From d0fad50139c8d7a0ec37a7815b12e7815feb2a60 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 15 Mar 2024 15:03:28 +0000 Subject: [PATCH] Auto-Update: 2024-03-15T15:00:38.131917+00:00 --- CVE-2023/CVE-2023-487xx/CVE-2023-48788.json | 59 ++++++- CVE-2023/CVE-2023-508xx/CVE-2023-50861.json | 55 +++++++ CVE-2023/CVE-2023-515xx/CVE-2023-51525.json | 32 ++++ CVE-2023/CVE-2023-524xx/CVE-2023-52434.json | 105 +++++++++++- CVE-2023/CVE-2023-524xx/CVE-2023-52435.json | 142 ++++++++++++++-- CVE-2023/CVE-2023-524xx/CVE-2023-52438.json | 134 +++++++++++++-- CVE-2023/CVE-2023-524xx/CVE-2023-52439.json | 171 ++++++++++++++++++-- CVE-2023/CVE-2023-524xx/CVE-2023-52440.json | 99 +++++++++++- CVE-2023/CVE-2023-524xx/CVE-2023-52441.json | 94 ++++++++++- CVE-2023/CVE-2023-67xx/CVE-2023-6725.json | 59 +++++++ CVE-2024/CVE-2024-231xx/CVE-2024-23112.json | 94 ++++++++++- CVE-2024/CVE-2024-24xx/CVE-2024-2495.json | 55 +++++++ CVE-2024/CVE-2024-255xx/CVE-2024-25592.json | 55 +++++++ CVE-2024/CVE-2024-255xx/CVE-2024-25593.json | 55 +++++++ CVE-2024/CVE-2024-255xx/CVE-2024-25596.json | 55 +++++++ CVE-2024/CVE-2024-255xx/CVE-2024-25597.json | 55 +++++++ CVE-2024/CVE-2024-255xx/CVE-2024-25598.json | 55 +++++++ CVE-2024/CVE-2024-259xx/CVE-2024-25916.json | 55 +++++++ CVE-2024/CVE-2024-259xx/CVE-2024-25919.json | 55 +++++++ CVE-2024/CVE-2024-259xx/CVE-2024-25921.json | 55 +++++++ CVE-2024/CVE-2024-259xx/CVE-2024-25934.json | 55 +++++++ CVE-2024/CVE-2024-259xx/CVE-2024-25936.json | 55 +++++++ CVE-2024/CVE-2024-265xx/CVE-2024-26582.json | 94 ++++++++++- CVE-2024/CVE-2024-265xx/CVE-2024-26583.json | 94 ++++++++++- CVE-2024/CVE-2024-271xx/CVE-2024-27189.json | 55 +++++++ CVE-2024/CVE-2024-271xx/CVE-2024-27192.json | 55 +++++++ CVE-2024/CVE-2024-271xx/CVE-2024-27193.json | 55 +++++++ CVE-2024/CVE-2024-271xx/CVE-2024-27196.json | 55 +++++++ README.md | 66 ++++---- _state.csv | 160 ++++++++++-------- 30 files changed, 2106 insertions(+), 177 deletions(-) create mode 100644 CVE-2023/CVE-2023-508xx/CVE-2023-50861.json create mode 100644 CVE-2023/CVE-2023-515xx/CVE-2023-51525.json create mode 100644 CVE-2023/CVE-2023-67xx/CVE-2023-6725.json create mode 100644 CVE-2024/CVE-2024-24xx/CVE-2024-2495.json create mode 100644 CVE-2024/CVE-2024-255xx/CVE-2024-25592.json create mode 100644 CVE-2024/CVE-2024-255xx/CVE-2024-25593.json create mode 100644 CVE-2024/CVE-2024-255xx/CVE-2024-25596.json create mode 100644 CVE-2024/CVE-2024-255xx/CVE-2024-25597.json create mode 100644 CVE-2024/CVE-2024-255xx/CVE-2024-25598.json create mode 100644 CVE-2024/CVE-2024-259xx/CVE-2024-25916.json create mode 100644 CVE-2024/CVE-2024-259xx/CVE-2024-25919.json create mode 100644 CVE-2024/CVE-2024-259xx/CVE-2024-25921.json create mode 100644 CVE-2024/CVE-2024-259xx/CVE-2024-25934.json create mode 100644 CVE-2024/CVE-2024-259xx/CVE-2024-25936.json create mode 100644 CVE-2024/CVE-2024-271xx/CVE-2024-27189.json create mode 100644 CVE-2024/CVE-2024-271xx/CVE-2024-27192.json create mode 100644 CVE-2024/CVE-2024-271xx/CVE-2024-27193.json create mode 100644 CVE-2024/CVE-2024-271xx/CVE-2024-27196.json diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48788.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48788.json index 247c2899682..18c748643c9 100644 --- a/CVE-2023/CVE-2023-487xx/CVE-2023-48788.json +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48788.json @@ -2,16 +2,40 @@ "id": "CVE-2023-48788", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-03-12T15:15:46.973", - "lastModified": "2024-03-12T16:02:33.900", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-03-15T14:52:23.887", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiClientEMS version 7.2.0 through 7.2.2, FortiClientEMS 7.0.1 through 7.0.10 allows attacker to execute unauthorized code or commands via specially crafted packets." + }, + { + "lang": "es", + "value": "Una neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando sql (\"inyecci\u00f3n sql\") en Fortinet FortiClientEMS versi\u00f3n 7.2.0 a 7.2.2, FortiClientEMS 7.0.1 a 7.0.10 permite a un atacante ejecutar c\u00f3digo o comandos no autorizados a trav\u00e9s de paquetes especialmente manipulados." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -46,10 +70,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:forticlient_enterprise_management_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.1", + "versionEndIncluding": "7.0.10", + "matchCriteriaId": "CA97EA36-75D0-40DA-98CD-4C94E061A28F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:forticlient_enterprise_management_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0", + "versionEndIncluding": "7.2.2", + "matchCriteriaId": "3C4BC53A-0E69-4CDE-B89A-E6AAC3ADB1E0" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-23-430", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50861.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50861.json new file mode 100644 index 00000000000..d4441e2413d --- /dev/null +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50861.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-50861", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-15T14:15:07.207", + "lastModified": "2024-03-15T14:15:07.207", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in realmag777 HUSKY \u2013 Products Filter for WooCommerce (formerly WOOF).This issue affects HUSKY \u2013 Products Filter for WooCommerce (formerly WOOF): from n/a through 1.3.4.3.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/woocommerce-products-filter/wordpress-husky-plugin-1-3-4-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-515xx/CVE-2023-51525.json b/CVE-2023/CVE-2023-515xx/CVE-2023-51525.json new file mode 100644 index 00000000000..2b5353ce42b --- /dev/null +++ b/CVE-2023/CVE-2023-515xx/CVE-2023-51525.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-51525", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-15T14:15:07.457", + "lastModified": "2024-03-15T14:15:07.457", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Veribo, Roland Murg WP Simple Booking Calendar.This issue affects WP Simple Booking Calendar: from n/a through 2.0.8.4.\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-simple-booking-calendar/wordpress-wp-simple-booking-calendar-plugin-2-0-8-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52434.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52434.json index 35d8a828611..5f537d9a1da 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52434.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52434.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52434", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-20T18:15:50.790", - "lastModified": "2024-03-01T14:15:53.143", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-03-15T14:21:29.950", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,27 +14,116 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: smb: cliente: corrige OOB potenciales en smb2_parse_contexts() Valida compensaciones y longitudes antes de desreferenciar crea contextos en smb2_parse_contexts(). Esto corrige los siguientes errores al acceder a contextos de creaci\u00f3n no v\u00e1lidos desde el servidor: ERROR: no se puede manejar el error de p\u00e1gina para la direcci\u00f3n: ffff8881178d8cc3 #PF: acceso de lectura del supervisor en modo kernel #PF: error_code(0x0000) - p\u00e1gina no presente PGD 4a01067 P4D 4a01067 PUD 0 Ups: 0000 [#1] PREEMPT SMP NOPTI CPU: 3 PID: 1736 Comm: mount.cifs No est\u00e1 contaminado 6.7.0-rc4 #1 Nombre de hardware: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.2 -3-gd478f380-rebuilt.opensuse.org 04/04/2014 RIP: 0010: SMB2_PARSE_CONTEXTS+0XA0/0X3A0 [CIFS] C\u00f3digo: F8 10 75 13 48 B8 93 AD 25 50 9C B4 11 E7 49 39 06 0f 84 D2 00 00 00 8b 45 00 85 c0 74 61 41 29 c5 48 01 c5 41 83 fd 0f 76 55 <0f> b7 7d 04 0f b7 45 06 4c 8d 74 3d 00 66 83 f8 04 75 bc ba 04 00 RSP: 0018:ffffc900007939e0 EFLAGS: 00010216 RAX: ffffc90000793c78 RBX: ffff8880180cc000 RCX: ffffc90000793c90 RDX: ffffc90000793cc0 RSI: ffff8880178d8cc0 RDI: ffff8880180cc000 RBP: ffff8881178d8cbf R08: ffffc90000793c22 R09: 0000000000000000 R10: ffff8880180cc000 R11: 00000000000000024 R12: 0000000000000000 R13: 0000000 000000020 R14: 00000000000000000 R15: ffffc90000793c22 FS: 00007f873753cbc0(0000) GS:ffff88806bc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff8881178d8cc3 CR3 : 00000000181ca000 CR4: 0000000000750ef0 PKRU: 55555554 Seguimiento de llamadas: ? __morir+0x23/0x70 ? page_fault_oops+0x181/0x480? search_module_extables+0x19/0x60? srso_alias_return_thunk+0x5/0xfbef5? exc_page_fault+0x1b6/0x1c0? asm_exc_page_fault+0x26/0x30? smb2_parse_contexts+0xa0/0x3a0 [cifs] SMB2_open+0x38d/0x5f0 [cifs] ? smb2_is_path_accessible+0x138/0x260 [cifs] smb2_is_path_accessible+0x138/0x260 [cifs] cifs_is_path_remote+0x8d/0x230 [cifs] cifs_mount+0x7e/0x350 [cifs] cifs_smb3_do_mount+0x128/0x7 80 [cifs] smb3_get_tree+0xd9/0x290 [cifs] vfs_get_tree+ 0x2c/0x100? capaz+0x37/0x70 path_mount+0x2d7/0xb80? srso_alias_return_thunk+0x5/0xfbef5? _raw_spin_unlock_irqrestore+0x44/0x60 __x64_sys_mount+0x11a/0x150 do_syscall_64+0x47/0xf0 Entry_SYSCALL_64_after_hwframe+0x6f/0x77 RIP: 0033:0x7f8737657b1e" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.10.211", + "matchCriteriaId": "DC6905D6-5F33-4718-AAFD-C356351E82B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11.0", + "versionEndExcluding": "5.15.150", + "matchCriteriaId": "892B1C6C-0A61-4DAC-9F79-172AB564A179" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16.0", + "versionEndIncluding": "6.1.79", + "matchCriteriaId": "61F11EE9-C08A-482C-AE65-9D10AA4C8987" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2.0", + "versionEndExcluding": "6.6.8", + "matchCriteriaId": "CD91B283-F216-4A2B-ACCB-AF90DA101D1D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/13fb0fc4917621f3dfa285a27eaf7151d770b5e5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/17a0f64cc02d4972e21c733d9f21d1c512963afa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1ae3c59355dc9882e09c020afe8ffbd895ad0f29", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/890bc4fac3c0973a49cac35f634579bebba7fe48", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/af1689a9b7701d9907dfc84d2a4b57c4bc907144", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52435.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52435.json index 6bc3bb041f9..ae762d4f6e0 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52435.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52435.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52435", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-20T20:15:08.063", - "lastModified": "2024-02-23T09:15:22.190", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-03-15T14:06:17.587", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,31 +14,155 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: previene el desbordamiento de mss en skb_segment() Una vez m\u00e1s, syzbot puede bloquear el kernel en skb_segment() [1] GSO_BY_FRAGS es un valor prohibido, pero desafortunadamente el siguiente c\u00e1lculo en skb_segment () puede alcanzarlo con bastante facilidad: mss = mss * part_segs; 65535 = 3 * 5 * 17 * 257, por lo que muchos valores iniciales de mss pueden llevar a un mal resultado final. Aseg\u00farese de limitar la segmentaci\u00f3n para que el nuevo valor de mss sea menor que GSO_BY_FRAGS. [1] falla de protecci\u00f3n general, probablemente para direcci\u00f3n no can\u00f3nica 0xdffffc000000000e: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref en rango [0x0000000000000070-0x0000000000000077] CPU: 1 PID: 5079 Comm: syz-executor993 Not tainted 6.7.0-rc4-syzkaller-00141-g1ae4cd3cbdd0 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 RIP: 0010:skb_segment+0x181d/0x3f30 net/core/skbuff.c:4551 Code: 83 e3 02 e9 fb ed ff ff e8 90 68 1c f9 48 8b 84 24 f8 00 00 00 48 8d 78 70 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 8a 21 00 00 48 8b 84 24 f8 00 RSP: 0018:ffffc900043473d0 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: 0000000000010046 RCX: ffffffff886b1597 RDX: 000000000000000e RSI: ffffffff886b2520 RDI: 0000000000000070 RBP: ffffc90004347578 R08: 0000000000000005 R09: 000000000000ffff R10: 000000000000ffff R11: 0000000000000002 R12: ffff888063202ac0 R13: 0000000000010000 R14: 000000000000ffff R15: 0000000000000046 FS: 0000555556e7e380(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020010000 CR3: 0000000027ee2000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: udp6_ufo_fragment+0xa0e/0xd00 net/ipv6/udp_offload.c:109 ipv6_gso_segment+0x534/0x17e0 net/ipv6/ip6_offload.c:120 skb_mac_gso_segment+0x290/0x610 net/core/gso.c:53 __skb_gso_segment+0x339/0x710 net/core/gso.c:124 skb_gso_segment include/net/gso.h:83 [inline] validate_xmit_skb+0x36c/0xeb0 net/core/dev.c:3626 __dev_queue_xmit+0x6f3/0x3d60 net/core/dev.c:4338 dev_queue_xmit include/linux/netdevice.h:3134 [inline] packet_xmit+0x257/0x380 net/packet/af_packet.c:276 packet_snd net/packet/af_packet.c:3087 [inline] packet_sendmsg+0x24c6/0x5220 net/packet/af_packet.c:3119 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg+0xd5/0x180 net/socket.c:745 __sys_sendto+0x255/0x340 net/socket.c:2190 __do_sys_sendto net/socket.c:2202 [inline] __se_sys_sendto net/socket.c:2198 [inline] __x64_sys_sendto+0xe0/0x1b0 net/socket.c:2198 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x40/0x110 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x63/0x6b RIP: 0033:0x7f8692032aa9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 d1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fff8d685418 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f8692032aa9 RDX: 0000000000010048 RSI: 00000000200000c0 RDI: 0000000000000003 RBP: 00000000000f4240 R08: 0000000020000540 R09: 0000000000000014 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff8d685480 R13: 0000000000000001 R14: 00007fff8d685480 R15: 0000000000000003 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:skb_segment+0x181d/0x3f30 net/core/skbuff.c:4551 Code: 83 e3 02 e9 fb ed ff ff e8 90 68 1c f9 48 8b 84 24 f8 00 00 00 48 8d 78 70 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 8a 21 00 00 48 8b 84 24 f8 00 RSP: 0018:ffffc900043473d0 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: 0000000000010046 RCX: ffffffff886b1597 RDX: 000000000000000e RSI: ffffffff886b2520 RDI: 0000000000000070 RBP: ffffc90004347578 R0 ---truncated--- " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.4.269", + "matchCriteriaId": "48E561A5-2F59-4E74-BFAB-39B8D844FD15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5.0", + "versionEndExcluding": "5.10.210", + "matchCriteriaId": "B39742A2-A0C1-490C-95CC-FB78D6D70698" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11.0", + "versionEndExcluding": "5.15.149", + "matchCriteriaId": "E6FB1C44-BEEE-4D31-AD44-E15806EA6249" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16.0", + "versionEndExcluding": "6.1.79", + "matchCriteriaId": "3B0A907E-1010-4294-AEFE-0EB5684AF52C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2.0", + "versionEndExcluding": "6.6.11", + "matchCriteriaId": "B476EA8E-7141-4ABB-8EF7-F7B6806D4892" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc1:*:*:*:*:*:*", + "matchCriteriaId": "3A0038DE-E183-4958-A6E3-CE3821FEAFBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc2:*:*:*:*:*:*", + "matchCriteriaId": "E31AD4FC-436C-44AB-BCAB-3A0B37F69EE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc3:*:*:*:*:*:*", + "matchCriteriaId": "C56C6E04-4F04-44A3-8DB8-93899903CFCF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc4:*:*:*:*:*:*", + "matchCriteriaId": "5C78EDA4-8BE6-42FC-9512-49032D525A55" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc5:*:*:*:*:*:*", + "matchCriteriaId": "32F2E5CA-13C6-4601-B530-D465CBF73D1C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/23d05d563b7e7b0314e65c8e882bc27eac2da8e7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6c53e8547687d9c767c139cd4b50af566f58c29a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8f8f185643747fbb448de6aab0efa51c679909a3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/95b3904a261a9f810205da560e802cc326f50d77", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/989b0ff35fe5fc9652ee5bafbe8483db6f27b137", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cd1022eaf87be8e6151435bd4df4c242c347e083", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52438.