From df66da7977f461c2cd81d5e4aa82589226914a6a Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 14 Mar 2024 13:03:29 +0000 Subject: [PATCH] Auto-Update: 2024-03-14T13:00:40.736016+00:00 --- CVE-2020/CVE-2020-118xx/CVE-2020-11862.json | 8 +- CVE-2023/CVE-2023-362xx/CVE-2023-36238.json | 8 +- CVE-2023/CVE-2023-385xx/CVE-2023-38534.json | 8 +- CVE-2023/CVE-2023-385xx/CVE-2023-38535.json | 8 +- CVE-2023/CVE-2023-385xx/CVE-2023-38536.json | 8 +- CVE-2023/CVE-2023-415xx/CVE-2023-41504.json | 8 +- CVE-2023/CVE-2023-415xx/CVE-2023-41505.json | 8 +- CVE-2023/CVE-2023-507xx/CVE-2023-50726.json | 8 +- CVE-2024/CVE-2024-03xx/CVE-2024-0311.json | 4 +- CVE-2024/CVE-2024-03xx/CVE-2024-0312.json | 4 +- CVE-2024/CVE-2024-03xx/CVE-2024-0313.json | 4 +- CVE-2024/CVE-2024-07xx/CVE-2024-0799.json | 8 +- CVE-2024/CVE-2024-08xx/CVE-2024-0800.json | 8 +- CVE-2024/CVE-2024-08xx/CVE-2024-0801.json | 8 +- CVE-2024/CVE-2024-12xx/CVE-2024-1221.json | 4 +- CVE-2024/CVE-2024-12xx/CVE-2024-1222.json | 4 +- CVE-2024/CVE-2024-12xx/CVE-2024-1223.json | 4 +- CVE-2024/CVE-2024-16xx/CVE-2024-1654.json | 4 +- CVE-2024/CVE-2024-18xx/CVE-2024-1882.json | 4 +- CVE-2024/CVE-2024-18xx/CVE-2024-1883.json | 4 +- CVE-2024/CVE-2024-18xx/CVE-2024-1884.json | 4 +- CVE-2024/CVE-2024-20xx/CVE-2024-2079.json | 8 +- CVE-2024/CVE-2024-221xx/CVE-2024-22167.json | 8 +- CVE-2024/CVE-2024-223xx/CVE-2024-22396.json | 4 +- CVE-2024/CVE-2024-223xx/CVE-2024-22397.json | 4 +- CVE-2024/CVE-2024-223xx/CVE-2024-22398.json | 4 +- CVE-2024/CVE-2024-22xx/CVE-2024-2242.json | 8 +- CVE-2024/CVE-2024-241xx/CVE-2024-24105.json | 8 +- CVE-2024/CVE-2024-246xx/CVE-2024-24692.json | 8 +- CVE-2024/CVE-2024-246xx/CVE-2024-24693.json | 8 +- CVE-2024/CVE-2024-252xx/CVE-2024-25228.json | 4 +- CVE-2024/CVE-2024-252xx/CVE-2024-25250.json | 8 +- CVE-2024/CVE-2024-256xx/CVE-2024-25649.json | 4 +- CVE-2024/CVE-2024-256xx/CVE-2024-25650.json | 4 +- CVE-2024/CVE-2024-256xx/CVE-2024-25651.json | 4 +- CVE-2024/CVE-2024-256xx/CVE-2024-25652.json | 4 +- CVE-2024/CVE-2024-256xx/CVE-2024-25653.json | 4 +- CVE-2024/CVE-2024-270xx/CVE-2024-27097.json | 8 +- CVE-2024/CVE-2024-271xx/CVE-2024-27102.json | 8 +- CVE-2024/CVE-2024-277xx/CVE-2024-27703.json | 8 +- CVE-2024/CVE-2024-279xx/CVE-2024-27986.json | 8 +- CVE-2024/CVE-2024-281xx/CVE-2024-28175.json | 8 +- CVE-2024/CVE-2024-281xx/CVE-2024-28192.json | 8 +- CVE-2024/CVE-2024-281xx/CVE-2024-28193.json | 8 +- CVE-2024/CVE-2024-281xx/CVE-2024-28194.json | 8 +- CVE-2024/CVE-2024-282xx/CVE-2024-28251.json | 8 +- CVE-2024/CVE-2024-283xx/CVE-2024-28388.json | 4 +- CVE-2024/CVE-2024-283xx/CVE-2024-28390.json | 4 +- CVE-2024/CVE-2024-283xx/CVE-2024-28391.json | 4 +- CVE-2024/CVE-2024-286xx/CVE-2024-28662.json | 8 +- CVE-2024/CVE-2024-287xx/CVE-2024-28746.json | 4 +- README.md | 41 +++++--- _state.csv | 108 ++++++++++---------- 53 files changed, 297 insertions(+), 168 deletions(-) diff --git a/CVE-2020/CVE-2020-118xx/CVE-2020-11862.json b/CVE-2020/CVE-2020-118xx/CVE-2020-11862.json index c79478f274a..90f157561d5 100644 --- a/CVE-2020/CVE-2020-118xx/CVE-2020-11862.json +++ b/CVE-2020/CVE-2020-118xx/CVE-2020-11862.json @@ -2,12 +2,16 @@ "id": "CVE-2020-11862", "sourceIdentifier": "security@opentext.com", "published": "2024-03-13T22:15:07.517", - "lastModified": "2024-03-13T22:15:07.517", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:16.723", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Allocation of Resources Without Limits or Throttling vulnerability in OpenText NetIQ Privileged Account Manager on Linux, Windows, 64 bit allows Flooding.This issue affects NetIQ Privileged Account Manager: before 3.7.0.2.\n\n" + }, + { + "lang": "es", + "value": "Asignaci\u00f3n de recursos sin l\u00edmites o vulnerabilidad de limitaci\u00f3n en OpenText NetIQ Privileged Account Manager en Linux, Windows, 64 bits permite inundaciones. Este problema afecta a NetIQ Privileged Account Manager: versiones anteriores a 3.7.0.2." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-362xx/CVE-2023-36238.json b/CVE-2023/CVE-2023-362xx/CVE-2023-36238.json index ce2cb8ae035..42d56c1bb9c 100644 --- a/CVE-2023/CVE-2023-362xx/CVE-2023-36238.json +++ b/CVE-2023/CVE-2023-362xx/CVE-2023-36238.json @@ -2,12 +2,16 @@ "id": "CVE-2023-36238", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T21:15:53.813", - "lastModified": "2024-03-13T21:15:53.813", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:21.763", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Insecure Direct Object Reference (IDOR) in Bagisto v.1.5.1 allows an attacker to obtain sensitive information via the invoice ID parameter." + }, + { + "lang": "es", + "value": "La referencia directa a objetos inseguros (IDOR) en Bagisto v.1.5.1 permite a un atacante obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro ID de factura." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38534.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38534.json index ffe29cffdd1..e5b66f63691 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38534.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38534.json @@ -2,12 +2,16 @@ "id": "CVE-2023-38534", "sourceIdentifier": "security@opentext.com", "published": "2024-03-13T22:15:08.197", - "lastModified": "2024-03-13T22:15:08.197", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:16.723", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Improper authentication vulnerability in\u00a0OpenText\u2122\u00a0Exceed Turbo X affecting versions 12.5.0 and 12.5.1. The vulnerability could allow disclosure of restricted information in unauthenticated RPC.\u00a0" + }, + { + "lang": "es", + "value": "Vulnerabilidad de autenticaci\u00f3n incorrecta en OpenText\u2122 Exceed Turbo X que afecta a las versiones 12.5.0 y 12.5.1. La vulnerabilidad podr\u00eda permitir la divulgaci\u00f3n de informaci\u00f3n restringida en RPC no autenticado." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38535.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38535.json index 8dd138f1b96..f8a8027d0db 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38535.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38535.json @@ -2,12 +2,16 @@ "id": "CVE-2023-38535", "sourceIdentifier": "security@opentext.com", "published": "2024-03-13T22:15:08.463", - "lastModified": "2024-03-13T22:15:08.463", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:16.723", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Use of Hard-coded Cryptographic Key vulnerability in\u00a0OpenText\u2122\u00a0Exceed Turbo X affecting versions 12.5.1 and 12.5.2. The vulnerability could compromise the cryptographic keys.\u00a0\u00a0" + }, + { + "lang": "es", + "value": "Uso de vulnerabilidad de clave criptogr\u00e1fica codificada en OpenText\u2122 Exceed Turbo X que afecta a las versiones 12.5.1 y 12.5.2. La vulnerabilidad podr\u00eda comprometer las claves criptogr\u00e1ficas." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38536.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38536.json index 33f2622d51e..4efd389a3e7 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38536.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38536.json @@ -2,12 +2,16 @@ "id": "CVE-2023-38536", "sourceIdentifier": "security@opentext.com", "published": "2024-03-13T22:15:08.710", - "lastModified": "2024-03-13T22:15:08.710", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:16.723", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "HTML injection in\u00a0OpenText\u2122\u00a0Exceed Turbo X affecting version 12.5.1. The vulnerability could result in Cross site scripting.\u00a0\u00a0" + }, + { + "lang": "es", + "value": "Inyecci\u00f3n de HTML en OpenText\u2122 Exceed Turbo X que afecta a la versi\u00f3n 12.5.1. La vulnerabilidad podr\u00eda provocar Cross Site Scripting." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-415xx/CVE-2023-41504.json b/CVE-2023/CVE-2023-415xx/CVE-2023-41504.json index 578382f5ef2..cf22c5746b0 100644 --- a/CVE-2023/CVE-2023-415xx/CVE-2023-41504.json +++ b/CVE-2023/CVE-2023-415xx/CVE-2023-41504.json @@ -2,12 +2,16 @@ "id": "CVE-2023-41504", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T21:15:53.863", - "lastModified": "2024-03-13T21:15:53.863", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:21.763", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "SQL Injection vulnerability in Student Enrollment In PHP 1.0 allows attackers to run arbitrary code via the Student Search function." + }, + { + "lang": "es", + "value": "Vulnerabilidad de inyecci\u00f3n SQL en Student Enrollment en PHP 1.0 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n de b\u00fasqueda de estudiantes." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-415xx/CVE-2023-41505.json b/CVE-2023/CVE-2023-415xx/CVE-2023-41505.json index 022cabafcfd..bd4429a0b19 100644 --- a/CVE-2023/CVE-2023-415xx/CVE-2023-41505.json +++ b/CVE-2023/CVE-2023-415xx/CVE-2023-41505.json @@ -2,12 +2,16 @@ "id": "CVE-2023-41505", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T21:15:53.910", - "lastModified": "2024-03-13T21:15:53.910", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:21.763", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An arbitrary file upload vulnerability in the Add Student's Profile Picture function of Student Enrollment In PHP v1.0 allows attackers to execute arbitrary code via uploading a crafted PHP file." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de carga de archivos arbitrarios en la funci\u00f3n Agregar imagen de perfil del estudiante de Student Enrollment In PHP v1.0 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo PHP manipulado." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-507xx/CVE-2023-50726.json b/CVE-2023/CVE-2023-507xx/CVE-2023-50726.json index c6e46ceb019..5b86e3111f3 100644 --- a/CVE-2023/CVE-2023-507xx/CVE-2023-50726.json +++ b/CVE-2023/CVE-2023-507xx/CVE-2023-50726.json @@ -2,12 +2,16 @@ "id": "CVE-2023-50726", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-13T21:15:54.797", - "lastModified": "2024-03-13T21:15:54.797", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:21.763", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. \"Local sync\" is an Argo CD feature that allows developers to temporarily override an Application's manifests with locally-defined manifests. Use of the feature should generally be limited to highly-trusted users, since it allows the user to bypass any merge protections in git. An improper validation bug allows users who have `create` privileges but not `override` privileges to sync local manifests on app creation. All other restrictions, including AppProject restrictions are still enforced. The only restriction which is not enforced is that the manifests come from some approved git/Helm/OCI source. The bug was introduced in 1.2.0-rc1 when the local manifest sync feature was added. The bug has been patched in Argo CD versions 2.10.3, 2.9.8, and 2.8.12. Users are advised to upgrade. Users unable to upgrade may mitigate the risk of branch protection bypass by removing `applications, create` RBAC access. The only way to eliminate the issue without removing RBAC access is to upgrade to a patched version." + }, + { + "lang": "es", + "value": "Argo CD es una herramienta declarativa de entrega continua de GitOps para Kubernetes. La \"sincronizaci\u00f3n local\" es una caracter\u00edstica de Argo CD que permite a los desarrolladores anular temporalmente los manifiestos de una aplicaci\u00f3n con manifiestos definidos localmente. El uso de la funci\u00f3n generalmente debe limitarse a usuarios de alta confianza, ya que permite al usuario evitar cualquier protecci\u00f3n de combinaci\u00f3n en git. Un error de validaci\u00f3n inadecuado permite a los usuarios que tienen privilegios de \"crear\" pero no privilegios de \"anular\" sincronizar manifiestos locales al crear la aplicaci\u00f3n. Todas las dem\u00e1s restricciones, incluidas las de AppProject, a\u00fan se aplican. La \u00fanica restricci\u00f3n que no se aplica es que los manifiestos provengan de alguna fuente aprobada de git/Helm/OCI. El error se introdujo en 1.2.0-rc1 cuando se agreg\u00f3 la funci\u00f3n de sincronizaci\u00f3n del manifiesto local. El error se ha solucionado en las versiones 2.10.3, 2.9.8 y 2.8.12 de Argo CD. