From d5ea2304b5169e58c0c8aa35972b1c32a4cd7a96 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 27 Mar 2024 21:03:27 +0000 Subject: [PATCH] Auto-Update: 2024-03-27T21:00:38.583660+00:00 --- CVE-2024/CVE-2024-280xx/CVE-2024-28085.json | 36 ++++++++ CVE-2024/CVE-2024-282xx/CVE-2024-28233.json | 67 +++++++++++++++ CVE-2024/CVE-2024-282xx/CVE-2024-28247.json | 63 ++++++++++++++ CVE-2024/CVE-2024-288xx/CVE-2024-28860.json | 71 +++++++++++++++ CVE-2024/CVE-2024-298xx/CVE-2024-29886.json | 59 +++++++++++++ CVE-2024/CVE-2024-298xx/CVE-2024-29887.json | 59 +++++++++++++ CVE-2024/CVE-2024-298xx/CVE-2024-29888.json | 95 +++++++++++++++++++++ CVE-2024/CVE-2024-298xx/CVE-2024-29891.json | 83 ++++++++++++++++++ CVE-2024/CVE-2024-298xx/CVE-2024-29892.json | 83 ++++++++++++++++++ CVE-2024/CVE-2024-299xx/CVE-2024-29945.json | 6 +- CVE-2024/CVE-2024-29xx/CVE-2024-2990.json | 92 ++++++++++++++++++++ CVE-2024/CVE-2024-29xx/CVE-2024-2991.json | 92 ++++++++++++++++++++ CVE-2024/CVE-2024-29xx/CVE-2024-2992.json | 92 ++++++++++++++++++++ CVE-2024/CVE-2024-29xx/CVE-2024-2993.json | 92 ++++++++++++++++++++ CVE-2024/CVE-2024-29xx/CVE-2024-2994.json | 92 ++++++++++++++++++++ CVE-2024/CVE-2024-29xx/CVE-2024-2995.json | 92 ++++++++++++++++++++ CVE-2024/CVE-2024-29xx/CVE-2024-2996.json | 92 ++++++++++++++++++++ README.md | 58 +++++-------- _state.csv | 82 +++++++++++------- 19 files changed, 1336 insertions(+), 70 deletions(-) create mode 100644 CVE-2024/CVE-2024-280xx/CVE-2024-28085.json create mode 100644 CVE-2024/CVE-2024-282xx/CVE-2024-28233.json create mode 100644 CVE-2024/CVE-2024-282xx/CVE-2024-28247.json create mode 100644 CVE-2024/CVE-2024-288xx/CVE-2024-28860.json create mode 100644 CVE-2024/CVE-2024-298xx/CVE-2024-29886.json create mode 100644 CVE-2024/CVE-2024-298xx/CVE-2024-29887.json create mode 100644 CVE-2024/CVE-2024-298xx/CVE-2024-29888.json create mode 100644 CVE-2024/CVE-2024-298xx/CVE-2024-29891.json create mode 100644 CVE-2024/CVE-2024-298xx/CVE-2024-29892.json create mode 100644 CVE-2024/CVE-2024-29xx/CVE-2024-2990.json create mode 100644 CVE-2024/CVE-2024-29xx/CVE-2024-2991.json create mode 100644 CVE-2024/CVE-2024-29xx/CVE-2024-2992.json create mode 100644 CVE-2024/CVE-2024-29xx/CVE-2024-2993.json create mode 100644 CVE-2024/CVE-2024-29xx/CVE-2024-2994.json create mode 100644 CVE-2024/CVE-2024-29xx/CVE-2024-2995.json create mode 100644 CVE-2024/CVE-2024-29xx/CVE-2024-2996.json diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28085.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28085.json new file mode 100644 index 00000000000..1301ec5fc8e --- /dev/null +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28085.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2024-28085", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-27T19:15:48.367", + "lastModified": "2024-03-27T19:15:48.367", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/skyler-ferrante/CVE-2024-28085", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/util-linux/util-linux/security/advisories/GHSA-xv2h-c6ww-mrjq", + "source": "cve@mitre.org" + }, + { + "url": "https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/", + "source": "cve@mitre.org" + }, + { + "url": "https://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://www.openwall.com/lists/oss-security/2024/03/27/5", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-282xx/CVE-2024-28233.json b/CVE-2024/CVE-2024-282xx/CVE-2024-28233.json new file mode 100644 index 00000000000..00cfd5656d3 --- /dev/null +++ b/CVE-2024/CVE-2024-282xx/CVE-2024-28233.json @@ -0,0 +1,67 @@ +{ + "id": "CVE-2024-28233", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-03-27T19:15:48.430", + "lastModified": "2024-03-27T19:15:48.430", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "JupyterHub is an open source multi-user server for Jupyter notebooks. By tricking a user into visiting a malicious subdomain, the attacker can achieve an XSS directly affecting the former's session. More precisely, in the context of JupyterHub, this XSS could achieve full access to JupyterHub API and user's single-user server. The affected configurations are single-origin JupyterHub deployments and JupyterHub deployments with user-controlled applications running on subdomains or peer subdomains of either the Hub or a single-user server. This vulnerability is fixed in 4.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + }, + { + "lang": "en", + "value": "CWE-565" + }, + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/jupyterhub/jupyterhub/commit/e2798a088f5ad45340fe79cdf1386198e664f77f", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/jupyterhub/jupyterhub/security/advisories/GHSA-7r3h-4ph8-w38g", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-282xx/CVE-2024-28247.json b/CVE-2024/CVE-2024-282xx/CVE-2024-28247.json new file mode 100644 index 00000000000..0b3d85990de --- /dev/null +++ b/CVE-2024/CVE-2024-282xx/CVE-2024-28247.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2024-28247", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-03-27T19:15:48.637", + "lastModified": "2024-03-27T19:15:48.637", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Pi-hole is a DNS sinkhole that protects your devices from unwanted content without installing any client-side software. A vulnerability has been discovered in Pihole that allows an authenticated user on the platform to read internal server files arbitrarily, and because the application runs from behind, reading files is done as a privileged user.If the URL that is in the list of \"Adslists\" begins with \"file*\" it is understood that it is updating from a local file, on the other hand if it does not begin with \"file*\" depending on the state of the response it does one thing or another. The problem resides in the update through local files. When updating from a file which contains non-domain lines, 5 of the non-domain lines are printed on the screen, so if you provide it with any file on the server which contains non-domain lines it will print them on the screen. This vulnerability is fixed by 5.18." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + }, + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/pi-hole/pi-hole/commit/f3af03174e676c20e502a92ed7842159f2fdeb7e", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/pi-hole/pi-hole/security/advisories/GHSA-95g6-7q26-mp9x", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28860.