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52438.json index 7adf2474d4e..f048a7f696b 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52438.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52438.json @@ -2,43 +2,157 @@ "id": "CVE-2023-52438", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-20T21:15:08.167", - "lastModified": "2024-02-20T21:52:55.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-03-15T14:03:51.503", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbinder: fix use-after-free in shinker's callback\n\nThe mmap read lock is used during the shrinker's callback, which means\nthat using alloc->vma pointer isn't safe as it can race with munmap().\nAs of commit dd2283f2605e (\"mm: mmap: zap pages with read mmap_sem in\nmunmap\") the mmap lock is downgraded after the vma has been isolated.\n\nI was able to reproduce this issue by manually adding some delays and\ntriggering page reclaiming through the shrinker's debug sysfs. The\nfollowing KASAN report confirms the UAF:\n\n ==================================================================\n BUG: KASAN: slab-use-after-free in zap_page_range_single+0x470/0x4b8\n Read of size 8 at addr ffff356ed50e50f0 by task bash/478\n\n CPU: 1 PID: 478 Comm: bash Not tainted 6.6.0-rc5-00055-g1c8b86a3799f-dirty #70\n Hardware name: linux,dummy-virt (DT)\n Call trace:\n zap_page_range_single+0x470/0x4b8\n binder_alloc_free_page+0x608/0xadc\n __list_lru_walk_one+0x130/0x3b0\n list_lru_walk_node+0xc4/0x22c\n binder_shrink_scan+0x108/0x1dc\n shrinker_debugfs_scan_write+0x2b4/0x500\n full_proxy_write+0xd4/0x140\n vfs_write+0x1ac/0x758\n ksys_write+0xf0/0x1dc\n __arm64_sys_write+0x6c/0x9c\n\n Allocated by task 492:\n kmem_cache_alloc+0x130/0x368\n vm_area_alloc+0x2c/0x190\n mmap_region+0x258/0x18bc\n do_mmap+0x694/0xa60\n vm_mmap_pgoff+0x170/0x29c\n ksys_mmap_pgoff+0x290/0x3a0\n __arm64_sys_mmap+0xcc/0x144\n\n Freed by task 491:\n kmem_cache_free+0x17c/0x3c8\n vm_area_free_rcu_cb+0x74/0x98\n rcu_core+0xa38/0x26d4\n rcu_core_si+0x10/0x1c\n __do_softirq+0x2fc/0xd24\n\n Last potentially related work creation:\n __call_rcu_common.constprop.0+0x6c/0xba0\n call_rcu+0x10/0x1c\n vm_area_free+0x18/0x24\n remove_vma+0xe4/0x118\n do_vmi_align_munmap.isra.0+0x718/0xb5c\n do_vmi_munmap+0xdc/0x1fc\n __vm_munmap+0x10c/0x278\n __arm64_sys_munmap+0x58/0x7c\n\nFix this issue by performing instead a vma_lookup() which will fail to\nfind the vma that was isolated before the mmap lock downgrade. Note that\nthis option has better performance than upgrading to a mmap write lock\nwhich would increase contention. Plus, mmap_write_trylock() has been\nrecently removed anyway." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: binder: corrige el use-after-free en la devoluci\u00f3n de llamada de shinker. El bloqueo de lectura mmap se usa durante la devoluci\u00f3n de llamada de shrinker, lo que significa que usar el puntero alloc->vma no es seguro ya que puede ejecutarse con munmap(). A partir de el commit dd2283f2605e (\"mm: mmap: zap p\u00e1ginas con lectura mmap_sem en munmap\"), el bloqueo mmap se degrada despu\u00e9s de que se ha aislado el vma. Pude reproducir este problema agregando manualmente algunos retrasos y activando la recuperaci\u00f3n de p\u00e1ginas a trav\u00e9s del sistema de depuraci\u00f3n del reductor. El siguiente informe de KASAN confirma la UAF: =========================================== ======================== ERROR: KASAN: slab-use-after-free en zap_page_range_single+0x470/0x4b8 Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff356ed50e50f0 por tarea bash/478 CPU: 1 PID: 478 Comm: bash No contaminado 6.6.0-rc5-00055-g1c8b86a3799f-dirty #70 Nombre de hardware: linux,dummy-virt (DT) Rastreo de llamadas: zap_page_range_single+0x470/0x4b8 binder_alloc_free_page+0x608/ 0xadc __list_lru_walk_one+0x130/0x3b0 list_lru_walk_node+0xc4/0x22c binder_shrink_scan+0x108/0x1dc encogimiento_debugfs_scan_write+0x2b4/0x500 full_proxy_write+0xd4/0x140 vfs_write+0x1ac/0x758 ksys_write+0xf0/0x1dc __arm64_sys_write+0x6c/0x9c Asignado por la tarea 492: kmem_cache_alloc+0x130/ 0x368 vm_area_alloc+0x2c/0x190 mmap_region+0x258/0x18bc do_mmap+0x694/0xa60 vm_mmap_pgoff+0x170/0x29c ksys_mmap_pgoff+0x290/0x3a0 __arm64_sys_mmap+0xcc/0x144 Liberado por tarea 491: kmem_cache_free+0x17c/0x3c8 vm_area_free_rcu_cb+0x74/0x98 rcu_core+0xa38/ 0x26d4 rcu_core_si+0x10/0x1c __do_softirq+0x2fc/0xd24 \u00daltima creaci\u00f3n de trabajo potencialmente relacionado: __call_rcu_common.constprop.0+0x6c/0xba0 call_rcu+0x10/0x1c vm_area_free+0x18/0x24 remove_vma+0xe4/0x118 do_vmi _align_munmap.isra.0+0x718/0xb5c do_vmi_munmap+0xdc/0x1fc __vm_munmap+0x10c/0x278 __arm64_sys_munmap+0x58/0x7c Solucione este problema realizando en su lugar un vma_lookup() que no podr\u00e1 encontrar el vma que estaba aislado antes de la degradaci\u00f3n del bloqueo mmap. Tenga en cuenta que esta opci\u00f3n tiene un mejor rendimiento que actualizar a un bloqueo de escritura mmap, lo que aumentar\u00eda la contenci\u00f3n. Adem\u00e1s, mmap_write_trylock() se elimin\u00f3 recientemente de todos modos." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20.0", + "versionEndExcluding": "5.4.268", + "matchCriteriaId": "35ADF607-EDCA-45AB-8FB6-9F2D40D47C0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5.0", + "versionEndExcluding": "5.10.209", + "matchCriteriaId": "5D2E4F24-2FBB-4434-8598-2B1499E566B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11.0", + "versionEndExcluding": "5.15.148", + "matchCriteriaId": "E25E1389-4B0F-407A-9C94-5908FF3EE88B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16.0", + "versionEndExcluding": "6.1.74", + "matchCriteriaId": "F7DD9841-CE11-470D-A285-A2E8E0F6640D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2.0", + "versionEndExcluding": "6.6.13", + "matchCriteriaId": "74A1FFC7-19FA-450E-BC2D-2BBD2EBF0A5F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7.0", + "versionEndExcluding": "6.7.1", + "matchCriteriaId": "664EB721-F519-48BB-B1C8-897D5990CD78" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/3f489c2067c5824528212b0fc18b28d51332d906", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8ad4d580e8aff8de2a4d57c5930fcc29f1ffd4a6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9fa04c93f24138747807fe75b5591bb680098f56", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a49087ab93508b60d9b8add91707a22dda832869", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a53e15e592b4dcc91c3a3b8514e484a0bdbc53a3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c8c1158ffb007197f31f9d9170cf13e4f34cbb5c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e074686e993ff1be5f21b085a3b1b4275ccd5727", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52439.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52439.json index 8d2e02d0083..4766d50c377 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52439.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52439.json @@ -2,47 +2,196 @@ "id": "CVE-2023-52439", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-20T21:15:08.213", - "lastModified": "2024-02-20T21:52:55.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-03-15T14:21:10.847", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio: Fix use-after-free in uio_open\n\ncore-1\t\t\t\tcore-2\n-------------------------------------------------------\nuio_unregister_device\t\tuio_open\n\t\t\t\tidev = idr_find()\ndevice_unregister(&idev->dev)\nput_device(&idev->dev)\nuio_device_release\n\t\t\t\tget_device(&idev->dev)\nkfree(idev)\nuio_free_minor(minor)\n\t\t\t\tuio_release\n\t\t\t\tput_device(&idev->dev)\n\t\t\t\tkfree(idev)\n-------------------------------------------------------\n\nIn the core-1 uio_unregister_device(), the device_unregister will kfree\nidev when the idev->dev kobject ref is 1. But after core-1\ndevice_unregister, put_device and before doing kfree, the core-2 may\nget_device. Then:\n1. After core-1 kfree idev, the core-2 will do use-after-free for idev.\n2. When core-2 do uio_release and put_device, the idev will be double\n freed.\n\nTo address this issue, we can get idev atomic & inc idev reference with\nminor_lock." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: uio: corrige use-after-free en uio_open core-1 core-2 ------------------------------------------------------- uio_unregister_device uio_open idev = idr_find() device_unregister(&idev->dev) put_device(&idev->dev) uio_device_release get_device(&idev->dev) kfree(idev) uio_free_minor(minor) uio_release put_device(&idev->dev) kfree(idev) ------------------------------------------------------- In the core-1 uio_unregister_device(), the device_unregister se liberar\u00e1 idev cuando la referencia del objeto idev->dev kobject es 1. But after core-1 device_unregister, put_device and before doing kfree, the core-2 may get_device. Then: 1. After core-1 kfree idev, the core-2 will do use-after-free for idev. 2. When core-2 do uio_release and put_device, el idev se liberar\u00e1 dos veces. Para solucionar este problema, podemos obtener la referencia de idev atomic & inc idev con minor_lock." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartExcluding": "4.18.0", + "versionEndExcluding": "4.19.306", + "matchCriteriaId": "5A94A44F-4F9A-4447-AF13-47B88B4CD211" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20.0", + "versionEndExcluding": "5.4.268", + "matchCriteriaId": "35ADF607-EDCA-45AB-8FB6-9F2D40D47C0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5.0", + "versionEndExcluding": "5.10.209", + "matchCriteriaId": "5D2E4F24-2FBB-4434-8598-2B1499E566B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11.0", + "versionEndExcluding": "5.15.148", + "matchCriteriaId": "E25E1389-4B0F-407A-9C94-5908FF3EE88B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16.0", + "versionEndExcluding": "6.1.74", + "matchCriteriaId": "F7DD9841-CE11-470D-A285-A2E8E0F6640D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2.0", + "versionEndExcluding": "6.6.13", + "matchCriteriaId": "74A1FFC7-19FA-450E-BC2D-2BBD2EBF0A5F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7.0", + "versionEndExcluding": "6.7.1", + "matchCriteriaId": "664EB721-F519-48BB-B1C8-897D5990CD78" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:4.18:-:*:*:*:*:*:*", + "matchCriteriaId": "6AE7DC47-EAFA-42D5-BCF5-C7039EE3D771" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:4.18:rc5:*:*:*:*:*:*", + "matchCriteriaId": "DB2B91AF-ACE1-4F6F-B2D0-9D4B7D8D20CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:4.18:rc6:*:*:*:*:*:*", + "matchCriteriaId": "30FBD992-DD41-441E-A6C7-D39DAC45DA34" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:4.18:rc7:*:*:*:*:*:*", + "matchCriteriaId": "10979D17-76B4-465F-A475-78680FBECEBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:4.18:rc8:*:*:*:*:*:*", + "matchCriteriaId": "56BF1EDD-3351-4E3E-AD42-54AF093ADB89" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/0c9ae0b8605078eafc3bea053cc78791e97ba2e2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/17a8519cb359c3b483fb5c7367efa9a8a508bdea", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3174e0f7de1ba392dc191625da83df02d695b60c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/35f102607054faafe78d2a6994b18d5d9d6e92ad", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5cf604ee538ed0c467abe3b4cda5308a6398f0f7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5e0be1229ae199ebb90b33102f74a0f22d152570", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/913205930da6213305616ac539447702eaa85e41", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e93da893d52d82d57fc0db2ca566024e0f26ff50", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52440.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52440.json index f258d8dc57e..ce8d98689a5 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52440.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52440.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52440", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-21T08:15:45.203", - "lastModified": "2024-02-22T19:07:27.197", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-03-15T13:44:59.367", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,27 +14,110 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ksmbd: corrige el desbordamiento de slub en ksmbd_decode_ntlmssp_auth_blob() Si authblob->SessionKey.Length es mayor que el tama\u00f1o de la clave de sesi\u00f3n (CIFS_KEY_SIZE), puede ocurrir un desbordamiento de slub en los c\u00f3digos de intercambio de claves. cifs_arc4_crypt copia a la matriz de claves de sesi\u00f3n desde SessionKey del cliente." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17.0", + "versionEndExcluding": "6.1.52", + "matchCriteriaId": "169F25B6-7A66-437D-B095-420A0C9D2628" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2.0", + "versionEndExcluding": "6.4.15", + "matchCriteriaId": "FB08B8F4-BEEF-473F-8A44-8C0DC24B919C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.5.0", + "versionEndExcluding": "6.5.2", + "matchCriteriaId": "496F2478-0324-4792-B3ED-95D8884323A4" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/30fd6521b2fbd9b767e438e31945e5ea3e3a2fba", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4b081ce0d830b684fdf967abc3696d1261387254", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7f1d6cb0eb6af3a8088dc24b7ddee9a9711538c4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bd554ed4fdc3d38404a1c43d428432577573e809", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ecd7e1c562cb08e41957fcd4b0e404de5ab38e20", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52441.