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar pueden mitigar el riesgo de eludir la protecci\u00f3n de sucursal eliminando el acceso RBAC \"aplicaciones, creaci\u00f3n\". La \u00fanica forma de eliminar el problema sin eliminar el acceso a RBAC es actualizar a una versi\u00f3n parcheada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0311.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0311.json index 5aa17c35e97..c9c77c86cf9 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0311.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0311.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0311", "sourceIdentifier": "trellixpsirt@trellix.com", "published": "2024-03-14T09:15:46.580", - "lastModified": "2024-03-14T09:15:46.580", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:09.877", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0312.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0312.json index 4702deb8f0c..517582c1563 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0312.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0312.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0312", "sourceIdentifier": "trellixpsirt@trellix.com", "published": "2024-03-14T09:15:46.943", - "lastModified": "2024-03-14T09:15:46.943", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:09.877", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0313.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0313.json index b37589d0096..3f271b0186d 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0313.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0313.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0313", "sourceIdentifier": "trellixpsirt@trellix.com", "published": "2024-03-14T09:15:47.153", - "lastModified": "2024-03-14T09:15:47.153", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:09.877", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0799.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0799.json index 3b2e6ad4c01..ea921c21aca 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0799.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0799.json @@ -2,12 +2,16 @@ "id": "CVE-2024-0799", "sourceIdentifier": "vulnreport@tenable.com", "published": "2024-03-13T19:15:46.510", - "lastModified": "2024-03-13T19:15:46.510", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:21.763", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An authentication bypass vulnerability exists in Arcserve Unified Data Protection 9.2 and 8.1 in the edge-app-base-webui.jar!com.ca.arcserve.edge.app.base.ui.server.EdgeLoginServiceImpl.doLogin() function within wizardLogin." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n en Arcserve Unified Data Protection 9.2 y 8.1 en la funci\u00f3n edge-app-base-webui.jar!com.ca.arcserve.edge.app.base.ui.server.EdgeLoginServiceImpl.doLogin() dentro de WizardLogin." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0800.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0800.json index a148f8bf39a..5f68fe874b0 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0800.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0800.json @@ -2,12 +2,16 @@ "id": "CVE-2024-0800", "sourceIdentifier": "vulnreport@tenable.com", "published": "2024-03-13T19:15:46.757", - "lastModified": "2024-03-13T19:15:46.757", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:21.763", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A path traversal vulnerability exists in Arcserve Unified Data Protection 9.2 and 8.1 in edge-app-base-webui.jar!com.ca.arcserve.edge.app.base.ui.server.servlet.ImportNodeServlet." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de path traversal en Arcserve Unified Data Protection 9.2 y 8.1 en edge-app-base-webui.jar!com.ca.arcserve.edge.app.base.ui.server.servlet.ImportNodeServlet." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0801.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0801.json index d03694a5496..6aaa6176759 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0801.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0801.json @@ -2,12 +2,16 @@ "id": "CVE-2024-0801", "sourceIdentifier": "vulnreport@tenable.com", "published": "2024-03-13T19:15:46.943", - "lastModified": "2024-03-13T19:15:46.943", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:21.763", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A denial of service vulnerability exists in Arcserve Unified Data Protection 9.2 and 8.1 in ASNative.dll." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de denegaci\u00f3n de servicio en Arcserve Unified Data Protection 9.2 y 8.1 en ASNative.dll." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1221.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1221.json index 91f3cf55c6a..b4a922f1a0e 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1221.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1221.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1221", "sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "published": "2024-03-14T03:15:06.607", - "lastModified": "2024-03-14T03:15:06.607", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:16.723", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1222.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1222.json index 75b312ca5bd..4c73b9a6bd5 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1222.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1222.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1222", "sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "published": "2024-03-14T03:15:07.090", - "lastModified": "2024-03-14T03:15:07.090", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:16.723", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1223.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1223.json index 357a1280fe9..2a43d22a998 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1223.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1223.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1223", "sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "published": "2024-03-14T03:15:07.580", - "lastModified": "2024-03-14T03:15:07.580", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:09.877", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1654.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1654.json index 2c3029cc229..2d8f23b316c 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1654.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1654.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1654", "sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "published": "2024-03-14T03:15:08.033", - "lastModified": "2024-03-14T03:15:08.033", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:09.877", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1882.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1882.json index 3400cb377a0..83d30480a61 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1882.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1882.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1882", "sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "published": "2024-03-14T04:15:08.003", - "lastModified": "2024-03-14T04:15:08.003", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:09.877", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1883.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1883.json index 7ccb61c1941..6967e557879 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1883.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1883.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1883", "sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "published": "2024-03-14T04:15:08.353", - "lastModified": "2024-03-14T04:15:08.353", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:09.877", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1884.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1884.json index 9779aff4ff3..e75ace39761 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1884.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1884.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1884", "sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "published": "2024-03-14T04:15:08.697", - "lastModified": "2024-03-14T04:15:08.697", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:09.877", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2079.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2079.json index 4d95a211f27..6ffd2a2a900 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2079.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2079.json @@ -2,12 +2,16 @@ "id": "CVE-2024-2079", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T22:15:11.910", - "lastModified": "2024-03-13T22:15:11.910", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:16.723", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The WPBakery Page Builder Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'per_line_mobile' shortcode in all versions up to, and including, 3.8.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento WPBakery Page Builder Addons de Livemesh para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto 'per_line_mobile' del complemento en todas las versiones hasta la 3.8.1 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22167.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22167.json index bcaa512dbfb..85223395bd6 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22167.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22167.json @@ -2,12 +2,16 @@ "id": "CVE-2024-22167", "sourceIdentifier": "psirt@wdc.com", "published": "2024-03-13T21:15:55.343", - "lastModified": "2024-03-13T21:15:55.343", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:21.763", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A potential DLL hijacking vulnerability in the SanDisk PrivateAccess application for Windows that could lead to arbitrary code execution in the context of the system user. This vulnerability is only exploitable locally if an attacker has access to a copy of the user's vault or has already gained access into a user's system. This attack is limited to the system in context and cannot be propagated.