00ac05d6d7a58cdac6,2023-12-04T17:40:31.033000 CVE-2023-30589,0,0,9a2862378c0000304b189e348a8612e355e70054bc3e963a6d9d53897e41242d,2023-12-12T14:33:56.690000 CVE-2023-3059,0,0,757ac0696161df4fdc0301c72c5e394f55c1289e87f28f269d8eae610272e6e1,2024-03-21T02:48:22.927000 -CVE-2023-30590,0,0,bb2f4b5a2b71b6e9ed8364081e6c49dfc6f1d30934375818fa78b0cf136f2845,2023-12-04T17:39:07.437000 +CVE-2023-30590,0,1,9d92e6bca8862bf4474f084238b79e676b0ae0d745854851c9d39a3b98fca13b,2024-03-27T03:15:10.130000 CVE-2023-30591,0,0,e3c0c15172c3bf776941c8e92ce271edd14f614447df05c18564dae805e8fefa,2023-10-02T18:19:47.023000 CVE-2023-3060,0,0,53dc48b4846ebba7fad169d263ba5db51472951ec577b88a471d38d58da2c0fa,2024-03-21T02:48:23.020000 CVE-2023-30601,0,0,185f82914270fbceba260ab877194a591ba86c0879ae51f762b4741f41060e07,2023-06-05T16:41:46.257000 @@ -227142,8 +227142,8 @@ CVE-2023-38249,0,0,7cd43552422b2e6f419e43361e66f6bd74771dac21bef545fea7f649fc8ef CVE-2023-3825,0,0,091d480a43d203e74a0b63e3b5dfbd82afc868b447ebc0f63cdf3bda4aea25d5,2023-08-04T16:48:20.227000 CVE-2023-38250,0,0,251f05beb0a42019053b0aba3f387ffa1631763e76c1a5180db48ba5ae28cc45,2023-10-14T01:48:28.497000 CVE-2023-38251,0,0,0afa0ebd24b16b13f0f63a06bc3bb2b8068ac60715c72de232b585d6c21ceffb,2023-10-14T01:48:38.493000 -CVE-2023-38252,0,0,df48424315a8514386914dd1eccf75e193a74273db771ee712a35962ac3a6384,2024-03-23T03:15:09.020000 -CVE-2023-38253,0,0,4d437877cfb2bd1899956f465d20fb2f684d405303e1718338f41c12f4c6d558,2024-03-23T03:15:09.160000 +CVE-2023-38252,0,1,3a630af3d841d84b5746aa32ac9d236a3e6afbdb3aaf387a3ef71105b8f4664b,2024-03-27T03:15:10.220000 +CVE-2023-38253,0,1,943e0dcf970049c9405b1c73dd32bb50d96af70ed71eba3bb46a3e6de557630d,2024-03-27T03:15:10.390000 CVE-2023-38254,0,0,d6b49b1c839ba0227ab61cc354ce1ed1eb9d1b39d5a29955c6bf452943f80a0c,2023-08-10T21:02:04.993000 CVE-2023-38255,0,0,812507d0a018f207c231a1cbdca72467d6f5269cc22a08c747c60aece7c708d1,2024-03-21T02:48:11.353000 CVE-2023-38256,0,0,87aa5a7065a3927baf304c46955787658a3062310d14bcd62cc05536a7a08c0f,2023-09-15T17:35:21.417000 @@ -228262,6 +228262,7 @@ CVE-2023-3979,0,0,4415db529dc1f8726b53811362ede87472ef89ada442f56f004e14ccaccc2a CVE-2023-39796,0,0,35cabf8f2d9419b5c28120c81a09a68054aebd722f802c28d34099e3d758a03d,2023-11-16T19:20:34.407000 CVE-2023-3980,0,0,bdb719235be62de736e8efd608c03d80a564e7bf80718e8bbd2cb447e379924d,2023-08-03T13:41:37.933000 CVE-2023-39801,0,0,060eeeb508b0d5bba1a9b11b0d4067770d1f89ceb5b2599430de052ac4c86469,2023-08-29T16:10:38.307000 +CVE-2023-39804,1,1,8aeec0f6aeada2d51dcf32b588423bc673ff0a1e74efe974ea15cb1a41bb7d76,2024-03-27T04:15:08.897000 CVE-2023-39805,0,0,97f75df0843fae7011ba48aab591d3d9ef06d0696ef26cd697d5023f854ad154,2023-08-15T19:44:14.640000 CVE-2023-39806,0,0,7c1aa1698868383e8f490b6c2715d7db8790d38d90c2017a54406dc967a8128d,2023-08-15T19:44:26.260000 CVE-2023-39807,0,0,a53d1be7b657e86d88aaa3f5fe495cd3ce2852f598dc6df71683fe0561b8355f,2023-08-24T17:53:53.093000 @@ -228621,7 +228622,14 @@ CVE-2023-40280,0,0,d8471b523c83add259439e0e8ab1ab3dc90ad3841be77a74243f33b052d6e CVE-2023-40281,0,0,9151ee58e4e34a5d0e50b7a1455975136c3b0ec7392bd5aeea0e6461170746f4,2023-08-23T15:27:41.540000 