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52441.json index 9656f5b4f12..4b561003c2a 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52441.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52441.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52441", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-21T08:15:45.463", - "lastModified": "2024-02-22T19:07:27.197", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-03-15T13:56:31.710", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,23 +14,103 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ksmbd: correcci\u00f3n fuera de los l\u00edmites en init_smb2_rsp_hdr() Si el cliente env\u00eda una solicitud de negociaci\u00f3n smb2 y luego env\u00eda una solicitud de negociaci\u00f3n smb1, se llama a init_smb2_rsp_hdr para la solicitud de negociaci\u00f3n smb1 ya que need_neg est\u00e1 configurado en falso. Este parche ignora los paquetes smb1 despu\u00e9s de que ->need_neg se establece en falso." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15.0", + "versionEndExcluding": "5.15.145", + "matchCriteriaId": "9FF1671D-E1DC-4CBC-8438-A46DF4F1E978" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16.0", + "versionEndExcluding": "6.1.53", + "matchCriteriaId": "10E7E9D1-2299-4B6E-945D-98FF23478015" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2.0", + "versionEndExcluding": "6.4.16", + "matchCriteriaId": "447B7633-4054-4954-8C80-6F6098C5574B" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/330d900620dfc9893011d725b3620cd2ee0bc2bc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/536bb492d39bb6c080c92f31e8a55fe9934f452b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5c0df9d30c289d6b9d7d44e2a450de2f8e3cf40b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aa669ef229ae8dd779da9caa24e254964545895f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6725.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6725.json new file mode 100644 index 00000000000..3728827281a --- /dev/null +++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6725.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-6725", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-03-15T13:15:06.857", + "lastModified": "2024-03-15T13:15:06.857", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An access-control flaw was found in the OpenStack Designate component where private configuration information including access keys to BIND were improperly made world readable. A malicious attacker with access to any container could exploit this flaw to access sensitive information." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1220" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2023-6725", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2249273", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23112.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23112.json index 74488179e11..25030d1253b 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23112.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23112.json @@ -2,16 +2,40 @@ "id": "CVE-2024-23112", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-03-12T15:15:49.090", - "lastModified": "2024-03-12T16:02:33.900", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-03-15T14:51:58.497", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiOS version 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.1 through 7.0.13, 6.4.7 through 6.4.14, and FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14 SSL-VPN may allow an authenticated attacker to gain access to another user\u2019s bookmark via URL manipulation." + }, + { + "lang": "es", + "value": "Una omisi\u00f3n de autorizaci\u00f3n a trav\u00e9s de una vulnerabilidad de clave controlada por el usuario [CWE-639] en FortiOS versi\u00f3n 7.4.0 a 7.4.1, 7.2.0 a 7.2.6, 7.0.1 a 7.0.13, 6.4.7 a 6.4.14, y FortiProxy versi\u00f3n 7.4.0 a 7.4.2, 7.2.0 a 7.2.8, 7.0.0 a 7.0.14 SSL-VPN puede permitir que un atacante autenticado obtenga acceso al marcador de otro usuario mediante manipulaci\u00f3n de URL." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -46,10 +70,74 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndIncluding": "7.0.14", + "matchCriteriaId": "94C6FBEA-B8B8-4A92-9CAF-F4A125577C3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0", + "versionEndIncluding": "7.2.8", + "matchCriteriaId": "406F8C48-85CE-46AF-BE5C-0ED9E3E16A39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.4.0", + "versionEndIncluding": "7.4.2", + "matchCriteriaId": "A8DD8789-6485-49E6-92D3-74004D9B6E9B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4.7", + "versionEndIncluding": "6.4.14", + "matchCriteriaId": "4841D40B-DA6E-4B4A-A698-8E23B3E40101" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.1", + "versionEndIncluding": "7.0.13", + "matchCriteriaId": "40193C91-DAF4-4A0D-9AA7-0D4DDE964488" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0", + "versionEndIncluding": "7.2.6", + "matchCriteriaId": "24D09A92-81EC-4003-B017-C67FC739EEBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.4.0", + "versionEndIncluding": "7.4.1", + "matchCriteriaId": "2E2A5347-D536-4D43-A163-5B5A3AFE742C" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-24-013", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2495.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2495.json new file mode 100644 index 00000000000..0900459eecf --- /dev/null +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2495.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-2495", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2024-03-15T13:15:09.500", + "lastModified": "2024-03-15T13:15:09.500", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cryptographic key vulnerability encoded in the FriendlyWrt firmware affecting version 2022-11-16.51b3d35. This vulnerability could allow an attacker to compromise the confidentiality and integrity of encrypted data." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.0, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/cryptographic-key-plain-text-vulnerability-friendlyelecs-friendlywrt", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25592.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25592.json new file mode 100644 index 00000000000..828c1f61a36 --- /dev/null +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25592.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-25592", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-15T14:15:07.550", + "lastModified": "2024-03-15T14:15:07.550", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPMU DEV Broken Link Checker allows Stored XSS.This issue affects Broken Link Checker: from n/a through 2.2.3.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/broken-link-checker/wordpress-broken-link-checker-plugin-2-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25593.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25593.json new file mode 100644 index 00000000000..1e9f6ef0f54 --- /dev/null +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25593.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-25593", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-15T14:15:07.787", + "lastModified": "2024-03-15T14:15:07.787", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Basix NEX-Forms \u2013 Ultimate Form Builder allows Stored XSS.This issue affects NEX-Forms \u2013 Ultimate Form Builder: from n/a through 8.5.5.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/nex-forms-express-wp-form-builder/wordpress-nex-forms-plugin-8-5-5-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25596.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25596.json new file mode 100644 index 00000000000..4ddb3d1672f --- /dev/null +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25596.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-25596", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-15T14:15:07.990", + "lastModified": "2024-03-15T14:15:07.990", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Doofinder Doofinder for WooCommerce allows Stored XSS.This issue affects Doofinder for WooCommerce: from n/a through 2.1.8.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/doofinder-for-woocommerce/wordpress-doofinder-for-woocommerce-plugin-2-1-8-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25597.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25597.json new file mode 100644 index 00000000000..38a94ab6310 --- /dev/null +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25597.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-25597", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-15T14:15:08.220", + "lastModified": "2024-03-15T14:15:08.220", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Etoile Web Design Ultimate Reviews allows Stored XSS.This issue affects Ultimate Reviews: from n/a through 3.2.8.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/ultimate-reviews/wordpress-ultimate-reviews-plugin-3-2-8-unauthenticated-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25598.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25598.json new file mode 100644 index 00000000000..8cccf39be0b --- /dev/null +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25598.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-25598", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-15T13:15:07.087", + "lastModified": "2024-03-15T13:15:07.087", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Livemesh Livemesh Addons for Elementor allows Stored XSS.This issue affects Livemesh Addons for Elementor: from n/a through 8.3.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/addons-for-elementor/wordpress-elementor-addons-by-livemesh-plugin-8-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25916.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25916.json new file mode 100644 index 00000000000..98369530f3c --- /dev/null +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25916.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-25916", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-15T13:15:07.323", + "lastModified": "2024-03-15T13:15:07.323", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Joseph C Dolson My Calendar allows Stored XSS.This issue affects My Calendar: from n/a through 3.4.23.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/my-calendar/wordpress-my-calendar-plugin-3-4-23-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25919.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25919.json new file mode 100644 index 00000000000..c99a1b09989 --- /dev/null +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25919.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-25919", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-15T13:15:07.563", + "lastModified": "2024-03-15T13:15:07.563", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Hiroaki Miyashita Custom Field Template allows Stored XSS.This issue affects Custom Field Template: from n/a through 2.6.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/custom-field-template/wordpress-custom-field-template-plugin-2-6-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25921.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25921.json new file mode 100644 index 00000000000..1ced279c1ae --- /dev/null +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25921.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-25921", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-15T13:15:07.807", + "lastModified": "2024-03-15T13:15:07.807", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Concerted Action Action Network allows Reflected XSS.This issue affects Action Network: from n/a through 1.4.2.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-action-network/wordpress-action-network-plugin-1-4-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25934.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25934.json new file mode 100644 index 00000000000..e50d264a2f1 --- /dev/null +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25934.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-25934", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-15T13:15:08.070", + "lastModified": "2024-03-15T13:15:08.070", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FormFacade allows Stored XSS.This issue affects FormFacade: from n/a through 1.0.0.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/formfacade/wordpress-formfacade-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25936.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25936.json new file mode 100644 index 00000000000..792babaddb6 --- /dev/null +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25936.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-25936", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-15T13:15:08.287", + "lastModified": "2024-03-15T13:15:08.287", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SoundCloud Inc., Lawrie Malen SoundCloud Shortcode allows Stored XSS.This issue affects SoundCloud Shortcode: from n/a through 4.0.1.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/soundcloud-shortcode/wordpress-soundcloud-shortcode-plugin-4-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26582.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26582.json index 3c0e292e5ea..44931121a8f 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26582.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26582.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26582", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-21T15:15:09.327", - "lastModified": "2024-03-11T18:15:18.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-03-15T13:56:41.843", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,23 +14,103 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: tls: corrige el use-after-free con lecturas parciales y descifrado as\u00edncrono tls_decrypt_sg no toma una referencia en las p\u00e1ginas de clear_skb, por lo que put_page() en tls_decrypt_done las libera y activamos un use-after-free en Process_rx_list cuando intentamos leer desde el skb parcialmente le\u00eddo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0", + "versionEndExcluding": "6.1.79", + "matchCriteriaId": "82C70944-013B-4FC2-97B8-F2D6C1342B5E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2.0", + "versionEndExcluding": "6.6.18", + "matchCriteriaId": "A5CC150E-F35C-4CF7-ADF5-422D32C511C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7.0", + "versionEndExcluding": "6.7.6", + "matchCriteriaId": "0C8D1FAD-4D5D-4A25-B058-2AD15082710E" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/20b4ed034872b4d024b26e2bc1092c3f80e5db96", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/32b55c5ff9103b8508c1e04bfa5a08c64e7a925f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/754c9bab77a1b895b97bd99d754403c505bc79df", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d684763534b969cca1022e2a28645c7cc91f7fa5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26583.