\u00a0\n" + }, + { + "lang": "es", + "value": "Una posible vulnerabilidad de secuestro de DLL en la aplicaci\u00f3n SanDisk PrivateAccess para Windows que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario del sistema. Esta vulnerabilidad solo se puede explotar localmente si un atacante tiene acceso a una copia de la b\u00f3veda del usuario o ya ha obtenido acceso al sistema de un usuario. Este ataque se limita al sistema en contexto y no se puede propagar." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22396.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22396.json index c4d09de67b2..f102c9b06c9 100644 --- a/CVE-2024/CVE-2024-223xx/CVE-2024-22396.json +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22396.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22396", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2024-03-14T04:15:09.080", - "lastModified": "2024-03-14T04:15:09.080", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:09.877", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22397.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22397.json index 0b306dbb64c..06c65bfc2bd 100644 --- a/CVE-2024/CVE-2024-223xx/CVE-2024-22397.json +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22397.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22397", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2024-03-14T04:15:09.297", - "lastModified": "2024-03-14T04:15:09.297", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:09.877", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22398.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22398.json index 6d6ddd7efff..8fa018ecdd8 100644 --- a/CVE-2024/CVE-2024-223xx/CVE-2024-22398.json +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22398.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22398", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2024-03-14T04:15:09.417", - "lastModified": "2024-03-14T04:15:09.417", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:09.877", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2242.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2242.json index f80c7beb6d0..b7b4bdba39a 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2242.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2242.json @@ -2,12 +2,16 @@ "id": "CVE-2024-2242", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T22:15:12.173", - "lastModified": "2024-03-13T22:15:12.173", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:16.723", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Contact Form 7 plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018active-tab\u2019 parameter in all versions up to, and including, 5.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Contact Form 7 para WordPress es vulnerable a Cross-Site Scripting Reflejado a trav\u00e9s del par\u00e1metro 'active-tab' en todas las versiones hasta la 5.9 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-241xx/CVE-2024-24105.json b/CVE-2024/CVE-2024-241xx/CVE-2024-24105.json index 45e7735a986..889c30cfa87 100644 --- a/CVE-2024/CVE-2024-241xx/CVE-2024-24105.json +++ b/CVE-2024/CVE-2024-241xx/CVE-2024-24105.json @@ -2,12 +2,16 @@ "id": "CVE-2024-24105", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T21:15:58.870", - "lastModified": "2024-03-13T21:15:58.870", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:16.723", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "SQL Injection vulnerability in Code-projects Computer Science Time Table System 1.0 allows attackers to run arbitrary code via adminFormvalidation.php." + }, + { + "lang": "es", + "value": "Vulnerabilidad de inyecci\u00f3n SQL en Code-projects Computer Science Time Table System 1.0 permite a atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de adminFormvalidation.php." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-246xx/CVE-2024-24692.json b/CVE-2024/CVE-2024-246xx/CVE-2024-24692.json index 17055fafe93..2afcfcf1aec 100644 --- a/CVE-2024/CVE-2024-246xx/CVE-2024-24692.json +++ b/CVE-2024/CVE-2024-246xx/CVE-2024-24692.json @@ -2,12 +2,16 @@ "id": "CVE-2024-24692", "sourceIdentifier": "security@zoom.us", "published": "2024-03-13T20:15:07.273", - "lastModified": "2024-03-13T20:15:07.273", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:21.763", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Race condition in the installer for Zoom Rooms Client for Windows before version 5.17.5 may allow an authenticated user to conduct a denial of service via local access." + }, + { + "lang": "es", + "value": "La condici\u00f3n de ejecuci\u00f3n en el instalador de Zoom Rooms Client para Windows anterior a la versi\u00f3n 5.17.5 puede permitir que un usuario autenticado realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-246xx/CVE-2024-24693.json b/CVE-2024/CVE-2024-246xx/CVE-2024-24693.json index 80c43dd9972..259a6afb9d1 100644 --- a/CVE-2024/CVE-2024-246xx/CVE-2024-24693.json +++ b/CVE-2024/CVE-2024-246xx/CVE-2024-24693.json @@ -2,12 +2,16 @@ "id": "CVE-2024-24693", "sourceIdentifier": "security@zoom.us", "published": "2024-03-13T20:15:07.760", - "lastModified": "2024-03-13T20:15:07.760", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:21.763", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Improper access control in the installer for Zoom Rooms Client for Windows before version 5.17.5 may allow an authenticated user to conduct a denial of service via local access.\n\n" + }, + { + "lang": "es", + "value": "Un control de acceso inadecuado en el instalador de Zoom Rooms Client para Windows anterior a la versi\u00f3n 5.17.5 puede permitir que un usuario autenticado realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25228.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25228.json index f56c60171fc..d2ef698815f 100644 --- a/CVE-2024/CVE-2024-252xx/CVE-2024-25228.json +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25228.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25228", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-14T02:15:50.613", - "lastModified": "2024-03-14T02:15:50.613", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:16.723", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25250.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25250.json index 2cdffa68e71..f44f1a7d00d 100644 --- a/CVE-2024/CVE-2024-252xx/CVE-2024-25250.json +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25250.json @@ -2,12 +2,16 @@ "id": "CVE-2024-25250", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T21:15:58.943", - "lastModified": "2024-03-13T21:15:58.943", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:16.723", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "SQL Injection vulnerability in code-projects Agro-School Management System 1.0 allows attackers to run arbitrary code via the Login page." + }, + { + "lang": "es", + "value": "Vulnerabilidad de inyecci\u00f3n SQL en code-projects Agro-School Management System 1.0 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de la p\u00e1gina de inicio de sesi\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25649.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25649.json index 6be206dcb60..54e2bc2191b 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25649.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25649.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25649", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-14T03:15:08.540", - "lastModified": "2024-03-14T03:15:08.540", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:09.877", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25650.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25650.json index 7072ee881a8..2f77c31ff82 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25650.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25650.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25650", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-14T02:15:50.690", - "lastModified": "2024-03-14T02:15:50.690", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:16.723", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25651.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25651.json index 6e5fcb6faa4..94b686d481f 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25651.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25651.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25651", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-14T03:15:08.727", - "lastModified": "2024-03-14T03:15:08.727", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:09.877", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25652.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25652.json index 408546dfebe..9aaa1c0a32c 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25652.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25652.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25652", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-14T03:15:08.877", - "lastModified": "2024-03-14T03:15:08.877", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:09.877", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25653.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25653.json index 432556e0073..82caecefe9c 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25653.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25653.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25653", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-14T03:15:09.017", - "lastModified": "2024-03-14T03:15:09.017", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:09.877", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27097.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27097.json index 94cc0cae5ed..d5fd7b7c305 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27097.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27097.json @@ -2,12 +2,16 @@ "id": "CVE-2024-27097", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-13T21:15:58.993", - "lastModified": "2024-03-13T21:15:58.993", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:16.723", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A user endpoint didn't perform filtering on an incoming parameter, which was added directly to the application log. This could lead to an attacker injecting false log entries or corrupt the log file format. This has been fixed in the CKAN versions 2.9.11 and 2.10.4. Users are advised to upgrade. Users unable to upgrade should override the `/user/reset` endpoint to filter the `id` parameter in order to exclude newlines.\n\n" + }, + { + "lang": "es", + "value": "Un endpoint de usuario no realiz\u00f3 el filtrado de un par\u00e1metro entrante, que se agreg\u00f3 directamente al registro de la aplicaci\u00f3n. Esto podr\u00eda provocar que un atacante inyecte entradas de registro falsas o corrompa el formato del archivo de registro. Esto se ha solucionado en las versiones 2.9.11 y 2.10.4 de CKAN. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar deben anular el endpoint `/user/reset` para filtrar el par\u00e1metro `id` y excluir las nuevas l\u00edneas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27102.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27102.json index ee52482b359..91fe4911e85 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27102.