CVE-2023-40282,0,0,adf51ee68c2519ad24231c58c6dac845438d31b8fe1b09aecaefeb9ce3e5adc9,2024-03-21T02:48:55.063000 CVE-2023-40283,0,0,f509256457d45926216ae9129c3e4ee52dab388f6335b0dd0bd2d155acf5d072,2024-01-11T19:15:10.930000 +CVE-2023-40284,1,1,dfd383e2458c7f3ea8506b0596dc64f2d8ff462ee5130ed757b2042c266fde29,2024-03-27T04:15:09.200000 +CVE-2023-40285,1,1,42457a96491a5e039666bb11612f3a1af390c1bc8fc6134721c2c41c0d2b9fd1,2024-03-27T04:15:09.440000 +CVE-2023-40286,1,1,cfd1db92071df47c8bee5bfbbf3799e1d839cfc7c440d933786a6dc9563226be,2024-03-27T04:15:09.643000 +CVE-2023-40287,1,1,da9175df32e230c7ebbe988bf29c58b0fbc86928c913e90fa501d7da6a4c88d7,2024-03-27T04:15:09.833000 +CVE-2023-40288,1,1,272a108a6d7797e0b21f20ebdfcd962e6bde6ab213a57fa918a8c045958accce,2024-03-27T04:15:10.027000 +CVE-2023-40289,1,1,ec1cc397c96ced1739b4136d9a54a2381c0bea481cf9d9581aced44ac6a9c72e,2024-03-27T04:15:10.220000 CVE-2023-4029,0,0,5b82dba5f70750738f48c964461c48243d76548a87dc15c0e3a76b4eaea0c491,2023-08-24T20:27:25.837000 +CVE-2023-40290,1,1,8dda6c7ec82f3844e2891c8c5ac49b08df8adba0f35b0913a1df67e195a40753,2024-03-27T04:15:10.387000 CVE-2023-40291,0,0,7d46102bfb73c9a6b9218e80e397506b15509308c371456de1e20a5e76cbc1a0,2023-08-21T18:26:45.787000 CVE-2023-40292,0,0,ff7d72e807e428f47e6291ea2a8465ec91ac91e8b48b5daf36be492dda1fc44b,2023-08-21T18:37:53.610000 CVE-2023-40293,0,0,3e91b40761ee299655829605f60c684af2a5be7622d2e61ae3ccedf339529e63,2023-08-21T18:38:08.537000 @@ -230031,7 +230039,7 @@ CVE-2023-42546,0,0,2464d1554c3032bc26c0dab6949687330754ebfa3ede78b0b121e695a689d CVE-2023-42547,0,0,504818aaaf73be017a58285d596213d083c7ff4d4f9c9d5d7bae582cc3621b72,2023-11-13T18:18:13.067000 CVE-2023-42548,0,0,22b96d2e716cd048580dfaec87f705d83c420e906b70ec9155a339f8bb5f0d52,2024-01-21T01:57:38.307000 CVE-2023-42549,0,0,11e12744ef5bdae88e94355d1ab21f60bbad7dc2c4b19ee7897fc29a15749aeb,2023-11-13T18:42:06.850000 -CVE-2023-4255,0,0,18ac13583165dfc44795d82dbe9dd2d2b2818775e0103d80c525013383a79c02,2024-03-23T03:15:09.943000 +CVE-2023-4255,0,1,bb940656c7da55323b5b6e31b13cacf9b0f67c19245683754904bdd8b4497bbf,2024-03-27T03:15:10.537000 CVE-2023-42550,0,0,f220e5eb2bce046b1b044741d7b46415feae915be9f8c52030ec6b29151070c4,2023-11-13T18:42:18.493000 CVE-2023-42551,0,0,4b99ab20bf3ff75bdab92885b7e8f8bc4d8c311c17bc7de2daeb827409c64d6a,2023-11-13T18:17:16.387000 CVE-2023-42552,0,0,46434390b073da5cbe48f65710cd035addbb3fd8102d1daa0863e82daaf9bb0d,2023-11-15T13:27:22.327000 @@ -232089,15 +232097,19 @@ CVE-2023-45909,0,0,c5694bd739d925d6c691a59651e180b8aa791a6e5ab955738a16c0e30e02a CVE-2023-4591,0,0,7b7489e0ef096cb53299a588ee180b9616089c4949cb6afe064035f5525d5f06,2023-11-13T18:31:39.193000 CVE-2023-45911,0,0,40a6d4a59e32f2704b6b4aa0c83b05852f7a3efa3303de6d634364cd1b9e613f,2023-10-25T13:45:28.653000 CVE-2023-45912,0,0,e7b70d01df1e6b7ed29be6cef3a5d24a0188fc4204e45db25f76f5dd91970245,2023-10-25T13:49:52.877000 +CVE-2023-45913,1,1,8be194ab60fd9b92fb32f6e65f6c99753648f40f89b88348a8965ce203db31b4,2024-03-27T04:15:10.590000 CVE-2023-45916,0,0,b4de35a31730ce89637c5d93cae2af2c0f6956624ee8cf845871fb361731df75,2024-01-29T09:15:42.327000 