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26583.json index d3ae6dc2b43..46d5fced6de 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26583.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26583.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26583", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-21T15:15:09.373", - "lastModified": "2024-03-11T18:15:18.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-03-15T13:05:03.220", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,23 +14,103 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: tls: corrige la ejecuci\u00f3n entre la notificaci\u00f3n as\u00edncrona y el cierre del socket. El hilo de env\u00edo (uno que llam\u00f3 recvmsg/sendmsg) puede salir tan pronto como el controlador criptogr\u00e1fico as\u00edncrono llame a complete(), por lo que cualquier c\u00f3digo pasado ese punto corre el riesgo de tocar datos ya liberados. Intente evitar por completo el bloqueo y las banderas adicionales. Haga que el hilo principal contenga una referencia adicional, de esta manera podemos depender \u00fanicamente del contador de referencia at\u00f3mica para la sincronizaci\u00f3n. Tampoco te preocupes por reiniciar la finalizaci\u00f3n, ahora estamos controlando estrictamente cu\u00e1ndo se activa la finalizaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.7.0", + "versionEndExcluding": "6.1.79", + "matchCriteriaId": "37AE2B04-CF69-412C-89AE-605725C54364" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2.0", + "versionEndExcluding": "6.6.18", + "matchCriteriaId": "A5CC150E-F35C-4CF7-ADF5-422D32C511C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7.0", + "versionEndExcluding": "6.7.6", + "matchCriteriaId": "0C8D1FAD-4D5D-4A25-B058-2AD15082710E" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/6209319b2efdd8524691187ee99c40637558fa33", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7a3ca06d04d589deec81f56229a9a9d62352ce01", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/86dc27ee36f558fe223dbdfbfcb6856247356f4a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aec7961916f3f9e88766e2688992da6980f11b8d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27189.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27189.json new file mode 100644 index 00000000000..e7d2ff03179 --- /dev/null +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27189.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-27189", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-15T13:15:08.500", + "lastModified": "2024-03-15T13:15:08.500", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in catchsquare WP Social Widget allows Stored XSS.This issue affects WP Social Widget: from n/a through 2.2.5.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-social-widget/wordpress-wp-social-widget-plugin-2-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27192.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27192.json new file mode 100644 index 00000000000..c1a2b2b0d5d --- /dev/null +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27192.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-27192", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-15T13:15:08.737", + "lastModified": "2024-03-15T13:15:08.737", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Scott Reilly Configure SMTP allows Reflected XSS.This issue affects Configure SMTP: from n/a through 3.1.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/configure-smtp/wordpress-configure-smtp-plugin-3-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27193.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27193.json new file mode 100644 index 00000000000..6ea940f4dab --- /dev/null +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27193.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-27193", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-15T13:15:09.043", + "lastModified": "2024-03-15T13:15:09.043", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PayU PayU India allows Reflected XSS.This issue affects PayU India: from n/a through 3.8.2.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/payu-india/wordpress-payu-india-plugin-3-8-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27196.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27196.json new file mode 100644 index 00000000000..0ac34e7893e --- /dev/null +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27196.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-27196", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-15T13:15:09.277", + "lastModified": "2024-03-15T13:15:09.277", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting (XSS) vulnerability in Joel Starnes postMash \u2013 custom post order allows Reflected XSS.This issue affects postMash \u2013 custom post order: from n/a through 1.2.0.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/postmash/wordpress-postmash-custom-post-order-plugin-1-2-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index aa86de3e19b..ef233ee9d72 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-03-15T13:00:30.346703+00:00 +2024-03-15T15:00:38.131917+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-03-15T12:53:06.423000+00:00 +2024-03-15T14:52:23.887000+00:00 ``` ### Last Data Feed Release @@ -29,47 +29,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -241573 +241591 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `18` -* [CVE-2024-23944](CVE-2024/CVE-2024-239xx/CVE-2024-23944.json) (`2024-03-15T11:15:08.927`) -* [CVE-2024-27987](CVE-2024/CVE-2024-279xx/CVE-2024-27987.json) (`2024-03-15T11:15:09.013`) -* [CVE-2024-28752](CVE-2024/CVE-2024-287xx/CVE-2024-28752.json) (`2024-03-15T11:15:09.220`) +* [CVE-2023-50861](CVE-2023/CVE-2023-508xx/CVE-2023-50861.json) (`2024-03-15T14:15:07.207`) +* [CVE-2023-51525](CVE-2023/CVE-2023-515xx/CVE-2023-51525.json) (`2024-03-15T14:15:07.457`) +* [CVE-2023-6725](CVE-2023/CVE-2023-67xx/CVE-2023-6725.json) (`2024-03-15T13:15:06.857`) +* [CVE-2024-2495](CVE-2024/CVE-2024-24xx/CVE-2024-2495.json) (`2024-03-15T13:15:09.500`) +* [CVE-2024-25592](CVE-2024/CVE-2024-255xx/CVE-2024-25592.json) (`2024-03-15T14:15:07.550`) +* [CVE-2024-25593](CVE-2024/CVE-2024-255xx/CVE-2024-25593.json) (`2024-03-15T14:15:07.787`) +* [CVE-2024-25596](CVE-2024/CVE-2024-255xx/CVE-2024-25596.json) (`2024-03-15T14:15:07.990`) +* [CVE-2024-25597](CVE-2024/CVE-2024-255xx/CVE-2024-25597.json) (`2024-03-15T14:15:08.220`) +* [CVE-2024-25598](CVE-2024/CVE-2024-255xx/CVE-2024-25598.json) (`2024-03-15T13:15:07.087`) +* [CVE-2024-25916](CVE-2024/CVE-2024-259xx/CVE-2024-25916.json) (`2024-03-15T13:15:07.323`) +* [CVE-2024-25919](CVE-2024/CVE-2024-259xx/CVE-2024-25919.json) (`2024-03-15T13:15:07.563`) +* [CVE-2024-25921](CVE-2024/CVE-2024-259xx/CVE-2024-25921.json) (`2024-03-15T13:15:07.807`) +* [CVE-2024-25934](CVE-2024/CVE-2024-259xx/CVE-2024-25934.json) (`2024-03-15T13:15:08.070`) +* [CVE-2024-25936](CVE-2024/CVE-2024-259xx/CVE-2024-25936.json) (`2024-03-15T13:15:08.287`) +* [CVE-2024-27189](CVE-2024/CVE-2024-271xx/CVE-2024-27189.json) (`2024-03-15T13:15:08.500`) +* [CVE-2024-27192](CVE-2024/CVE-2024-271xx/CVE-2024-27192.json) (`2024-03-15T13:15:08.737`) +* [CVE-2024-27193](CVE-2024/CVE-2024-271xx/CVE-2024-27193.json) (`2024-03-15T13:15:09.043`) +* [CVE-2024-27196](CVE-2024/CVE-2024-271xx/CVE-2024-27196.json) (`2024-03-15T13:15:09.277`) ### CVEs modified in the last Commit -Recently modified CVEs: `58` +Recently modified CVEs: `10` -* [CVE-2024-2450](CVE-2024/CVE-2024-24xx/CVE-2024-2450.json) (`2024-03-15T12:53:06.423`) -* [CVE-2024-2478](CVE-2024/CVE-2024-24xx/CVE-2024-2478.json) (`2024-03-15T12:53:06.423`) -* [CVE-2024-2479](CVE-2024/CVE-2024-24xx/CVE-2024-2479.json) (`2024-03-15T12:53:06.423`) -* [CVE-2024-2480](CVE-2024/CVE-2024-24xx/CVE-2024-2480.json) (`2024-03-15T12:53:06.423`) -* [CVE-2024-2481](CVE-2024/CVE-2024-24xx/CVE-2024-2481.json) (`2024-03-15T12:53:06.423`) -* [CVE-2024-2482](CVE-2024/CVE-2024-24xx/CVE-2024-2482.json) (`2024-03-15T12:53:06.423`) -* [CVE-2024-2483](CVE-2024/CVE-2024-24xx/CVE-2024-2483.json) (`2024-03-15T12:53:06.423`) -* [CVE-2024-2485](CVE-2024/CVE-2024-24xx/CVE-2024-2485.json) (`2024-03-15T12:53:06.423`) -* [CVE-2024-2486](CVE-2024/CVE-2024-24xx/CVE-2024-2486.json) (`2024-03-15T12:53:06.423`) -* [CVE-2024-2487](CVE-2024/CVE-2024-24xx/CVE-2024-2487.json) (`2024-03-15T12:53:06.423`) -* [CVE-2024-2488](CVE-2024/CVE-2024-24xx/CVE-2024-2488.json) (`2024-03-15T12:53:06.423`) -* [CVE-2024-2489](CVE-2024/CVE-2024-24xx/CVE-2024-2489.json) (`2024-03-15T12:53:06.423`) -* [CVE-2024-2490](CVE-2024/CVE-2024-24xx/CVE-2024-2490.json) (`2024-03-15T12:53:06.423`) -* [CVE-2024-24975](CVE-2024/CVE-2024-249xx/CVE-2024-24975.json) (`2024-03-15T12:53:06.423`) -* [CVE-2024-25227](CVE-2024/CVE-2024-252xx/CVE-2024-25227.json) (`2024-03-15T12:53:06.423`) -* [CVE-2024-26163](CVE-2024/CVE-2024-261xx/CVE-2024-26163.json) (`2024-03-15T12:53:06.423`) -* [CVE-2024-26246](CVE-2024/CVE-2024-262xx/CVE-2024-26246.json) (`2024-03-15T12:53:06.423`) -* [CVE-2024-26454](CVE-2024/CVE-2024-264xx/CVE-2024-26454.json) (`2024-03-15T12:53:06.423`) -* [CVE-2024-26475](CVE-2024/CVE-2024-264xx/CVE-2024-26475.json) (`2024-03-15T12:53:06.423`) -* [CVE-2024-26503](CVE-2024/CVE-2024-265xx/CVE-2024-26503.json) (`2024-03-15T12:53:06.423`) -* [CVE-2024-26540](CVE-2024/CVE-2024-265xx/CVE-2024-26540.json) (`2024-03-15T12:53:06.423`) -* [CVE-2024-27756](CVE-2024/CVE-2024-277xx/CVE-2024-27756.json) (`2024-03-15T12:53:06.423`) -* [CVE-2024-28053](CVE-2024/CVE-2024-280xx/CVE-2024-28053.json) (`2024-03-15T12:53:06.423`) -* [CVE-2024-28353](CVE-2024/CVE-2024-283xx/CVE-2024-28353.json) (`2024-03-15T12:53:06.423`) -* [CVE-2024-28354](CVE-2024/CVE-2024-283xx/CVE-2024-28354.json) (`2024-03-15T12:53:06.423`) +* [CVE-2023-48788](CVE-2023/CVE-2023-487xx/CVE-2023-48788.json) (`2024-03-15T14:52:23.887`) +* [CVE-2023-52434](CVE-2023/CVE-2023-524xx/CVE-2023-52434.json) (`2024-03-15T14:21:29.950`) +* [CVE-2023-52435](CVE-2023/CVE-2023-524xx/CVE-2023-52435.json) (`2024-03-15T14:06:17.587`) +* [CVE-2023-52438](CVE-2023/CVE-2023-524xx/CVE-2023-52438.json) (`2024-03-15T14:03:51.503`) +* [CVE-2023-52439](CVE-2023/CVE-2023-524xx/CVE-2023-52439.json) (`2024-03-15T14:21:10.847`) +* [CVE-2023-52440](CVE-2023/CVE-2023-524xx/CVE-2023-52440.json) (`2024-03-15T13:44:59.367`) +* [CVE-2023-52441](CVE-2023/CVE-2023-524xx/CVE-2023-52441.json) (`2024-03-15T13:56:31.710`) +* [CVE-2024-23112](CVE-2024/CVE-2024-231xx/CVE-2024-23112.json) (`2024-03-15T14:51:58.497`) +* [CVE-2024-26582](CVE-2024/CVE-2024-265xx/CVE-2024-26582.json) (`2024-03-15T13:56:41.843`) +* [CVE-2024-26583](CVE-2024/CVE-2024-265xx/CVE-2024-26583.json) (`2024-03-15T13:05:03.220`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 4a249371ebf..008d916a32d 100644 --- a/_state.csv +++ b/_state.csv @@ -193424,7 +193424,7 @@ CVE-2022-25138,0,0,095bc1b88099ec319919372adc5664376d881c7122c4259d76a7668aeeff8 CVE-2022-25139,0,0,b263a8c92c8d08ff7b15d380126b7013a9452619a61e6968e63adfd4afaf98c5,2022-03-24T14:35:03.850000 CVE-2022-2514,0,0,5180332558d8b16b1319494be300ca9ad259fc298d544c7d3ce0324395f5fba0,2022-07-27T19:29:52.413000 CVE-2022-25146,0,0,5a57e47d84d31101f62e70c86e21ab8e9e5c7700a09f8bc79a68b42c0f6b3ecb,2022-10-28T19:23:31.853000 -CVE-2022-25147,0,1,37a7fee32f08f03e8104e41a463aad7323fa33fb4d08f45739bd0dc8a3446f4a,2024-03-15T11:15:07.027000 +CVE-2022-25147,0,0,37a7fee32f08f03e8104e41a463aad7323fa33fb4d08f45739bd0dc8a3446f4a,2024-03-15T11:15:07.027000 CVE-2022-25148,0,0,cdfd3f26cb58162240c7de7ce58a5377d52abd74a58d49019151ac4f12891b42,2024-01-25T21:32:03.557000 CVE-2022-25149,0,0,9317b163352608980cc59d078d0fb81c53a7e1117e7f02ab5d3245ad8057c48b,2022-03-03T18:12:41.587000 CVE-2022-2515,0,0,5a8490c6ada289168ba9fe99d4d3c7f122251463184ad1aee1119a5def6b2d6c,2023-11-07T03:46:37.960000 @@ -194040,7 +194040,7 @@ CVE-2022-25853,0,0,208a7b3980399fa4094fe050dddcf257e8603532748802e6dc98e0ae86ba6 CVE-2022-25854,0,0,cbf4f95e7d14dc4c46bdc02121ec74a89cb60535c191145d6baf6e041201309a,2022-09-23T18:57:11.480000 CVE-2022-25855,0,0,7ab85a87e7e74396d8d90916e476f789ecea2b9f4e4059578f6af12989d3e16a,2023-11-07T03:44:51.277000 CVE-2022-25856,0,0,3771afe6961f9597f1a7b100f9947a53671c4e5243e300d8b4978e5cfb9c26bc,2022-06-28T14:54:56.283000 -CVE-2022-25857,0,1,9de37fa5a541e6e6e55304f8c732e3976dc46c326424d33bff1dc7faed3d8df8,2024-03-15T11:15:07.750000 +CVE-2022-25857,0,0,9de37fa5a541e6e6e55304f8c732e3976dc46c326424d33bff1dc7faed3d8df8,2024-03-15T11:15:07.750000 CVE-2022-25858,0,0,e513ec495c2885cccac86c3c164dec042c24fbd954604811be6c86a569fa33ad,2022-07-21T14:33:45.663000 CVE-2022-2586,0,0,20643e91afc20570c916bb6f4219909d0ce99bb9aa7d8e4034056546f7bc44e8,2024-01-12T16:21:26.710000 CVE-2022-25860,0,0,f95205c836f0c654486cd82f6a59345ab861e05f2269db5bdef025fda33fb2e0,2023-11-07T03:44:51.413000 @@ -204291,11 +204291,11 @@ CVE-2022-38742,0,0,35a65c8d1dad8fee06ef43506be96fe957d8f022cf02eebe83ed8bca36941 CVE-2022-38743,0,0,2b3f1cb4913f54fb4f1734f9b1cecfdcc7668d1a1e29c40311007e3646f0f98c,2022-10-19T17:55:40.100000 CVE-2022-38744,0,0,930278ed8aec9c8470d6a50af20fe0abc9761f5c22917a3dc8e9158cbe7234bf,2023-11-07T03:50:14.327000 CVE-2022-38745,0,0,76b03db448f954cd3252476a6a19ca909659b0fcb6b8c5bbd4591c25cb38b76c,2023-11-07T03:50:14.410000 -CVE-2022-38749,0,1,b0acced012b896b3af94ffdb898686186d5eb22196d894cdaa6e6b2c65462934,2024-03-15T11:15:07.890000 +CVE-2022-38749,0,0,b0acced012b896b3af94ffdb898686186d5eb22196d894cdaa6e6b2c65462934,2024-03-15T11:15:07.890000 CVE-2022-3875,0,0,cf1e2b7b16328a5605a7ae794f227ee531d5aadfc0976db32f21ccd137c34464,2023-06-27T20:14:35.760000 -CVE-2022-38750,0,1,2f7c92a1718c59f573752abb16c9289e3032a332b345502060498e5686749d69,2024-03-15T11:15:08.003000 -CVE-2022-38751,0,1,a416fbc78a45e508d7116c29cf8757596ed953ac410275688de6d96a3cf54398,2024-03-15T11:15:08.107000 -CVE-2022-38752,0,1,05b7ba1c9eed764f576263cc847a695022e102a198144e1a3604fef1bd6f152c,2024-03-15T11:15:08.207000 +CVE-2022-38750,0,0,2f7c92a1718c59f573752abb16c9289e3032a332b345502060498e5686749d69,2024-03-15T11:15:08.003000 +CVE-2022-38751,0,0,a416fbc78a45e508d7116c29cf8757596ed953ac410275688de6d96a3cf54398,2024-03-15T11:15:08.107000 +CVE-2022-38752,0,0,05b7ba1c9eed764f576263cc847a695022e102a198144e1a3604fef1bd6f152c,2024-03-15T11:15:08.207000 CVE-2022-38753,0,0,c94bddd15f31ec7e6479212331fe29b21a7e6f23e8a64a35952202d158dc3224,2023-11-07T03:50:14.567000 