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27102.json @@ -2,12 +2,16 @@ "id": "CVE-2024-27102", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-13T21:15:59.590", - "lastModified": "2024-03-13T21:15:59.590", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:16.723", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Wings is the server control plane for Pterodactyl Panel. This vulnerability impacts anyone running the affected versions of Wings. The vulnerability can potentially be used to access files and directories on the host system. The full scope of impact is exactly unknown, but reading files outside of a server's base directory (sandbox root) is possible. In order to use this exploit, an attacker must have an existing \"server\" allocated and controlled by Wings. Details on the exploitation of this vulnerability are embargoed until March 27th, 2024 at 18:00 UTC. In order to mitigate this vulnerability, a full rewrite of the entire server filesystem was necessary. Because of this, the size of the patch is massive, however effort was made to reduce the amount of breaking changes. Users are advised to update to version 1.11.9. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Wings es el plano de control del servidor de Pterodactyl Panel. Esta vulnerabilidad afecta a cualquiera que ejecute las versiones afectadas de Wings. La vulnerabilidad puede usarse potencialmente para acceder a archivos y directorios en el sistema host. Se desconoce exactamente el alcance total del impacto, pero es posible leer archivos fuera del directorio base de un servidor (ra\u00edz de la zona de pruebas). Para utilizar este exploit, un atacante debe tener un \"servidor\" existente asignado y controlado por Wings. Los detalles sobre la explotaci\u00f3n de esta vulnerabilidad est\u00e1n embargados hasta el 27 de marzo de 2024 a las 18:00 UTC. Para mitigar esta vulnerabilidad, fue necesaria una reescritura completa de todo el sistema de archivos del servidor. Debido a esto, el tama\u00f1o del parche es enorme, sin embargo, se hizo un esfuerzo para reducir la cantidad de cambios importantes. Se recomienda a los usuarios que actualicen a la versi\u00f3n 1.11.9. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27703.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27703.json index 9ffc80bd476..e150d881865 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27703.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27703.json @@ -2,12 +2,16 @@ "id": "CVE-2024-27703", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T22:15:11.843", - "lastModified": "2024-03-13T22:15:11.843", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:16.723", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability in Leantime 3.0.6 allows a remote attacker to execute arbitrary code via the to-do title parameter." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross Site Scripting en Leantime 3.0.6 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de t\u00edtulo de tareas pendientes." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27986.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27986.json index 1b047fda8d2..a8712d2bfbc 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27986.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27986.json @@ -2,12 +2,16 @@ "id": "CVE-2024-27986", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-14T09:15:47.363", - "lastModified": "2024-03-14T09:15:47.363", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:09.877", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Livemesh Elementor Addons by Livemesh allows Stored XSS.This issue affects Elementor Addons by Livemesh: from n/a through 8.3.5.\n\n" + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Livemesh Elementor Addons de Livemesh permite almacenar XSS. Este problema afecta a Elementor Addons de Livemesh: desde n/a hasta 8.3.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28175.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28175.json index 6fc0e758d5f..70c1fd4e873 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28175.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28175.json @@ -2,12 +2,16 @@ "id": "CVE-2024-28175", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-13T21:16:00.570", - "lastModified": "2024-03-13T21:16:00.570", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:16.723", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Due to the improper URL protocols filtering of links specified in the `link.argocd.argoproj.io` annotations in the application summary component, an attacker can achieve cross-site scripting with elevated permissions. All unpatched versions of Argo CD starting with v1.0.0 are vulnerable to a cross-site scripting (XSS) bug allowing a malicious user to inject a javascript: link in the UI. When clicked by a victim user, the script will execute with the victim's permissions (up to and including admin). This vulnerability allows an attacker to perform arbitrary actions on behalf of the victim via the API, such as creating, modifying, and deleting Kubernetes resources. A patch for this vulnerability has been released in Argo CD versions v2.10.3 v2.9.8, and v2.8.12. There are no completely-safe workarounds besides upgrading. The safest alternative, if upgrading is not possible, would be to create a Kubernetes admission controller to reject any resources with an annotation starting with link.argocd.argoproj.io or reject the resource if the value use an improper URL protocol. This validation will need to be applied in all clusters managed by ArgoCD.\n\n" + }, + { + "lang": "es", + "value": "Argo CD es una herramienta declarativa de entrega continua de GitOps para Kubernetes. Debido al filtrado inadecuado de los protocolos URL de los enlaces especificados en las anotaciones `link.argocd.argoproj.io` en el componente de resumen de la aplicaci\u00f3n, un atacante puede lograr Cross Site Scripting con permisos elevados. Todas las versiones sin parches de Argo CD que comienzan con v1.0.0 son vulnerables a un error de Cross Site Scripting (XSS) que permite a un usuario malintencionado inyectar un enlace javascript: en la interfaz de usuario. Cuando un usuario v\u00edctima hace clic en \u00e9l, el script se ejecutar\u00e1 con los permisos de la v\u00edctima (hasta administrador incluido). Esta vulnerabilidad permite a un atacante realizar acciones arbitrarias en nombre de la v\u00edctima a trav\u00e9s de la API, como crear, modificar y eliminar recursos de Kubernetes. Se lanz\u00f3 un parche para esta vulnerabilidad en las versiones de Argo CD v2.10.3 v2.9.8 y v2.8.12. No existen soluciones alternativas completamente seguras adem\u00e1s de actualizar. La alternativa m\u00e1s segura, si no es posible la actualizaci\u00f3n, ser\u00eda crear un controlador de admisi\u00f3n de Kubernetes para rechazar cualquier recurso con una anotaci\u00f3n que comience con link.argocd.argoproj.io o rechazar el recurso si el valor utiliza un protocolo URL inadecuado. Esta validaci\u00f3n deber\u00e1 aplicarse en todos los cl\u00fasteres gestionados por ArgoCD." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28192.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28192.json index a9a2dfdd9c3..56b76de10f3 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28192.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28192.json @@ -2,12 +2,16 @@ "id": "CVE-2024-28192", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-13T21:16:00.823", - "lastModified": "2024-03-13T21:16:00.823", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:16.723", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "your_spotify is an open source, self hosted Spotify tracking dashboard. YourSpotify version <1.8.0 is vulnerable to NoSQL injection in the public access token processing logic. Attackers can fully bypass the public token authentication mechanism, regardless if a public token has been generated before or not, without any user interaction or prerequisite knowledge. This vulnerability allows an attacker to fully bypass the public token authentication mechanism, regardless if a public token has been generated before or not, without any user interaction or prerequisite knowledge. This issue has been addressed in version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "your_spotify es un panel de seguimiento de Spotify autohospedado y de c\u00f3digo abierto. La versi\u00f3n de YourSpotify <1.8.0 es vulnerable a la inyecci\u00f3n NoSQL en la l\u00f3gica de procesamiento del token de acceso p\u00fablico. Los atacantes pueden eludir por completo el mecanismo de autenticaci\u00f3n de token p\u00fablico, independientemente de si se ha generado un token p\u00fablico antes o no, sin ninguna interacci\u00f3n del usuario ni conocimiento previo. Esta vulnerabilidad permite a un atacante eludir por completo el mecanismo de autenticaci\u00f3n de token p\u00fablico, independientemente de si se ha generado un token p\u00fablico antes o no, sin ninguna interacci\u00f3n del usuario ni conocimiento previo. Este problema se solucion\u00f3 en la versi\u00f3n 1.8.0. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28193.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28193.json index c66a1750025..0454b0fb400 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28193.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28193.json @@ -2,12 +2,16 @@ "id": "CVE-2024-28193", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-13T21:16:01.077", - "lastModified": "2024-03-13T21:16:01.077", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:16.723", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "your_spotify is an open source, self hosted Spotify tracking dashboard. YourSpotify version <1.8.0 allows users to create a public token in the settings, which can be used to provide guest-level access to the information of that specific user in YourSpotify. The /me API endpoint discloses Spotify API access and refresh tokens to guest users. Attackers with access to a public token for guest access to YourSpotify can therefore obtain access to Spotify API tokens of YourSpotify users. As a consequence, attackers may extract profile information, information about listening habits, playlists and other information from the corresponding Spotify profile. In addition, the attacker can pause and resume playback in the Spotify app at will. This issue has been resolved in version 1.8.0. Users are advised to upgrade. There are no known workarounds for this issue." + }, + { + "lang": "es", + "value": "your_spotify es un panel de seguimiento de Spotify autohospedado y de c\u00f3digo abierto. La versi\u00f3n <1.8.0 de YourSpotify permite a los usuarios crear un token p\u00fablico en la configuraci\u00f3n, que se puede utilizar para proporcionar acceso a nivel de invitado a la informaci\u00f3n de ese usuario espec\u00edfico en YourSpotify. El punto final de la API /me revela el acceso a la API de Spotify y los tokens de actualizaci\u00f3n a los usuarios invitados. Por lo tanto, los atacantes con acceso a un token p\u00fablico para el acceso de invitados a YourSpotify pueden obtener acceso a los tokens API de Spotify de los usuarios de YourSpotify. Como consecuencia, los atacantes pueden extraer informaci\u00f3n de perfil, informaci\u00f3n sobre h\u00e1bitos de escucha, listas de reproducci\u00f3n y otra informaci\u00f3n del perfil de Spotify correspondiente. Adem\u00e1s, el atacante puede pausar y reanudar la reproducci\u00f3n en la aplicaci\u00f3n Spotify a voluntad. Este problema se resolvi\u00f3 en la versi\u00f3n 1.8.0. Se recomienda a los usuarios que actualicen. No se conocen workarounds para este problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28194.