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28860.json new file mode 100644 index 00000000000..67d28716b9f --- /dev/null +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28860.json @@ -0,0 +1,71 @@ +{ + "id": "CVE-2024-28860", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-03-27T19:15:48.827", + "lastModified": "2024-03-27T19:15:48.827", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Users of IPsec transparent encryption in Cilium may be vulnerable to cryptographic attacks that render the transparent encryption ineffective. In particular, Cilium is vulnerable to chosen plaintext, key recovery, replay attacks by a man-in-the-middle attacker. These attacks are possible due to an ESP sequence number collision when multiple nodes are configured with the same key. Fixed versions of Cilium use unique keys for each IPsec tunnel established between nodes, resolving all of the above attacks. This vulnerability is fixed in 1.13.13, 1.14.9, and 1.15.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-326" + } + ] + } + ], + "references": [ + { + "url": "https://docs.cilium.io/en/stable/security/network/encryption-ipsec", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/cilium/cilium/commit/311fbce5280491cddceab178d83b06fa23688c72", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/cilium/cilium/commit/a1742b478306fa256cd27df1039dfae0537b4149", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/cilium/cilium/commit/a652c123331852cca90c74202f993d4170fd37fa", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/cilium/cilium/security/advisories/GHSA-pwqm-x5x6-5586", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29886.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29886.json new file mode 100644 index 00000000000..b814de0a404 --- /dev/null +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29886.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-29886", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-03-27T19:15:49.023", + "lastModified": "2024-03-27T19:15:49.023", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Serverpod is an app and web server, built for the Flutter and Dart ecosystem. An issue was identified with the old password hash algorithm that made it susceptible to rainbow attacks if the database was compromised. This vulnerability is fixed by 1.2.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-916" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/serverpod/serverpod/commit/a78b9e9f1de74d1300633a122b6cc0f064139ad6", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/serverpod/serverpod/security/advisories/GHSA-r75m-26cq-mjxc", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29887.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29887.json new file mode 100644 index 00000000000..375d7094d52 --- /dev/null +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29887.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-29887", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-03-27T19:15:49.230", + "lastModified": "2024-03-27T19:15:49.230", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Serverpod is an app and web server, built for the Flutter and Dart ecosystem. This bug bypassed the validation of TSL certificates on all none web HTTP clients in the `serverpod_client` package. Making them susceptible to a man in the middle attack against encrypted traffic between the client device and the server. An attacker would need to be able to intercept the traffic and highjack the connection to the server for this vulnerability to be used. Upgrading to version `1.2.6` resolves this issue.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/serverpod/serverpod/commit/d55bf8d12967fc7955a875cb3e0f9693bd6d2c71", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/serverpod/serverpod/security/advisories/GHSA-h6x7-r5rg-x5fw", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29888.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29888.json new file mode 100644 index 00000000000..c7dc1f3ca07 --- /dev/null +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29888.json @@ -0,0 +1,95 @@ +{ + "id": "CVE-2024-29888", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-03-27T19:15:49.410", + "lastModified": "2024-03-27T19:15:49.410", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Saleor is an e-commerce platform that serves high-volume companies. When using `Pickup: Local stock only` click-and-collect as a delivery method in specific conditions the customer could overwrite the warehouse address with its own, which exposes its address as click-and-collect address. This issue has been patched in versions: `3.14.61`, `3.15.37`, `3.16.34`, `3.17.32`, `3.18.28`, `3.19.15`." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-359" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/saleor/saleor/commit/22a1aa3ef0bc54156405f69146788016a7f3f761", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/saleor/saleor/commit/39abb0f4e4fe6503f81bfbb871227e4f70bcdd5c", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/saleor/saleor/commit/47cedfd7d6524d79bdb04708edcdbb235874de6b", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/saleor/saleor/commit/997f7ea4f576543ec88679a86bfe1b14f7f2ff26", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/saleor/saleor/commit/b7cecda8b603f7472790150bb4508c7b655946d4", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/saleor/saleor/commit/d8ba545c16ad3153febc5b5be8fd2ef75da9fc95", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/saleor/saleor/commit/dccc2c842b4e2e09470929c80f07dc137e439182", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/saleor/saleor/commit/ef003c76a304c89ddb2dc65b7f1d5b3b2ba1c640", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/saleor/saleor/pull/15694", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/saleor/saleor/pull/15697", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/saleor/saleor/security/advisories/GHSA-mrj3-f2h4-7w45", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29891.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29891.json new file mode 100644 index 00000000000..923fd0d84aa --- /dev/null +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29891.json @@ -0,0 +1,83 @@ +{ + "id": "CVE-2024-29891", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-03-27T20:15:07.780", + "lastModified": "2024-03-27T20:15:07.780", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "ZITADEL users can upload their own avatar image and various image types are allowed. Due to a missing check, an attacker could upload HTML and pretend it is an image to gain access to the victim's account in certain scenarios. A possible victim would need to directly open the supposed image in the browser, where a session in ZITADEL needs to be active for this exploit to work. The exploit could only be reproduced if the victim was using Firefox. Chrome, Safari as well as Edge did not execute the code. This vulnerability is fixed in 2.48.3, 2.47.8, 2.46.5, 2.45.5, 2.44.7, 2.43.11, and 2.42.17." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.42.17", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.43.11", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.44.7", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.45.5", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.46.5", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.47.8", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.48.3", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-hr5w-cwwq-2v4m", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29892.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29892.json new file mode 100644 index 00000000000..f43600ee9d8 --- /dev/null +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29892.json @@ -0,0 +1,83 @@ +{ + "id": "CVE-2024-29892", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-03-27T20:15:08.303", + "lastModified": "2024-03-27T20:15:08.303", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "ZITADEL, open source authentication management software, uses Go templates to render the login UI. Under certain circumstances an action could set reserved claims managed by ZITADEL. For example it would be possible to set the claim `urn:zitadel:iam:user:resourceowner:name`. To compensate for this we introduced a protection that does prevent actions from changing claims that start with `urn:zitadel:iam`. This vulnerability is fixed in 2.48.3, 2.47.8, 2.46.5, 2.45.5, 2.44.7, 2.43.11, and 2.42.17." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.42.17", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.43.11", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.44.7", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.45.5", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.46.5", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.47.8", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.48.3", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-gp8g-f42f-95q2", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29945.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29945.json index 1cdbcbe05ec..157ca0d168c 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29945.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29945.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29945", "sourceIdentifier": "prodsec@splunk.com", "published": "2024-03-27T17:15:54.087", - "lastModified": "2024-03-27T17:48:21.140", + "lastModified": "2024-03-27T19:15:49.607", "vulnStatus": "Undergoing Analysis", "descriptions": [ { @@ -50,6 +50,10 @@ { "url": "https://advisory.splunk.com/advisories/SVD-2024-0301", "source": "prodsec@splunk.com" + }, + { + "url": "https://research.splunk.com/application/9a67e749-d291-40dd-8376-d422e7ecf8b5", + "source": "prodsec@splunk.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2990.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2990.json new file mode 100644 index 00000000000..fa6ca04a2fb --- /dev/null +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2990.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-2990", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-27T19:15:49.710", + "lastModified": "2024-03-27T19:15:49.710", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in Tenda FH1203 2.0.1.6. This affects the function formexeCommand of the file /goform/execCommand. The manipulation of the argument cmdinput leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258159. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formexeCommand.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.258159", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.258159", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.301365", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2991.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2991.json new file mode 100644 index 00000000000..2f21d4d7fa9 --- /dev/null +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2991.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-2991", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-27T19:15:49.940", + "lastModified": "2024-03-27T19:15:49.940", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in Tenda FH1203 2.0.1.6 and classified as critical. This vulnerability affects the function formWriteFacMac of the file /goform/WriteFacMac. The manipulation of the argument mac leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258160. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formWriteFacMac.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.258160", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.258160", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.301366", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2992.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2992.json new file mode 100644 index 00000000000..34136ce42b2 --- /dev/null +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2992.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-2992", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-27T19:15:50.173", + "lastModified": "2024-03-27T19:15:50.173", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Tenda FH1203 2.0.1.6 and classified as critical. This issue affects the function formSetCfm of the file /goform/setcfm. The manipulation of the argument funcpara1 leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258161 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formSetCfm.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.258161", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.258161", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.301371", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2993.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2993.json new file mode 100644 index 00000000000..88b246ddffb --- /dev/null +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2993.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-2993", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-27T20:15:08.780", + "lastModified": "2024-03-27T20:15:08.780", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Tenda FH1203 2.0.1.6. It has been classified as critical. Affected is the function formQuickIndex of the file /goform/QuickIndex. The manipulation of the argument PPPOEPassword leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-258162 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formQuickIndex.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.258162", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.258162", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.301372", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2994.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2994.json new file mode 100644 index 00000000000..588ebb0f278 --- /dev/null +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2994.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-2994", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-27T20:15:09.337", + "lastModified": "2024-03-27T20:15:09.337", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Tenda FH1203 2.0.1.6. It has been declared as critical. Affected by this vulnerability is the function GetParentControlInfo of the file /goform/GetParentControlInfo. The manipulation of the argument mac leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258163. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/GetParentControlInfo.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.258163", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.258163", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.301373", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2995.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2995.json new file mode 100644 index 00000000000..4ed3b237be4 --- /dev/null +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2995.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-2995", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-27T20:15:09.903", + "lastModified": "2024-03-27T20:15:09.903", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in NUUO Camera up to 20240319 and classified as problematic. This issue affects some unknown processing of the file /deletefile.php. The manipulation of the argument filename leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258197 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 5.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 4.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + } + ] + } + ], + "references": [ + { + "url": "https://h0e4a0r1t.github.io/2024/vulns/Arbitrary%20file%20deletion%20vulnerability%20exists%20in%20nuuo%20camera-deletefile.php.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.258197", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.258197", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.301068", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2996.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2996.json new file mode 100644 index 00000000000..7894ba1d45a --- /dev/null +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2996.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-2996", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-27T20:15:10.507", + "lastModified": "2024-03-27T20:15:10.507", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Bdtask Multi-Store Inventory Management System up to 20240320. It has been classified as problematic. Affected is an unknown function of the component Page Title Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-258198 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 2.4, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 3.3 + }, + "baseSeverity": "LOW", + "exploitabilityScore": 6.4, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://drive.google.com/file/d/115tr5PJ_RmSlaLR_jLXPyJse6ojSFRxu/view?usp=drivesdk", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.258198", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.258198", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.301376", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 7ad70d48f68..e6c4eb27611 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-03-27T19:00:37.713009+00:00 +2024-03-27T21:00:38.583660+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-03-27T18:15:11.293000+00:00 +2024-03-27T20:15:10.507000+00:00 ``` ### Last Data Feed Release @@ -33,50 +33,36 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -243042 +243058 ``` ### CVEs added in the last Commit -Recently added CVEs: `27` +Recently added CVEs: `16` -- [CVE-2024-20265](CVE-2024/CVE-2024-202xx/CVE-2024-20265.json) (`2024-03-27T17:15:51.113`) -- [CVE-2024-20271](CVE-2024/CVE-2024-202xx/CVE-2024-20271.json) (`2024-03-27T17:15:51.320`) -- [CVE-2024-20276](CVE-2024/CVE-2024-202xx/CVE-2024-20276.json) (`2024-03-27T17:15:51.513`) -- [CVE-2024-20278](CVE-2024/CVE-2024-202xx/CVE-2024-20278.json) (`2024-03-27T17:15:51.703`) -- [CVE-2024-20303](CVE-2024/CVE-2024-203xx/CVE-2024-20303.json) (`2024-03-27T17:15:51.880`) -- [CVE-2024-20306](CVE-2024/CVE-2024-203xx/CVE-2024-20306.json) (`2024-03-27T17:15:52.067`) -- [CVE-2024-20307](CVE-2024/CVE-2024-203xx/CVE-2024-20307.json) (`2024-03-27T18:15:09.357`) -- [CVE-2024-20308](CVE-2024/CVE-2024-203xx/CVE-2024-20308.json) (`2024-03-27T18:15:09.853`) -- [CVE-2024-20309](CVE-2024/CVE-2024-203xx/CVE-2024-20309.json) (`2024-03-27T17:15:52.260`) -- [CVE-2024-20311](CVE-2024/CVE-2024-203xx/CVE-2024-20311.json) (`2024-03-27T17:15:52.463`) -- [CVE-2024-20312](CVE-2024/CVE-2024-203xx/CVE-2024-20312.json) (`2024-03-27T17:15:52.690`) -- [CVE-2024-20314](CVE-2024/CVE-2024-203xx/CVE-2024-20314.json) (`2024-03-27T17:15:52.920`) -- [CVE-2024-20316](CVE-2024/CVE-2024-203xx/CVE-2024-20316.json) (`2024-03-27T17:15:53.110`) -- [CVE-2024-20324](CVE-2024/CVE-2024-203xx/CVE-2024-20324.json) (`2024-03-27T17:15:53.293`) -- [CVE-2024-20333](CVE-2024/CVE-2024-203xx/CVE-2024-20333.json) (`2024-03-27T17:15:53.480`) -- [CVE-2024-20354](CVE-2024/CVE-2024-203xx/CVE-2024-20354.json) (`2024-03-27T17:15:53.660`) -- [CVE-2024-23450](CVE-2024/CVE-2024-234xx/CVE-2024-23450.json) (`2024-03-27T17:15:53.857`) -- [CVE-2024-23451](CVE-2024/CVE-2024-234xx/CVE-2024-23451.json) (`2024-03-27T18:15:10.330`) -- [CVE-2024-2985](CVE-2024/CVE-2024-29xx/CVE-2024-2985.json) (`2024-03-27T17:15:54.460`) -- [CVE-2024-2986](CVE-2024/CVE-2024-29xx/CVE-2024-2986.json) (`2024-03-27T17:15:54.693`) -- [CVE-2024-2987](CVE-2024/CVE-2024-29xx/CVE-2024-2987.json) (`2024-03-27T17:15:54.917`) -- [CVE-2024-2988](CVE-2024/CVE-2024-29xx/CVE-2024-2988.json) (`2024-03-27T18:15:10.757`) -- [CVE-2024-2989](CVE-2024/CVE-2024-29xx/CVE-2024-2989.json) (`2024-03-27T18:15:11.293`) -- [CVE-2024-29945](CVE-2024/CVE-2024-299xx/CVE-2024-29945.json) (`2024-03-27T17:15:54.087`) -- [CVE-2024-29946](CVE-2024/CVE-2024-299xx/CVE-2024-29946.json) (`2024-03-27T17:15:54.273`) +- [CVE-2024-28085](CVE-2024/CVE-2024-280xx/CVE-2024-28085.json) (`2024-03-27T19:15:48.367`) +- [CVE-2024-28233](CVE-2024/CVE-2024-282xx/CVE-2024-28233.json) (`2024-03-27T19:15:48.430`) +- [CVE-2024-28247](CVE-2024/CVE-2024-282xx/CVE-2024-28247.json) (`2024-03-27T19:15:48.637`) +- [CVE-2024-28860](CVE-2024/CVE-2024-288xx/CVE-2024-28860.json) (`2024-03-27T19:15:48.827`) +- [CVE-2024-29886](CVE-2024/CVE-2024-298xx/CVE-2024-29886.json) (`2024-03-27T19:15:49.023`) +- [CVE-2024-29887](CVE-2024/CVE-2024-298xx/CVE-2024-29887.json) (`2024-03-27T19:15:49.230`) +- [CVE-2024-29888](CVE-2024/CVE-2024-298xx/CVE-2024-29888.json) (`2024-03-27T19:15:49.410`) +- [CVE-2024-29891](CVE-2024/CVE-2024-298xx/CVE-2024-29891.json) (`2024-03-27T20:15:07.780`) +- [CVE-2024-29892](CVE-2024/CVE-2024-298xx/CVE-2024-29892.json) (`2024-03-27T20:15:08.303`) +- [CVE-2024-2990](CVE-2024/CVE-2024-29xx/CVE-2024-2990.json) (`2024-03-27T19:15:49.710`) +- [CVE-2024-2991](CVE-2024/CVE-2024-29xx/CVE-2024-2991.json) (`2024-03-27T19:15:49.940`) +- [CVE-2024-2992](CVE-2024/CVE-2024-29xx/CVE-2024-2992.json) (`2024-03-27T19:15:50.173`) +- [CVE-2024-2993](CVE-2024/CVE-2024-29xx/CVE-2024-2993.json) (`2024-03-27T20:15:08.780`) +- [CVE-2024-2994](CVE-2024/CVE-2024-29xx/CVE-2024-2994.json) (`2024-03-27T20:15:09.337`) +- [CVE-2024-2995](CVE-2024/CVE-2024-29xx/CVE-2024-2995.json) (`2024-03-27T20:15:09.903`) +- [CVE-2024-2996](CVE-2024/CVE-2024-29xx/CVE-2024-2996.json) (`2024-03-27T20:15:10.507`) ### CVEs