CVE-2023-45918,0,0,33f00f55399e9410b66f853b2e07c334232e97a2facaeb394e496c0ea19cdb2e,2024-03-15T11:15:08.510000 CVE-2023-4592,0,0,81f9ec9c7754df484556128f55402d2b2e5da813e76693d6a2e51c67954d6e8c,2023-11-13T18:46:52.950000 CVE-2023-45921,0,0,645fcaff78feed0e43ec127059f0dcc7feb6d53759818ded268f99ff2c3f84f3,2024-01-29T09:15:42.547000 CVE-2023-45923,0,0,5946dd1d30e5db85cc88e2299cbbf78c4c1c23d4d9e7d4f1539852b51a3b5d93,2024-01-30T06:15:45.300000 CVE-2023-45926,0,0,b31fd162068a0734b2b75498e371bf05938747f0b8d935b26b2fd650b2446211,2024-01-30T06:15:45.480000 +CVE-2023-45927,1,1,ae56f4590fd9d07d5b8c867e3b755884cd97a70364b7eced99294c867133d1ce,2024-03-27T04:15:10.847000 CVE-2023-45928,0,0,47558c1eca203c24f69589e30fb4f90aaef8f6b0bba4ad813aa029274f5783ce,2024-01-30T06:15:45.520000 +CVE-2023-45929,1,1,188e6646298a43c849508a7fc749c50fa0003b701eae65fdb62c7407046b6135,2024-03-27T04:15:11.067000 CVE-2023-4593,0,0,3ea98d1462e60e86f08f26c4ce82616d1986809830750d8163ae88a206cf2a59,2023-11-29T21:23:46.107000 CVE-2023-45930,0,0,a38e7fb36c8eb8727531b4f64a404afbf67a9bcec1356bd838a6e5e8aa652ae6,2024-01-30T06:15:45.560000 +CVE-2023-45931,1,1,4749ada89cf5946eb8000ae610ebad21250ad68cefdb4f6f6ab27120ca7b1611,2024-03-27T04:15:11.250000 CVE-2023-45932,0,0,98a0e114fa5b0548d7699473110f851a5f41bbf08881d91fe84141ff1183f83f,2024-01-29T09:15:42.593000 CVE-2023-4594,0,0,1724d709b98492bcbeea6886be2201bc3d2e779f95aff0daccd52f3a83f41cb0,2023-11-29T21:23:22.717000 CVE-2023-4595,0,0,d94b04dcb798ddb91c74a5e68df1ab4ecfdb9f34a3301555c5768b6471809428,2023-11-29T21:23:11.087000 @@ -238117,6 +238129,7 @@ CVE-2024-0390,0,0,9f797e4a099c94c2da0407f1b9d4e4b6fb9f46975b208cacd9e42b322aa519 CVE-2024-0393,0,0,da969f8f421acdb215c775785004bc08bc486dde722bd2cf22073edf20e709fb,2024-01-12T06:15:47.157000 CVE-2024-0395,0,0,9697a8ac3bbf759d0c2ea19b7ab0aa903676619b1d5a607c85b8d090a4e44ee7,2024-01-10T14:15:44.970000 CVE-2024-0396,0,0,106628bcb832aae2e274e4e91fdb5add809827efe4c459066d3102ffe0249334,2024-01-29T15:22:40.317000 +CVE-2024-0400,1,1,a6858a4011f820cf24a5419d916c3dd7ac5b0a378112918eb17fe0d39b0b8a70,2024-03-27T03:15:10.697000 CVE-2024-0402,0,0,2fe1b596353be20e61cfde75d3fd6588203ea2d19b7c21e2ce1c5a9ecc57cc90,2024-01-31T18:34:47.867000 CVE-2024-0403,0,0,ba0983060e2034b216b25cd26ed2bb024a7850bc1fcd95abc9a090d5040f7805,2024-03-01T14:04:26.010000 CVE-2024-0405,0,0,efdadcc35fc4ed87224ff4e930a96f9ee86e8b4ccb1a79f084616e91b90070e3,2024-01-24T17:23:09.773000 @@ -238997,7 +239010,8 @@ CVE-2024-1527,0,0,8f06fe1c17bff39e91c6d3012913ea5f8070ff383b8a0b61bb88d3bd435f1f CVE-2024-1528,0,0,6ab8f39f0b896e9d0d7804e3f3d7bb4d33d6cfb8272b1b7047fc22376eeb8249,2024-03-12T17:46:17.273000 CVE-2024-1529,0,0,c48f70f7277d5d7f374c30fc26b9f938e3b79615ae1320955b7bdc2e7c6b1a8e,2024-03-12T17:46:17.273000 CVE-2024-1530,0,0,d70370865071b9b7238c018b4a86246f8caaef82442ca223560af3f8ad472df5,2024-03-21T02:51:43.540000 -CVE-2024-1531,1,1,4ff80deb88ea559f735f8268fb7c9600f6ef2fa1670d96501c39304c2f05f9af,2024-03-27T02:15:11.177000 +CVE-2024-1531,0,0,4ff80deb88ea559f735f8268fb7c9600f6ef2fa1670d96501c39304c2f05f9af,2024-03-27T02:15:11.177000 +CVE-2024-1532,1,1,f23251146a89cbd9f1ceb5d60f4594de584f0358caf7cd74f804e6721e8bf5e3,2024-03-27T03:15:10.933000 CVE-2024-1534,0,0,b47b5b6f31ee51f53e35858c84b04962d1229f4f62333f470d913dd20b214dd3,2024-03-07T13:52:27.110000 CVE-2024-1535,0,0,c2e452de4f130d0657f2ad52768b1d03d46cb2c5e636f4ca1b10840f9898bd02,2024-03-13T18:15:58.530000 CVE-2024-1536,0,0,3680c54e462a2a7edc1fc99438ddf2bbe56f66c6c70a4febe86757b7c0d77832,2024-03-13T18:15:58.530000 @@ -239111,7 +239125,7 @@ CVE-2024-1748,0,0,a1dc98a9081cf73f47d608f84388fd9e1d6663e40c50dbfb283535778827ec CVE-2024-1749,0,0,4b591dad7740802113c665ceda12f8a50246d60996cd4895b30a69f97068386e,2024-03-21T02:51:45.117000 CVE-2024-1750,0,0,2c5d0228a637c37f3f121f1e7fcc9f9b6be5eacb2ceb4e3205185263509a639c,2024-03-21T02:51:45.190000 CVE-2024-1751,0,0,073725f5797dd1a08c13cb9b8b608bec978f19a1ac37e258dfebc8036af5d5ee,2024-03-13T18:15:58.530000 -CVE-2024-1753,0,1,8271012a1d03f2034f6165766a96446221361e181f1f481d4f7f5f3b150cc9cc,2024-03-27T01:15:46.480000 +CVE-2024-1753,0,0,8271012a1d03f2034f6165766a96446221361e181f1f481d4f7f5f3b150cc9cc,2024-03-27T01:15:46.480000 CVE-2024-1758,0,0,6de6dd43b2bb9af7fe1358bc4934bd64904e9488104279e3470618b288cbdab8,2024-02-26T16:32:25.577000 CVE-2024-1760,0,0,0a20f47041faa81845898be9ba0faa3a27a19a140e382ff1058d2f999acd0fd1,2024-03-06T15:18:08.093000 CVE-2024-1761,0,0,9e36bbb76f5c2b7f4a9f5c6274a1f378aa86f86f618e6f962a515dfe593dc5f7,2024-03-07T13:52:27.110000 @@ -239581,6 +239595,7 @@ CVE-2024-20966,0,0,90478ee155b1260e2d56f90db3eee79a3960c9f46fb653e0c3b476696cb8e CVE-2024-20967,0,0,e1389956ab6c65ef121f19629eccf2d83471300bf2053df24afec39272cd3f5e,2024-02-02T17:42:32.037000 CVE-2024-20968,0,0,5328331b425a8172ee83dd598176315d15095c7b0965bc70f8189ba25e4cfa3d,2024-02-20T19:50:53.960000 CVE-2024-20969,0,0,6aaf867b316bed0e097197fb850997ec6d7a283bbc360f2b1bb54300d844eead,2024-02-02T17:24:44.617000 +CVE-2024-2097,1,1,211d34b9759906e96b3aed71441a257031e54985b2d45d8dbc751bf6dfe56218,2024-03-27T03:15:12.290000 CVE-2024-20970,0,0,96582614455aa3dbb3857f7a50e932068cbe0d51e392095995004c5c6a4d4a46,2024-02-20T19:50:53.960000 CVE-2024-20971,0,0,be7eba951ff648dd289edcea340251532d7876c3cd202fcd765d96398ab30ebb,2024-02-02T17:24:10.267000 CVE-2024-20972,0,0,2daf7f9a52dc377d2c4f5f55bb63780bc28f0b6fc2d2a7cce0f434aab3c174bf,2024-03-01T23:18:40.500000 @@ -239688,6 +239703,7 @@ CVE-2024-21386,0,0,903a512cc32d9e4674dc7d86977b04859925aeeaf4bf144d775c4ac6c4cba CVE-2024-21387,0,0,7fed095f12199f3e674e290d01dbfe98907c805a81347bcb7dfa229268485bdc,2024-01-31T20:08:28.943000 CVE-2024-21388,0,0,4689f3e5a25df77d38bba630c81581b1866b09926bc1df9fc34e5bb70ce254f6,2024-02-06T18:21:15.953000 CVE-2024-21389,0,0,c1dff7495d1f41d9f906c3a6839e9f5bbde84314db35a5d04f2a4417ef658156,2024-02-23T17:39:57.703000 +CVE-2024-2139,1,1,f0a593dd6199276b579cb922f031f83672fe05ae2a03d305db0a373eca451119,2024-03-27T03:15:12.510000 CVE-2024-21390,0,0,8219a434145bfe7959ea8e4741bf30daf6b14c92574a93fe04a1803ca76b16a0,2024-03-21T21:04:32.570000 CVE-2024-21391,0,0,bf2070d05137e38bbe24d5d76cf0717ede5add506f6e523e54ee2b337b0573d0,2024-03-07T19:27:15.807000 