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28194.json index 5f40518e2c9..73006ef5e59 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28194.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28194.json @@ -2,12 +2,16 @@ "id": "CVE-2024-28194", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-13T19:15:47.110", - "lastModified": "2024-03-13T19:15:47.110", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:21.763", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "your_spotify is an open source, self hosted Spotify tracking dashboard. YourSpotify versions < 1.8.0 use a hardcoded JSON Web Token (JWT) secret to sign authentication tokens. Attackers can use this well-known value to forge valid authentication tokens for arbitrary users. This vulnerability allows attackers to bypass authentication and authenticate as arbitrary YourSpotify users, including admin users. This issue has been addressed in version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "your_spotify es un panel de seguimiento de Spotify autohospedado y de c\u00f3digo abierto. Las versiones de YourSpotify < 1.8.0 utilizan un secreto JSON Web Token (JWT) codificado para firmar tokens de autenticaci\u00f3n. Los atacantes pueden utilizar este valor conocido para falsificar tokens de autenticaci\u00f3n v\u00e1lidos para usuarios arbitrarios. Esta vulnerabilidad permite a los atacantes eludir la autenticaci\u00f3n y autenticarse como usuarios arbitrarios de YourSpotify, incluidos los usuarios administradores. Este problema se solucion\u00f3 en la versi\u00f3n 1.8.0. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-282xx/CVE-2024-28251.json b/CVE-2024/CVE-2024-282xx/CVE-2024-28251.json index 8d92d514336..88eb55f2bc1 100644 --- a/CVE-2024/CVE-2024-282xx/CVE-2024-28251.json +++ b/CVE-2024/CVE-2024-282xx/CVE-2024-28251.json @@ -2,12 +2,16 @@ "id": "CVE-2024-28251", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-14T00:15:33.630", - "lastModified": "2024-03-14T00:15:33.630", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:16.723", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Querybook is a Big Data Querying UI, combining collocated table metadata and a simple notebook interface. Querybook's datadocs functionality works by using a Websocket Server. The client talks to this WSS whenever updating/deleting/reading any cells as well as for watching the live status of query executions. Currently the CORS setting allows all origins, which could result in cross-site websocket hijacking and allow attackers to read/edit/remove datadocs of the user. This issue has been addressed in version 3.32.0. Users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Querybook es una interfaz de usuario de consulta de Big Data que combina metadatos de tablas colocadas y una interfaz de cuaderno simple. La funcionalidad de documentos de datos de Querybook funciona mediante un servidor Websocket. El cliente habla con este WSS cada vez que actualiza, elimina o lee cualquier celda, as\u00ed como para observar el estado en vivo de las ejecuciones de consultas. Actualmente, la configuraci\u00f3n CORS permite todos los or\u00edgenes, lo que podr\u00eda resultar en el secuestro de websocket entre sitios y permitir a los atacantes leer/editar/eliminar documentos de datos del usuario. Este problema se solucion\u00f3 en la versi\u00f3n 3.32.0. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-283xx/CVE-2024-28388.json b/CVE-2024/CVE-2024-283xx/CVE-2024-28388.json index c139a43c543..53e60b85be3 100644 --- a/CVE-2024/CVE-2024-283xx/CVE-2024-28388.json +++ b/CVE-2024/CVE-2024-283xx/CVE-2024-28388.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28388", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-14T03:15:09.173", - "lastModified": "2024-03-14T03:15:09.173", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:09.877", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-283xx/CVE-2024-28390.json b/CVE-2024/CVE-2024-283xx/CVE-2024-28390.json index 2fcc85159ca..6c1c19ec41f 100644 --- a/CVE-2024/CVE-2024-283xx/CVE-2024-28390.json +++ b/CVE-2024/CVE-2024-283xx/CVE-2024-28390.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28390", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-14T04:15:09.640", - "lastModified": "2024-03-14T04:15:09.640", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:09.877", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-283xx/CVE-2024-28391.json b/CVE-2024/CVE-2024-283xx/CVE-2024-28391.json index 6b6b2da1246..3872be24e4b 100644 --- a/CVE-2024/CVE-2024-283xx/CVE-2024-28391.json +++ b/CVE-2024/CVE-2024-283xx/CVE-2024-28391.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28391", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-14T04:15:09.697", - "lastModified": "2024-03-14T04:15:09.697", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:09.877", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28662.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28662.json index 70e20c90f04..0472d2f3242 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28662.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28662.json @@ -2,12 +2,16 @@ "id": "CVE-2024-28662", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T21:16:01.357", - "lastModified": "2024-03-13T21:16:01.357", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:16.723", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A Cross Site Scripting vulnerability exists in Piwigo before 14.3.0 script because of missing sanitization in create_tag in admin/include/functions.php." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Cross Site Scripting en Piwigo anterior a la versi\u00f3n 14.3.0 debido a la falta de sanitizaci\u00f3n en create_tag en admin/include/functions.php." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28746.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28746.json index 274a28d29d0..69cccad9297 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28746.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28746.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28746", "sourceIdentifier": "security@apache.org", "published": "2024-03-14T09:15:47.577", - "lastModified": "2024-03-14T09:15:47.577", - "vulnStatus": "Received", + "lastModified": "2024-03-14T12:52:09.877", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index e2224d5e0d4..620e60877ff 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-03-14T11:00:43.303062+00:00 +2024-03-14T13:00:40.736016+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-03-14T10:15:07.027000+00:00 +2024-03-14T12:52:21.763000+00:00 ``` ### Last Data Feed Release @@ -34,22 +34,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `0` -* [CVE-2024-0311](CVE-2024/CVE-2024-03xx/CVE-2024-0311.json) (`2024-03-14T09:15:46.580`) -* [CVE-2024-0312](CVE-2024/CVE-2024-03xx/CVE-2024-0312.json) (`2024-03-14T09:15:46.943`) -* [CVE-2024-0313](CVE-2024/CVE-2024-03xx/CVE-2024-0313.json) (`2024-03-14T09:15:47.153`) -* [CVE-2024-2437](CVE-2024/CVE-2024-24xx/CVE-2024-2437.json) (`2024-03-14T09:15:47.690`) -* [CVE-2024-2438](CVE-2024/CVE-2024-24xx/CVE-2024-2438.json) (`2024-03-14T09:15:47.820`) -* [CVE-2024-27986](CVE-2024/CVE-2024-279xx/CVE-2024-27986.json) (`2024-03-14T09:15:47.363`) -* [CVE-2024-28746](CVE-2024/CVE-2024-287xx/CVE-2024-28746.json) (`2024-03-14T09:15:47.577`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `51` -* [CVE-2024-2247](CVE-2024/CVE-2024-22xx/CVE-2024-2247.json) (`2024-03-14T10:15:07.027`) +* [CVE-2024-2242](CVE-2024/CVE-2024-22xx/CVE-2024-2242.json) (`2024-03-14T12:52:16.723`) +* [CVE-2024-24105](CVE-2024/CVE-2024-241xx/CVE-2024-24105.json) (`2024-03-14T12:52:16.723`) +* [CVE-2024-24692](CVE-2024/CVE-2024-246xx/CVE-2024-24692.json) (`2024-03-14T12:52:21.763`) +* [CVE-2024-24693](CVE-2024/CVE-2024-246xx/CVE-2024-24693.json) (`2024-03-14T12:52:21.763`) +* [CVE-2024-25228](CVE-2024/CVE-2024-252xx/CVE-2024-25228.json) (`2024-03-14T12:52:16.723`) +* [CVE-2024-25250](CVE-2024/CVE-2024-252xx/CVE-2024-25250.json) (`2024-03-14T12:52:16.723`) +* [CVE-2024-25649](CVE-2024/CVE-2024-256xx/CVE-2024-25649.json) (`2024-03-14T12:52:09.877`) +* [CVE-2024-25650](CVE-2024/CVE-2024-256xx/CVE-2024-25650.json) (`2024-03-14T12:52:16.723`) +* [CVE-2024-25651](CVE-2024/CVE-2024-256xx/CVE-2024-25651.json) (`2024-03-14T12:52:09.877`) +* [CVE-2024-25652](CVE-2024/CVE-2024-256xx/CVE-2024-25652.json) (`2024-03-14T12:52:09.877`) +* [CVE-2024-25653](CVE-2024/CVE-2024-256xx/CVE-2024-25653.json) (`2024-03-14T12:52:09.877`) +* [CVE-2024-27097](CVE-2024/CVE-2024-270xx/CVE-2024-27097.json) (`2024-03-14T12:52:16.723`) +* [CVE-2024-27102](CVE-2024/CVE-2024-271xx/CVE-2024-27102.json) (`2024-03-14T12:52:16.723`) +* [CVE-2024-27703](CVE-2024/CVE-2024-277xx/CVE-2024-27703.json) (`2024-03-14T12:52:16.723`) +* [CVE-2024-27986](CVE-2024/CVE-2024-279xx/CVE-2024-27986.json) (`2024-03-14T12:52:09.877`) +* [CVE-2024-28175](CVE-2024/CVE-2024-281xx/CVE-2024-28175.json) (`2024-03-14T12:52:16.723`) +* [CVE-2024-28192](CVE-2024/CVE-2024-281xx/CVE-2024-28192.json) (`2024-03-14T12:52:16.723`) +* [CVE-2024-28193](CVE-2024/CVE-2024-281xx/CVE-2024-28193.json) (`2024-03-14T12:52:16.723`) +* [CVE-2024-28194](CVE-2024/CVE-2024-281xx/CVE-2024-28194.json) (`2024-03-14T12:52:21.763`) +* [CVE-2024-28251](CVE-2024/CVE-2024-282xx/CVE-2024-28251.json) (`2024-03-14T12:52:16.723`) +* [CVE-2024-28388](CVE-2024/CVE-2024-283xx/CVE-2024-28388.json) (`2024-03-14T12:52:09.877`) +* [CVE-2024-28390](CVE-2024/CVE-2024-283xx/CVE-2024-28390.json) (`2024-03-14T12:52:09.877`) +* [CVE-2024-28391](CVE-2024/CVE-2024-283xx/CVE-2024-28391.json) (`2024-03-14T12:52:09.877`) +* [CVE-2024-28662](CVE-2024/CVE-2024-286xx/CVE-2024-28662.json) (`2024-03-14T12:52:16.723`) +* [CVE-2024-28746](CVE-2024/CVE-2024-287xx/CVE-2024-28746.json) (`2024-03-14T12:52:09.877`) ## Download and Usage diff --git a/_state.csv b/_state.csv index fb7f458b220..482103613e9 100644 --- a/_state.csv +++ b/_state.csv @@ -146788,7 +146788,7 @@ CVE-2020-11858,0,0,e3751d93c39dc561e0bc014198f20f581fa176040cbe2ea7da77c24143260 CVE-2020-1186,0,0,0bc344b7a1e570a78333d69ceac2d0e453b6f57ae3a2cd74454233da741990bb,2021-07-21T11:39:23.747000 CVE-2020-11860,0,0,75322e26c7491537aebd8a29e900e9c7093fe15733010eee9c9bb3e4be14f63c,2023-11-07T03:15:13.847000 CVE-2020-11861,0,0,6fe965776441227f6a4587f66e1c2005727acd5006d43c90cf9c94883158ac29,2023-11-07T03:15:14.130000 -CVE-2020-11862,0,0,1f3cddb225446d39cd27a51f1958cc66e80677058ac55835d58ffe3d43bff11d,2024-03-13T22:15:07.517000 +CVE-2020-11862,0,1,c62137152cdb9ff06f3922dab06b4cc639191abf194594e48039b10ffadc9fe5,2024-03-14T12:52:16.723000 CVE-2020-11863,0,0,71da40a557b18027054a68368cb3351ac18462c9781299077036f23bc721afe6,2023-11-07T03:15:14.393000 