CVE-2022-38754,0,0,e23bd09ecac75629b6e1498a3795546c9f635d904cd7349d73502c83e4dc11f7,2023-11-07T03:50:14.870000 CVE-2022-38755,0,0,e6565e62154784b04d84b3719a22b3022985d12dd26d35583b85eb2a3cc968bd,2023-11-07T03:50:15.163000 @@ -206640,7 +206640,7 @@ CVE-2022-41850,0,0,ac2719327c442951e81004fb44267b5552d9e849c14e7e2cdd82ac041f221 CVE-2022-41851,0,0,38327bf12b43b300663bbd04a39065792f284b7ef2c7ba971e60c6a4c14ed902,2022-10-12T14:30:54.330000 CVE-2022-41852,0,0,c3185bfc193cd85841bf371a4e0eef8f173fcfa77037f73356c16e2eb9ff6c9a,2023-11-07T03:53:02.600000 CVE-2022-41853,0,0,24142528e4ad5748c930bf02546b690d251aab817fd312f70be3e8f056855ce2,2023-02-03T23:43:43.453000 -CVE-2022-41854,0,1,961808baf88a1c0f72673bdb6a84f008fe51c3df452c7dc75bf179135566a8be,2024-03-15T11:15:08.303000 +CVE-2022-41854,0,0,961808baf88a1c0f72673bdb6a84f008fe51c3df452c7dc75bf179135566a8be,2024-03-15T11:15:08.303000 CVE-2022-41855,0,0,dd5f37b919e5019c73957251db258c4f724723075c49805e108ad6fbed83df25,2023-11-07T03:53:03.443000 CVE-2022-41856,0,0,591a39d74f332468a475536e53cb1140f905fbe690af6da1038215b2bd041210,2023-11-07T03:53:03.973000 CVE-2022-41857,0,0,2bfb60dcc3398494f00e6c7072d89aeb78361a08f59c38a1a49886dae6697c89,2023-11-07T03:53:04.530000 @@ -229721,10 +229721,10 @@ CVE-2023-42278,0,0,ee0ec18f540f3d23e934e2de8db0f17be345642135a1fcb536e5ed9056b61 CVE-2023-42279,0,0,2b5fd45e3f7b5847cdf94bacf8431811911a70e786a0646743e5feef43384778,2024-03-08T13:15:07.870000 CVE-2023-4228,0,0,3f89c2bd23d86c6631e166d6883e49420ad57a55b32f2055f78a3149f09454ab,2023-08-29T23:36:22.147000 CVE-2023-42280,0,0,998be9ae9db10da8d8bc0c54fc9e9367324bba82590a90bf698705b8218b9c4c,2023-09-25T17:06:48.100000 -CVE-2023-42282,0,1,ef96b2ed03e923eaad91fee84d0a54eb9243f524f365d26e2b0f4805d0986535,2024-03-15T11:15:08.430000 +CVE-2023-42282,0,0,ef96b2ed03e923eaad91fee84d0a54eb9243f524f365d26e2b0f4805d0986535,2024-03-15T11:15:08.430000 CVE-2023-42283,0,0,a98ae80c6258afcd9dd5fa419aa8d77e55afc9a17fdaaa9bbc1658066c82ea5e,2023-11-14T19:39:46.053000 CVE-2023-42284,0,0,15446465ee77926e88ea059de6b012825a7669d75381bed08ca0074356895815,2023-11-14T20:35:27.577000 -CVE-2023-42286,0,1,bb6c64ec4f5cce41c86e9722ebb23286b35c3c60964c1b33d34443bf9bc9bb1f,2024-03-15T12:53:06.423000 +CVE-2023-42286,0,0,bb6c64ec4f5cce41c86e9722ebb23286b35c3c60964c1b33d34443bf9bc9bb1f,2024-03-15T12:53:06.423000 CVE-2023-4229,0,0,b52c2fa7e2394d6b42eae83bed29722fab6d4cb85028915ebecc747eee6230f6,2023-08-29T23:35:40.940000 CVE-2023-42295,0,0,76e92c5a31a1c38c774b96fb948b716fe550c55e664576533af49902b5cabeae,2023-10-28T03:19:16.690000 CVE-2023-42298,0,0,007b09605f4ed7b0628f77a85d1e0a7fe95be1f19353799459bee4c90043a90b,2023-10-17T14:11:02.190000 @@ -231933,7 +231933,7 @@ CVE-2023-4591,0,0,7b7489e0ef096cb53299a588ee180b9616089c4949cb6afe064035f5525d5f CVE-2023-45911,0,0,40a6d4a59e32f2704b6b4aa0c83b05852f7a3efa3303de6d634364cd1b9e613f,2023-10-25T13:45:28.653000 CVE-2023-45912,0,0,e7b70d01df1e6b7ed29be6cef3a5d24a0188fc4204e45db25f76f5dd91970245,2023-10-25T13:49:52.877000 CVE-2023-45916,0,0,b4de35a31730ce89637c5d93cae2af2c0f6956624ee8cf845871fb361731df75,2024-01-29T09:15:42.327000 -CVE-2023-45918,0,1,33f00f55399e9410b66f853b2e07c334232e97a2facaeb394e496c0ea19cdb2e,2024-03-15T11:15:08.510000 +CVE-2023-45918,0,0,33f00f55399e9410b66f853b2e07c334232e97a2facaeb394e496c0ea19cdb2e,2024-03-15T11:15:08.510000 CVE-2023-4592,0,0,81f9ec9c7754df484556128f55402d2b2e5da813e76693d6a2e51c67954d6e8c,2023-11-13T18:46:52.950000 CVE-2023-45921,0,0,645fcaff78feed0e43ec127059f0dcc7feb6d53759818ded268f99ff2c3f84f3,2024-01-29T09:15:42.547000 CVE-2023-45923,0,0,5946dd1d30e5db85cc88e2299cbbf78c4c1c23d4d9e7d4f1539852b51a3b5d93,2024-01-30T06:15:45.300000 @@ -233899,7 +233899,7 @@ CVE-2023-48780,0,0,81a46aadc83bef693702f0587720fb307d57733c38a40b0e9a0adbf977d5c CVE-2023-48781,0,0,0b8167a5eef8ab6e938308c388d4115607ba3ad1846d34aa073b91ec79ad8a40,2023-12-22T09:47:10.017000 CVE-2023-48782,0,0,88145c135f3d36dc2324e589083cb79dceef7bf357c73c33782a57f9910e4f66,2023-12-15T20:01:55.773000 CVE-2023-48783,0,0,ebc0e9b096de11f5bb2feb6ecedfda87f1114290b6bb005e0f4f19fb8a6d2ef6,2024-01-17T18:24:38.617000 -CVE-2023-48788,0,0,0f209a451597062eb292f1256b85474a0c13831a23977ba358f7496194430484,2024-03-12T16:02:33.900000 +CVE-2023-48788,0,1,431a30b5a4d2d89a6f19f8c64dd0507c284384eda44196b13aaf49cb79224e2a,2024-03-15T14:52:23.887000 CVE-2023-4879,0,0,fa584d11e9766c316d104762d8e4d48a31923cd7ce617f7440b7a809b8dd63fe,2023-09-18T18:58:43.767000 CVE-2023-48791,0,0,4e7d2cae3ad6ba11c4e276624bedca77887a0ee315b409ddadb10bd81db3bb45,2023-12-15T20:09:24.010000 CVE-2023-48792,0,0,a3c17617afe01ace18242f14c2f591f70a09281fccef1129ab04ab7743ac5ed0,2024-02-09T19:41:33.093000 @@ -234881,7 +234881,7 @@ CVE-2023-50643,0,0,55614908e29dfbef803e2a46693f5b61b380d013162b4469912eb83807a2f CVE-2023-50651,0,0,f3844a6f5ec34177bf49b303e4d6646bdb34f27fe11e2bc419d17cac8c4ce604,2024-01-05T18:27:24.550000 CVE-2023-50658,0,0,ee939de97a2ee211949ae65e220d6896984dc72b221c0aca31785e2be4505ace,2024-02-29T13:49:47.277000 CVE-2023-50671,0,0,1b57fef150a331e8baf93e121682c8f5e3d5e2f36f049f9813d69d8ede2ccde1,2024-01-18T18:54:54.863000 -CVE-2023-50677,0,1,35b39e12497b0a8e7db71d038544981fc94a7e1ca08173c6951c9deb49f6791d,2024-03-15T12:53:06.423000 +CVE-2023-50677,0,0,35b39e12497b0a8e7db71d038544981fc94a7e1ca08173c6951c9deb49f6791d,2024-03-15T12:53:06.423000 CVE-2023-5068,0,0,17fc2eb1388d05163deaaf7983c73a7e5b5c2899de850a7fc45c4a10f1050a74,2023-09-25T16:40:58.693000 CVE-2023-50692,0,0,d40be33e1bfba63c571bb4e9e0096e84e4055246d18dcee958eac39ecd76d8de,2024-01-04T20:25:53.587000 CVE-2023-50693,0,0,f33d0ae19a7d8856fba0e93c0c84708f7a77cf886b027202286c6bccc773a541,2024-03-05T21:15:07.367000 @@ -235001,6 +235001,7 @@ CVE-2023-50858,0,0,94d07847a491bbe81a54b6db746f38547b8b9460f13c67d1c03ef5493373b CVE-2023-50859,0,0,c55b7ebfdad692c446161665ad7f57d5be4c4ffca139aa2ba69fd933143bb7b0,2024-01-04T19:21:18.457000 CVE-2023-5086,0,0,04cab16ae21da525bc5fa3fc2006574bc61344fe24e236a9fe6b2c57761baec9,2023-11-07T04:23:26.530000 CVE-2023-50860,0,0,06bdd35e56b1857cf3d3ff537b3ce562fb9605a6c9659981d4436040d58ad4f8,2024-01-04T19:21:02.913000 +CVE-2023-50861,1,1,513130f0fadd21816260070491b883f5fe1e9eaeb44544fa43adc7076bb69eb9,2024-03-15T14:15:07.207000 CVE-2023-50862,0,0,e4cb32b36db0afa0ad6ef97c99a384298b67a311b9652e286e4e5ff290075969,2024-01-10T01:12:52.360000 CVE-2023-50863,0,0,c77e5226b7e344c7e1e9dd4386edfcafa55161eef35c2134974fbc700d5b668f,2024-01-10T01:12:42.607000 CVE-2023-50864,0,0,dbb8d20e5f36a035c3156fb7a77589dedbf6adf8027e6048f396876e3395893c,2024-01-10T01:12:35.763000 @@ -235327,6 +235328,7 @@ CVE-2023-51517,0,0,1a69e7a8868bb57fe23881af905a555a81020cb04edb85fe9a748430c692e CVE-2023-51518,0,0,82d2f1d17566273e3d96a161b87d4f3f7567388d39e7cb79eb1a426bdc54e536,2024-02-27T14:20:06.637000 CVE-2023-5152,0,0,2c3f5b0deeae37ff96f4852108cf5d6fc102cc5a9f5bbf14a3b0b902e67c543e,2024-02-29T01:42:12.497000 CVE-2023-51520,0,0,278d7a72857b486e9b0b31b11c49041fe1beb2c693b353f7760792bf09c1e90d,2024-02-06T20:20:11.330000 +CVE-2023-51525,1,1,e9a062d606e10db818cb431361b3f83d07db3dd5f6a3f2cfed46fe786295de82,2024-03-15T14:15:07.457000 CVE-2023-51527,0,0,6cb4ff038359f6e44ffc98cebb0259b94fe40cd1a58bddb18fc1cd2b63f324d3,2024-01-05T18:13:46.270000 CVE-2023-51528,0,0,9dfa54b303eb56104b42c24d77fae5eea4f23b1ed226c56c1b41872b1d7aec3d,2024-02-29T13:49:29.390000 CVE-2023-51529,0,0,f1431d628580aaae90dc3558b09f51395840a04ba474ae8bd49d2f4fca4b448b,2024-02-29T13:49:29.390000 @@ -235823,15 +235825,15 @@ CVE-2023-52430,0,0,d42ac76eff7e870ccd425430baec924966d37450b40a663564ae4a320330f CVE-2023-52431,0,0,c693cbe76127faa54716f414936fa58bc8929839973e4bd5352d442ea2d0fbba,2024-02-13T14:01:07.747000 CVE-2023-52432,0,0,e1d380fbb265614fea5d100f2d4330b94e2c0e2793fb6bfcf16b790141380ced,2024-03-05T13:41:01.900000 CVE-2023-52433,0,0,1a0cb05542d0c79456ce86a71a378df73e7a3f74f8da709b843dc9ea6d882dfa,2024-02-20T19:50:53.960000 -CVE-2023-52434,0,0,1a2a94b389d20b6cf6ba0416a76f36fbfe55da2e658135cd285b8105cc02d1d0,2024-03-01T14:15:53.143000 -CVE-2023-52435,0,0,4a326a1f08853c190e3f60720e4a43adfa9ae64091785e27c72d216e731f1c3f,2024-02-23T09:15:22.190000 +CVE-2023-52434,0,1,5d52612c26fee7b14653aeb9fd0e234de51ea4d52e7c788aef26856ca04a039a,2024-03-15T14:21:29.950000 +CVE-2023-52435,0,1,93ff57cc29918e833611e81b89e4ae0482ae349c7e83a8ab64e2ebbd978f4b55,2024-03-15T14:06:17.587000 CVE-2023-52436,0,0,96f7114e19431af0a0b95791e5cff25753f280edc668cb19fd284740b4aec928,2024-02-20T21:52:55.187000 CVE-2023-52437,0,0,91d3cc3a51673e754e25f139cf45e627b67188a0988727604c925b81f4f0227e,2024-02-22T13:15:08.020000 -CVE-2023-52438,0,0,82f5e4215f700ec09e3074e4cca5a58af98120a2d210f484630c55c5aa023aca,2024-02-20T21:52:55.187000 -CVE-2023-52439,0,0,b9a5f88a17e67701fb8ac10fcf5d42a79d484bd6742ce98b0c54afea50c4fe63,2024-02-20T21:52:55.187000 +CVE-2023-52438,0,1,320b81973417672f06fe062915e89ef0ec0fe09ac9641be89e9ceb9cc678c91e,2024-03-15T14:03:51.503000 +CVE-2023-52439,0,1,1acb61b0653d7d06078084524dd22a72646c2e70fb118450a15ea65c12a46971,2024-03-15T14:21:10.847000 CVE-2023-5244,0,0,2d7ccf46570f7a789336019a996859f3eea1c41d32a5a30c878bc5f986cf3b6e,2023-09-29T17:53:12.883000 -CVE-2023-52440,0,0,df1d24f58b5780781d166f03e5bbee989af213ed28e43bfb8a74e059b4a6ae50,2024-02-22T19:07:27.197000 -CVE-2023-52441,0,0,7349925d74cb6467b47b7b1d276df3eab91f5c1935d4ef85c04b101257863651,2024-02-22T19:07:27.197000 +CVE-2023-52440,0,1,7f79ecc423520493b7ea33e872fa5ceb47ef15bacc232c9a528905fdc11fa5b2,2024-03-15T13:44:59.367000 +CVE-2023-52441,0,1,29f8dfdafb0665e97721ef99b56f7416e8cc50e990c6b9fd16addab92b75b2de,2024-03-15T13:56:31.710000 CVE-2023-52442,0,0,f0e32f692f04917f9b44f1a58b9cc67efd1d412e7f16caea29f8d0af9ba07f69,2024-02-22T19:07:27.197000 CVE-2023-52443,0,0,d2cfc476b089f8fdcf50f50719540af45f0af66b06ea096a3e3bdb089d114cc0,2024-03-14T20:16:02.947000 CVE-2023-52444,0,0,e4e74b636a9119fb1430d59aa25d18b36c2089ded63e3a22c77190c88140fba1,2024-03-14T20:13:28.070000 @@ -237212,6 +237214,7 @@ CVE-2023-6721,0,0,2baa6c13f444a73c8fb708ab0933aa43f74442dd83269a4b99012840f04e4f CVE-2023-6722,0,0,d32d2d7ab88d7b27501031c246b7de1d18841f9831592e8928e0295e33c59b6c,2023-12-18T17:33:10.883000 CVE-2023-6723,0,0,0256b9a79fe5fd6a26df76092daabbd127e889141255d3fca4ab7e5083681e37,2023-12-15T20:37:10.720000 CVE-2023-6724,0,0,fe9b9f3e5a0c77767c8fbb38c69fe4abc8f7e517abb9a915da744e7f8cd31e28,2024-02-15T18:44:49.107000 +CVE-2023-6725,1,1,b72eaa5c9c5a0f48abae55eeb9d2df99fb18c06166a591884648f042aa6af1b0,2024-03-15T13:15:06.857000 CVE-2023-6727,0,0,6ec2c8890148313c75d2521ac9dcb5bcdc679ead10a2731713c6e45c491d3e46,2023-12-15T14:43:08.920000 CVE-2023-6730,0,0,daf67cb33b45f797c478299d62236f8fa267c9e9eab404abeacd1583fccd7584,2023-12-28T17:15:33.537000 CVE-2023-6732,0,0,8e995ef87bd85afefe754d26396da496813fb0ec12bab50f6fc0e73c46e5ca77,2024-01-23T14:59:59.107000 @@ -237711,7 +237714,7 @@ CVE-2024-0227,0,0,293cc6e11acf30e33ff683670fd3450332b171ef136e33bb5c8e28161457ae CVE-2024-0228,0,0,ce6c89afac41f61c47db4c38fe10e22e0a81a5c45ffdb1b44ab12c9bd9185c4b,2024-01-09T17:15:12.223000 CVE-2024-0229,0,0,e6bf7db3b09f9868a2b3df4f8f27cb4ed3c692375e7efc4fb03d84e5d778908f,2024-02-09T14:31:23.603000 CVE-2024-0230,0,0,0ed95f328d6a9b1575e5cfa228e1d818590393567da3497a9c16bfb4b412b523,2024-01-19T18:35:52.493000 -CVE-2024-0232,0,1,cc0880bd0343b8160892da7b4e37c3089d940d3ddc268fdf06f6a8f527fd9f25,2024-03-15T11:15:08.560000 +CVE-2024-0232,0,0,cc0880bd0343b8160892da7b4e37c3089d940d3ddc268fdf06f6a8f527fd9f25,2024-03-15T11:15:08.560000 CVE-2024-0233,0,0,5dc41a8872508ea2109cbef39ae4ca35aea786fff68fbcd8d1e30c28d52ef8b5,2024-01-19T14:28:14.077000 CVE-2024-0235,0,0,31ec0e84bd14770b88729768ca64700da82ea5e5ec69d9d96962a4380b4ef26c,2024-01-19T14:28:22.047000 CVE-2024-0236,0,0,c4ea74a32a78a6547a8a84af52c815270ada99253269b7fa84272cfa10dba7ca,2024-01-19T14:28:41.540000 @@ -238187,8 +238190,8 @@ CVE-2024-0798,0,0,2f1b0b827ba8873a7b25770613534b3f8d6a0f026296e59c448002f5144077 CVE-2024-0799,0,0,565bc32cefccc7b54c8a2a9ae87b575853af295d8bcf02c26770d29b4f9124c3,2024-03-14T12:52:21.763000 CVE-2024-0800,0,0,d01951efcbc246e656d94cfc618f67e25f655df800a6a24c24ab44bafa9ef9ed,2024-03-14T12:52:21.763000 CVE-2024-0801,0,0,a89dd8886cf81b019461340c433bdec2c4bcb02d2b385117b1316445faec54f0,2024-03-14T12:52:21.763000 -CVE-2024-0802,0,1,8a8354942e43ddf1114b5fc54e43fdb66ebd6f66eb74144035f3a566ca4193d2,2024-03-15T12:53:06.423000 -CVE-2024-0803,0,1,972943007faa1afd1c11dd3aae04f5ce91aa41b928830da8adeb2dbe4bfa7ba3,2024-03-15T12:53:06.423000 +CVE-2024-0802,0,0,8a8354942e43ddf1114b5fc54e43fdb66ebd6f66eb74144035f3a566ca4193d2,2024-03-15T12:53:06.423000 +CVE-2024-0803,0,0,972943007faa1afd1c11dd3aae04f5ce91aa41b928830da8adeb2dbe4bfa7ba3,2024-03-15T12:53:06.423000 CVE-2024-0804,0,0,70935988ae140dfc2a5adfcb943faf94a39f18e0935f58c282d47a399ed09108,2024-01-29T14:29:25.953000 CVE-2024-0805,0,0,479c25c464f6a328d6731c12cfc75b50b35f0f2dec0194359c3aeae6dde0d30d,2024-01-29T14:24:19.087000 CVE-2024-0806,0,0,9c93ca7b1341b35e16a22cdbbee1fe7fe1f2eaf26781f684014c115afdc39972,2024-01-29T14:24:48.090000 @@ -238229,7 +238232,7 @@ CVE-2024-0853,0,0,72eb57fa9d91eeed9b78ea6861ab48b720d6a39710ade722cce53b9624df3b CVE-2024-0854,0,0,b2a19a635a88b4ff68549abb31f11c392c07f9e329d9704350bbb3ee75810c41,2024-01-30T17:01:37.127000 CVE-2024-0855,0,0,fee06b61accc977f963cdb2b2ef743d4f7ee62d05033c371692bc8e3d7ebf823,2024-02-27T14:20:06.637000 CVE-2024-0859,0,0,ebdbbfb62fdac702a888e13ac2f08cf009b152778d43282d960af2d2fbc4e23d,2024-02-13T19:45:29.770000 -CVE-2024-0860,0,1,00bbcd6c65f213eeeceffda8243a1a6631ac3559dfbca28d155a8f476f1aeb6d,2024-03-15T12:53:06.423000 +CVE-2024-0860,0,0,00bbcd6c65f213eeeceffda8243a1a6631ac3559dfbca28d155a8f476f1aeb6d,2024-03-15T12:53:06.423000 CVE-2024-0861,0,0,896e71725cbfb614341352655e0b66e7def84c2617b58556401d4278cc8b74b9,2024-03-04T20:26:41.663000 CVE-2024-0864,0,0,17024975930493e251806bb80b57b820a57bfd49c0ac48954296f7125d5de83a,2024-02-29T13:49:29.390000 CVE-2024-0869,0,0,39eb12d4def5ace38cccd71318a17cc1945f05a59b2d0897303b6745b871b84d,2024-02-13T19:45:09.783000 @@ -238769,7 +238772,7 @@ CVE-2024-1707,0,0,c7acff8660e1825b1c485d2f7220505bc397dfb5733debf4e42c43a4bfec2d CVE-2024-1708,0,0,146e7b2e6e4cd14d7a500c32b14e4d15b261c88faf38d2dba04ed7811ca58395,2024-02-22T15:19:39.123000 CVE-2024-1709,0,0,2a24ee712d1d811f95e92e49cc0cd5598b50a33a0581a3e0bdba9d2a43db38c2,2024-02-23T02:00:01.867000 CVE-2024-1710,0,0,70a74a96f904da75ac8b72fd56c9d1d88348f443877486657b55e1efe1bd61c4,2024-02-26T16:32:25.577000 -CVE-2024-1713,0,1,e7d3134bce53c0ac843ba564da06176e57d02e074ee162a0046f51a226503b96,2024-03-15T12:53:06.423000 +CVE-2024-1713,0,0,e7d3134bce53c0ac843ba564da06176e57d02e074ee162a0046f51a226503b96,2024-03-15T12:53:06.423000 CVE-2024-1714,0,0,3d41c5b029ddf1f5d2c142d7cc7bb81d52a9f5606a977021cc48dc8d1157889e,2024-03-07T13:52:27.110000 CVE-2024-1719,0,0,bd92ffe7c3f4bf124004e532d326d3643bc62f549595f2a7817efea0dc7c188f,2024-02-28T14:06:45.783000 