CVE-2024-21392,0,0,f8c347c372addecafd969a8402f74415361262f568cd324d75d3354da9caa2f8,2024-03-12T17:46:17.273000 @@ -239970,9 +239986,10 @@ CVE-2024-2202,0,0,d90e9832fdf1c21273733d9377e3972434dc23b4e3135178a32eb03be8b0dd CVE-2024-22021,0,0,ba38d4b86a2c5af951f989c7a28594b6207f0b19739ba3d580be6e4d49001bfb,2024-02-29T01:44:04.690000 CVE-2024-22022,0,0,925c0d46bbd39b5d0f2644b5e26e0cd82488a20b7de7cccfa4639e9bb8f60d9e,2024-02-15T18:45:30.887000 CVE-2024-22024,0,0,980d44adebdc63cfe4985efd7aa2ee2044d33423093fc7c9f165c43f20a43115,2024-02-13T15:15:32.193000 -CVE-2024-22025,0,0,5d68e9acf6c67c273a95150bd270bdc446473f3d7435d2a1bda2b5f400f71a4b,2024-03-19T13:26:46 +CVE-2024-22025,0,1,61459addde8d883e2fba52001930c3fdd5c1e72e223ae9ae0e9157b1bc2b1032,2024-03-27T03:15:11.187000 CVE-2024-22027,0,0,0822e6ca4a0197c830c667319442a46ae27f8152642de8d7f05f1858eada021b,2024-01-18T20:02:46.993000 CVE-2024-22028,0,0,8abd1038154eaf5ca23784f859ed6e719a17c93e427bf707fe61eab823cdcecc,2024-01-22T20:22:47.847000 +CVE-2024-2203,1,1,9374d8fac244b2bfcf7355753cd8e3d736eba9fde0ffa61c14e543b50f9c4e5e,2024-03-27T03:15:12.737000 CVE-2024-22039,0,0,c637282ea7179dd6a2d06a50d4c62cff6a70254815a36383973abd2e8d1999c4,2024-03-25T16:28:08.990000 CVE-2024-2204,0,0,f2361237c4001e01c13b041357423ddc6e12c61adf05210140f123a253dd047a,2024-03-15T12:53:06.423000 CVE-2024-22040,0,0,7d11f7fb5567534dcb6d5b3b79b8f0abaa376b6da679960f376543715fd2e79b,2024-03-12T12:40:13.500000 @@ -239987,7 +240004,7 @@ CVE-2024-22049,0,0,9b7359ed630e382551d4570c9533818edaca377c6778b42eef7546c621957 CVE-2024-22050,0,0,6cc1f5932c87c1ee4d5f0c22a81597d6852da9226b500ed6c316fab1f5f2b61b,2024-01-10T15:10:36.697000 CVE-2024-22051,0,0,351db93d6ca76e0dc0a7975efc553f9724406030c8337d111a27ec7033241658,2024-01-11T17:07:05.660000 CVE-2024-22054,0,0,ea7f90611fdd0de53fc019330b39d133a7eda202c929c51b6ca495fd39ad0bf5,2024-03-04T02:15:16.820000 -CVE-2024-2206,1,1,914185f0459a7ee8793b454942ddb90b60499b1a6a7697a4321da1c1ada37d7a,2024-03-27T01:15:46.613000 +CVE-2024-2206,0,0,914185f0459a7ee8793b454942ddb90b60499b1a6a7697a4321da1c1ada37d7a,2024-03-27T01:15:46.613000 CVE-2024-22075,0,0,e134c94ca50cfff14da7c6327f518dbd409e37e86810fc1b2a583012e3bdb9ef,2024-01-10T15:06:42.563000 CVE-2024-22076,0,0,07315b2e9c67887db1f24ee7d086d2a66716d3e4f66007058ad41d66ed9f1af5,2024-02-22T02:15:49.207000 CVE-2024-22077,0,0,a44b0e8d36a26ac142be37c62e09b8aebeca99a3b0c48ad29f9e3c70906a2d27,2024-03-20T13:00:16.367000 @@ -240007,6 +240024,7 @@ CVE-2024-22093,0,0,0cbc4f486dd2eb1b48ce1c4e9d316887f7d468da5c83d93117f6d1b9d4036 CVE-2024-22096,0,0,330d7fb3350f034a1e0c8805b47a2db6dbe2ceb88846f9ddfaaa7c652ddde766,2024-02-07T17:33:26.800000 CVE-2024-22097,0,0,5fdbd89068c51850a0f66cf0b6ea41858c21ad70e4a6147f1a1147450ab1d4f9,2024-02-20T19:50:53.960000 CVE-2024-22099,0,0,f14a702aeb9b71ba68c95750b691221596433d41d3e949d76bdcf28368f44584,2024-03-13T03:15:06.237000 +CVE-2024-2210,1,1,92a07de1179e34c9dc6b97dbf2d7b0c2a19c64b7faa0d50ad404ef8f04d384f1,2024-03-27T03:15:12.937000 CVE-2024-22100,0,0,a6ff3a70b4f3071cb6edf59573e0a019914b2e075d17d6c1c64c20010521b0fb,2024-03-01T14:04:26.010000 CVE-2024-22107,0,0,e3cca6041ab5ebaddd7412e3f1116f94d2eef4d2646eefe8a425a6cd027599ec,2024-02-09T19:44:32.497000 