CVE-2020-11864,0,0,193466154f3750bc68a987368ac71b7ab3853cb0095d413aacf07fec9914b853,2023-11-07T03:15:14.453000 CVE-2020-11865,0,0,1324746ebce0e369b7b9c89137e732152abdf01264749d369f2083e99700e5f5,2023-11-07T03:15:14.523000 @@ -225564,7 +225564,7 @@ CVE-2023-36234,0,0,973b7234bf394d41440796898f5347122468df9850574084c231db2df301e CVE-2023-36235,0,0,5540886c332c02c9f9daa7ee2d25e6b259f3a1d56e1899fba23de10080f667ab,2024-01-24T18:17:24.737000 CVE-2023-36236,0,0,68a4110dbc6185eaae8ba23285e9202d2867e74ac1d26edb597597898cff0d0a,2024-01-20T18:46:09.557000 CVE-2023-36237,0,0,6af9cb38c947543e7f1e44734eae902360e21435f871f5b61e9845d77f1324b1,2024-02-27T14:20:06.637000 -CVE-2023-36238,0,0,b39c394ad332b2bb954dfec51378c9f7ded276f271a857567ea0021a0ef9f6fe,2024-03-13T21:15:53.813000 +CVE-2023-36238,0,1,6e1da8dbdfd9138aa72b8c59c4ec0940fa128ec282eae77e954f0f22ffc73304,2024-03-14T12:52:21.763000 CVE-2023-36239,0,0,fc89aa2439f680352e63beab2cf34bdec6b034d4732f59c386f4aef3fe1c4d69,2023-06-29T20:58:32.827000 CVE-2023-3624,0,0,6a652e107ad82aabfc202398a7fad51559957fe592a3bbc8e886e1dde4232ef2,2024-02-29T01:40:37.163000 CVE-2023-36243,0,0,79214c4423a5bdbb534e2cceebb1996c4a0cb127d02b7df848796e5e3e60eca4,2023-06-29T21:02:42.490000 @@ -227246,9 +227246,9 @@ CVE-2023-3853,0,0,2e2f95d4d18ecd974c9e9668bd9aad5d3272d8b384c563a307e610826b1c64 CVE-2023-38530,0,0,f3d85729456a1be906aa691bb39e4fab14e628b80eac64a0d841010ee9fadf74,2024-01-21T03:02:12.170000 CVE-2023-38531,0,0,1eaf3ff39bdf83e578d5519ad4678d67a1b669b605f325e9b473a722aadc02ff,2023-12-27T19:09:56.817000 CVE-2023-38532,0,0,8d2765379d0a48190c4a0355f977b5f3c3481b6f3c0e372c2189aec2fff3111c,2023-12-22T15:16:50.043000 -CVE-2023-38534,0,0,a5e99d032bb1525454c20d4c36d3314a7740b22a90a6f6091162e83604dc56e5,2024-03-13T22:15:08.197000 -CVE-2023-38535,0,0,d15c0f1b6265b83f42c200be93fa57f558961c4555b71051139aa623f52cedef,2024-03-13T22:15:08.463000 -CVE-2023-38536,0,0,7b2c891a25ad4a2546daca003ec0bb2fe59e97c78f95472b28fd6084fb3ab0df,2024-03-13T22:15:08.710000 +CVE-2023-38534,0,1,bdcb44fedb3e74680416becd9b75e16d6a1d2f82387d8415e85ece49170184a6,2024-03-14T12:52:16.723000 +CVE-2023-38535,0,1,de8f978974df2f2ee4719e5c40ebb0188b6419d640395c585cb1a75b0e6b8a78,2024-03-14T12:52:16.723000 +CVE-2023-38536,0,1,2f791f2772663f383e0571d4fe237e98726462cbd43b2f90613d9684caf738ed,2024-03-14T12:52:16.723000 CVE-2023-38537,0,0,058af9a745864bcd589467c7b4d6902729400b28c16b75c86c3d3ec1b1935a56,2023-11-07T04:17:20.823000 CVE-2023-38538,0,0,aa5068e5cb5f7f9514149a9c201f88ab13f21f5373f3332bad9247612a115f87,2023-11-07T04:17:20.903000 CVE-2023-3854,0,0,a22124eaeda0afe0c7f815ef48ca157fa6c9e2271214c276e9926d6b3d1d1123,2024-02-29T01:40:47.670000 @@ -229295,8 +229295,8 @@ CVE-2023-41484,0,0,2021d5253fe16579ccf445b51d808cfc47dfe42287dae5d3335d5a80034f6 CVE-2023-4149,0,0,d79a219615c62d1aa33587a0a183788c3846b9f93f1519a47c404003cfe7ade4,2023-11-29T17:09:20.563000 CVE-2023-4150,0,0,7cbcb166ff389d32932e7e5aef6351f41a08c447edc0d75faa72b6226be84764,2023-11-07T04:22:11.360000 CVE-2023-41503,0,0,8a03f2b23621815253996faeef4dedff8337be56b914569062e8fc959e5a4fa0,2024-03-07T13:52:27.110000 -CVE-2023-41504,0,0,54b2159f0554f7743a765d2cec880aec06b95e436420a6d7ff3b58081fbadffc,2024-03-13T21:15:53.863000 -CVE-2023-41505,0,0,de7abadf617bc0392a95429c4574053c93e90adff6427fc61e67508e70308310,2024-03-13T21:15:53.910000 +CVE-2023-41504,0,1,34741b4f7dba9baeb5198f6b35a56d79bf4f50336b665d18b061906ee69d6b68,2024-03-14T12:52:21.763000 +CVE-2023-41505,0,1,6ba46d255a238ffeabec9750e39fdc186100d3795ff4307cea4f9e84aae87ed8,2024-03-14T12:52:21.763000 CVE-2023-41506,0,0,8ea3b02ada1155accd3add0c28958c6e0a97fd9c34e102f201e62b41077dfb62,2024-02-27T14:20:06.637000 CVE-2023-41507,0,0,2f5df285845ec35d22e06c44e84f6a93efee8f6951ed77da531971db01c7dcfb,2023-09-08T16:51:07.547000 CVE-2023-41508,0,0,8a35ce4a62b9631a655302fdf3166d2699322e97463890228046721e6f29a14f,2023-09-11T18:53:12.833000 @@ -234895,7 +234895,7 @@ CVE-2023-50722,0,0,fbd1cced3be8f08f72fd640e7299d2239764c6a12913a16fc9db72aecedbe CVE-2023-50723,0,0,5f758664f83d029b94878ae2f70dfed031014274ec993637af2df376c33c4c37,2023-12-19T20:33:39.183000 CVE-2023-50724,0,0,4912ff5166b1fd07e6e136d001fee1e9eb1d851472eb38638577d23853b5103d,2024-01-02T18:40:50.497000 CVE-2023-50725,0,0,0fc438df98d96b10da1a8c0dc83ac1e83157e0edf5fb21735adea9bb7acb9c12,2024-01-03T03:20:02.863000 -CVE-2023-50726,0,0,7e87bae830b24cd107e7eb1c2f0862d27fe65f2f09ebd0057e5b6dc04bd7b7c8,2024-03-13T21:15:54.797000 +CVE-2023-50726,0,1,c773e75851083afa4d8135e740d956fc9588d8b1a86bbf3bf172ff777acce7d7,2024-03-14T12:52:21.763000 CVE-2023-50727,0,0,3c7cb702f8185b19b43358a1154f05cdf87449c6807deb38307fed4330add83e,2024-01-03T03:25:51.337000 CVE-2023-50728,0,0,d5a2db73d5e1c297536c48081b3f95fefbd8844770b9bb75e3b4e060b538caad,2023-12-19T20:43:55.837000 CVE-2023-50729,0,0,dca406d2463a99487bc2f647850c1e6acc924ae37882d23abaea265fc5cbc987,2024-01-19T18:03:25.383000 @@ -237769,9 +237769,9 @@ CVE-2024-0306,0,0,b16f92c4a57a78580a52f72a84126778ebdaa3c536bd7e40b62367d789d467 CVE-2024-0307,0,0,966cba6a906cf8576b3e22074f9068ff5de1957049fe57d9d5cbc37ee44349fd,2024-02-29T01:43:07.687000 CVE-2024-0308,0,0,9b374c4831c1d7e4a01993ec95f413541808b94d3287b12ae8901324a0a5069f,2024-02-29T01:43:07.777000 CVE-2024-0310,0,0,0c2885511923199ef6e03dac11102e56161395771a2afd9522cbb1c995a0879b,2024-01-17T20:33:20.540000 -CVE-2024-0311,1,1,3d442843b5e7608c6bb2d77d9dcb114de76282fb17e1ce6c84f71c9f13b56353,2024-03-14T09:15:46.580000 -CVE-2024-0312,1,1,69d12d721f795cc0d22cd17188a5b39718b4865bc47a526252bc99e0123e85cd,2024-03-14T09:15:46.943000 -CVE-2024-0313,1,1,a469c3f2b32bec348f652dac84f522f30364e2e85c51d95d77fb481340e1f3de,2024-03-14T09:15:47.153000 +CVE-2024-0311,0,1,5db40c4bfc5c09ae2debaff4128c7a78d58419561313ee8a104fb6848ce89c41,2024-03-14T12:52:09.877000 +CVE-2024-0312,0,1,5ec0d1d30fe5c772c361d16941ba1aaba9383fd412be8a8cac420e99f9c5b90f,2024-03-14T12:52:09.877000 +CVE-2024-0313,0,1,059c0df495eb4715b3d0741f3cc647dfc993e8e7529bac0523f689831427c68b,2024-03-14T12:52:09.877000 CVE-2024-0314,0,0,cb39f430188fa2205e666e0316f77a35baf49f032cd18aa7e33289fa487d3fcc,2024-01-19T18:49:31.097000 CVE-2024-0315,0,0,a788da88ec4ebc0bdd26d80fefc9882fdad32f8f7dd4b621291efc32f023b296,2024-01-19T18:16:37.743000 CVE-2024-0316,0,0,00ac14550b7d60d3281c01b35600da830ada0f25e388579ccb4be08b0f546755,2024-01-19T18:16:51.523000 @@ -238169,9 +238169,9 @@ CVE-2024-0795,0,0,9387b7114acb61252d200ea553a236502abf8b7b27e1d3c3681a13f5f3022c CVE-2024-0796,0,0,117654d8458e901616b5dcc51586c0e623b4d624a6f0f01cf88de01da401d097,2024-02-13T19:40:50.223000 CVE-2024-0797,0,0,009aa845f9ae5bde1b4c5995aa015349e7f6ec6f8f0f63bfb450e718f9300e52,2024-02-13T19:40:35.397000 CVE-2024-0798,0,0,2f1b0b827ba8873a7b25770613534b3f8d6a0f026296e59c448002f514407704,2024-02-26T16:32:25.577000 -CVE-2024-0799,0,0,ef16ef0273fd8c1ec75c42c368b11d7f2c68564b13b362dc9617462a82ec82c6,2024-03-13T19:15:46.510000 -CVE-2024-0800,0,0,d04df57780e77fe713036b62c2ed37ea9f9600cc051743a8354a61549e035ca4,2024-03-13T19:15:46.757000 -CVE-2024-0801,0,0,473fec6aee21dae8f195e1c6b4892dba7567bc4612a820b1485748dc9fb87ada,2024-03-13T19:15:46.943000 +CVE-2024-0799,0,1,565bc32cefccc7b54c8a2a9ae87b575853af295d8bcf02c26770d29b4f9124c3,2024-03-14T12:52:21.763000 +CVE-2024-0800,0,1,d01951efcbc246e656d94cfc618f67e25f655df800a6a24c24ab44bafa9ef9ed,2024-03-14T12:52:21.763000 +CVE-2024-0801,0,1,a89dd8886cf81b019461340c433bdec2c4bcb02d2b385117b1316445faec54f0,2024-03-14T12:52:21.763000 CVE-2024-0804,0,0,70935988ae140dfc2a5adfcb943faf94a39f18e0935f58c282d47a399ed09108,2024-01-29T14:29:25.953000 CVE-2024-0805,0,0,479c25c464f6a328d6731c12cfc75b50b35f0f2dec0194359c3aeae6dde0d30d,2024-01-29T14:24:19.087000 CVE-2024-0806,0,0,9c93ca7b1341b35e16a22cdbbee1fe7fe1f2eaf26781f684014c115afdc39972,2024-01-29T14:24:48.090000 @@ -238470,9 +238470,9 @@ CVE-2024-1216,0,0,cf8cbc681fab31a82a726030cd7e5b2697f90ed7fc6fe37a66dad5c3cedfca CVE-2024-1217,0,0,2f3a9888a6fbf53051bf3e1d713109419f2670877e27546924b2618e93987f41,2024-02-29T13:49:29.390000 CVE-2024-1218,0,0,f7a43c3097a98a76412fe9c1af1feb423b6a534d59f1a1be753dd55ce0e5155c,2024-02-29T13:49:29.390000 CVE-2024-1220,0,0,7fc61962f6d2075b07bb030435da96def1b153ddab02d3c5264f2409e74faa58,2024-03-06T15:18:08.093000 -CVE-2024-1221,0,0,72683792ce9c283255541d5ac660fa78f64a38a1637cf2ed82ea089144c05781,2024-03-14T03:15:06.607000 -CVE-2024-1222,0,0,5b097491b98908ff7e6db3da1f90d0bc5e62019a19484337138401f19c65b843,2024-03-14T03:15:07.090000 -CVE-2024-1223,0,0,bcce03f069a230840b65a318aed8fc83e8f3977b6a931636a215c3e057bb8175,2024-03-14T03:15:07.580000 +CVE-2024-1221,0,1,2772ab118d345973bb70102156f0a9ba23f65bc7e69fb6c97b531ae7aa018395,2024-03-14T12:52:16.723000 +CVE-2024-1222,0,1,c69564e36b074aff06c51d10d4b5b8189a6729bdb1e1b9c14b8e40846e06e2f0,2024-03-14T12:52:16.723000 +CVE-2024-1223,0,1,a7a9e1c05adae7a81659ba2ff7caa10eb2d1a06107f9b31e93f51bb9dd1a9e91,2024-03-14T12:52:09.877000 CVE-2024-1224,0,0,f5377a59802b4c28898eed36128680d24ab17fb508c502610abb50cb4d44c2e5,2024-03-06T15:18:08.093000 CVE-2024-1225,0,0,48e8aaacf87c1f1ce817a462226bd45c66b45e1434a262109b41e4c91072a987,2024-02-29T01:43:44.277000 CVE-2024-1226,0,0,866d071ad8625704064a7fde58b7b8a2a90c5873a4eb7f372776142f1a28cf32,2024-03-12T16:02:33.900000 @@ -238719,7 +238719,7 @@ CVE-2024-1650,0,0,3020ece11ffdddeeec0030da948830348e1867089b2578f18d2a470b71bf8a CVE-2024-1651,0,0,b5a1bc561b4d7ae4d1ca2ccf7f79068fb2afa7b09c9ad49805a75edae57e0400,2024-02-20T19:50:53.960000 CVE-2024-1652,0,0,713b08425ff0d91e3a1f6c5fcc742628e562c3c90970b08c1ec718d504f2db3c,2024-02-27T14:19:41.650000 CVE-2024-1653,0,0,875a0ad46333e774de4f895ea6a9ead74cdbdb6ae6c4ddb02a960bfb85513ae4,2024-02-27T14:19:41.650000 -CVE-2024-1654,0,0,b67f7c776b64097c757a87a6d7d22a8df21e2be37384f31188a789970302a42e,2024-03-14T03:15:08.033000 +CVE-2024-1654,0,1,eb9626fce310149d4ccf57ea81b4c034dcaf62686ee2c7ca822dc0fc8ca870d9,2024-03-14T12:52:09.877000 CVE-2024-1661,0,0,24db83c92b829dc6c3c4aa1496bd15ce44d311aaea85d91d099cbad064ada2b4,2024-02-29T01:43:53.173000 CVE-2024-1668,0,0,9fe479fb08a9c3e6acaa42b32d642c1a77a4b3afa3c06ca8b35741f02d9dd1bf,2024-03-13T18:15:58.530000 CVE-2024-1669,0,0,3362eeabf5b6399fda046d3f728ab967509d79cc74a91c5ce260a94031135ec7,2024-02-26T16:27:52.577000 @@ -238826,9 +238826,9 @@ CVE-2024-1875,0,0,6b658f389b536cea98293568c7ee6644587a9b1bef069f774207e95c99ee51 CVE-2024-1876,0,0,82560fab1f4fbe2b28673412a54026b5c1806e6e970cf396594ce5608059f917,2024-02-29T09:15:06.320000 CVE-2024-1877,0,0,dc0df84bf200c26187720f27a43e69dca821743a88d60bdf70024e88eda285b4,2024-02-29T09:15:06.407000 CVE-2024-1878,0,0,c55652da9052ae10c0f5815143b64799f9a5b82eb1a20210e8e29c385eb1c149,2024-02-29T09:15:06.490000 -CVE-2024-1882,0,0,10c6e74771347b67fa3c838c9d71cc234ab54d67925ce262fed28d8f9bb44513,2024-03-14T04:15:08.003000 -CVE-2024-1883,0,0,e5e91ae0abed696d1abc51c06539334ac29fcc9a9edcb560d2084b7e2dc68356,2024-03-14T04:15:08.353000 -CVE-2024-1884,0,0,0cbc4b22c13954feaf9f0861216bee59fd3068f748b376e760b0221e0a5f2091,2024-03-14T04:15:08.697000 +CVE-2024-1882,0,1,65b682ecafe7582e463d65be737c66a5d812d02dc7c05e20f6941ab4cabca590,2024-03-14T12:52:09.877000 +CVE-2024-1883,0,1,f33d1f2bdfe0bff5bee1086cef77aed78bc7ffb15d776f93d56481c80868277c,2024-03-14T12:52:09.877000 +CVE-2024-1884,0,1,d5ca467ddd2d583a9a4003273c17763dc88a755dd4a6a44afd561a754155e761,2024-03-14T12:52:09.877000 