CVE-2024-1720,0,0,3f534b1db2e7b75966562da6fb1d468afac7b86b23a312961b1d896997e21de8,2024-03-07T13:52:27.110000 @@ -238806,8 +238809,8 @@ CVE-2024-1786,0,0,449ec13e35f750939f24803b2ef55c495bc451930bfead85c3515bd3cd68c4 CVE-2024-1788,0,0,880181e49a800669246c4d4cd32ccd361560cda70996b821fd2bf7b522fa9d8b,2024-03-04T13:15:44.523000 CVE-2024-1791,0,0,5d3b6b544d9930344476e785dc53de0e62748b437e39c14583d8b6dbe65900d0,2024-02-28T14:06:45.783000 CVE-2024-1793,0,0,77e4384a73b63366cc7a82d39793c93c7895932d395595c11733397f9a5e5553,2024-03-13T18:15:58.530000 -CVE-2024-1795,0,1,afbe1ad94101265276f210002545443389376fc607d6633b7de261da3ddb92bc,2024-03-15T12:53:06.423000 -CVE-2024-1796,0,1,117057a7b5e6b573e83fab690d07e65620c4bfdef2545e3c4decb951155d8d39,2024-03-15T12:53:06.423000 +CVE-2024-1795,0,0,afbe1ad94101265276f210002545443389376fc607d6633b7de261da3ddb92bc,2024-03-15T12:53:06.423000 +CVE-2024-1796,0,0,117057a7b5e6b573e83fab690d07e65620c4bfdef2545e3c4decb951155d8d39,2024-03-15T12:53:06.423000 CVE-2024-1802,0,0,fc49d6852e2d9c806d87bd476c49eb44290671042d27cb531abfd095f2e45f37,2024-03-08T14:02:57.420000 CVE-2024-1806,0,0,73f76c289a42538b0e30741cbd9c42340b0dc0b9404f8627ff555054eb7d9696,2024-03-13T18:15:58.530000 CVE-2024-1808,0,0,2da113a6f87d1b28b926abe8dc4a1c1454247327ae44f0a848973179ceb1addc,2024-02-28T14:06:45.783000 @@ -238833,7 +238836,7 @@ CVE-2024-1834,0,0,71484c054cc8716550405a2212257a1bb19512d3ccfc712afddd01b2d896ef CVE-2024-1843,0,0,979d0dff9637d9cab00bf6a14f591ee68b79b4ec3300ebdf02b15cf0e8a60188,2024-03-13T18:15:58.530000 CVE-2024-1847,0,0,152f4d845ce8c23980172297d934e8efa3d32af4a304d4db000f4175545dd48b,2024-02-29T13:49:47.277000 CVE-2024-1851,0,0,ac07ab34f3e596527407cf2fcb93e785fa1a213045982c8aadd05f9e543a11a5,2024-03-08T14:02:57.420000 -CVE-2024-1853,0,1,d8883604ae63cf7a1fbe4fa65bd3207340a5327b7afe017b25b83cfed4793944,2024-03-15T12:53:06.423000 +CVE-2024-1853,0,0,d8883604ae63cf7a1fbe4fa65bd3207340a5327b7afe017b25b83cfed4793944,2024-03-15T12:53:06.423000 CVE-2024-1854,0,0,67720ca675e573934fd73c30069aead563244277f4e5c6d2e86973e2c6bd9b5b,2024-03-13T18:15:58.530000 CVE-2024-1859,0,0,c19a8bbad570254357ebcf90235dc1b7204181d3a1a12c804d832963f66d9a08,2024-03-01T14:04:26.010000 CVE-2024-1860,0,0,53b7775f88dbda3fc2d4abeb2e913e87a2f0c7e010f7824d10356d98445fd8c8,2024-02-28T14:06:45.783000 @@ -238869,9 +238872,9 @@ CVE-2024-1907,0,0,674a8f990612fbd789e8b29e4f4db555efa2966321d7535d44b4ff9d82432e CVE-2024-1909,0,0,12e32b499c59433d30e6ac050b3983e16567b85d72e6d218e26a62327a6048b6,2024-02-27T14:19:41.650000 CVE-2024-1910,0,0,211f272c3ce02464501561e3549f84db9f1611eadb733262f278463e5a2128b8,2024-02-27T14:19:41.650000 CVE-2024-1912,0,0,3c8c0a0238b829a76fd9478bd9956e4a11490ac17d1dddd78b43604a20598ec4,2024-02-27T14:19:41.650000 -CVE-2024-1915,0,1,1fa31b2864a79ff8a316a28989e5764264b34a91cf5014f736194b65ddc570a7,2024-03-15T12:53:06.423000 -CVE-2024-1916,0,1,88719f1bd0f5b79729b388c51f5164c12fd7f3687b99a8e71e104ac18ecb5a31,2024-03-15T12:53:06.423000 -CVE-2024-1917,0,1,2e77801aee1fcb23eb93c439df2a04ed35c1a65d50f13ddabaf21f53e0c8bcb2,2024-03-15T12:53:06.423000 +CVE-2024-1915,0,0,1fa31b2864a79ff8a316a28989e5764264b34a91cf5014f736194b65ddc570a7,2024-03-15T12:53:06.423000 +CVE-2024-1916,0,0,88719f1bd0f5b79729b388c51f5164c12fd7f3687b99a8e71e104ac18ecb5a31,2024-03-15T12:53:06.423000 +CVE-2024-1917,0,0,2e77801aee1fcb23eb93c439df2a04ed35c1a65d50f13ddabaf21f53e0c8bcb2,2024-03-15T12:53:06.423000 CVE-2024-1918,0,0,1bafa8f12a3e1e89cbdae2d567e58d0f2dd7fa8d62ec65a26fca54b119ab135d,2024-02-29T01:43:56.517000 CVE-2024-1919,0,0,72d56d7edb3e5a5021c1ed22bcc46eb2a75ae4941d6cc2cec5dac07191166356,2024-02-29T01:43:56.607000 CVE-2024-1920,0,0,609fbe0726b7e3b7b8c9d1e9070e8f3b7491975accc744191b84356320447097,2024-02-29T01:43:56.683000 @@ -239504,7 +239507,7 @@ CVE-2024-21794,0,0,5140601c591fc7e01c922f6b4426d49907b4278c42a623419c59c4c96fa7a CVE-2024-21795,0,0,8f8b465c9c098b0486c8d3a422710444a0bf1254314ad2cce00f5cb6633448c5,2024-02-20T19:50:53.960000 CVE-2024-21796,0,0,ad6ea83e4ba68ed8909637d1ef7b65d12f04c56232c1b05d9173891b89591836,2024-01-30T22:14:16.247000 CVE-2024-21798,0,0,f6b1c3b51bfe93bdfac8ebe499d7027ef38a497aacd0c971587b98e3900bec13,2024-02-29T13:49:47.277000 -CVE-2024-2180,0,1,f29f310f994bdc1547d14907db3ea5b567d0e701ee0c912abfad5bc40b39a210,2024-03-15T12:53:06.423000 +CVE-2024-2180,0,0,f29f310f994bdc1547d14907db3ea5b567d0e701ee0c912abfad5bc40b39a210,2024-03-15T12:53:06.423000 CVE-2024-21802,0,0,2a0324ca9760c4b3be107883f84a1ed806e6bad72b3badb393d00982ae57c159,2024-02-26T18:15:07.290000 CVE-2024-21803,0,0,412e1fe487e1aa8e1b208c7f0baf850a3bb5b2cd1ac7cabb6ce669e7a4281bbb,2024-02-08T01:57:53.770000 CVE-2024-21805,0,0,a52828f65b6509bde8b488130919a2fdb0ba808c102ed9f4fd4334d154ad08a0,2024-03-12T12:40:13.500000 @@ -239534,8 +239537,8 @@ CVE-2024-21885,0,0,2ded91db474abcb1cfa7458555f469a31dde320770425e9a420b652d27c56 CVE-2024-21886,0,0,c2d6842412cf7edd7910975db0735ae154eb1bf10c1a3e7de2b56796a6f73429,2024-02-28T14:06:45.783000 CVE-2024-21887,0,0,27308d07d43795d3f4289d79a64af5933e89a71cf679d41be9d0c5a30a308379,2024-01-22T17:15:09.523000 CVE-2024-21888,0,0,eafebd7f30818e8036790fc3c83d6cd7cc7a89b258668430c4b64c79614679d2,2024-01-31T19:53:06.303000 -CVE-2024-21890,0,1,d0d6d1a152080740d6ba84ad392a919d70445665b25a7f6969e602652f189cf2,2024-03-15T11:15:08.687000 -CVE-2024-21891,0,1,e424ef0f7a416dd53e40d650cdce75de43c958a1f5dba4ec358496f75617d5f2,2024-03-15T11:15:08.753000 +CVE-2024-21890,0,0,d0d6d1a152080740d6ba84ad392a919d70445665b25a7f6969e602652f189cf2,2024-03-15T11:15:08.687000 +CVE-2024-21891,0,0,e424ef0f7a416dd53e40d650cdce75de43c958a1f5dba4ec358496f75617d5f2,2024-03-15T11:15:08.753000 CVE-2024-21892,0,0,e9e7cd547b9c865ef0f7d643a8d56e423d474c52d8079510bad9fcfef1233a4d,2024-02-20T19:50:53.960000 CVE-2024-21893,0,0,2d188d3c7852b895bab2eb60f33b22f9fc7e1606c5595723c82f7fae54df9f67,2024-02-01T02:00:01.187000 CVE-2024-21896,0,0,f2e89bd11f46e09b5e1cac8d09f61e5326ff446268c7f7ea5ae718519ecd8d4a,2024-02-20T19:50:53.960000 @@ -239565,14 +239568,14 @@ CVE-2024-22010,0,0,c8be08522110436a9d4fa99d4021d5a2fb6c1481cb50733e6d40fe00f78ad CVE-2024-22011,0,0,0b600b1e31e74facb27c71d7c9b3f514c8b8b4c777fc0d39f1c7ce9fc8756817,2024-03-12T12:40:13.500000 CVE-2024-22012,0,0,6083637305fc19ea62a8c209ebe6bfac1cd035e045c787ca530a090291dc1971,2024-03-12T21:15:57.953000 CVE-2024-22016,0,0,72bb3341c866069974fe863b6c9e848e25809f5f0697d51cda8a3c348c9671f4,2024-02-07T17:33:12.727000 -CVE-2024-22019,0,1,f2437e68c6ddb8f7177f54a0e9f52e5ca8426b13996c7a8a6cfcbbb0d671c60e,2024-03-15T11:15:08.807000 +CVE-2024-22019,0,0,f2437e68c6ddb8f7177f54a0e9f52e5ca8426b13996c7a8a6cfcbbb0d671c60e,2024-03-15T11:15:08.807000 CVE-2024-22021,0,0,ba38d4b86a2c5af951f989c7a28594b6207f0b19739ba3d580be6e4d49001bfb,2024-02-29T01:44:04.690000 CVE-2024-22022,0,0,925c0d46bbd39b5d0f2644b5e26e0cd82488a20b7de7cccfa4639e9bb8f60d9e,2024-02-15T18:45:30.887000 CVE-2024-22024,0,0,980d44adebdc63cfe4985efd7aa2ee2044d33423093fc7c9f165c43f20a43115,2024-02-13T15:15:32.193000 CVE-2024-22027,0,0,0822e6ca4a0197c830c667319442a46ae27f8152642de8d7f05f1858eada021b,2024-01-18T20:02:46.993000 CVE-2024-22028,0,0,8abd1038154eaf5ca23784f859ed6e719a17c93e427bf707fe61eab823cdcecc,2024-01-22T20:22:47.847000 CVE-2024-22039,0,0,ef8c56b19d2a3b2c57a146991f2128767113626aa58dc9954ac8669d3630e403,2024-03-12T12:40:13.500000 -CVE-2024-2204,0,1,f2361237c4001e01c13b041357423ddc6e12c61adf05210140f123a253dd047a,2024-03-15T12:53:06.423000 +CVE-2024-2204,0,0,f2361237c4001e01c13b041357423ddc6e12c61adf05210140f123a253dd047a,2024-03-15T12:53:06.423000 CVE-2024-22040,0,0,7d11f7fb5567534dcb6d5b3b79b8f0abaa376b6da679960f376543715fd2e79b,2024-03-12T12:40:13.500000 CVE-2024-22041,0,0,3a754a682c04a281339ab26bd427f37b021c68ff67ed8d1ced26ab3b349cb150,2024-03-12T12:40:13.500000 CVE-2024-22042,0,0,c5aca849b5ae0d8d5a45ea8ff67dd52ef5ada43150173caa8f5617617296b9fd,2024-02-13T14:01:07.747000 @@ -239674,7 +239677,7 @@ CVE-2024-22228,0,0,78d2b6e91237b41440665215c9b4e77ccc8811641b8c3516a01f9391d6778 CVE-2024-22229,0,0,942079f7535239209609b5cbc34a85ff0a40c69533135771fdb6410ce1778e0c,2024-01-30T23:01:36.513000 CVE-2024-22230,0,0,1dba8e437bacd8d1f2a5a22c03d0799f6c41b12fb7346ebf5256856880ee3b1a,2024-02-15T06:25:53.660000 CVE-2024-22233,0,0,0fe59b4b663f0c6d5b9043fb5ee923bedfa271d937aabb2465577a5f1e4e3b27,2024-01-29T17:24:16.230000 -CVE-2024-22234,0,1,ed66ea75d4f91bd4cf760a873ffa711eec74e184d0ed1b507bd27dedbdd28669,2024-03-15T11:15:08.857000 +CVE-2024-22234,0,0,ed66ea75d4f91bd4cf760a873ffa711eec74e184d0ed1b507bd27dedbdd28669,2024-03-15T11:15:08.857000 CVE-2024-22235,0,0,94dcf649455ce66e40f15519944aa08c6281ad01f157b931cb45eb28dc8bde92,2024-02-22T19:07:37.840000 CVE-2024-22236,0,0,8201be843ca4fddc3e50d61ba00eee488c4be6cba8a9459a0251fd7b88b774f4,2024-02-09T01:01:27.447000 CVE-2024-22237,0,0,e71897597855cd1424c518c72383f574819812eafb673db1067e39ca6ce39465,2024-02-10T04:12:42.680000 @@ -239793,7 +239796,7 @@ CVE-2024-22463,0,0,5b884681f5c1cb31ebf38842df7c3075a8e9d98da101d1e4ec4faa1ef09b6 CVE-2024-22464,0,0,890f63b91e1207e51dc2d0fc686f763deb067d6410c523bfc64d52071d75be15,2024-02-15T05:03:27.617000 CVE-2024-2247,0,0,b52dba6f68142dbeca56f2f1bf8b23a5401066ec4f0585445fe0cb42ba284eff,2024-03-14T10:15:07.027000 CVE-2024-22473,0,0,ba695bcad0bbe2cba422f3053697429916506f0f0ce55f150fe9af4a818e1f6b,2024-02-22T19:07:27.197000 -CVE-2024-2249,0,1,cf7e9c481ceeab4ebea44cd6aa64f5dbe4abd16900b5ad6fea6a1dcff54afc44,2024-03-15T12:53:06.423000 +CVE-2024-2249,0,0,cf7e9c481ceeab4ebea44cd6aa64f5dbe4abd16900b5ad6fea6a1dcff54afc44,2024-03-15T12:53:06.423000 CVE-2024-22490,0,0,36caaa8caefc70cd3fb65a62a9488b2446e68d14844d0a61d7baf757d2000caa,2024-01-29T22:48:35.493000 CVE-2024-22491,0,0,99c25b0ff8de89fe3ebd04368e499e7fe9b3820707560bd21fed90048934c0ad,2024-01-23T14:28:45.890000 CVE-2024-22492,0,0,d5f3c39114d683a19b63c12000afa4d89fabfab5536b09341cba8fab701d6afc,2024-01-20T18:42:47.087000 @@ -239819,7 +239822,7 @@ CVE-2024-22549,0,0,9d125f13584b8e9a98c7ba04ebcdd0c32883b8ff51ce2ca12c4e35cf1c2f0 CVE-2024-22550,0,0,f902d83073addd3a776ed36cb4649f966b6484d16d8386f091439ccd6c55a4c3,2024-02-02T17:14:39.690000 CVE-2024-22551,0,0,79fcc177ff1b11ecc118fd58da1a84094ba022f8d936327b273fc8f04260ffb6,2024-02-01T20:10:53.180000 CVE-2024-22559,0,0,47254ebdbd259f1c38f8ed3eecbaf91c57cad6163fd30fc26c430e3cd2eb7381,2024-02-02T02:03:48.573000 -CVE-2024-2256,0,1,f8fd57ec7ff6633dc90410eddd2a90616aa5e7d36e0072f4031a2bc404da991d,2024-03-15T12:53:06.423000 +CVE-2024-2256,0,0,f8fd57ec7ff6633dc90410eddd2a90616aa5e7d36e0072f4031a2bc404da991d,2024-03-15T12:53:06.423000 CVE-2024-22562,0,0,fbcf5332a9ae5bd938c146408ac3cbda0023927af7c1ecabde813ca87b9348d0,2024-01-25T20:22:03.963000 CVE-2024-22563,0,0,e68d7fb0548f09a5ec2c02ea3bc2e400b99a4a7ece951a19b220371a41585758,2024-01-25T22:19:08.390000 CVE-2024-22567,0,0,37499b14fc95be5de51f415505f023a34c878497b34bd94665d0d5d9fc0f3959,2024-02-14T19:54:19.663000 @@ -239958,7 +239961,7 @@ CVE-2024-23061,0,0,d40b225d92d8f0f0d47201622b24e50bc3550ed3e56a2682a133a8aeae502 CVE-2024-23094,0,0,9f79dbaa28554230ecec6bf9c8ebad70b78370379f350d8ce65fe4447a3b2f3f,2024-02-22T19:07:27.197000 CVE-2024-23108,0,0,4bd66ae4e2150cd9c3073e095bacf489de77af9a273b611e130c3e3fa4edf7ea,2024-02-07T15:02:00.203000 CVE-2024-23109,0,0,c2686a38cd2651bfef8ab0e98ee0dbcce98e98fd7c1f1805290cb9df9c03fe78,2024-02-07T15:04:28.237000 -CVE-2024-23112,0,0,94dfeeb97ac3ddeed6a2e0061f0ac178814740587a740ca0cd04282ff8354503,2024-03-12T16:02:33.900000 +CVE-2024-23112,0,1,db97de9e46492b481e52ee1e1883233ddfe5123c1ba448f0e59ac92baa6de68f,2024-03-15T14:51:58.497000 CVE-2024-23113,0,0,29903cf0008dd4023f7698dfe9b07a61d8c5e19cfdea1fb0ce14ef659e7383ed,2024-02-22T15:33:00.970000 CVE-2024-23114,0,0,fa8f95e0e83961a881a09cd70451012be00683c9d1e43570d7214d2ff680cc51,2024-02-20T19:50:53.960000 CVE-2024-23120,0,0,1fdd5384a3247451b572eec50acc63b80f4302d338e02a15db81dbcc92866844,2024-03-01T16:15:45.920000 @@ -240387,7 +240390,7 @@ CVE-2024-2393,0,0,88d7ea46d41b8a62f530c69db99a66fd82ab7526c083e60b1939a19c5a484a CVE-2024-2394,0,0,a1808c3e423b31a5f61767caea3e96f7bde3f2a439710708c637f27d2a25cf41,2024-03-12T16:02:33.900000 CVE-2024-23940,0,0,88f3246b7d729e9740dbc7accb734f511d890171cb976d7dde750494e61216dd,2024-02-06T19:19:33.920000 CVE-2024-23941,0,0,12a475e2ca4f3cbb312854167865e0f548c636a650b921a0048a701032c53d0b,2024-02-06T21:37:12.433000 -CVE-2024-23944,1,1,d7189cd17bc8529e11b77c38b3cbb5d227e8a7f862bb2fe75d66b288543ad7bc,2024-03-15T12:53:06.423000 +CVE-2024-23944,0,0,d7189cd17bc8529e11b77c38b3cbb5d227e8a7f862bb2fe75d66b288543ad7bc,2024-03-15T12:53:06.423000 CVE-2024-23946,0,0,32194d05d3f7a3a80cd0b416a872a66ff74b3120ea9e0897100b1fe32331e71d,2024-03-12T17:29:17.243000 CVE-2024-2395,0,0,1fdafc69366cd072c6108b6d86410a63c85cce9eeaa62bcac076c3a2bc3a1766,2024-03-13T12:33:51.697000 CVE-2024-23952,0,0,89289c4c1b03193a134cbe14ed609452617a970c4d8ae9dfbad6f91cd36db610,2024-02-14T14:16:07.460000 @@ -240396,7 +240399,7 @@ CVE-2024-23978,0,0,dce24325560fbd2c8a4b55826a990c779123e234941d6c9decad894b94e08 CVE-2024-23979,0,0,5e1dc647eec92472a586c7319077fa782b48d632d4a171a926ee19c9f0ee9a24,2024-02-14T18:04:45.380000 CVE-2024-23982,0,0,b14ba0205dd1f33ce2faf143ef8b9750d0c0a19e31571fc2532f719ca5f2eec3,2024-02-14T18:04:45.380000 CVE-2024-23985,0,0,258f4468fe9f37b9a6c2732e57d96bdd80375c2f3603af19ad729cbcccfb8b72,2024-02-01T17:33:41.777000 -CVE-2024-2399,0,1,6f8fb1e3be26b1339d174325c835cf0d1371f9e848d17aa9846a8738e0086de0,2024-03-15T12:53:06.423000 +CVE-2024-2399,0,0,6f8fb1e3be26b1339d174325c835cf0d1371f9e848d17aa9846a8738e0086de0,2024-03-15T12:53:06.423000 CVE-2024-2400,0,0,a3559f292416a7177d55cf2300155f3e2cebd6068dd39e4a19e49113027fe34d,2024-03-14T03:15:09.323000 CVE-2024-24000,0,0,c0e25ee371e3e2954ce1c31994df30792949134b707de19bf25452c7e2c5373a,2024-02-13T20:30:10.053000 CVE-2024-24001,0,0,ee1c723e23fc182642c00ee71c6c1dbca341b34ff9a2a69da4bee1c4da91e395,2024-02-09T02:10:25.807000 @@ -240527,8 +240530,8 @@ CVE-2024-24398,0,0,f4bfb9d92cdfc220b232a85deeb8216b709f2d184cff7e693fbf714bca45d CVE-2024-24399,0,0,353ec2da6e48e6292145d6b75abe75b7e4722004c5ee075b39e05af1ecc581a2,2024-01-29T15:57:59.413000 CVE-2024-24401,0,0,ec06c8cf90df05f5e4115d49f7ce6be6908f7d5473423eaeaae838929ca6fe04,2024-02-26T22:10:40.463000 CVE-2024-24402,0,0,97bd4ff0a8ca6538f4d318e89076733036a976638fa55c2c6b338003bd50f01d,2024-02-26T22:10:40.463000 -CVE-2024-2445,0,1,3aece2c7d99f4f988e852fe4d4830ce49e1f7b44f3ea5261c934033985be71a4,2024-03-15T12:53:06.423000 -CVE-2024-2446,0,1,5333d17fcaf02150b804f8573c04d1f6063740622130e6fa314d960f427bfd4e,2024-03-15T12:53:06.423000 +CVE-2024-2445,0,0,3aece2c7d99f4f988e852fe4d4830ce49e1f7b44f3ea5261c934033985be71a4,2024-03-15T12:53:06.423000 +CVE-2024-2446,0,0,5333d17fcaf02150b804f8573c04d1f6063740622130e6fa314d960f427bfd4e,2024-03-15T12:53:06.423000 CVE-2024-24468,0,0,2ffe0e787add87754da9d28139dd49fe0df5af62f9576796ac86e102fb215c8b,2024-02-07T22:03:09.897000 