modified in the last Commit -Recently modified CVEs: `6` +Recently modified CVEs: `1` -- [CVE-2023-5189](CVE-2023/CVE-2023-51xx/CVE-2023-5189.json) (`2024-03-27T18:15:08.710`) -- [CVE-2024-1540](CVE-2024/CVE-2024-15xx/CVE-2024-1540.json) (`2024-03-27T17:48:21.140`) -- [CVE-2024-1580](CVE-2024/CVE-2024-15xx/CVE-2024-1580.json) (`2024-03-27T18:15:09.063`) -- [CVE-2024-2982](CVE-2024/CVE-2024-29xx/CVE-2024-2982.json) (`2024-03-27T17:48:21.140`) -- [CVE-2024-2983](CVE-2024/CVE-2024-29xx/CVE-2024-2983.json) (`2024-03-27T17:48:21.140`) -- [CVE-2024-2984](CVE-2024/CVE-2024-29xx/CVE-2024-2984.json) (`2024-03-27T17:48:21.140`) +- [CVE-2024-29945](CVE-2024/CVE-2024-299xx/CVE-2024-29945.json) (`2024-03-27T19:15:49.607`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 86ff62f29bd..c2d739361e0 100644 --- a/_state.csv +++ b/_state.csv @@ -212065,7 +212065,7 @@ CVE-2023-0578,0,0,c2cf10d09529bf342567ff561ff5fc5b2abe259e50445b77cdf258d0a115db CVE-2023-0579,0,0,504b4338f864e933aa44e888a09084f9d604fd2edb1bc93c969428fcc9526d01,2023-11-07T04:00:52.513000 CVE-2023-0580,0,0,496b4aaf459be8082f40af9709a8d52cae4c41b641bd7ca2e1f477b04712ed00,2023-11-07T04:00:52.727000 CVE-2023-0581,0,0,80d4f5ae1b34ea0255629d958cda2cdcf146f8044343eecb0200e915f691c351,2023-11-07T04:00:52.963000 -CVE-2023-0582,1,1,b3d8f7c84b265316b7e893995a48113564e6ef297a2eb81dadb43454ece92941,2024-03-27T18:15:08.237000 +CVE-2023-0582,0,0,b3d8f7c84b265316b7e893995a48113564e6ef297a2eb81dadb43454ece92941,2024-03-27T18:15:08.237000 CVE-2023-0583,0,0,ce927582782be4db333475ecc49caef43ac381b8ee355357a8ae6188916854c1,2023-11-07T04:00:53.253000 CVE-2023-0584,0,0,661ecf0e0e258efd0247b994949d777aeb58bd9b6fb3f10f25ebfe1d0595391a,2023-11-07T04:00:53.487000 CVE-2023-0585,0,0,e90d02e3a14ec76a3f74d6f239a409836679ba4da0fdac7466ba614a8fa9d16d,2023-11-07T04:00:53.740000 @@ -235764,7 +235764,7 @@ CVE-2023-51886,0,0,57376d86734d9125cdefeefb78630aac114d6de1902e63e7e68f3a3c286da CVE-2023-51887,0,0,5ef2b724fc508a46d98e2525360ceec49832ad8963da68755a3ed1e998657e14,2024-02-05T17:29:49.697000 CVE-2023-51888,0,0,0c26c76fa0194a6bf43f7b0d37b92c45dfae056622dc0b83d9eb4f0ea5ca00ab,2024-02-05T14:11:51.323000 CVE-2023-51889,0,0,8818124c066a6fc089f0ca349b82501811306f8e10b0be4d7c4755f36976d478,2024-02-05T14:10:48.287000 -CVE-2023-5189,0,1,dd34534e185942a0e90badb41c5e213b21a944d47974c8c87a51609f819a599b,2024-03-27T18:15:08.710000 +CVE-2023-5189,0,0,dd34534e185942a0e90badb41c5e213b21a944d47974c8c87a51609f819a599b,2024-03-27T18:15:08.710000 CVE-2023-51890,0,0,781340432dbcfdc8e5dd47cf218a3ee83bd6eb1e3c9d4e385b3f27a1d7a54d20,2024-02-05T13:57:15.610000 CVE-2023-51892,0,0,83e77db8e71e0f4c493aeecdca7dc8524049c5ad059bc3e1dc3f8c0291c22774,2024-01-26T17:12:58.500000 CVE-2023-5190,0,0,4e5acd0b306f781670b3a54b1d1143953c2740e2d360008f138cc2e5de5de17a,2024-02-20T19:50:53.960000 @@ -239049,7 +239049,7 @@ CVE-2024-1535,0,0,c2e452de4f130d0657f2ad52768b1d03d46cb2c5e636f4ca1b10840f9898bd CVE-2024-1536,0,0,3680c54e462a2a7edc1fc99438ddf2bbe56f66c6c70a4febe86757b7c0d77832,2024-03-13T18:15:58.530000 CVE-2024-1537,0,0,90084d772bcb3ecc6e07d74ed60eae5fe9aea59c6e1713f7863063d24965b57f,2024-03-13T18:15:58.530000 CVE-2024-1538,0,0,7710e1b546e09312497f0b9c9df24bcccbffd2cbc2e6cf10ad6aac7ce2ffe5db,2024-03-21T12:58:51.093000 -CVE-2024-1540,0,1,76005015a825567349150f82c72870d086e465eb518fb8c7a03f9bc7bf9bede1,2024-03-27T17:48:21.140000 +CVE-2024-1540,0,0,76005015a825567349150f82c72870d086e465eb518fb8c7a03f9bc7bf9bede1,2024-03-27T17:48:21.140000 CVE-2024-1541,0,0,0b73186deefb215b3bbc0b2b970c4145b3ad229def4c224287b4e5a63ecff82c,2024-03-13T18:15:58.530000 CVE-2024-1546,0,0,d87548555f4c8992ddc193a435b01cbf450a34c4725a832074955ddd5326558a,2024-03-04T09:15:37.650000 CVE-2024-1547,0,0,fc3de1ace81ccfdd8fbde9e6a6951be522c10c940115407bd01fd7d037e7d770,2024-03-04T09:15:37.740000 @@ -239070,7 +239070,7 @@ CVE-2024-1564,0,0,84875cf797fa64328b336ae33772e46886c72657e3c983b9d184a2a3d50ffd CVE-2024-1566,0,0,fae18125d42af6480c1fb49e1e6428a52d2bf4f1074f21a5dfe482b2c8d87086,2024-02-28T14:06:45.783000 CVE-2024-1568,0,0,03adf0f94bdba0662cb278cdaa3b54a5cd3ae08b3ef89a1e89169605096fa6c9,2024-02-28T14:06:45.783000 CVE-2024-1570,0,0,fa96633d08cf4f7a9a083fffefdd325991610013e77e1890328cb3b85d75e300,2024-02-29T13:49:29.390000 -CVE-2024-1580,0,1,4a10e63fa95d49470234e2661449f906487822e0aeb3a95c53a88e84627958f0,2024-03-27T18:15:09.063000 +CVE-2024-1580,0,0,4a10e63fa95d49470234e2661449f906487822e0aeb3a95c53a88e84627958f0,2024-03-27T18:15:09.063000 CVE-2024-1582,0,0,5801086f12a7b25e0a24481309300eacfe3989ff6a37128452730610efa279b1,2024-03-13T12:33:51.697000 CVE-2024-1585,0,0,e91f99f5d286c3afef1058be20d258b7aa9acfdf346cd5b86fd70de17ee7844a,2024-03-13T18:15:58.530000 CVE-2024-1586,0,0,0f7dcaaedeb3b15eee35c0b1fbce415960454d76b6eae4dff9a3ecfad1011e31,2024-02-29T13:49:29.390000 @@ -239363,18 +239363,18 @@ CVE-2024-20252,0,0,b3e7ab7affd116881816a7adc1b9a82671c5b4da83512a13f8133ebc1b35c CVE-2024-20253,0,0,d3a8e74c395d6dc3e7ac6947f74fcfd7abc559db9a2a5673b58b5d97e64fbd4a,2024-02-02T16:15:53.893000 CVE-2024-20254,0,0,483b1bcc903a1f3fe5774e73017e3920b0d7ed3bc82e804e2d29798a514160f0,2024-02-15T15:54:33.153000 CVE-2024-20255,0,0,4c8067b6b3b68c94894b4ecd8c182992b7e2d67f936be466104b1472a1d76a79,2024-02-15T15:54:19.960000 -CVE-2024-20259,1,1,320a14ee14d62aa5d17681a1efe29c443b0cdc7bc00d2121817f310cc495e59d,2024-03-27T17:48:21.140000 +CVE-2024-20259,0,0,320a14ee14d62aa5d17681a1efe29c443b0cdc7bc00d2121817f310cc495e59d,2024-03-27T17:48:21.140000 CVE-2024-20262,0,0,a40254b410d0784e77864e44354a4b6d276cfd1ed801d8c8cea773abddaa6fdb,2024-03-13T18:15:58.530000 CVE-2024-20263,0,0,eee9d5be1e797577581d307b6debeb0e216dfa8c65e90aa4284e364da06d4b08,2024-02-06T19:23:20.600000 -CVE-2024-20265,1,1,3489362a547286567b228fe9ed8fabd87d542e719de273953f70320b8c723a6a,2024-03-27T17:48:21.140000 +CVE-2024-20265,0,0,3489362a547286567b228fe9ed8fabd87d542e719de273953f70320b8c723a6a,2024-03-27T17:48:21.140000 CVE-2024-20266,0,0,7107175b332490e839d5721f467b6ded5bb175039dfd7bbdacb90e93b939405e,2024-03-13T18:15:58.530000 CVE-2024-20267,0,0,2716a642cdad532c3a4bd75fb20d5fecd6f79884b8ec8ad4d3b70c55b604b9c9,2024-03-04T22:45:43.893000 CVE-2024-20270,0,0,e782cd7ba9de695c0ad1c66716422322472732a1f5415c3e41652abc7d8c0edc,2024-02-02T16:15:54.227000 -CVE-2024-20271,1,1,dfae8db584f1048f6a3c2c1977b24965cd6ce960b56141c77d166e3081815ee1,2024-03-27T17:48:21.140000 +CVE-2024-20271,0,0,dfae8db584f1048f6a3c2c1977b24965cd6ce960b56141c77d166e3081815ee1,2024-03-27T17:48:21.140000 