CVE-2024-1885,0,0,502b33ef4dbb909774fc1ef1eb02e9b9fbffdbeee1e2971953e7a0c92a37628d,2024-02-29T07:15:06.293000 CVE-2024-1886,0,0,092cf7a21972f581040984f11ef7d5c93e369371178904eaee065bef71ec984b,2024-02-29T07:15:06.520000 CVE-2024-1887,0,0,c4ea1f30b4ee64401ec471c46007c0919b3d087c3cc77ec486ec75f252891a28,2024-02-29T13:49:29.390000 @@ -239074,7 +239074,7 @@ CVE-2024-2076,0,0,e7f4f1eb9d4801b159e19e6958b03336e4a3f4c5f2daffd2429350dcc008ce CVE-2024-20765,0,0,0bc0d6bebc7d0e3e5238fdf4ab0750cdcca06992066d14fdc4f2a56816d15cff,2024-02-29T18:06:42.010000 CVE-2024-2077,0,0,9a4b96c976de73d6d8f579a225f4ba6e55c8a8791cc5d9d9f141b958b0074a4a,2024-03-01T22:22:25.913000 CVE-2024-2078,0,0,c5cf1f8224dc1437cc5c72b4c20f193ca60f923ea1195c1e3b8d6f13446a32c9,2024-03-01T14:04:04.827000 -CVE-2024-2079,0,0,43a14cd4db7b214a5c8f3e3fb2bda119325b028ae522653b0bd01ff60a3a3c34,2024-03-13T22:15:11.910000 +CVE-2024-2079,0,1,d19df912ca8f24c4783570207f7ead00a2f333eee11795e142007ff6a5180cfc,2024-03-14T12:52:16.723000 CVE-2024-20802,0,0,09b0e538ab7892d37fab32a8e5c61289f6ef8af3dfbdfbb048a6512fa7396094,2024-01-10T16:14:57.787000 CVE-2024-20803,0,0,6c415e68c0cc04850639517c5e65b145b62c937ecdd266efbaf3b8a7e936e490,2024-01-10T16:11:26.313000 CVE-2024-20804,0,0,f961cce5ac55cac12f82f1b9af1706ecad8b5889d74e0d2cb7f3ec9a86f51549,2024-01-10T16:10:45.437000 @@ -239606,7 +239606,7 @@ CVE-2024-22162,0,0,3c2cb36f32a60ca693f81b961c287d758c19ce669967ae728e78b13e00efd CVE-2024-22163,0,0,c83e1ba1846b1fce21c84865fbae3a4da5f3738a4cbae342d708ebb4390dbfc8,2024-02-06T14:57:33.760000 CVE-2024-22164,0,0,477ce475db07f491f945e658dfba7270a678f1c9f9986653d1cf70ab7be3b709,2024-01-16T17:40:17.057000 CVE-2024-22165,0,0,e5745c0914c304a6a883c5cbbe12f7d3b628ffd9c8f1f4447610dc31781824ee,2024-01-16T18:30:58.893000 -CVE-2024-22167,0,0,4efa3f0953388985e35aa0fc7cde3e5468f1d8536829035d4e70933f25b2971a,2024-03-13T21:15:55.343000 +CVE-2024-22167,0,1,66eeaa7802a03d7220e8e4d342cc2b136735ca1b12a8df28a329ae7f7fc30d01,2024-03-14T12:52:21.763000 CVE-2024-22182,0,0,907bb5baf28273d3fccc2bf9f187fdb84f5fc8c1f9e9a557acec183fdb8a4a41,2024-03-01T22:22:25.913000 CVE-2024-22188,0,0,c925f824384b59eea62dc4af4666ddb75fd12e09a6bf8db8c7f8ccf3dffad485,2024-03-05T13:41:01.900000 CVE-2024-22190,0,0,b6052bec184e44f4bdb37913f09378ade6ba357d503aeeeace40339b578d1a46,2024-01-18T13:48:07.553000 @@ -239718,9 +239718,9 @@ CVE-2024-2239,0,0,8a25d7fd7eaacb8ebf85fc00694a049e7ce7420bfb6cf416c5b42d50c5d1d4 CVE-2024-22393,0,0,baae8029e1587725a02d8ccb1fb298e540bb69b478da7728d31a9731926e8718,2024-02-22T19:07:27.197000 CVE-2024-22394,0,0,fdf2846817bf0321d479c4aa67f29d797db24255733cd4d946cc68e44bfccdc7,2024-02-14T21:46:40.537000 CVE-2024-22395,0,0,b21f811c39a8757d126ad039f30ef550a4161900f4b964d1876a739d59a87644,2024-02-26T13:42:22.567000 -CVE-2024-22396,0,0,f31a8478611f246e75e3189d21bf9ef362e314a74863dafebff2c53a0d093433,2024-03-14T04:15:09.080000 -CVE-2024-22397,0,0,dd628a66d8f0ca8bd03cdfa506d1cfa64763356d779eb356796a3ef2aa6831cb,2024-03-14T04:15:09.297000 -CVE-2024-22398,0,0,c77e5448cb612df458a655c23f75acac1504b30f42bbfcca524271c814d3eb63,2024-03-14T04:15:09.417000 +CVE-2024-22396,0,1,3abb46e50ad636b49fa1626720ec980896bc78f9c45d1bcf1eda8e9ee80c033c,2024-03-14T12:52:09.877000 +CVE-2024-22397,0,1,a9450283301e1e49819d3862b657193585bbce3c8f221b0f8c811f63f9e45af0,2024-03-14T12:52:09.877000 +CVE-2024-22398,0,1,6274168717eaf1c1ad5c0ba9993d9a14d19f9de051ef1a9ae7c30d936f0a8aff,2024-03-14T12:52:09.877000 CVE-2024-22400,0,0,75e98c1f1edd6beccc5653abbccb406114df98ae36ae20c7db97671271c6d967,2024-01-26T20:55:37.543000 CVE-2024-22401,0,0,66adbef511b1833a5b0f5721c3bf92cfe438dfd63a9ac9655aa7c9dea6d9ded0,2024-01-26T14:42:35.147000 CVE-2024-22402,0,0,6c66fef7245df59e63379f6d488e03f20fc7beed00d8afe188d68ca1b49ff0b2,2024-01-26T14:11:30.677000 @@ -239739,7 +239739,7 @@ CVE-2024-22416,0,0,4743c834e9f721c7d271903d375817b56210d75d85a6318060ff428a321c4 CVE-2024-22417,0,0,cbffb89ddefa4461a2c9ab3f4209af97f2fbed0e034b82012b430c49f1cc363d,2024-02-15T03:17:08.090000 CVE-2024-22418,0,0,0253a6086c2436c05752e6e58a0d383294b9f59fbd83ecf7515ed514c42aca8d,2024-01-25T22:20:11.087000 CVE-2024-22419,0,0,c565baa116d24bde7e5de7a0d128d511dc0e0f3e4161069cbe6da43b0f53182f,2024-01-26T18:10:24.747000 -CVE-2024-2242,0,0,b2e12ba2d852f23d46dc99a1c46baefdd04f84d51d9c86db5512a78bff567268,2024-03-13T22:15:12.173000 +CVE-2024-2242,0,1,39d308e366a51cd5a7be9e3c4a03c92cd8109861f94356873beae64a70ef5519,2024-03-14T12:52:16.723000 CVE-2024-22420,0,0,dcbfe647d1443cce2b795eae483259c958c0472084bb1bb4ee3374c4670666da,2024-02-10T02:51:45.717000 CVE-2024-22421,0,0,58c7848effa15c2f45cae3a355504d85dac425537d9bac99b99330760ff84e0c,2024-02-10T02:51:03.987000 CVE-2024-22422,0,0,cafc60081059c38b5fbf7c4dc43db8e59eaafdb89fe8cc5c7225f1844e49fce8,2024-01-25T22:19:52.030000 @@ -239761,7 +239761,7 @@ CVE-2024-22458,0,0,fab0847e92bbf727c5b27aa7c362cf6e8ac33445a67dace1537122f2ef005 CVE-2024-22459,0,0,0f6e55dd5e86a1ba38a08c9c7a4fb2896872d396522db79869b212894fff2ef6,2024-02-28T14:06:45.783000 CVE-2024-22463,0,0,5b884681f5c1cb31ebf38842df7c3075a8e9d98da101d1e4ec4faa1ef09b6ce2,2024-03-04T15:35:25.673000 CVE-2024-22464,0,0,890f63b91e1207e51dc2d0fc686f763deb067d6410c523bfc64d52071d75be15,2024-02-15T05:03:27.617000 -CVE-2024-2247,0,1,b52dba6f68142dbeca56f2f1bf8b23a5401066ec4f0585445fe0cb42ba284eff,2024-03-14T10:15:07.027000 +CVE-2024-2247,0,0,b52dba6f68142dbeca56f2f1bf8b23a5401066ec4f0585445fe0cb42ba284eff,2024-03-14T10:15:07.027000 CVE-2024-22473,0,0,ba695bcad0bbe2cba422f3053697429916506f0f0ce55f150fe9af4a818e1f6b,2024-02-22T19:07:27.197000 CVE-2024-22490,0,0,36caaa8caefc70cd3fb65a62a9488b2446e68d14844d0a61d7baf757d2000caa,2024-01-29T22:48:35.493000 CVE-2024-22491,0,0,99c25b0ff8de89fe3ebd04368e499e7fe9b3820707560bd21fed90048934c0ad,2024-01-23T14:28:45.890000 @@ -240400,7 +240400,7 @@ CVE-2024-24098,0,0,278909d70f7cff296783b4b8a548916c6d64b22508219b62d702151781ea2 CVE-2024-24099,0,0,e75badf6651a6d84e33aa0d6378d82bf7383b7d186bb27d0ab0f05af5c87836c,2024-02-27T14:20:06.637000 CVE-2024-24100,0,0,a27c32dc14c8987b127be9cd991f37144e95622920d0f3983f740c9f65a1ed81,2024-02-27T14:20:06.637000 CVE-2024-24101,0,0,465610d11fbea3a63202ee4b992dde1745c78e4f43267fcf6791260a204c8347,2024-03-13T12:33:51.697000 -CVE-2024-24105,0,0,c756102406536d18d5b7587cc76c52c0b7d345ddea22d625cd43256cc77708da,2024-03-13T21:15:58.870000 +CVE-2024-24105,0,1,f380e262c8dd655f8c2a2aaab705945e3e53d934f43a99a8988c2679e64d26e6,2024-03-14T12:52:16.723000 CVE-2024-24112,0,0,85e73cacfedc53adcf11f5f918fd045bef98237a7befd9901dcc9210924d64d7,2024-02-12T17:36:55.950000 CVE-2024-24113,0,0,9eef336ce15946e031a73b26b3e239a7b6b89883c338eb5418a2161e5a5d4cfc,2024-02-15T03:07:46.013000 CVE-2024-24115,0,0,14551eae0714aa949f3a2722e897b385606f2d79896bdde4df5b423d4061d078,2024-02-15T16:01:23.457000 @@ -240478,10 +240478,10 @@ CVE-2024-24332,0,0,e8ff48d8d559b64b9ab6ad7cafcefb37d4d80401868f386c665115c6aeb40 CVE-2024-24333,0,0,01fbda1675f098d1cc7c6d19f4f3e61befb0126ec79fb324ab3d3ab060b94378,2024-02-01T04:50:09.707000 CVE-2024-24337,0,0,aea724cce42152cfbca31af56ebea4b4144a07dac6916cd215f4a89a5f259b76,2024-02-13T14:01:49.147000 CVE-2024-24350,0,0,9134767962641c17d78d439bf5ad6b0040b309c747242ef118ff001480ea18e9,2024-02-14T21:53:21.057000 -CVE-2024-2437,1,1,e2a2bd9bd0dcdea0cc630f9078b3e3fd0d505d341534c09f27e2d7feb3fe79ac,2024-03-14T09:15:47.690000 +CVE-2024-2437,0,0,e2a2bd9bd0dcdea0cc630f9078b3e3fd0d505d341534c09f27e2d7feb3fe79ac,2024-03-14T09:15:47.690000 CVE-2024-24375,0,0,6d93bed7b91eebe0279780e7942da5d713b2770f2037688e2705f8e5250bec6b,2024-03-07T13:52:27.110000 CVE-2024-24377,0,0,4fd82afd92a47ec9c215e71594b94e69e50289be89a362cbe08c09e263cd1ed7,2024-02-16T13:37:51.433000 -CVE-2024-2438,1,1,c00f0172cf7ab8467da2d5d83a23b794d6f6a7817b3440d3b686b7132bf26b21,2024-03-14T09:15:47.820000 +CVE-2024-2438,0,0,c00f0172cf7ab8467da2d5d83a23b794d6f6a7817b3440d3b686b7132bf26b21,2024-03-14T09:15:47.820000 CVE-2024-24386,0,0,b3790fe661cff8a8634891f10d13cf244a8c2db222c1d3928967cefd661b68bf,2024-02-15T14:28:31.380000 CVE-2024-24388,0,0,3f3d5731a0be4e881fd82d2a190d75a64cc3a7cfd8c995358dcecccf32a929bb,2024-02-08T20:04:04.027000 CVE-2024-24389,0,0,2c9b678e90ca811a5e4fb1d9cfec1c17129f5ec175674cc0051b26f5da267c13,2024-03-07T13:52:27.110000 @@ -240547,8 +240547,8 @@ CVE-2024-24680,0,0,00c6b06cbd399fac9a1cb69a45fdeee991ea9572aae73c195704c3555b436 CVE-2024-24681,0,0,705110c1a0575ef95794934b23101ccc4a6f384f7c61c4db9f4dbf9a8c528dd4,2024-02-26T13:42:22.567000 CVE-2024-24690,0,0,4249963fcab3f64839ca35be1a62d20e5da7a24ba0a47ce2bf9c0d2ae28ac410,2024-02-14T13:59:35.580000 CVE-2024-24691,0,0,87a55408e5efa0a4e3ce695995ae48834f0ce6baa0932acdc26c28bc7459ff4b,2024-02-14T13:59:35.580000 -CVE-2024-24692,0,0,8f35977ecb1fc63a3e79e626900b547600a6f147bb5e4fe2307611edc881f8eb,2024-03-13T20:15:07.273000 -CVE-2024-24693,0,0,384ba36041e0e5352c63befbbfbd1143d3360cb9d0a88f62cf73f43813fae147,2024-03-13T20:15:07.760000 +CVE-2024-24692,0,1,96b263e11e7ffd264e5e6330a524d4e167d94ed5d670d61f6bb2c4bb8b02f370,2024-03-14T12:52:21.763000 +CVE-2024-24693,0,1,5948992e2aa56bf9230af7bcdfd2c9a8d3e9ce95b4c0f6ada002a4f7d2439c11,2024-03-14T12:52:21.763000 CVE-2024-24695,0,0,f7b489372675997f3018702f3166f9e3d390c6d5bf9cde9b8e59b33dbe31e943,2024-02-14T13:59:35.580000 CVE-2024-24696,0,0,340219d088caaa9660211943b96c2739fe7ed93b849c938b38d29441b9ee779b,2024-02-14T13:59:35.580000 CVE-2024-24697,0,0,61551c1d57df2d326f3c36bc68e06a9320623a0f54e789a8374a92406f147d56,2024-02-14T13:59:35.580000 @@ -240803,11 +240803,11 @@ CVE-2024-25223,0,0,fed0ee1c93d4da13aa94c11be23fd7ce47331585823cc1398816a42e972c6 CVE-2024-25224,0,0,60a033d8e8f6de71de20eba59193ebdd929b6bf393aa49baa96edb59007a6ae2,2024-02-14T16:13:16.563000 CVE-2024-25225,0,0,b00e13f44ac0134f1fc7e8ea7aab2c5dcadd2e02f8582f1036d69738d9332b6f,2024-02-14T16:13:16.563000 CVE-2024-25226,0,0,97ea8fb758b8c513c8e72ae3403e9f8a56bb02ec88e94afe18fc9fb3fc39daf2,2024-02-14T16:13:16.563000 -CVE-2024-25228,0,0,874aa05e1a272a25a83a650ac8d7cced0f21348e2881b87b6589a4012112af12,2024-03-14T02:15:50.613000 +CVE-2024-25228,0,1,0239fa4a0a2fc4eb6bb0a1d2903e89a077f9c73228502ccb53d8cf7f226021ad,2024-03-14T12:52:16.723000 CVE-2024-25247,0,0,1833ae291fb426e6ea03731a73288e6521c4f877eb6214fb79e6117118a15f59,2024-02-27T14:20:06.637000 CVE-2024-25248,0,0,ab3d2a3b38abc9eda04104b8736bee6722a7b783d7f7311f9358790a48b160f2,2024-02-27T14:20:06.637000 CVE-2024-25249,0,0,e626f7804fc8e3e2331820b9aeb548c245c405719ff0d76dcfa04a8ec8a29acb,2024-02-22T19:07:27.197000 -CVE-2024-25250,0,0,3cc334e2050b6a9eaa97416427fbea02322921755fe268fbb09b55a56f03777a,2024-03-13T21:15:58.943000 +CVE-2024-25250,0,1,50921ad09828430a91a170dee03070c033f5594e850effa2946a4512e5f222cf,2024-03-14T12:52:16.723000 CVE-2024-25251,0,0,1d2a5a9a4b66e0916ca3d01dc7a497fd6f413128e5f9cf23b916246f32337d74,2024-02-22T19:07:27.197000 CVE-2024-25260,0,0,a963ef502694ae6000774c93857ccef97ccb95aa054d7c962bcf481c9eca61da,2024-02-20T19:50:53.960000 CVE-2024-25262,0,0,e9e8a281108082e2fe38cf1f84c8b0462ae4f78a51833715d231a5f9854a6582,2024-02-29T13:49:29.390000 @@ -240928,11 +240928,11 @@ CVE-2024-25642,0,0,bf91eeb1502dedca60fe6c035b93d7dfc5a440bc6932322c6ae4d128b4c7c CVE-2024-25643,0,0,08f3e6c0d454841d4e4dc84aae81812246ffbd96bb71cc2e9e4566cd4077e910,2024-02-13T14:01:07.747000 CVE-2024-25644,0,0,cad748db94c87605f745ac8efbb54ef36e9bf866e1bcdbdf96bff9a05dfcf738,2024-03-12T12:40:13.500000 