CVE-2024-22108,0,0,cdaf61a2506aec5c5c15705bb009e8054dc2f9e9fadf39ff642fb65becdf0793,2024-02-09T19:39:12.853000 @@ -240206,7 +240224,7 @@ CVE-2024-22430,0,0,2e5779ce610960aa54065a985f7d7b4d5fc66005f09960beaac23d15bb28b CVE-2024-22432,0,0,a5ce1013533b36d94c95ad06d489dc2a6480ecc8fe7741cd230ce585b643d9e0,2024-02-01T17:00:46.647000 CVE-2024-22433,0,0,15060e68251742f26417bd26381576269dfd06519ddd1ac4517720d4b647a719,2024-02-13T22:51:37.293000 CVE-2024-22436,0,0,1a6ca03e82f15ba09d256dc4d1cfbe8c473cd6ccbc09b8293ead87668477e67b,2024-03-26T19:15:48.550000 -CVE-2024-2244,1,1,6246250a6cc26a68047ec0cb7feb670179d81607c2a78c2515458b6a11438433,2024-03-27T02:15:11.417000 +CVE-2024-2244,0,0,6246250a6cc26a68047ec0cb7feb670179d81607c2a78c2515458b6a11438433,2024-03-27T02:15:11.417000 CVE-2024-22445,0,0,874153d1fc6b93fe9f1bc951c0a860f76df46d0b4a1da0ccdd296d9b31c66c08,2024-02-27T16:51:44.013000 CVE-2024-22449,0,0,bbda7843d9766542fd731dac4991558c835fbecfc00731f79a512d8c0e63a23d,2024-02-03T00:30:30.737000 CVE-2024-2245,0,0,691730e073363309cbbedda1561ea8c86cfdfccb1b6917a0eaaacd61f92e651b,2024-03-07T13:52:27.110000 @@ -240985,6 +241003,8 @@ CVE-2024-24330,0,0,f7988d122720d6123f79dcd5665b39b7eb02582091413a244134c84c6c908 CVE-2024-24331,0,0,b909d3e1c009364cabe78d8757e0ee8497b9c0fbf40568f9ffe30825f188bfc7,2024-02-01T04:18:45.817000 CVE-2024-24332,0,0,e8ff48d8d559b64b9ab6ad7cafcefb37d4d80401868f386c665115c6aeb40249,2024-02-01T04:49:16.350000 CVE-2024-24333,0,0,01fbda1675f098d1cc7c6d19f4f3e61befb0126ec79fb324ab3d3ab060b94378,2024-02-01T04:50:09.707000 +CVE-2024-24334,1,1,15769b0284dde8af0352ecbe73d82f54e9ee26b0b2d65611c93cb2d5a9e411b4,2024-03-27T03:15:11.260000 +CVE-2024-24335,1,1,7d60cc6508d08142d5785f9fff0e399ce8202802e01fb5a245282c7902a5e087,2024-03-27T03:15:11.330000 CVE-2024-24336,0,0,0bc89cbf407fac7b8e4dd340b7bf905a47346ae9d6a54373d9b8c6ff7fbc5fd0,2024-03-20T13:00:16.367000 CVE-2024-24337,0,0,aea724cce42152cfbca31af56ebea4b4144a07dac6916cd215f4a89a5f259b76,2024-02-13T14:01:49.147000 CVE-2024-24350,0,0,9134767962641c17d78d439bf5ad6b0040b309c747242ef118ff001480ea18e9,2024-02-14T21:53:21.057000 @@ -241456,6 +241476,14 @@ CVE-2024-2538,0,0,9040c900b991e8f6fd3afa80f5869e2f9dbcc85520bbfcec371534f7a5ee52 CVE-2024-25381,0,0,2fbf6a4c7caf83717eb116c843eb9d06446ef20fab32ebaa59c38b740fd20318,2024-02-22T19:07:27.197000 CVE-2024-25385,0,0,dc5aed2b1124e6338385fba73ddf3ed395eabffadc76f106a4939973b350e40a,2024-02-23T02:42:54.547000 CVE-2024-25386,0,0,b3e34473858eb8e804a89ab203abac2433271329bd78e7f08fb63dfed4e84395,2024-03-13T04:15:07.960000 +CVE-2024-25388,1,1,fa8f3daa7cb9294cf0e73f1ba6cc29e8ded10ebc0e7ad071e5bac8e68391ea06,2024-03-27T03:15:11.400000 +CVE-2024-25389,1,1,f907282d43935819fcb0625286a68257d26dbf85796a820839e610e4b045e49c,2024-03-27T03:15:11.460000 +CVE-2024-25390,1,1,5d3481b7e4206b256a2ad2850ba4463703958ddf6353d521b6b6e3b5283bbcf3,2024-03-27T03:15:11.537000 +CVE-2024-25391,1,1,0e19dd345e7a95f1c70e272a00b3e7fd70aedbd66a351c23968f955b7e6abf76,2024-03-27T03:15:11.603000 +CVE-2024-25392,1,1,ad504d79cd2c482c9b607ebff4e58d1593f57fe26d12860c641270fd73cc20de,2024-03-27T03:15:11.667000 +CVE-2024-25393,1,1,dbd1770e55652e7fdf5fae2a39be93a9b48724fa6ab89d3ccb765143ee41a8ef,2024-03-27T03:15:11.730000 +CVE-2024-25394,1,1,71a1bc9f66c6bfca74d7be3a0fb207b80453c504b2433fa2a81b2a9aa63f42da,2024-03-27T03:15:11.830000 +CVE-2024-25395,1,1,551fcfd241e902d0129242fa02547cbc283324e932e38f790c944ec11ee5f67c,2024-03-27T03:15:11.927000 CVE-2024-25398,0,0,5f9177c45e78128f47bee33d155348e7281adb4722b60ad3313c147682b88eac,2024-02-28T14:07:00.563000 CVE-2024-25399,0,0,b681bbee2f606a57716a8b8a1ed6ef4fd1407c61ce2bf8ffff233f88dd45b3ba,2024-02-28T14:07:00.563000 CVE-2024-25400,0,0,3912ffcf040787a24c42c021604642fe62f1b3305c74e7110cea5a03e5d1c065,2024-02-28T14:07:00.563000 @@ -241510,6 +241538,7 @@ CVE-2024-2557,0,0,bd3cbcd6fdd2bc53d05ad0a21dcf76dc9100645c8cd39cc3bfd0cd796821c2 CVE-2024-25578,0,0,ff68f9ee0e3394b3fa83fe8766f2e044325a5fd043b437de063c0cd80654c610,2024-03-01T14:04:26.010000 CVE-2024-25579,0,0,91953a88eab65ef3b6eb3b0fbea08ce09211ffa83ae8783d4b439f2092b924fc,2024-02-29T13:49:47.277000 CVE-2024-2558,0,0,9b2e64cc1dfa18aa6ab6ed26c2435de053f445557e20541392c5e86001c65488,2024-03-21T02:52:37.973000 +CVE-2024-25580,1,1,19289d99dc2eb0162344a5cabd480aa69375d1d073b8abddd9d157a0993b4102,2024-03-27T03:15:12.007000 CVE-2024-2559,0,0,e913f295acbf3f21c20619071c5c76f626d7ca39e71d862a4c6e578c87ef0b76,2024-03-21T02:52:38.050000 CVE-2024-25591,0,0,21fc6106113381145cf8446abbb8c9f90fa9e50d33b435a64df1b0f7c59b5baf,2024-03-17T22:38:29.433000 CVE-2024-25592,0,0,0412b365f90f8498f043e36695d62af9e4613ca29af17a99e02dba80f6454731,2024-03-15T16:26:49.320000 @@ -241595,6 +241624,9 @@ CVE-2024-25729,0,0,184930f04b43901bc1f4566a359e2a59bf4139503b85debe12ca335f06305 CVE-2024-2573,0,0,47bf6df35de56265e29983094ffe31e40ab87bee427160b9445564c34def87cf,2024-03-21T02:52:39.180000 CVE-2024-25730,0,0,70855abe305d0dfeeb202d7d3e0222d8c78a13e99e14d9706026a5f359efacd5,2024-02-26T13:42:22.567000 CVE-2024-25731,0,0,12f10a210f08c80cc0b13af611399517c9199c1982133ea9d0862af74a2a1634,2024-03-05T13:41:01.900000 +CVE-2024-25734,1,1,e171f7dc1e03f26e0eff1ee07f40d46d0b61c133a1f3f5344d00c26be9a87d3e,2024-03-27T03:15:12.077000 +CVE-2024-25735,1,1,7a740dd664397426bdbc4f6baf143e99c6e858ed3a56a40f2eb76bc355dd2013,2024-03-27T03:15:12.150000 +CVE-2024-25736,1,1,1aed0e34e534d8a35431b1c474c0726737b60fc824e98a72519830095f20da7e,2024-03-27T03:15:12.220000 CVE-2024-25739,0,0,3f77808e2a48c50aab928b0c96b70686e724f3302ff450f04c0ab77d04e27e26,2024-03-25T01:15:55.230000 CVE-2024-2574,0,0,3d88f51bb13c35eb00259193c58fba5dafef39d8018b9496b2dc12b2a4f87ce4,2024-03-21T02:52:39.263000 CVE-2024-25740,0,0,e49082457da2ca822066645fd01741e2b46dee6a85b6e915fd169e8229594e99,2024-02-26T21:11:27.837000 @@ -242733,20 +242765,25 @@ CVE-2024-2930,0,0,f884734dfb1468ce360d6e6a4b0f6c4ee9b6ce144b838c6d810644bd301964 CVE-2024-29301,0,0,154c6ea8f36ae553114269a1e880d159b7e9b09b869cc177af921f11e043c79a,2024-03-26T12:55:05.010000 CVE-2024-29302,0,0,befca4baa09da55c6ccc652e95ace012df1b1e2aab7ec33ac183ae5971911acf,2024-03-26T12:55:05.010000 CVE-2024-29303,0,0,9fc5b63681179dd34090ab25180fdf1128a0a8fe7fe2b044acdbb780ed8094f7,2024-03-26T12:55:05.010000 -CVE-2024-2932,1,1,b08163504f620ffa077b0e077b684dce0c6a45e49cf19160654705c07597f4ee,2024-03-27T01:15:46.830000 +CVE-2024-2932,0,0,b08163504f620ffa077b0e077b684dce0c6a45e49cf19160654705c07597f4ee,2024-03-27T01:15:46.830000 CVE-2024-29338,0,0,17a24f10f7d0496e7fcb2400fc6c6af48717728349b99b9f4dc4f19499bc4c6d,2024-03-22T19:02:10.300000 -CVE-2024-2934,1,1,44323ff798ff5070f4270df45aa0fef1bd9ac50dab7f05705f0a7011c1ee48d2,2024-03-27T01:15:47.100000 -CVE-2024-2935,1,1,9e953f4bded1b662331783228d656cd80eacd7f1727105f28ba92f0e8d42d18c,2024-03-27T01:15:47.360000 +CVE-2024-2934,0,0,44323ff798ff5070f4270df45aa0fef1bd9ac50dab7f05705f0a7011c1ee48d2,2024-03-27T01:15:47.100000 +CVE-2024-2935,0,0,9e953f4bded1b662331783228d656cd80eacd7f1727105f28ba92f0e8d42d18c,2024-03-27T01:15:47.360000 CVE-2024-29366,0,0,970a4db6ccd44fa8fff843a083b23c4276fdabe942805276e1033f4579523e8f,2024-03-22T19:02:10.300000 CVE-2024-29374,0,0,f8a146770d52182e0c10b15b21ebc5da7e22091690385e976078b28de6736be7,2024-03-21T19:47:03.943000 -CVE-2024-2938,1,1,495f45577a8237d25e325268be9d395f70f4b8c2157913180899b23c00c04a64,2024-03-27T01:15:47.630000 +CVE-2024-2938,0,0,495f45577a8237d25e325268be9d395f70f4b8c2157913180899b23c00c04a64,2024-03-27T01:15:47.630000 CVE-2024-29385,0,0,77dce7c3f8675f81eb6a00c8f1d149f72619312873eb8bb6e829225e587309f5,2024-03-22T19:02:10.300000 -CVE-2024-2939,1,1,27697eeff613b2e1bd50623adfd73f80eb1ec542cf6b630f0a12c9b70dd18a1c,2024-03-27T01:15:47.903000 -CVE-2024-2940,1,1,8171ee8127ac68cf335c497790e4b27bba18c505a379531179b1cd277fdf6541,2024-03-27T02:15:11.620000 +CVE-2024-2939,0,0,27697eeff613b2e1bd50623adfd73f80eb1ec542cf6b630f0a12c9b70dd18a1c,2024-03-27T01:15:47.903000 +CVE-2024-2940,0,0,8171ee8127ac68cf335c497790e4b27bba18c505a379531179b1cd277fdf6541,2024-03-27T02:15:11.620000 CVE-2024-29401,0,0,89656cc9e9a7fef85aec3d184bc9af149e9114d584510da9b248a092c84a80e6,2024-03-26T17:09:53.043000 +CVE-2024-2941,1,1,1f1aba283ea3a344bd0968415d2de723b8fa626b3bc2cab7351ffa70c0e83ab6,2024-03-27T03:15:13.160000 CVE-2024-29419,0,0,1f113c646466febbefbd1317ecc5036f9bdf6e219db156971cfdda70e05f32f0,2024-03-20T17:18:21.343000 +CVE-2024-2942,1,1,7c10f71a1dbb51c11ae8f476d5919a8346fa435673be3b6e1eb0d2d163712955,2024-03-27T03:15:13.490000 +CVE-2024-2943,1,1,f9184d593360e50714bfd3c7e038ce415a9b5bc4c63b11b2ca129a137e5fcacd,2024-03-27T03:15:13.820000 +CVE-2024-2944,1,1,399790c426e47e04baea32b7c5c32b61b52a43012ff264053487c7c8e5947b8f,2024-03-27T03:15:14.160000 CVE-2024-29440,0,0,b41dbba691936eb263a6e48ee2f4c3b0c65bf928cbb922caedd1e0f5f03baacf,2024-03-26T12:55:05.010000 CVE-2024-29442,0,0,7905121fe561461f75c739d09685b7ffc46a6e6f08464603a503f7d567bf4eab,2024-03-26T12:55:05.010000 +CVE-2024-2945,1,1,ac5903cd0a1b10a53529e27ee2cf1479cd745ed0fe181b7f856a7ced5d2172bd,2024-03-27T03:15:14.477000 CVE-2024-29469,0,0,acf93e04574e9669a29498319a75720c9b5a03ff4de2c06070b1f52ac9f365b7,2024-03-21T12:58:51.093000 CVE-2024-29470,0,0,ec8cc83a60b9ef7edaa49e0605acc097203825f31a2e1ca35494b606ac2473df,2024-03-21T12:58:51.093000 CVE-2024-29471,0,0,82d45a5ffd79414ce139218b143945b76a967fb1502a8005b616153a32c452ff,2024-03-21T12:58:51.093000