CVE-2024-24469,0,0,4f6c0d02ab780395cc2795972f5ccd070037d1f155bb48f88977ff7315e7ceab,2024-02-07T22:02:57.743000 CVE-2024-24470,0,0,0ed64df001bff16a393bf92778dffdaa6681f7af33a9a33c77cdaa83290d7947,2024-02-06T21:07:34.547000 @@ -240545,7 +240548,7 @@ CVE-2024-24496,0,0,d3af8fed4f9dc5ab516231a6a765383283bf96cc93c20c6077308e5e48b88 CVE-2024-24497,0,0,508098c217acb7b8b140ecd382edc9fe44597401eccd971d6c1417d26c569bec,2024-02-12T14:31:34.073000 CVE-2024-24498,0,0,753379bf38359db11676987b60d3fc62d861f4b4d9e21b1906af1fc91bba7195,2024-02-12T14:31:21.610000 CVE-2024-24499,0,0,f3fa195f99d03c816961a79dfcc5225a65897f0a2c13286167d69ca586129263,2024-02-12T14:31:04.057000 -CVE-2024-2450,0,1,00768fb37fabbe59aaa05a2b15e979f5b194f2b002bbfb5602d5ad6df849f0ce,2024-03-15T12:53:06.423000 +CVE-2024-2450,0,0,00768fb37fabbe59aaa05a2b15e979f5b194f2b002bbfb5602d5ad6df849f0ce,2024-03-15T12:53:06.423000 CVE-2024-24511,0,0,c2a15768e4699e22cbf5e8595792dbc9bf48071b723d524443a4f83d9a5c3ab8,2024-03-04T13:58:23.447000 CVE-2024-24512,0,0,03c51f88444f0be6fcfaff8e371681e3a1a1d007832a9bf8fa7088f13cfe5d40,2024-03-04T13:58:23.447000 CVE-2024-24524,0,0,40ecb02cd326bdc34833c61cf5eb3e9f45f526d45502f51591361c36d1938c63,2024-02-09T16:30:43.830000 @@ -240637,20 +240640,20 @@ CVE-2024-24774,0,0,5ce184dd523c8effa0bf9ff2cb869eab62ae87eb1154ab58365aadeb9c76c CVE-2024-24775,0,0,d06506c81c4e07c1022939620db695892cb4401762e4a2787f2944d4645c719f,2024-02-14T18:04:45.380000 CVE-2024-24776,0,0,a113a2303e14c85bd8fbc5e168ceae41e42a3bd77b2e4df344678a7acbeef687,2024-02-15T18:42:25.383000 CVE-2024-24779,0,0,18631c5e58ceb2e9322e72f89a38e3f6c05c74af750000a5fed820d268e6baea,2024-02-28T15:15:09.250000 -CVE-2024-2478,0,1,e9bf5ae73a3eccec32ce37111aeee76c8f29fc7e68dbc802ebf9fe55d1cbf6e5,2024-03-15T12:53:06.423000 +CVE-2024-2478,0,0,e9bf5ae73a3eccec32ce37111aeee76c8f29fc7e68dbc802ebf9fe55d1cbf6e5,2024-03-15T12:53:06.423000 CVE-2024-24781,0,0,48385a425dcc6c0339feeada61281fd6a5323a74db948e3c0f249af2d3b0cfe4,2024-02-13T15:16:05.223000 CVE-2024-24782,0,0,cec52fb522063b4541c054f611458d0df6c7d32db1a26bd5bb59ee4420900e48,2024-02-13T15:16:05.223000 CVE-2024-24783,0,0,12be64e2db63a036341461fa12b20bbb20b8ea46e325e75c94cfb782663e82b6,2024-03-06T15:18:08.093000 CVE-2024-24784,0,0,5450058de71553b9cf7fdedc345d5ee5f35be919b251db9a4b49d663fd2c521a,2024-03-06T15:18:08.093000 CVE-2024-24785,0,0,7b9073a1f2be203ed1de8c1594434fc8421a0c0316879bd3f71a1253b422083d,2024-03-06T15:18:08.093000 CVE-2024-24786,0,0,9a7cdd8ad660e7a56a83d0409ccc2144904f9d91b9b4d12f7d622b82700c0904,2024-03-06T15:18:08.093000 -CVE-2024-2479,0,1,47b3c19b0298507568d5036163a3e382a6395cdee86b21dfccff1f2ad7aa300a,2024-03-15T12:53:06.423000 +CVE-2024-2479,0,0,47b3c19b0298507568d5036163a3e382a6395cdee86b21dfccff1f2ad7aa300a,2024-03-15T12:53:06.423000 CVE-2024-24793,0,0,c02d48f5d574325816298b4b1d2848ca92f5dc7aa67a2fd30978e3885630bc1b,2024-02-20T19:50:53.960000 CVE-2024-24794,0,0,0d491c54da3b197a1321ac69102f9de79d058e3462ee7572209ea583555d837a,2024-02-20T19:50:53.960000 CVE-2024-24796,0,0,a14eda4226a58c2c4e1be311d88c2631825b3dc125c63aa2226f772d7e85a358,2024-02-12T14:19:54.330000 CVE-2024-24797,0,0,c19a8ac8bc5c78a5206d6c6bb45c357c3a8b7076e1d1a067b2d060905019e0d6,2024-02-12T14:19:54.330000 CVE-2024-24798,0,0,27adaa65a015e65d65b2afdd5c0a25214a188429d30f4388b6afc3dde21fa6d1,2024-02-22T19:07:27.197000 -CVE-2024-2480,0,1,28e577c451b247476a0a7225fd4724f8938ca6fd6a15f996eabbfd72ee472657,2024-03-15T12:53:06.423000 +CVE-2024-2480,0,0,28e577c451b247476a0a7225fd4724f8938ca6fd6a15f996eabbfd72ee472657,2024-03-15T12:53:06.423000 CVE-2024-24801,0,0,47915f71445069b208f35a7935b9c510a17f8f452a570f52726f8c5c81b5b647,2024-02-16T16:17:01.713000 CVE-2024-24802,0,0,a1a79b4d1a40c19f0b1fd783e577af4a06bd7c4a6081e664509b96e8417dd1d1,2024-02-22T19:07:27.197000 CVE-2024-24803,0,0,fc5d4f4cab51b4c20d7b6e3bf5587ec068edf5c72abf706c2f7a07ca396460a8,2024-02-16T16:19:58.613000 @@ -240658,7 +240661,7 @@ CVE-2024-24804,0,0,eeb6fdfa103bf8168fd7c265cc5d58c5754970ed08409f99ef624c0715efc CVE-2024-24806,0,0,c22f635b0a8e149aa103df5ec505273138fb224093663def7772242037a61135,2024-03-05T23:15:07.867000 CVE-2024-24807,0,0,2d34e5a71f21b856008e0b8570ab5cdf60822d8a0563980a1edf758417c67389,2024-02-12T21:41:24.647000 CVE-2024-24808,0,0,bdbd983ba6c1a4b09d677aa089f9419ebf22e351f535d11a049fcdc6e3f33540,2024-02-13T22:48:57.290000 -CVE-2024-2481,0,1,983535f37db66cd4c3d608cf25bbeee83831f09945d1626dba92323c9c9fa20f,2024-03-15T12:53:06.423000 +CVE-2024-2481,0,0,983535f37db66cd4c3d608cf25bbeee83831f09945d1626dba92323c9c9fa20f,2024-03-15T12:53:06.423000 CVE-2024-24810,0,0,9dab4129d1c20588c512bce77a7cc1f7e1b1d517809a86dc2acb61d422d4f488,2024-02-14T20:12:54.643000 CVE-2024-24811,0,0,a42cc7b4d95d752401262af12a58e0c503baff6bc12320ad45002a6cf532b477,2024-02-14T20:26:39.143000 CVE-2024-24812,0,0,e7efa697650eb9b8a9ae2cbb057919a119f2e3cc992b07dc5909cac077f62dba,2024-02-14T20:22:02.537000 @@ -240667,7 +240670,7 @@ CVE-2024-24815,0,0,7ef44958e4dccc9b43c5d3676af931e836517878672143ed602e96364ee73 CVE-2024-24816,0,0,0a0fea4c2cc9d7f26e33e3d5240afb81f51bfa58d93bcab2759f33c430974970,2024-02-15T05:01:35.393000 CVE-2024-24817,0,0,fdde672642557a8a2852513b11069618f453ff1b811266148c78822a38a56d95,2024-02-22T19:07:27.197000 CVE-2024-24819,0,0,35941d7444bb12eb303fbe4e6356b4e7c694ff9d77a3a091af78e5d9c718b3dc,2024-02-16T21:34:17.650000 -CVE-2024-2482,0,1,31b254ad2a0cb4f1819955be37fd832bd37e244b32e4fdde3bc6c6acb565f816,2024-03-15T12:53:06.423000 +CVE-2024-2482,0,0,31b254ad2a0cb4f1819955be37fd832bd37e244b32e4fdde3bc6c6acb565f816,2024-03-15T12:53:06.423000 CVE-2024-24820,0,0,3b801b1febe3947cdc9f4e9b7316023af164bb3cbc08159c83a10386b0e562b8,2024-02-16T21:36:58.440000 CVE-2024-24821,0,0,f214df264f2293ccab3a5b6002616d6e1c0fc596d016ab4f3509d1330c15283b,2024-02-16T21:37:27.557000 CVE-2024-24822,0,0,635c30cc08c673ea561185631628373cd19274be3aa6a1832f042b55a0a6da0d,2024-02-15T15:43:07.647000 @@ -240677,7 +240680,7 @@ CVE-2024-24825,0,0,d270d838d76c4af232d0ce52669df28a177a81175d698f081f58acbb6ee89 CVE-2024-24826,0,0,24055e3561d59b8a3939c012d5daa6e0d9c3aea14ffdc480c0d82d63ca5e0695,2024-02-13T14:01:49.147000 CVE-2024-24828,0,0,49f3203ef220d83772b2ef2d38603decf2279328e1e01bba81d6a5042632951e,2024-02-16T13:43:33.407000 CVE-2024-24829,0,0,3577cb941a1662429dafc55c4424c0aba88e61b66a2cd724c7c9ac171337142f,2024-02-16T21:37:59.497000 -CVE-2024-2483,0,1,8be7d8096983c30adadfa053d096e42f8f79432afdb3f7425a0ca340918b9a2d,2024-03-15T12:53:06.423000 +CVE-2024-2483,0,0,8be7d8096983c30adadfa053d096e42f8f79432afdb3f7425a0ca340918b9a2d,2024-03-15T12:53:06.423000 CVE-2024-24830,0,0,0d9adea9164c18f7ff7989d5488b101c9a82392f2b7e4acf1331d044331cbf79,2024-02-15T18:53:54.370000 CVE-2024-24831,0,0,c84e178260bd3abff1690dc35c00a2b3b1eccfdb8ac833753e26fa86bbd36f7d,2024-02-16T16:22:00.857000 CVE-2024-24834,0,0,f1b0afc5b1406c76028e9a1457aaaa7c9c4a1ab2208a1bb8ffbf62e150ea41ea,2024-02-15T03:16:47.957000 @@ -240691,19 +240694,19 @@ CVE-2024-24846,0,0,6890a12a2a75edd735a365e4f936d5236ba568d73a773641099ac2fe0c58d CVE-2024-24847,0,0,b4fa9a61260da316bc833192464fabd12095e29ea013df2a2fb0faf16c78be6a,2024-02-07T23:30:27.567000 CVE-2024-24848,0,0,40caff22a3243fb89666855618bfb8dcbc9fcd477abdaa3c19527de1aee97a51,2024-02-07T23:30:36.817000 CVE-2024-24849,0,0,7310ea40ba14819a766bfed2718d0ae7c9bf655c4a04b330968acbdb73d5a918,2024-02-22T19:07:27.197000 -CVE-2024-2485,0,1,2153f15968004316ce519dcde7e2764d62fe794ba016473eda1e07f8cc480ed8,2024-03-15T12:53:06.423000 +CVE-2024-2485,0,0,2153f15968004316ce519dcde7e2764d62fe794ba016473eda1e07f8cc480ed8,2024-03-15T12:53:06.423000 CVE-2024-24855,0,0,53926eea6176e5ec7dac755182b92f74698401115acbca0c88724948db080e51,2024-02-10T04:06:40.840000 CVE-2024-24857,0,0,bd0a671ef627655a534b97d40879c56dc0a8ee5f900294aaa10a2d6428455f4e,2024-02-10T04:06:50.263000 CVE-2024-24858,0,0,249d6bf347d8c64c978bec670161d1545cd8d4294041793438e8d2c55804ba1b,2024-02-10T04:06:20.077000 CVE-2024-24859,0,0,e679ba08f49ce2259e6fae9f7247bb624101b65d866a2698d5f41c0ab1e599e7,2024-02-10T04:06:05.623000 -CVE-2024-2486,0,1,9ef580228c9b4b5fe57bd8f7afa1ad4b182c88dee54f6f3dc6ac633557c1691b,2024-03-15T12:53:06.423000 +CVE-2024-2486,0,0,9ef580228c9b4b5fe57bd8f7afa1ad4b182c88dee54f6f3dc6ac633557c1691b,2024-03-15T12:53:06.423000 CVE-2024-24860,0,0,cc439582f3b205787436e95c2e570817bcdd2c0b521aeea3ff157e2bc11704f7,2024-02-14T19:50:10.803000 CVE-2024-24861,0,0,6b40afdcfeaef4379ad19505bbc3196ca9bd79cff347b2f5b0473b639a0022c5,2024-02-10T04:05:59.040000 CVE-2024-24864,0,0,cb2feb3346fb11cc5b4be9ff84c56cdf4de4a5045cdc4255bc9349b2b8259736,2024-02-10T04:05:22.843000 CVE-2024-24865,0,0,69d1d9e6b7dcdc1a41fcca26c5c38135753d56b8f5d02ca0d16d1408ab64d3a6,2024-02-07T23:30:50.313000 CVE-2024-24866,0,0,7234eb10c2179098475da368126463933a93e4c44ee1e87fac56ce5cbea64b85,2024-02-13T19:48:45.207000 CVE-2024-24868,0,0,e7f14abb86f06eb8a849fd232ff7f12dc608d17b75bfc6f64f2c0bbfd51ed1c7,2024-02-28T14:06:45.783000 -CVE-2024-2487,0,1,4ca5472da55e03928f48be008f61a5daee2051808522c475d1ce22687edd2999,2024-03-15T12:53:06.423000 +CVE-2024-2487,0,0,4ca5472da55e03928f48be008f61a5daee2051808522c475d1ce22687edd2999,2024-03-15T12:53:06.423000 CVE-2024-24870,0,0,b39acdcce0711487a9081cc9665d4882378e31aa9603afc2ce7a407d6eacb9c6,2024-02-13T19:48:35.953000 CVE-2024-24871,0,0,7929bd8570e26f9c39d1231b81e0525120c731b0a1415309e5364f8936da12a6,2024-02-15T02:49:29.963000 CVE-2024-24872,0,0,fa2594fdb5d0746614a8f20c8074f7685479685549755908db43da65febaf141,2024-02-22T19:07:27.197000 @@ -240712,7 +240715,7 @@ CVE-2024-24876,0,0,3412ec71bdbeb06b31836d557387c0bc905744144ffe50082b3b5bf66ccb5 CVE-2024-24877,0,0,2ca89fda7db1c8f959b87a956aa7f8eb617785e1c531dd6e92fe052410c661a6,2024-02-15T02:53:41.823000 CVE-2024-24878,0,0,5c96fc08b674ebb2a329fb182e09d6483bbb49a56ae668f6d267ce41c431787f,2024-02-15T03:01:50.883000 CVE-2024-24879,0,0,5b5b5bf87620f8667e3d64f2e68df998d5ed1de826612ab2b7e1a8ef88d680f8,2024-02-08T13:44:11.750000 -CVE-2024-2488,0,1,528409579dffffd5726094a25b7469dcc0e01d1d1130495fba0b34d7dc0dfb44,2024-03-15T12:53:06.423000 +CVE-2024-2488,0,0,528409579dffffd5726094a25b7469dcc0e01d1d1130495fba0b34d7dc0dfb44,2024-03-15T12:53:06.423000 CVE-2024-24880,0,0,c09c072607ab4886f4a9aad9bd3a049d854086280fee035d43332e78f56fd75c,2024-02-08T13:44:11.750000 CVE-2024-24881,0,0,0139359b4adb91c8a74807ed4668ec8c28b6f35ffbdc8bdb558ebcdf79f694ee,2024-02-08T13:44:11.750000 CVE-2024-24884,0,0,3be547ad02d5edafd16cdb3e30d3f558c78e079d502479e596507065efaa12b6,2024-02-12T14:19:54.330000 @@ -240720,8 +240723,8 @@ CVE-2024-24885,0,0,cf96828bd1e0d8642b5bc72ae1a103792f29d8f132a4d58681b5d711c4fbe CVE-2024-24886,0,0,040a0013f85a73849a5e9e87e8cb23eb11fbc2fee3776455c71d53478d5c4150,2024-02-15T05:03:32.117000 CVE-2024-24887,0,0,51bb971aeec0ed957f12ca5afaba185f88497169dd14d4b58764bb6f0fa78b3d,2024-02-12T14:19:54.330000 CVE-2024-24889,0,0,160e344fd60146726ab8e77aa791f12196b0392022f8c6908394fea561203d9c,2024-02-12T14:20:03.287000 -CVE-2024-2489,0,1,c2f08db985f168bdc461a736b2cb039c1ba106cf2adb6f3003fbe94e10ee8235,2024-03-15T12:53:06.423000 -CVE-2024-2490,0,1,96148f262d1152b3d77b12e3486ff1a1af8224fa5bcb69b4ac26d0205ebc9400,2024-03-15T12:53:06.423000 +CVE-2024-2489,0,0,c2f08db985f168bdc461a736b2cb039c1ba106cf2adb6f3003fbe94e10ee8235,2024-03-15T12:53:06.423000 +CVE-2024-2490,0,0,96148f262d1152b3d77b12e3486ff1a1af8224fa5bcb69b4ac26d0205ebc9400,2024-03-15T12:53:06.423000 CVE-2024-24900,0,0,78084b8a525a74146f1a3d21441f9130184d0ec88af68fc99068c40e48da1545,2024-03-01T14:04:04.827000 CVE-2024-24901,0,0,9e041e0c5e68c2bedc98b95ae11c81b17f7982f78f6dd79805adbe04641e3e86,2024-03-04T15:35:25.673000 CVE-2024-24903,0,0,b786e71962ef97555a8e397cc791b68b34c4c2e99ca71a4e665766a901c645b0,2024-03-01T15:23:36.177000 @@ -240753,9 +240756,10 @@ CVE-2024-24941,0,0,3ce7539cc2c00ca21eaf8843bb8dfa494f8daac6c677d25fe85a072b680ae CVE-2024-24942,0,0,98967e5f253d2f0e2d6c9adde01d5feb324664bac3fce3b7b875de585c5550eb,2024-02-09T01:03:13.453000 CVE-2024-24943,0,0,cecde2b734965816be739f7278af2a22cd088f91f77e60d1e6c087126d44acbd,2024-02-09T01:03:03.970000 CVE-2024-24945,0,0,c6e7443a15ad58b887b66a1afc517e5c6d2b064a4aecae431013860646a47dfe,2024-02-07T17:14:48.630000 +CVE-2024-2495,1,1,87240ec1b0a31035f8bd4fe1bcd2e0cfde2010d7e3f27ba6bbd8d27da193c4e4,2024-03-15T13:15:09.500000 CVE-2024-24964,0,0,3c015ff9319add283b75ba9284dbb0964a9d4ce7edb50d2870b6147733f7e6d5,2024-03-12T12:40:13.500000 CVE-2024-24966,0,0,b8b1142fa7a04127bebdbfe2d935a3fd815c1f2bb5c99e70bfcbb30576800e5e,2024-02-14T18:04:45.380000 -CVE-2024-24975,0,1,c403197a52452c60ee17afdfbf9edd4a6993ed059ba65add25a9b2620ac53eb1,2024-03-15T12:53:06.423000 +CVE-2024-24975,0,0,c403197a52452c60ee17afdfbf9edd4a6993ed059ba65add25a9b2620ac53eb1,2024-03-15T12:53:06.423000 CVE-2024-24988,0,0,5be9c22e9d6c42885be25053a8e3f832fee202eb91ce1cb05a36918eae761d1a,2024-02-29T13:49:29.390000 CVE-2024-24989,0,0,39be90963d0952b8475635420a2f64ca0893f9b2941aa846029d2a39bd57b9e9,2024-02-14T18:04:45.380000 CVE-2024-24990,0,0,f549c5a0bfcab6df0ca6e0a5d66e4c65b77814eac3b9adbe63217da37b030524,2024-02-14T18:04:45.380000 @@ -240858,7 +240862,7 @@ CVE-2024-25223,0,0,fed0ee1c93d4da13aa94c11be23fd7ce47331585823cc1398816a42e972c6 CVE-2024-25224,0,0,60a033d8e8f6de71de20eba59193ebdd929b6bf393aa49baa96edb59007a6ae2,2024-02-14T16:13:16.563000 CVE-2024-25225,0,0,b00e13f44ac0134f1fc7e8ea7aab2c5dcadd2e02f8582f1036d69738d9332b6f,2024-02-14T16:13:16.563000 CVE-2024-25226,0,0,97ea8fb758b8c513c8e72ae3403e9f8a56bb02ec88e94afe18fc9fb3fc39daf2,2024-02-14T16:13:16.563000 -CVE-2024-25227,0,1,85ee852be11e5546f1e3ce25258807dab448668d51e6dd7deeb508012c478893,2024-03-15T12:53:06.423000 +CVE-2024-25227,0,0,85ee852be11e5546f1e3ce25258807dab448668d51e6dd7deeb508012c478893,2024-03-15T12:53:06.423000 CVE-2024-25228,0,0,0239fa4a0a2fc4eb6bb0a1d2903e89a077f9c73228502ccb53d8cf7f226021ad,2024-03-14T12:52:16.723000 CVE-2024-25247,0,0,1833ae291fb426e6ea03731a73288e6521c4f877eb6214fb79e6117118a15f59,2024-02-27T14:20:06.637000 CVE-2024-25248,0,0,ab3d2a3b38abc9eda04104b8736bee6722a7b783d7f7311f9358790a48b160f2,2024-02-27T14:20:06.637000 @@ -240947,7 +240951,12 @@ CVE-2024-25554,0,0,a87c08d7479e0670c1de7ac680e974b7c966b7f12d7b309312798a5acd199 CVE-2024-25559,0,0,621d2089e4066088e4f2e7151d4c52b797349073e2e5f4d074059dc172fb61d6,2024-02-15T06:23:39.303000 CVE-2024-25578,0,0,ff68f9ee0e3394b3fa83fe8766f2e044325a5fd043b437de063c0cd80654c610,2024-03-01T14:04:26.010000 CVE-2024-25579,0,0,91953a88eab65ef3b6eb3b0fbea08ce09211ffa83ae8783d4b439f2092b924fc,2024-02-29T13:49:47.277000 +CVE-2024-25592,1,1,7e5ba00e5d890182601422469a17f00786fcde9a61c4ed047158b4300fb53b1f,2024-03-15T14:15:07.550000 +CVE-2024-25593,1,1,2c5aacf75208e920cc705d4658f842798fd0dcd2769ee9853582bf3522e31b5f,2024-03-15T14:15:07.787000 CVE-2024-25594,0,0,041a8f1098ea8eb68537c88dc97c5b5bc81f29a13cfba102c394bd754ead05ca,2024-02-29T13:49:29.390000 +CVE-2024-25596,1,1,0102c1c56e481b13b8f94e092b0cac510535143dc2a30ace497c59950d3a3ddc,2024-03-15T14:15:07.990000 +CVE-2024-25597,1,1,e152f482a7f15675e369c979d181f58f05e1af4d3a870b7cfbbee56b0ef94e6f,2024-03-15T14:15:08.220000 +CVE-2024-25598,1,1,605fd982754aaa53bea43b6e3f8e58eedfa880e08ab766ba25e9561f0078ef18,2024-03-15T13:15:07.087000 CVE-2024-25601,0,0,81f4fdae91c2e2979380ffdf7201132bd42db70ea50ec659a221655da6bb1b91,2024-02-22T19:07:37.840000 CVE-2024-25602,0,0,6a0412f9e3d86cacfb35a934a8fd793128a0f85212ec26797b187230b94df26a,2024-02-22T19:07:37.840000 CVE-2024-25603,0,0,863f490c7ea22d0d3c701bfeb2e8a36747268d73fdd29bb24261158009a35432,2024-02-22T19:07:37.840000 @@ -241070,12 +241079,17 @@ CVE-2024-25910,0,0,46915ce767477cde79dec327c420fb80a93ebb8584c8668c193e9ec22215e CVE-2024-25913,0,0,adbe1d51d998e7755c9e21c2f8e4899af91a4a0cc057128b5afa1c44996ee3fc,2024-02-26T16:32:25.577000 CVE-2024-25914,0,0,6c21c235c508fdd4e37939a7918e64e3dd4e50979a576bdc305d842a25f11a05,2024-02-13T14:01:07.747000 CVE-2024-25915,0,0,2b3eb3b61519c3cc7ec9c696d86f766a5ba91455b2def2592d7df0099d9b76fa,2024-02-23T16:14:43.447000 +CVE-2024-25916,1,1,a1ddedeea2fdb0b8ad3e81fc4ea7c26fd924816e1c78b9e5d53ea37a82602106,2024-03-15T13:15:07.323000 +CVE-2024-25919,1,1,9bab28643260a56f5c2ee9fc1143f525b51ea40290e4994aa23ebdd669b95ec7,2024-03-15T13:15:07.563000 +CVE-2024-25921,1,1,27d3d64bacf9674f1dd3320dc9193e4217ad3fe3b22e935e2e97d8d8734a058f,2024-03-15T13:15:07.807000 CVE-2024-25925,0,0,01bc086e03bbafe0dfede980aebb8a87a98cfcf8d010c13e69a9feac35eb7490,2024-02-26T16:32:25.577000 CVE-2024-25927,0,0,70ec221cb23fdd951e839b39a19a816e5c7a4881399308a30cbec9cd2c6f2d65,2024-02-28T14:06:45.783000 CVE-2024-25928,0,0,a6060327df403c3c616b275f710271564f7f2534d45ed96b3571c5b2e5121575,2024-02-23T16:14:43.447000 CVE-2024-25930,0,0,0ab8711195d4ca59bae23faf5b938c4832c53808527b8c4f0842867494c69bd3,2024-02-29T13:49:29.390000 CVE-2024-25931,0,0,cced732a62b8661206eb106d5ae979a2d16189f2911f7eaa9ca025496e8df531,2024-02-29T13:49:29.390000 CVE-2024-25932,0,0,b47ba5ecf2a19427a2d0c7404d84cf9b82c7d738bc913534568255e83139261d,2024-02-29T13:49:29.390000 +CVE-2024-25934,1,1,c08a19d8da4edbfa5fdf9a4231a783a14abda40d956d1ec9e57d9e1e4dcf6fe6,2024-03-15T13:15:08.070000 +CVE-2024-25936,1,1,41ed61c54a84cbe8ab04f5aaca5987168a76577f1a873a720eb1b23b24c7c463,2024-03-15T13:15:08.287000 CVE-2024-25940,0,0,81faf8084be28ad3443bfad1349de788b40c215e318cb61e901b3079aac1c24e,2024-02-15T06:23:39.303000 CVE-2024-25941,0,0,ca1cef65d30f17057b47421c2700ecf50e418e7bf4da35eb3fcc2989f17ef1eb,2024-02-15T06:23:39.303000 CVE-2024-25951,0,0,4cab9db546da1535e7f7aa83987aad28b8aa7aeb3328d636aa2cd78c27a2b2c1,2024-03-11T01:32:39.697000 @@ -241138,7 +241152,7 @@ CVE-2024-26159,0,0,8db8f42d5662b161251586cebfdfad3ac7119bf59dcefc0ce4412d5330cc4 CVE-2024-26160,0,0,fa9ab77966a6520f6fd48a75b259529e6a68bdc5f72bc11ac282a7c57a6be71f,2024-03-12T17:46:17.273000 CVE-2024-26161,0,0,179c500caa38708835a1de408543085e57586fd097d7453a1bf1888d48f494e3,2024-03-12T17:46:17.273000 CVE-2024-26162,0,0,abe9736aa1712017432f5ac3cb4f9e06d55b8e6b2899e4fcc1a691ec906deb0c,2024-03-12T17:46:17.273000 -CVE-2024-26163,0,1,17384ba1027e861f2af80d0ea19d4aae000f69379a7084be7179fba67b1f8bd9,2024-03-15T12:53:06.423000 +CVE-2024-26163,0,0,17384ba1027e861f2af80d0ea19d4aae000f69379a7084be7179fba67b1f8bd9,2024-03-15T12:53:06.423000 CVE-2024-26164,0,0,c529ef056d97ddfa055f4dab67a98e2c243b207609d3b8417d59eb6c8893d127,2024-03-12T17:46:17.273000 CVE-2024-26165,0,0,63d3dcf1b589358d7ead4e45bd2c42171f291333fcff06cba556b682dcc81435,2024-03-12T17:46:17.273000 CVE-2024-26166,0,0,978ab57484f1682cc950150e2b2e40d5b99e83a0da48cc1356ec7b38d0d948ec,2024-03-12T17:46:17.273000 @@ -241162,7 +241176,7 @@ CVE-2024-26199,0,0,c783249e58f7a34cdbc3a4a74bdf378194f69958b248f8c80379c0377a914 CVE-2024-26201,0,0,117ccddc353ed4894703f364acf785dd6a24217537e061ef980d1ca56918f180,2024-03-12T17:46:17.273000 CVE-2024-26203,0,0,6110281b9eda03c7d5a8219ec3a2aff67cf54ad90870a79c096fe875f28ea385,2024-03-12T17:46:17.273000 CVE-2024-26204,0,0,413dd43bdbc47045478482b7d3349e3e66b0c3197ca627e0b5f71ae7053c6d3e,2024-03-12T17:46:17.273000 -CVE-2024-26246,0,1,229a0d6478eae87edf8816e00563b02e82089fc0fc04e0e1cf7f1270429d5b96,2024-03-15T12:53:06.423000 +CVE-2024-26246,0,0,229a0d6478eae87edf8816e00563b02e82089fc0fc04e0e1cf7f1270429d5b96,2024-03-15T12:53:06.423000 CVE-2024-26260,0,0,e265a50d624e832bed578eaaf671225475ee52a0a641253d8d3fa4cc960d0968,2024-02-15T06:23:39.303000 CVE-2024-26261,0,0,0e54368aae0104b528b2c2b10aa27bd070162dbc45df6e809e95785e5efd10d2,2024-02-15T06:23:39.303000 CVE-2024-26262,0,0,6d57968ac2564b388ee7eb2f157289b2d34f808f6708bcc9236e1289de720f6f,2024-02-15T06:23:39.303000 @@ -241210,7 +241224,7 @@ CVE-2024-26351,0,0,61b98d66760f09ba8a0757ca890b9ad836349a62d566c880c0eb8336d14db CVE-2024-26352,0,0,ed876b320273da7c752d57a08640f2d98ce80b026324bdf46d0712ec0097ce54,2024-02-22T19:07:27.197000 CVE-2024-26445,0,0,3735cabd04dab3a1baa3e135ef467df65425520025be25bd7cf66dc1b1b0bf61,2024-02-22T19:07:27.197000 CVE-2024-26450,0,0,e70e1c7044e1447bb73bfa4a556135e1953f1916a7225089ba5c38735bf8ee34,2024-03-09T08:15:06.120000 -CVE-2024-26454,0,1,bae0c35b4dfcdbee5c6f4167647fab36cadeab218796adaaf17826bd73693c56,2024-03-15T12:53:06.423000 +CVE-2024-26454,0,0,bae0c35b4dfcdbee5c6f4167647fab36cadeab218796adaaf17826bd73693c56,2024-03-15T12:53:06.423000 CVE-2024-26455,0,0,b8d798122eed5fa7dc5e81852b3374f7f4b40339c21e80b998d09e1a756fc71d,2024-02-26T22:10:40.463000 CVE-2024-26458,0,0,4b2bac12846011765db5a8d92c99fed71bd0c8fd706ee4d4f4c7e419547c7ad4,2024-02-29T13:49:29.390000 CVE-2024-26461,0,0,904046a1bdb8d57e836285398ec79f3a5f035120c749bfa545aeddc73ebaca7d,2024-02-29T13:49:29.390000 @@ -241225,7 +241239,7 @@ CVE-2024-26470,0,0,dc0db164f8ce3a8bc9a2fa171d923c0f617dfc8790e83bc5c61622a828306 CVE-2024-26471,0,0,7fddf92026a168a390ea36b87da697eab84d57af1da83b920de1166301dbef90,2024-02-29T13:49:29.390000 CVE-2024-26472,0,0,263b6313f3d222b9b664ca4acf33761066c4df1f4a964e3dd263c3bac4f021db,2024-03-08T21:15:07.193000 CVE-2024-26473,0,0,23f27fa8ebd3984f506b7ad69a08bae2d515e7dd11e301086d0681feec0a45c1,2024-02-29T13:49:29.390000 -CVE-2024-26475,0,1,ca1da171d57f314c06f011443c195dce7f70866f213870057dd637d4798c4fda,2024-03-15T12:53:06.423000 +CVE-2024-26475,0,0,ca1da171d57f314c06f011443c195dce7f70866f213870057dd637d4798c4fda,2024-03-15T12:53:06.423000 CVE-2024-26476,0,0,fc0454504f51fc907b2a35a893877c52153f273304642bf8a5c147e2904eba6f,2024-02-29T13:49:47.277000 CVE-2024-26481,0,0,16c3c7f90cb16f8e754a4977b45d85fc37dcddc5f55bf7f8d07332bb65831b88,2024-03-12T05:15:47.500000 CVE-2024-26482,0,0,f9dca5e4d25904fab509e3ffdf08b74804d7cf4024d86bc77571cf17db2648b9,2024-02-26T19:15:07.357000 @@ -241235,10 +241249,10 @@ CVE-2024-26489,0,0,de79f1495737dd1b8577e3e02ec381880aa1980ded294214617e55a244fa4 CVE-2024-26490,0,0,b6f6bbce17cb8b3e0d7ffc74af2883f439e6d11d15d184e2f1a2e43e85a99a1d,2024-02-22T19:07:27.197000 CVE-2024-26491,0,0,73ef4da115c90ed06a18a1a334653b2533761b4f911c3db9814bd0d18285bcac,2024-02-22T19:07:27.197000 CVE-2024-26492,0,0,223ddadc0c7efe7b0886f487630808be0927541c8864c0a1df96647191c41c4f,2024-03-08T14:02:57.420000 -CVE-2024-26503,0,1,d0f374031f3bfa957597401c8f88ca58d151627558fd63926354c04ec0b8dff2,2024-03-15T12:53:06.423000 +CVE-2024-26503,0,0,d0f374031f3bfa957597401c8f88ca58d151627558fd63926354c04ec0b8dff2,2024-03-15T12:53:06.423000 CVE-2024-26521,0,0,0e3dff2f526dd01b3807e889e548f69877c6fbe716f338bf9b68ff7b3cd2a892,2024-03-12T12:40:13.500000 CVE-2024-26529,0,0,ceb7dffe95e5cd49d7bba0e418c1f06e328c8386f0796095312ed90a87d2d1b6,2024-03-13T12:33:51.697000 -CVE-2024-26540,0,1,617635ef0e8a400c648ca8f83ffa7f30619dec90da8a875f959e523aa0d1f776,2024-03-15T12:53:06.423000 +CVE-2024-26540,0,0,617635ef0e8a400c648ca8f83ffa7f30619dec90da8a875f959e523aa0d1f776,2024-03-15T12:53:06.423000 CVE-2024-26542,0,0,84bcc676050237f7706e936cd8d9d490aa0a127cdccddbe7afe739c073267e25,2024-02-28T14:06:45.783000 CVE-2024-26548,0,0,7b31129407d10e539a4174451b23a0f83a48cdb246d6dd13af61036fdc95df1c,2024-03-01T14:04:26.010000 CVE-2024-26559,0,0,3b7b5127dd0e422a83fadfb79310bdd57e4fb71532d47a597a5aa1449637c0ce,2024-02-29T13:49:47.277000 @@ -241246,8 +241260,8 @@ CVE-2024-26566,0,0,c84607e263dfbb2bafdffa5f1605a228a50fe6eb3d5c21b9f493cf56aab5c CVE-2024-26578,0,0,631d617cd0985d9923eed32b0cb4b9e9025809830b6a3ca2ef1a468d4f2a7124,2024-02-22T19:07:27.197000 CVE-2024-26580,0,0,716bfe9e7477c84eaf394c6917d0ce79d82ccdb90bad82d0c89b019a7d1ce425,2024-03-06T15:18:08.093000 CVE-2024-26581,0,0,353f24559890ac7b3597bd26d99362ecbfd523a3ec7e2aa7e9d65e75d894e5ee,2024-02-23T09:15:22.563000 -CVE-2024-26582,0,0,6cdcf6843f79a1ddc4c2cd0c26ad431557beeca360692c49f2a0f6c51a1d288c,2024-03-11T18:15:18.377000 -CVE-2024-26583,0,0,4a300c2895f7117869a919f3cccacc96bcc2b42fd06fde7e43015d0dc24ee87c,2024-03-11T18:15:18.453000 +CVE-2024-26582,0,1,3ff5c496d753899c1fc1e8062e53c8f61453498de38167daf1346ce24125ba81,2024-03-15T13:56:41.843000 +CVE-2024-26583,0,1,469df0658e18197ed0356dd7a5240250603137d767287de06ec0167d1ae18c2a,2024-03-15T13:05:03.220000 CVE-2024-26584,0,0,628c83749212390e734524e43d20fa678834b7ea9755141f8a3b9cd3762087b8,2024-03-11T18:15:18.503000 CVE-2024-26585,0,0,ab0df1121b4a44ad09abca0cf48007274128e339349339533a7e7946a2e72b52,2024-03-14T20:18:37.957000 CVE-2024-26586,0,0,6adf6fee4513357dce3d48353704f433902e35e2bc7d0ba0f94b639c08b43cd1,2024-02-23T09:15:22.820000 @@ -241315,6 +241329,10 @@ CVE-2024-27135,0,0,dc76c2c208b53579d0bb7d97b6b2e7e902c0fb1c8b5922e51dabb309b530b CVE-2024-27138,0,0,1ec0ded3b41c12b07651e921188be783731716c54fb55c30f65f5b3e8197e8cc,2024-03-01T22:22:25.913000 CVE-2024-27139,0,0,66ddd9efc34252e5e972ac0e5a31e042faa3995b86c5ae6f0f108c10e1d7b562,2024-03-01T22:22:25.913000 CVE-2024-27140,0,0,34daddef6e0d13f2bea16bc1184887cdd01053137a36a3bc5699d2875c449127,2024-03-01T22:22:25.913000 +CVE-2024-27189,1,1,ed3831284f329bc5f163703f390cebd316950a244cf976c69ad19e82e34723c4,2024-03-15T13:15:08.500000 +CVE-2024-27192,1,1,f915a7c19171c5ba9a4b2641b7adb0ec3be67a586fd1ce5e8e09a181b223cea9,2024-03-15T13:15:08.737000 +CVE-2024-27193,1,1,339cbbe22759dc63fcd17ac64c1a8bf67db19f19f49364949cd0c7f54def49d7,2024-03-15T13:15:09.043000 +CVE-2024-27196,1,1,5fd4d306583670efb7e2630190733701ea9e9d18073fcf8735d03382892fdb26,2024-03-15T13:15:09.277000 CVE-2024-27198,0,0,e4259fe3d4611134ab5dfb0d4f88f5b563c21b8238f30b4253811838ad004753,2024-03-11T15:15:47.483000 CVE-2024-27199,0,0,3dd3bfb58b796a8c7735f0a6f342852f32998fc13795786d35eb3d4375df0417,2024-03-11T15:15:47.663000 CVE-2024-27204,0,0,2f9f2ac2078c33addc2c698f165f7aff9339fcf3fa26f2cdd29a6de3328c8c2a,2024-03-12T12:40:13.500000 @@ -241434,7 +241452,7 @@ CVE-2024-27743,0,0,69a5e2d8c49bcfbf0b9f2f2f3b35b9cf6afe8c9f20e8371fcf519a2d38050 CVE-2024-27744,0,0,c100d4ba8f49a307e8f166c43dcf72396c641c27bc5c30f424e004f4b4c33d3f,2024-03-13T07:15:36.410000 CVE-2024-27746,0,0,6f3ddced2e2b26bef51987507b4e7466957a803a9da415c8c1c8b245cafe1423,2024-03-13T07:15:36.470000 CVE-2024-27747,0,0,eff635f872515818dfe20352d610bb047327d7f6971e953c63bc92feb6bf3ebe,2024-03-13T07:15:36.523000 -CVE-2024-27756,0,1,aebfc12c95eee1aa3d95acbf6fc8b0650b6e3d2e490fe1817d1c49f0782fe0c7,2024-03-15T12:53:06.423000 +CVE-2024-27756,0,0,aebfc12c95eee1aa3d95acbf6fc8b0650b6e3d2e490fe1817d1c49f0782fe0c7,2024-03-15T12:53:06.423000 CVE-2024-27758,0,0,6abe87e0a8905ac150ade2fec85250ff5e7fbf580c101c16b193b98f7d58141f,2024-03-12T17:46:17.273000 CVE-2024-27764,0,0,a6da085213081f41482d74001d5b27250ddae1567bc465fa0f4b1023f8322f06,2024-03-06T15:18:08.093000 CVE-2024-27765,0,0,c9283b485df441e5cf44e98a2bcaa6921e6b7ae7825314dc1fd3bb862197fb6e,2024-03-06T15:18:08.093000 @@ -241457,8 +241475,8 @@ CVE-2024-27950,0,0,56d632dad56c45d949d3327de16e5b70b08683cea8ce7876ca8c59cc37ee8 CVE-2024-27952,0,0,184c933cd3d4f7d9f291de87daadba6c6d2dcb57a0cab449b4798a27658d2d98,2024-03-13T18:15:58.530000 CVE-2024-27953,0,0,9606a5ea342585cc8ea605f674c63e8d870327e37e1ba285dba38be6126632a2,2024-03-13T18:15:58.530000 CVE-2024-27986,0,0,221ac31a72264e8303bc0dc716d0bcad27f92aa2e3b64824247f9d02601983b8,2024-03-14T12:52:09.877000 -CVE-2024-27987,1,1,ce6fd0b1730cd837f285c0aaaa1258cf6aa8505469e7f313401adb363ee7f395,2024-03-15T12:53:06.423000 -CVE-2024-28053,0,1,e281ed045d826247c32c0ccef204d2c431b80f755e75c928bfd444d7e8497772,2024-03-15T12:53:06.423000 +CVE-2024-27987,0,0,ce6fd0b1730cd837f285c0aaaa1258cf6aa8505469e7f313401adb363ee7f395,2024-03-15T12:53:06.423000 +CVE-2024-28053,0,0,e281ed045d826247c32c0ccef204d2c431b80f755e75c928bfd444d7e8497772,2024-03-15T12:53:06.423000 CVE-2024-28084,0,0,2ea238298cc724e9290d5587502d4eedb8db15dd1861547724435b977511956c,2024-03-04T13:58:23.447000 CVE-2024-28088,0,0,d2f20b1069b24ba10d21e8bf3b61c2c6a1c6b345ff59786676752b80abbde7a4,2024-03-13T21:16:00.380000 CVE-2024-28089,0,0,830991c1dd5898b6a817a3f8bb8784922af3636f20b8b62ba1c918d5d83f6f10,2024-03-11T01:32:29.610000 @@ -241526,8 +241544,8 @@ CVE-2024-28323,0,0,50ef03c499763d9e671e8f7abe3ff1d91993b3f242ed25d0b2f15c0783d9b CVE-2024-28338,0,0,9985a0b99abb928b9c829cb29ecce6039c07964aad6d9841c1477c6680f4f9b5,2024-03-12T17:46:17.273000 CVE-2024-28339,0,0,06a7f15d55f22a965683bef17c82587bc073ddf9fa5edb33c38c4cd82d5f37f7,2024-03-12T17:46:17.273000 CVE-2024-28340,0,0,89775fa07d73d115a7392603111ecb04f65799be74b8d41063e67ed0eb97d0cf,2024-03-12T17:46:17.273000 -CVE-2024-28353,0,1,775baedd795797f490e1b1e6993861f73b147b03ab9192dc45c3991e71d0561e,2024-03-15T12:53:06.423000 -CVE-2024-28354,0,1,74fe43ef76c1dcca1e1b1c82fba189337e4897b537fbb6f698402ef41ffa3ffa,2024-03-15T12:53:06.423000 +CVE-2024-28353,0,0,775baedd795797f490e1b1e6993861f73b147b03ab9192dc45c3991e71d0561e,2024-03-15T12:53:06.423000 +CVE-2024-28354,0,0,74fe43ef76c1dcca1e1b1c82fba189337e4897b537fbb6f698402ef41ffa3ffa,2024-03-15T12:53:06.423000 CVE-2024-28383,0,0,4ebb5b688ac785b11132be45898bb9d7934c49dcd0ae78bf745a27cbe4cf3c09,2024-03-14T14:21:20.217000 CVE-2024-28388,0,0,f20800f07aee245fbf5408ead00cec9bf5c1f6fde0c58ac0833a4f3740a134d7,2024-03-14T12:52:09.877000 CVE-2024-28390,0,0,c59fe44ce5898e034e8253a1c3bd017a5eae7c1708d584b45d3cdcaf6b6ab3d0,2024-03-14T12:52:09.877000 @@ -241565,7 +241583,7 @@ CVE-2024-28682,0,0,2c53ed716809a76ded005fd10ac6d93891dbf2dd9f02238c66f1445af60cb CVE-2024-28683,0,0,14fce1fb8fe5dd3fb68153125dd387047f48de59cd587ce41acfe8b0e8fa04c2,2024-03-13T18:15:58.530000 CVE-2024-28684,0,0,df89c702874c46527da5dc5bf33ec252c05a69f53466623f5ca04f0566a6cd25,2024-03-13T14:28:45.217000 CVE-2024-28746,0,0,4e08f19b517756fb15fbaf966494c1aeec3b9803b4e2b615b4d5a557eb48c84a,2024-03-14T12:52:09.877000 -CVE-2024-28752,1,1,b6856abb589c0fed02798f341901c4f3025e287fced11706e9fa0c89b392cd6a,2024-03-15T12:53:06.423000 +CVE-2024-28752,0,0,b6856abb589c0fed02798f341901c4f3025e287fced11706e9fa0c89b392cd6a,2024-03-15T12:53:06.423000 CVE-2024-28753,0,0,73ca850c1b6879daba607bc61d7d16457b56173a47004b8bff799b514a526c36,2024-03-11T01:32:39.697000 CVE-2024-28754,0,0,9281349f951cf3fa92b3f484f1e5f3e3b9f20229dcabe6872ba34e9bebaf3b2c,2024-03-11T01:32:39.697000 CVE-2024-28757,0,0,2ea8a9bd701b62a4c7d927e860f5361b09b4376e3bc3bbb014ff5d4ca725cec6,2024-03-11T01:32:29.610000