CVE-2024-25645,0,0,611af6391fb4617a6b65e5d2ff91bac5a4003873b65f133d0cd2495d911bd094,2024-03-12T12:40:13.500000 -CVE-2024-25649,0,0,218331cab7c62b05eb4d39dac1a79ad7ac8b83af2eb750388e434f7637a774f7,2024-03-14T03:15:08.540000 -CVE-2024-25650,0,0,642f2a97fcbb295131b088a5341f3b030499ec647a2ae701e0541ed64c8cf428,2024-03-14T02:15:50.690000 -CVE-2024-25651,0,0,2248b9010081da7da6b627ee680afeedcd3d4b945ee538337f832cfc007fb085,2024-03-14T03:15:08.727000 -CVE-2024-25652,0,0,295dd2978154c1bf9b2c6a87719cce6733bb755cf3cd8c6462372fddfcabd618,2024-03-14T03:15:08.877000 -CVE-2024-25653,0,0,288666ab37b8b1bd826f20b5520fe1bf046ca6dbd75973955552561e56a31a42,2024-03-14T03:15:09.017000 +CVE-2024-25649,0,1,ff4005c5bc448d78f7be592b75e982f7bf99b3c972c3f93072e448020f36c7cd,2024-03-14T12:52:09.877000 +CVE-2024-25650,0,1,86db7f9cd2961887ed39c6b63b2949a71fabae22076ac99000118f6e3ecf601e,2024-03-14T12:52:16.723000 +CVE-2024-25651,0,1,4935c44deda83694ae7a33c550d78c8ec02d262dfb7e7f44dbd503c93d5109ae,2024-03-14T12:52:09.877000 +CVE-2024-25652,0,1,1684edbbe6a032e904cd3d9da8c2e3b5d162c7d94708a30170c5b1a8fdc4de06,2024-03-14T12:52:09.877000 +CVE-2024-25653,0,1,cf0ab93d3f68bfc65ae7a6e2836e0f599b295638c5107d23ca26fba04d235e4d,2024-03-14T12:52:09.877000 CVE-2024-25674,0,0,880844ace2ad9fa6a214f1eff7f46e3beaded8f86ef202dfc09585e1e07ca21c,2024-02-12T14:30:40.343000 CVE-2024-25675,0,0,7eb120f8543ce89181641a0a8c791e82666c8e07d23577075c360f9dbf73d233,2024-02-12T14:30:28.640000 CVE-2024-25677,0,0,1d7f4f51208daa48b27418602ba1484337c537523201080701287445cfed0006,2024-02-15T19:43:24.983000 @@ -241241,10 +241241,10 @@ CVE-2024-27088,0,0,51e0e40780267d1754ef6fc0476358b31f9f3458dd54a6b66fef5c03c4a96 CVE-2024-27089,0,0,80888df8a8beb579eb58ecd8e5017bb9d7c0dad21161e687af8e50a608c5d017,2024-02-26T20:19:06.073000 CVE-2024-27092,0,0,46c8a65175e30ca99bc1ca448e9739f5a9fd09a26b86761b076001350720e53c,2024-02-29T13:49:29.390000 CVE-2024-27093,0,0,2adc536c19af535e2a03a5b98ba4818457cc5a617ec41b1d012943c718349d43,2024-02-27T14:20:06.637000 -CVE-2024-27097,0,0,50f3cf107f797e136114db4659f36aab4dcc1ed2c483d15d9f0c1870a1b504ca,2024-03-13T21:15:58.993000 +CVE-2024-27097,0,1,119cd9ece0e90261671b57d6900026bac78dfbf4d2981ae69a65322120d02a50,2024-03-14T12:52:16.723000 CVE-2024-27099,0,0,175d10b027dcaefa30f4f3d08f108961158696c2e68858dfb01ba6e05070217d,2024-02-28T14:06:45.783000 CVE-2024-27101,0,0,5e1cdb7fd021f767632e89261ae8cd71ddf2db43a5c2430745ab100b28a7d944,2024-03-01T22:22:25.913000 -CVE-2024-27102,0,0,cdefde17ac223bb0751d25dccaf6c69d2607e40a6e858e378aacf4409db4940a,2024-03-13T21:15:59.590000 +CVE-2024-27102,0,1,efafee84c11a7d42b73e32ffc69d4688f19605eb4ecc6d6cf419aaba4f0fed2f,2024-03-14T12:52:16.723000 CVE-2024-27103,0,0,ba41469ea697f39b66b49d222d300153b0a74c2fb1fbae161829f573b3ab98cc,2024-02-29T13:49:47.277000 CVE-2024-27121,0,0,9ff77f57a33b5e7894f52bbf3c39c57fbfb06ac4fc9de183cada29d2e4e25cb4,2024-03-12T12:40:13.500000 CVE-2024-27132,0,0,3211e33e39363e184b8550fc16d833a0f590c8e4cd3ef270e1d091501b93f80e,2024-02-26T13:42:22.567000 @@ -241360,7 +241360,7 @@ CVE-2024-27689,0,0,f4ebc1e59160fdab518bfa3aa9af1f1ba832ce6045359e8a975bb23df8ccd CVE-2024-27692,0,0,96cf609944e6476718d8d1c519869d6f251f131a1b19ff614e15f00c454cdd33,2024-03-01T17:15:07.617000 CVE-2024-27694,0,0,f3214413fbbba6e4989cb23c7682c51f2973a0b48d2e319f7c34a38e30c11001,2024-03-05T13:41:01.900000 CVE-2024-27698,0,0,ac54888b0a03034871f07f7d36cab166990ef3007932a85c3ddd7d9b6a6ab747,2024-03-09T23:15:49.403000 -CVE-2024-27703,0,0,3d640aed93e1dabbc4abed834a7b198ee41005d217fc00b5cf782d6d45969a06,2024-03-13T22:15:11.843000 +CVE-2024-27703,0,1,2b79380c63baf4bc3c9abfadfdc13a8325f8dae30b340951dc89a1b9f1e8f730,2024-03-14T12:52:16.723000 CVE-2024-27707,0,0,bd4780ccfe95d75b10e00a8c73b93480b3348a16006d364b38b5efca7ebc67cb,2024-03-08T14:02:57.420000 CVE-2024-27718,0,0,1278a2a8cee5a68342beae95f220d454fcd35e5e3853b311cb50bcc440948ebc,2024-03-05T13:41:01.900000 CVE-2024-27733,0,0,8d363cf969790e7f98247f28db2e0a162d296bdeea0f77bb77693ca2f7a6137e,2024-03-08T14:02:57.420000 @@ -241390,7 +241390,7 @@ CVE-2024-27949,0,0,12ee9b935394b527d1677a59b517c94d0df067a0b32bfff31d7cb2be5b4b5 CVE-2024-27950,0,0,56d632dad56c45d949d3327de16e5b70b08683cea8ce7876ca8c59cc37ee8062,2024-03-01T14:04:04.827000 CVE-2024-27952,0,0,184c933cd3d4f7d9f291de87daadba6c6d2dcb57a0cab449b4798a27658d2d98,2024-03-13T18:15:58.530000 CVE-2024-27953,0,0,9606a5ea342585cc8ea605f674c63e8d870327e37e1ba285dba38be6126632a2,2024-03-13T18:15:58.530000 -CVE-2024-27986,1,1,01528b706c9f06c52d7790b2237645f819afb573bee6a27e89a4eeb7a8b9eee6,2024-03-14T09:15:47.363000 +CVE-2024-27986,0,1,221ac31a72264e8303bc0dc716d0bcad27f92aa2e3b64824247f9d02601983b8,2024-03-14T12:52:09.877000 CVE-2024-28084,0,0,2ea238298cc724e9290d5587502d4eedb8db15dd1861547724435b977511956c,2024-03-04T13:58:23.447000 CVE-2024-28088,0,0,d2f20b1069b24ba10d21e8bf3b61c2c6a1c6b345ff59786676752b80abbde7a4,2024-03-13T21:16:00.380000 CVE-2024-28089,0,0,830991c1dd5898b6a817a3f8bb8784922af3636f20b8b62ba1c918d5d83f6f10,2024-03-11T01:32:29.610000 @@ -241425,15 +241425,15 @@ CVE-2024-28162,0,0,9f95dea899a301f3d7e776202ce6567032bc57cf37ea2c387cd5d210ccf05 CVE-2024-28163,0,0,e6f158d88c83d394762ccab484b2ad85c85d5028e78ed16fd0744829e8f59484,2024-03-12T12:40:13.500000 CVE-2024-28173,0,0,e0fed71b03fa1080cdfc47a71a0b80da5e87b19e624557c11c0e172f4b2c098a,2024-03-06T21:42:54.697000 CVE-2024-28174,0,0,fa1674b985861bddf4d0ff5ab075ec0e4328a9665c668bfe339f9f0de580d6b1,2024-03-06T21:42:54.697000 -CVE-2024-28175,0,0,ca58d29ef32983b33c62a2fd7b345268439a050ce23af1d5c40aa6dd749ccdb8,2024-03-13T21:16:00.570000 +CVE-2024-28175,0,1,c8f25bff8e97476e2963865ef2e9cf777aae8f2ef724b2ba6f372c990cea8179,2024-03-14T12:52:16.723000 CVE-2024-28176,0,0,5bb6d329167995170bd276a45554624691bdda8cbb6c83c2d08f42eba9f617aa,2024-03-11T01:32:39.697000 CVE-2024-28180,0,0,1e73ce45496cde15ab7710e8895a9f7d4caf4d2dcdb0d6de4d94afa753e9a64b,2024-03-11T01:32:39.697000 CVE-2024-28184,0,0,043b0bc7533d0fc96bb6df4be7b21b8477ffe807b0ac6ed0c4b06cf7d8241c3c,2024-03-11T01:32:39.697000 CVE-2024-28186,0,0,bd19020fb98c7e49f4ae9534406a8116ce29f7f2cd9253fb5db74e8880c2331b,2024-03-13T12:33:51.697000 CVE-2024-28187,0,0,ac9aee9b90f5e80eaf35f8c7ff9228de1d46fc7e7981b3ae0d130073676ebc09,2024-03-12T12:40:13.500000 -CVE-2024-28192,0,0,d78776cf653c920d1bae9feaacfd4e597f46ef67fbab546c6df435d4a69b5aa0,2024-03-13T21:16:00.823000 -CVE-2024-28193,0,0,1de78db701b48770c7b9ad6a4c3de8efe483bea9ec41e293cd7a32a5e150762c,2024-03-13T21:16:01.077000 -CVE-2024-28194,0,0,2994e8524191af9bad4e70397807a2f8e6e4543df62f104fe5234d833150c067,2024-03-13T19:15:47.110000 +CVE-2024-28192,0,1,b174fe16c8c5d79ad271f4d2c9a4367f27378fbad36778038489438c03ab1c5e,2024-03-14T12:52:16.723000 +CVE-2024-28193,0,1,8c1ca4c11484246f93cc5d645c632e9426b6a7357ef642cc72cfc1bf4fa0ff90,2024-03-14T12:52:16.723000 +CVE-2024-28194,0,1,bbf543bd49e731dd9f0390cae255c29b8ec19d1f801fcc500577e5449dd9092a,2024-03-14T12:52:21.763000 CVE-2024-28195,0,0,1b19b29658de96e47ddbe7fe6d42c1a696986a3c5eec359089bbbbbc5a058164,2024-03-13T18:15:58.530000 CVE-2024-28196,0,0,7046367e0acd02e985287d11a90605d3f19a7e35578ad5f9a01507573328c7a9,2024-03-13T18:15:58.530000 CVE-2024-28197,0,0,e70c7d0bb2a78854377299eb50fe7994eaf82f7d86398ed826c936d249a753e2,2024-03-12T12:40:13.500000 @@ -241452,13 +241452,13 @@ CVE-2024-28230,0,0,3036aa70102b53b9cc695265dc4a11e5a4f5b8d26f6120835dbd1a9c3d93e CVE-2024-28236,0,0,ea7d34bffb060eb0191757ceb4c446ee8bfa4166cb7d1e0d8e67e75c651ba966,2024-03-13T12:33:51.697000 CVE-2024-28238,0,0,38219e010007b7fe5426826144cd2eabd2e22d36d31c50aa8471901674b524b3,2024-03-13T12:33:51.697000 CVE-2024-28239,0,0,faccbe471f1ae24e1ff85c8426d7d0f8447bb8e496567a24af19b5962ca5e940,2024-03-13T12:33:51.697000 -CVE-2024-28251,0,0,fb8bb85433bd3b41ad1d143c946985fc64b58ab7659a617713f0e321c9f0e8ae,2024-03-14T00:15:33.630000 +CVE-2024-28251,0,1,19fc23d56f5d00fa3c69d993b0deb280b2d4a1df9b73eb3d828c9ec8b6104ec4,2024-03-14T12:52:16.723000 CVE-2024-28338,0,0,9985a0b99abb928b9c829cb29ecce6039c07964aad6d9841c1477c6680f4f9b5,2024-03-12T17:46:17.273000 CVE-2024-28339,0,0,06a7f15d55f22a965683bef17c82587bc073ddf9fa5edb33c38c4cd82d5f37f7,2024-03-12T17:46:17.273000 CVE-2024-28340,0,0,89775fa07d73d115a7392603111ecb04f65799be74b8d41063e67ed0eb97d0cf,2024-03-12T17:46:17.273000 -CVE-2024-28388,0,0,f17eaaccd231d77546d7899d1df3085348280bec8337c1a366c3d44c86452404,2024-03-14T03:15:09.173000 -CVE-2024-28390,0,0,1da0808737c64cfb1966175097fd2c66620ce27fb357d642515e15877a4acd6d,2024-03-14T04:15:09.640000 -CVE-2024-28391,0,0,2cf4d2f98732c7b04ac1c5926873543ea38367c981d16dbe8f52fbe309920f7c,2024-03-14T04:15:09.697000 +CVE-2024-28388,0,1,f20800f07aee245fbf5408ead00cec9bf5c1f6fde0c58ac0833a4f3740a134d7,2024-03-14T12:52:09.877000 +CVE-2024-28390,0,1,c59fe44ce5898e034e8253a1c3bd017a5eae7c1708d584b45d3cdcaf6b6ab3d0,2024-03-14T12:52:09.877000 +CVE-2024-28391,0,1,b1444c24f7ecf1ab52e2ae0fbb735e6665eab4acbe77c214aa4859db21cb1963,2024-03-14T12:52:09.877000 CVE-2024-28429,0,0,caaa64487b84149266e9e941a72e13f93e6070c94b1fe7355fb56db4eb5b2161,2024-03-13T14:28:45.217000 CVE-2024-28430,0,0,bf34fb49e742ebf9176808c1e05b7467ed1662a29a5c18afe29f976454928e37,2024-03-13T14:28:45.217000 CVE-2024-28431,0,0,148c6be422e12f315897bdd57f5208c74e8137e452c7019eafe29f97f527c418,2024-03-13T14:28:45.217000 @@ -241466,7 +241466,7 @@ CVE-2024-28432,0,0,4bc8c3df18623e8712ef966fb24c80f6754436b2eb6a0c14d5d3c56f5a161 CVE-2024-28535,0,0,05b59fc574e3ec1a67ffae1023c5999e94849ce19d6ee2f539dda71a994d8b6c,2024-03-12T16:02:33.900000 CVE-2024-28553,0,0,805b633f3af1b0b015d2f8e90520174ed99391ad33f4ee744bfc3e783d7c9257,2024-03-12T16:02:33.900000 CVE-2024-28623,0,0,81bda7f177219bd08e3dc69b11f4157e89434624cca7692be3ee54e609ec67e1,2024-03-13T12:33:51.697000 -CVE-2024-28662,0,0,e05f096e93e919099c24f0e445269f4c69c3d2dbb3c321cfc964ec75534bdaff,2024-03-13T21:16:01.357000 +CVE-2024-28662,0,1,69ece6d6842931df6f24b49f57aa09e3d2ee5159729500803e8b5fa3837da086,2024-03-14T12:52:16.723000 CVE-2024-28665,0,0,15ff1802f077648abfb71685745562ccf344af547e52cbd5425e81cbe36cae7e,2024-03-13T14:28:45.217000 CVE-2024-28666,0,0,5e800cca159186be28f29e1824df7439f0dc92c267c794010b9aa154f3d0c123,2024-03-13T14:28:45.217000 CVE-2024-28667,0,0,8609dc77a902b440c3c0b00b00f201e51c1c73cdced91bd71fb67881bef0f7c4,2024-03-13T14:28:45.217000 @@ -241486,7 +241486,7 @@ CVE-2024-28681,0,0,ed8a4fd064b6b3346412990e6226cbe04bee8a6bd2aaad4671fdcd0478ce5 CVE-2024-28682,0,0,2c53ed716809a76ded005fd10ac6d93891dbf2dd9f02238c66f1445af60cb8e7,2024-03-13T18:15:58.530000 CVE-2024-28683,0,0,14fce1fb8fe5dd3fb68153125dd387047f48de59cd587ce41acfe8b0e8fa04c2,2024-03-13T18:15:58.530000 CVE-2024-28684,0,0,df89c702874c46527da5dc5bf33ec252c05a69f53466623f5ca04f0566a6cd25,2024-03-13T14:28:45.217000 -CVE-2024-28746,1,1,68b127d8baa050906fc806d29eb629eac7d2be78c059e66496ad730631b35b73,2024-03-14T09:15:47.577000 +CVE-2024-28746,0,1,4e08f19b517756fb15fbaf966494c1aeec3b9803b4e2b615b4d5a557eb48c84a,2024-03-14T12:52:09.877000 CVE-2024-28753,0,0,73ca850c1b6879daba607bc61d7d16457b56173a47004b8bff799b514a526c36,2024-03-11T01:32:39.697000 CVE-2024-28754,0,0,9281349f951cf3fa92b3f484f1e5f3e3b9f20229dcabe6872ba34e9bebaf3b2c,2024-03-11T01:32:39.697000 CVE-2024-28757,0,0,2ea8a9bd701b62a4c7d927e860f5361b09b4376e3bc3bbb014ff5d4ca725cec6,2024-03-11T01:32:29.610000