CVE-2024-20272,0,0,185f140724efe06396f39e49d9628053efc8d5b0f336793319946b145d008ecc,2024-02-02T16:15:54.683000 -CVE-2024-20276,1,1,296a5bdd5467948ab48ce59d6adf71ce96a1b7c0465de9d78357fece032b5e4b,2024-03-27T17:48:21.140000 +CVE-2024-20276,0,0,296a5bdd5467948ab48ce59d6adf71ce96a1b7c0465de9d78357fece032b5e4b,2024-03-27T17:48:21.140000 CVE-2024-20277,0,0,c44de8c225b0707871143fcb06737e334d929dd5a0acde877fcecec9290acbf6,2024-02-02T16:15:54.787000 -CVE-2024-20278,1,1,3422bd62c0dbfc03ee503f488f9025cb4328d1a2c7b9cbaa4588ba28546b6550,2024-03-27T17:48:21.140000 +CVE-2024-20278,0,0,3422bd62c0dbfc03ee503f488f9025cb4328d1a2c7b9cbaa4588ba28546b6550,2024-03-27T17:48:21.140000 CVE-2024-2028,0,0,5879943042d614ba399bf0758e5dda45ae5ecb9ad367a59e13a5814f1ed688df,2024-03-13T18:15:58.530000 CVE-2024-20287,0,0,73801d80b462793a88b2af436ab77ac49555a7cb9634b8a2ccc26dc598e491a1,2024-02-02T16:15:54.887000 CVE-2024-20290,0,0,057d5dfa7ca9ea45e2cb423f9faaf6e87f8f428206a3f34ecdd5587406e21147,2024-02-15T15:43:27.240000 @@ -239383,28 +239383,28 @@ CVE-2024-20292,0,0,bd2670c9582b587cdf9a7328c2351789f5b8997cab8f7bfcaca92954507c5 CVE-2024-20294,0,0,1d3a9a3e9164827aaec419fc6a9a7d933913e3a790dc40da7ac082a33393bbf9,2024-02-29T13:49:29.390000 CVE-2024-2030,0,0,1279e34f262b0c0064508219ec7b722bb72cd0ff45a7c2dd1c4bd367a96f5a52,2024-03-13T18:15:58.530000 CVE-2024-20301,0,0,5731f674f5ae2bcf96420fc328e70e5146901802d1ab3db25461c019cd20961d,2024-03-07T13:52:27.110000 -CVE-2024-20303,1,1,e5ac9d50052f4c4c8ef804ccaefc800a16509a09aa16e231d189818adcc2e3c2,2024-03-27T17:48:21.140000 +CVE-2024-20303,0,0,e5ac9d50052f4c4c8ef804ccaefc800a16509a09aa16e231d189818adcc2e3c2,2024-03-27T17:48:21.140000 CVE-2024-20305,0,0,ab61a4ab7882e267880cc2c0e6b3ec1ab9c8b4d0dadf3a4832bdf14ae2ae012d,2024-02-15T19:56:38.910000 -CVE-2024-20306,1,1,7ce4ce882880d6a48a5bc5e41b86d2467b57bc87bd8f78243b3657e3eec48482,2024-03-27T17:48:21.140000 -CVE-2024-20307,1,1,6e057a049f344ad501317a246d37c6a97da44c74d43554b7afa1d19dde729fe3,2024-03-27T18:15:09.357000 -CVE-2024-20308,1,1,5982f15762a09863ecfc1c3105619d4c65dd988fdcec0e1b0f62fbfed1430f39,2024-03-27T18:15:09.853000 -CVE-2024-20309,1,1,e1a5a828e0a9998a91a0f24ce922d605b9c5494ea6372c8e56a89d1b0cae6848,2024-03-27T17:48:21.140000 +CVE-2024-20306,0,0,7ce4ce882880d6a48a5bc5e41b86d2467b57bc87bd8f78243b3657e3eec48482,2024-03-27T17:48:21.140000 +CVE-2024-20307,0,0,6e057a049f344ad501317a246d37c6a97da44c74d43554b7afa1d19dde729fe3,2024-03-27T18:15:09.357000 +CVE-2024-20308,0,0,5982f15762a09863ecfc1c3105619d4c65dd988fdcec0e1b0f62fbfed1430f39,2024-03-27T18:15:09.853000 +CVE-2024-20309,0,0,e1a5a828e0a9998a91a0f24ce922d605b9c5494ea6372c8e56a89d1b0cae6848,2024-03-27T17:48:21.140000 CVE-2024-2031,0,0,8c1bcd6bbcf916842768e08303dd42fc425614624a1e3216d105b6a1ddb5c8c0,2024-03-13T12:33:51.697000 -CVE-2024-20311,1,1,c693e0e2ebd0ccff4af9c3de016bddd629d8a55f7bab90eb59f830d5f1210bde,2024-03-27T17:48:21.140000 -CVE-2024-20312,1,1,c48be856a777b8fad526c083b489e4d8d6e24a6434163b12913e7e6d6bd387df,2024-03-27T17:48:21.140000 -CVE-2024-20314,1,1,25da68acd340edea4119f8cd36c690ff3a322aebd5bc20462f4be9eaaddee7e2,2024-03-27T17:48:21.140000 +CVE-2024-20311,0,0,c693e0e2ebd0ccff4af9c3de016bddd629d8a55f7bab90eb59f830d5f1210bde,2024-03-27T17:48:21.140000 +CVE-2024-20312,0,0,c48be856a777b8fad526c083b489e4d8d6e24a6434163b12913e7e6d6bd387df,2024-03-27T17:48:21.140000 +CVE-2024-20314,0,0,25da68acd340edea4119f8cd36c690ff3a322aebd5bc20462f4be9eaaddee7e2,2024-03-27T17:48:21.140000 CVE-2024-20315,0,0,831cd6ed54c2f6f2fd4097d9fc2e0953e1c74073f83cfb1960f6ad1247cec241,2024-03-13T18:15:58.530000 -CVE-2024-20316,1,1,0facf79c751f7edbf8bf7eb947aeebd24e08d05d059114eedc01d842bfa7840d,2024-03-27T17:48:21.140000 +CVE-2024-20316,0,0,0facf79c751f7edbf8bf7eb947aeebd24e08d05d059114eedc01d842bfa7840d,2024-03-27T17:48:21.140000 CVE-2024-20318,0,0,31b265ae70125be15efc925115276ad5f47aba03d611ad31fd59e0405ac987ce,2024-03-13T18:15:58.530000 CVE-2024-20319,0,0,fce820c860756da39956bcf24654b4c258181605332ce4ef4670a251a36856dc,2024-03-13T18:15:58.530000 CVE-2024-20320,0,0,f414732037b8e5e2b31a0c4322e496ff34c28ecfb3a724091e51a412efa51350,2024-03-13T18:15:58.530000 CVE-2024-20321,0,0,6de34d7d404f536decd9f5a380e1c4f28760edee84d237a9b02d7c6e56d785b7,2024-03-04T22:45:23.647000 CVE-2024-20322,0,0,2b06b6a28ea98e3be45957586078049ced390e2bbb1013999023329f607687e9,2024-03-13T18:15:58.530000 -CVE-2024-20324,1,1,4ceb90fa15b34b60a6093578287d94925925781fa75d2c106af71ed06f3f60fb,2024-03-27T17:48:21.140000 +CVE-2024-20324,0,0,4ceb90fa15b34b60a6093578287d94925925781fa75d2c106af71ed06f3f60fb,2024-03-27T17:48:21.140000 CVE-2024-20325,0,0,dfe1f947bf6fc9efa452f1881c4faae47bd9e909bfa416f69baa534db16c5289,2024-02-22T19:07:27.197000 CVE-2024-20327,0,0,99fc6b346e02158b3f4b7079ce29acef1779b3bc5057517cd2f663d4239946c0,2024-03-13T18:15:58.530000 CVE-2024-20328,0,0,f336e809226305b79cd50f26fae203aa1632211d86957dd92abacb2f83d51af6,2024-03-01T22:22:25.913000 -CVE-2024-20333,1,1,0fc0d9f2bb75be1d1f2fb11cd6f9cf26712193c623a9dcfd720083347398fc6f,2024-03-27T17:48:21.140000 +CVE-2024-20333,0,0,0fc0d9f2bb75be1d1f2fb11cd6f9cf26712193c623a9dcfd720083347398fc6f,2024-03-27T17:48:21.140000 CVE-2024-20335,0,0,e7a578f13e250b46805a1e9177b3b5be279d06874d056b5f6fc5ebbcf99e61d7,2024-03-07T13:52:27.110000 CVE-2024-20336,0,0,79e0816d77620de3a577cfb98875db786f37b5ccab0f43d45d78748499d8cbc3,2024-03-07T13:52:27.110000 CVE-2024-20337,0,0,3b1a37d60fcaa85f947811f983b479d3e4900eee9d9299595cf069082e613c78,2024-03-07T13:52:27.110000 @@ -239412,7 +239412,7 @@ CVE-2024-20338,0,0,5566f1b7285f199c07a2500bed0125d8d757cef5cccae1c32214ac0d6cd53 CVE-2024-20344,0,0,5701c086cd49552fb9b4e42b34522b298fb97269a26ec090e5fb132f538cd956,2024-02-29T13:49:29.390000 CVE-2024-20345,0,0,3d1a51edca02a2407f1ed6f3ffcbd5d09253c77ae2ce2b00247da9ce4f441eef,2024-03-07T13:52:27.110000 CVE-2024-20346,0,0,f967daadb6c5a5a55ae179293422d73f8c43ceb443c382f34755b3930e28b331,2024-03-06T21:42:54.697000 -CVE-2024-20354,1,1,d77b2c2498bd40063174d789072339810259d4fa0e4bc5c8d41a694f11a95e02,2024-03-27T17:48:21.140000 +CVE-2024-20354,0,0,d77b2c2498bd40063174d789072339810259d4fa0e4bc5c8d41a694f11a95e02,2024-03-27T17:48:21.140000 CVE-2024-2042,0,0,f6d54c5204cd94c19a84e1963b44103dc197c946869366cb59a65e7a4114231d,2024-03-17T22:38:29.433000 CVE-2024-2044,0,0,3d73c6b2cc04bd01f48c15467e360d6d6689d47e2b89d6d93430f2c98bfeca1a,2024-03-23T03:15:12.063000 CVE-2024-2045,0,0,72838b74e2668b744754639ee1018477ba3696de5929605fbc709ccd12df2c15,2024-03-01T14:04:26.010000 @@ -240654,8 +240654,8 @@ CVE-2024-23441,0,0,821a9fc4779da9403532f4be71c4c0616cc5f4f7bdd56ecb83e25ef4a979d CVE-2024-23446,0,0,250d55c97e03f858281f4b571f5417bd7430f2eb75d812ec1a5460363cd232aa,2024-02-14T20:10:24.323000 CVE-2024-23447,0,0,d914699914a1032e2f26c2be4fcf7737ff60c4d99dbe7a58145b0312508d8818,2024-02-14T20:02:00.753000 CVE-2024-23448,0,0,9b1c1e9aca41646e9bc0b5aea887714df628a3eafb241e1a8858ac207b41bd27,2024-02-15T15:39:14.317000 -CVE-2024-23450,1,1,6ff242ba8621158a6fc5bf1e14cebaff80a919a65abf5fe5c94bac3fd2cfef43,2024-03-27T17:48:21.140000 -CVE-2024-23451,1,1,396a36e96f019a84ce41421d631ed0347d8e4d3267d4975e6f03c5a130a41249,2024-03-27T18:15:10.330000 +CVE-2024-23450,0,0,6ff242ba8621158a6fc5bf1e14cebaff80a919a65abf5fe5c94bac3fd2cfef43,2024-03-27T17:48:21.140000 +CVE-2024-23451,0,0,396a36e96f019a84ce41421d631ed0347d8e4d3267d4975e6f03c5a130a41249,2024-03-27T18:15:10.330000 CVE-2024-23452,0,0,aaa529ca6e03eefd16006bb57cfd95647fc8b44bb3a3176fd8a83e06021cb7e9,2024-02-29T01:44:08.877000 CVE-2024-23453,0,0,ab3a22284e10fea1933712f86026a2e7792304e1f83321557a4d02140679b266,2024-01-29T22:58:07.777000 CVE-2024-23476,0,0,e3d84cdb88c20fc5ad4183c7e154fd4eb94d6574a64f56328103056889f0fc9e,2024-02-20T20:39:10.033000 @@ -242458,6 +242458,7 @@ CVE-2024-2807,0,0,47b8a7021ebbb15acc350203dd3081726f7b96c650b8d998414fd135c1027f CVE-2024-28070,0,0,d9b3309fdc4db05937449ae85d6df93a299898f40c2c79f5bb7988f4ebb25838,2024-03-17T22:38:29.433000 CVE-2024-2808,0,0,a0621aec3e17f906967cd04e2f75551ea2d13f29c3ece6e8f56dccb94d17afe1,2024-03-26T03:13:36.183000 CVE-2024-28084,0,0,e855eaf3201adbee7f29bca688e63324787cf32844050753a9cd1965f8c4b542,2024-03-23T03:15:11.583000 +CVE-2024-28085,1,1,98bf8795c0110d4df8052feb8dcd9584d06668c2d76d6af8803048daa3592c71,2024-03-27T19:15:48.367000 CVE-2024-28088,0,0,d2f20b1069b24ba10d21e8bf3b61c2c6a1c6b345ff59786676752b80abbde7a4,2024-03-13T21:16:00.380000 CVE-2024-28089,0,0,830991c1dd5898b6a817a3f8bb8784922af3636f20b8b62ba1c918d5d83f6f10,2024-03-11T01:32:29.610000 CVE-2024-2809,0,0,16a24c41619de5ba8d47e944f4573d2f7981695d1c5bec0e5f48dbb2fc9c9b69,2024-03-26T03:13:47.830000 @@ -242550,6 +242551,7 @@ CVE-2024-28229,0,0,7bfc3b59e790a5126732ec4d8d480f9938166a41475488b32e066c1e064cc CVE-2024-2823,0,0,1867dc09c5e833da359a0c14ac91c9482d72bb78f2ce80c84c0309fdaa923bfc,2024-03-22T19:02:10.300000 CVE-2024-28230,0,0,3036aa70102b53b9cc695265dc4a11e5a4f5b8d26f6120835dbd1a9c3d93e7ec,2024-03-07T13:52:27.110000 CVE-2024-28231,0,0,f41f4c1605399e97b52547261c763ca0d059815d5c55e921912a149cd091acde,2024-03-21T12:58:51.093000 +CVE-2024-28233,1,1,6e7adbfcda365f18ba124f94907710cd713a299e802391a71f30620ea74e66ca,2024-03-27T19:15:48.430000 CVE-2024-28236,0,0,ea7d34bffb060eb0191757ceb4c446ee8bfa4166cb7d1e0d8e67e75c651ba966,2024-03-13T12:33:51.697000 CVE-2024-28237,0,0,e54564ebce9f53fbf47a1a617d4c2539d1d06a16522000543afac14f934cf25f,2024-03-19T13:26:46 CVE-2024-28238,0,0,38219e010007b7fe5426826144cd2eabd2e22d36d31c50aa8471901674b524b3,2024-03-13T12:33:51.697000 @@ -242560,6 +242562,7 @@ CVE-2024-28243,0,0,b62121443f467a21df9a72e6de805a7094f659c79fc9b69ca113c6cd74783 CVE-2024-28244,0,0,8a0b0822374c9608b1ee3be4ddc31140538b510b0fd28061fd05bdbdf794fae2,2024-03-26T12:55:05.010000 CVE-2024-28245,0,0,ad5a09bb643469edf06f460630cbf65a15180867ced005dc01d0df0098be8f11,2024-03-26T12:55:05.010000 CVE-2024-28246,0,0,cd369a06f7ae7fd9ab35271cb07a672352ca99976424cd04633d8a0d97406151,2024-03-26T12:55:05.010000 +CVE-2024-28247,1,1,4c1010e8b1387a3575ae9cc58499c5ad2d20c679556fbdf0aedbea77747fa924,2024-03-27T19:15:48.637000 CVE-2024-28248,0,0,b617812c524b85d27f2a46b3a739648463fa9ffb5a6e46ea47ba0c68bd3fa409,2024-03-19T13:26:46 CVE-2024-28249,0,0,7f01b3731d6ed3594265964b9061da88eb89dfe99b6d59bfec8413859c3ac454,2024-03-19T13:26:46 CVE-2024-2825,0,0,731d564e18c15016bfac25b783d866bfc2b3073e42c4b54f0ca736209097bfbb,2024-03-25T01:51:01.223000 @@ -242718,6 +242721,7 @@ CVE-2024-28854,0,0,8cb03aded6b194ffbf5e93b6a999bfbf01ac8f736343c4fc752b0e38a8bc9 CVE-2024-28855,0,0,2384a3330fde47f752f152bfa13a6226cb6b236bb18ff2466f5e886c7d3e893c,2024-03-19T13:26:46 CVE-2024-28859,0,0,2d0407c7b83f2786a493b842ae3fe3ce3f906494adee8b0e0f61c75557fcb17c,2024-03-17T22:38:29.433000 CVE-2024-2886,0,0,6e2c93ce5d4e26c4d3323ffd43f5daeef03c7e577cbecbc4edf8fb5cb68f2687,2024-03-27T12:29:30.307000 +CVE-2024-28860,1,1,8530891db4a7f991deeb8743eda677f9aafce06f98a8d822a07506287d8e28eb,2024-03-27T19:15:48.827000 CVE-2024-28861,0,0,614b056391803730ffc563205182a9ac310eb6811e0e407400ba2dc4b494f050,2024-03-22T19:02:10.300000 CVE-2024-28862,0,0,b0dc40150b0e5f15633ecb26c2614b37fe6eefbb423911349887989b36d78640,2024-03-17T22:38:29.433000 CVE-2024-28863,0,0,ad7818a88579939a8a2c9b467548624411262308646c7865759640aa6d437826,2024-03-22T12:45:36.130000 @@ -242944,21 +242948,21 @@ CVE-2024-29816,0,0,26098ad42810abc782a6312323b3749848e728c068871f3a8e562ffd3827f CVE-2024-29817,0,0,b9d7d90bcba101b5bf99517f691b068a1efc5e5e388d754e386eca951d336d45,2024-03-27T12:29:30.307000 CVE-2024-29818,0,0,44af120b55fc277e2559e8317cff590953d75564f18e5cdb1a3adef98c7f6fa2,2024-03-27T12:29:30.307000 CVE-2024-29819,0,0,489085f50dbde78feed33cc0a68fd671c989aac2e872d0b30a126d7fff3447e6,2024-03-27T12:29:30.307000 -CVE-2024-2982,0,1,dda049ea5d2486c6f2bdb234a1dfc5a467a2381ac2f931408cf9328cd77cd76d,2024-03-27T17:48:21.140000 +CVE-2024-2982,0,0,dda049ea5d2486c6f2bdb234a1dfc5a467a2381ac2f931408cf9328cd77cd76d,2024-03-27T17:48:21.140000 CVE-2024-29820,0,0,da81473ce6ac9b7a0c8169d0e94b81abe513c85a432f3965c234ec8d7d8b927f,2024-03-27T12:29:30.307000 -CVE-2024-2983,0,1,873ca2d79b54162cace8ca3da7294f22ebfacbb79289c971b5f392cd577e4689,2024-03-27T17:48:21.140000 +CVE-2024-2983,0,0,873ca2d79b54162cace8ca3da7294f22ebfacbb79289c971b5f392cd577e4689,2024-03-27T17:48:21.140000 CVE-2024-29832,0,0,e21971089d12a8b67bd5dc57f7dea93be0cc79e81378beb3ae2f03d4ff6e4c14,2024-03-26T17:09:53.043000 CVE-2024-29833,0,0,4c9a8c532b47162f5aea1ac06e294c5bbf9e597d7d17a1d16e86b5dc1293a53a,2024-03-26T17:09:53.043000 -CVE-2024-2984,0,1,2d375aee96f2c9f8a84e53391976f555aaa90b5661a5979b39e2ea2d3b374caf,2024-03-27T17:48:21.140000 -CVE-2024-2985,1,1,d2c440a5fe0f8e92f2900a5671fbef483e2af166b02191dac0aceb0548aa2911,2024-03-27T17:48:21.140000 +CVE-2024-2984,0,0,2d375aee96f2c9f8a84e53391976f555aaa90b5661a5979b39e2ea2d3b374caf,2024-03-27T17:48:21.140000 +CVE-2024-2985,0,0,d2c440a5fe0f8e92f2900a5671fbef483e2af166b02191dac0aceb0548aa2911,2024-03-27T17:48:21.140000 CVE-2024-29858,0,0,585719d860c91771e96e52d882eed744121f21e899f727afe6b381f4ffbb308d,2024-03-21T12:58:51.093000 CVE-2024-29859,0,0,6ebff5730a73f542ffebf0a56f74146bb69314ac3f95118519ec4b678666f245,2024-03-21T12:58:51.093000 -CVE-2024-2986,1,1,c77fe7aa4ac5882d2496045c16279acb6d3f21728c12d35e86b894b6435b955d,2024-03-27T17:48:21.140000 +CVE-2024-2986,0,0,c77fe7aa4ac5882d2496045c16279acb6d3f21728c12d35e86b894b6435b955d,2024-03-27T17:48:21.140000 CVE-2024-29862,0,0,78f62d6320f790cb50cb5767943bbca91d7f9763b83315a1495201af3fd41026,2024-03-21T12:58:51.093000 CVE-2024-29864,0,0,3c9560ffae0fa16acac4cf8327bf4ae3182996a8c684b25430908ed832b73c71,2024-03-21T12:58:51.093000 CVE-2024-29865,0,0,e24c5786380c2695525e4e2d9b0d8cb3d2e21b4351c584a8032e8ded5e6f9da9,2024-03-22T15:34:43.663000 CVE-2024-29866,0,0,d3474a4cb7339082dcfbd889d056a2a906f051d7c933d6576013f44ee70632b2,2024-03-21T15:24:35.093000 -CVE-2024-2987,1,1,b4986bea0aba6f48be24f8f454c5e35bb2f698d582004b815160c33ab9e532b1,2024-03-27T17:48:21.140000 +CVE-2024-2987,0,0,b4986bea0aba6f48be24f8f454c5e35bb2f698d582004b815160c33ab9e532b1,2024-03-27T17:48:21.140000 CVE-2024-29870,0,0,04eec461d26d3928388aa1ebeda7f3889d70d7fb805b862b11fc37cdb9c73805,2024-03-21T15:24:35.093000 CVE-2024-29871,0,0,e7b820291fe87f3c68126b9e66a3cb2071635a1781039b23d1340b3ec50d7104,2024-03-21T15:24:35.093000 CVE-2024-29872,0,0,2ed0e31c2aeb7a79b11a328bd37ec6ac592cb7ae8ad49b21b1fd6587d921da01,2024-03-21T15:24:35.093000 @@ -242969,15 +242973,22 @@ CVE-2024-29876,0,0,81e9b92db68fe1869c86668a1e00f2a9ff624f59839df1fbe18d8e987774c CVE-2024-29877,0,0,5b6a7271e346dceec62c9141f9ae12b0e5342a31cc26366c653fe20c26c8bc21,2024-03-21T15:24:35.093000 CVE-2024-29878,0,0,59bd69937e12e8238cdc5eae96014d85a453bedc37861446ca2ffcb7373dda8d,2024-03-21T15:24:35.093000 CVE-2024-29879,0,0,f281e5565c18f62981e30c243c39ad05583d9bbab1631a620c93b3c78846e1db,2024-03-21T15:24:35.093000 -CVE-2024-2988,1,1,44a505017c98ed38c8d5dc5d8e011605d3c9f7895e5eca811eae32b18fc8f7bb,2024-03-27T18:15:10.757000 +CVE-2024-2988,0,0,44a505017c98ed38c8d5dc5d8e011605d3c9f7895e5eca811eae32b18fc8f7bb,2024-03-27T18:15:10.757000 CVE-2024-29880,0,0,e4ba47a3336aba44b26bc2b767c682c9997cfe6f0e16a9457e7fe50a3abeaa1c,2024-03-21T15:24:35.093000 CVE-2024-29881,0,0,7eaff78a6eecd508372203508f2ecab97ebc62cfd94b7af6101b5d7b6ca209b2,2024-03-26T17:09:53.043000 CVE-2024-29883,0,0,2444d321a867d6f4cdf63bf8a1bc6af3b407752f2134c1f64a1d02545242c426,2024-03-26T17:09:53.043000 -CVE-2024-2989,1,1,28b7dcd865137d9f2b8b08b53206e10e337ffacc5ed400750f6a854bac66dab1,2024-03-27T18:15:11.293000 +CVE-2024-29886,1,1,1adbb5073cba9b65593ecf8998a22e2a5d29436a3607268c528bf401c023cbf4,2024-03-27T19:15:49.023000 +CVE-2024-29887,1,1,d4e3377385744fa243f8c752377b78d10fb04f6b3cf56c3bd0fe2bd96f11984d,2024-03-27T19:15:49.230000 +CVE-2024-29888,1,1,816e1902566b12dbf24377b613baef5b79a414fcea833a258cf044d46f30bd51,2024-03-27T19:15:49.410000 +CVE-2024-2989,0,0,28b7dcd865137d9f2b8b08b53206e10e337ffacc5ed400750f6a854bac66dab1,2024-03-27T18:15:11.293000 +CVE-2024-29891,1,1,7f9df39928cbbf99e5030accf6dd8020531a4366a49ed903a14fbbd277432a72,2024-03-27T20:15:07.780000 +CVE-2024-29892,1,1,11a2de43764af3b9fd0910af9f11c950352c98e69bb104177454ad296186dea9,2024-03-27T20:15:08.303000 +CVE-2024-2990,1,1,29d47249dc9edae8b71b72a27ada065a3a8487192facbacb3019e2adced6a348,2024-03-27T19:15:49.710000 CVE-2024-29906,0,0,5e6afa8dbe77b2ceaee29629c66d8bdf273caddf4f38f955d682aeefe9beab4c,2024-03-27T12:29:30.307000 CVE-2024-29907,0,0,95ebf1e66704307f93559559f18923b10f644f7f3c6486fedede31060b34f004,2024-03-27T12:29:30.307000 CVE-2024-29908,0,0,e8d16098eaf081188862f8dc959904187f56568ff6eac559fa0228e1e293cd7d,2024-03-27T12:29:30.307000 CVE-2024-29909,0,0,e35d692490bf4e850bd9c44310b2bcdc71d1e19ea89b9513c3662fc2e536f1c8,2024-03-27T12:29:30.307000 +CVE-2024-2991,1,1,014fa0679cec95d7a2a8ad346f5e226ee43d3aeec7d3d19682b1d957d0dafc70,2024-03-27T19:15:49.940000 CVE-2024-29910,0,0,95e0ced080c2415c20a79532702b8302d4b33d6cd325a6b1a825844244f8d827,2024-03-27T12:29:30.307000 CVE-2024-29911,0,0,4092008a0663d92018dc076934d26b4252495c9f0c609c40c7a0a9cb7408115c,2024-03-27T12:29:30.307000 CVE-2024-29912,0,0,d4e137e215b0b00b25a8930ce0d0657c6dd7b00bfc0db6a92606d9a19e62f5d7,2024-03-27T12:29:30.307000 @@ -242988,6 +242999,7 @@ CVE-2024-29916,0,0,dd300e18b662f862d3dd0881eace85d81be3f3aaeb79c908bcef100a80a89 CVE-2024-29917,0,0,95c3e445522199a26b83d938184afd90a1d9b3b2a8bc319b5dd0b9abf802413e,2024-03-27T12:29:30.307000 CVE-2024-29918,0,0,c4d24a04c4f4c9971aa2b61b2b16b6699727fc3170e99022d4d427890c1308f4,2024-03-27T12:29:30.307000 CVE-2024-29919,0,0,817229c260cd52d55a65e42df611e748e6f73b9a57660f2c28863f6cf3622c00,2024-03-27T12:29:30.307000 +CVE-2024-2992,1,1,2d65220d2b906672bb98850be6a500c5b6a513172eb7363240df1e5290ef793c,2024-03-27T19:15:50.173000 CVE-2024-29920,0,0,ef33728d425fa66d6d618e2c1f88f50e442af75e655f18f6b3eeb620b9fc8dc0,2024-03-27T12:29:30.307000 CVE-2024-29921,0,0,d005f56290a07c8d41af4f88ae2cfe5cc38df315cb7fe36491d361da55105483,2024-03-27T12:29:30.307000 CVE-2024-29922,0,0,43b2a415461fb932606c7e442074762fc1c7f75ddb5f3011fe888c9d97612372,2024-03-27T12:29:30.307000 @@ -242998,6 +243010,7 @@ CVE-2024-29926,0,0,a774ce80509ca41dda348dca084b78d2d28da05a59a7cf4caade3a676403d CVE-2024-29927,0,0,be07820d91f38299d9fb6d4df08336e2d6d59401fb34adcc97e6c8bfc54c88ce,2024-03-27T12:29:30.307000 CVE-2024-29928,0,0,af15186b7473fc265776521d890548138671a1bf67efd8d69ad310a551d30c19,2024-03-27T12:29:30.307000 CVE-2024-29929,0,0,27716aabdc6516c3ef94065c2b993ed5b5982de82d07dca6a414e351d3ba3758,2024-03-27T12:29:30.307000 +CVE-2024-2993,1,1,4a6a8a4998f75a6ef469a63cfb2c694f28f2ad841535ff48deca75494d13eed3,2024-03-27T20:15:08.780000 CVE-2024-29930,0,0,6fcc220221700641e9da16e849b0714ef9f33840931a344748681165e2c7f58e,2024-03-27T12:29:30.307000 CVE-2024-29931,0,0,5fa913a409729523af37223992622bba3903bd19b9d545f7af9b777e9cbf348b,2024-03-27T12:29:30.307000 CVE-2024-29932,0,0,5d75cdd8ba02e2819991be48064230f949a31f4f4858cf3f43a7fca421016a8e,2024-03-27T12:29:30.307000 @@ -243005,10 +243018,13 @@ CVE-2024-29933,0,0,dedf4a0436c982230abe9b7179ec1be71724b7f64030e788ba0f8ea6283ee CVE-2024-29934,0,0,ca29550acd62f197f05fb73019cfe7d9a35aa76590a642b08535ea1b8d4c335b,2024-03-27T12:29:30.307000 CVE-2024-29935,0,0,be0415ab39e2424d7707b3e026043937bddf40f9f881b75f312fe4db29a7520f,2024-03-27T12:29:30.307000 CVE-2024-29936,0,0,a0aa951ea6a61ca1da8503010b43db132d71646708e0e57d95e11fe2a44ec10b,2024-03-27T12:29:30.307000 +CVE-2024-2994,1,1,9187e6071eddb36de6c79beb98a55c89d0ec8e6a41098ca1d49256ced96f9544,2024-03-27T20:15:09.337000 CVE-2024-29943,0,0,39d573a490fc5d2b219e8af270d3feeff9aa72e4341ddd52f10b0ddfa677f78e,2024-03-22T15:34:43.663000 CVE-2024-29944,0,0,4d21f9c7c1ab1ff30cce77b261f7b06b8e28526248b968d986726dab452f24fc,2024-03-25T17:15:51.670000 -CVE-2024-29945,1,1,97b7c829f41e6375bb757d6df21152ea8c651e9cee7b85bf8ce197c3feb776e6,2024-03-27T17:48:21.140000 -CVE-2024-29946,1,1,1dcd38a0ed008144b587f71b29e9f0373aec4787ad19668521370ecc593e8a2d,2024-03-27T17:48:21.140000 +CVE-2024-29945,0,1,d468839ff8eda4d8c6f46306d679b186fb3a35cb164da7996268d3c3b56c2c95,2024-03-27T19:15:49.607000 +CVE-2024-29946,0,0,1dcd38a0ed008144b587f71b29e9f0373aec4787ad19668521370ecc593e8a2d,2024-03-27T17:48:21.140000 +CVE-2024-2995,1,1,4626bf177e733f40a1ea9f83594ae62ce4072729d8dd6b6a61f3df0501cb44a7,2024-03-27T20:15:09.903000 +CVE-2024-2996,1,1,e21e31a1014d7574fca474fe1e8c11dded480086d1946ee193f1b733f7350546,2024-03-27T20:15:10.507000 CVE-2024-30156,0,0,aff0cd27a6d4ebd55e03f44f61cc23ee9163e094843acbac5af736e684ab9391,2024-03-25T01:51:01.223000 CVE-2024-30161,0,0,f6d00094643508d05d1e5626fca4ef83c82ab69ba4696adb329c49eff6d0ab4a,2024-03-25T01:51:01.223000 CVE-2024-30177,0,0,ce7cec2fca67508ea4a8b86ac0339410ad9c9cb05c2afad1960db626913e7789,2024-03-27T12:29:30.307000