From e1d4f5547322c26694a7ecc6bf159f68b2b62a3f Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sat, 9 Mar 2024 11:03:25 +0000 Subject: [PATCH] Auto-Update: 2024-03-09T11:00:37.027821+00:00 --- CVE-2024/CVE-2024-18xx/CVE-2024-1870.json | 51 +++++++++++++ CVE-2024/CVE-2024-23xx/CVE-2024-2330.json | 88 +++++++++++++++++++++++ CVE-2024/CVE-2024-23xx/CVE-2024-2331.json | 88 +++++++++++++++++++++++ README.md | 22 +++--- _state.csv | 21 +++--- 5 files changed, 247 insertions(+), 23 deletions(-) create mode 100644 CVE-2024/CVE-2024-18xx/CVE-2024-1870.json create mode 100644 CVE-2024/CVE-2024-23xx/CVE-2024-2330.json create mode 100644 CVE-2024/CVE-2024-23xx/CVE-2024-2331.json diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1870.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1870.json new file mode 100644 index 00000000000..de6922937e4 --- /dev/null +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1870.json @@ -0,0 +1,51 @@ +{ + "id": "CVE-2024-1870", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-03-09T10:15:06.370", + "lastModified": "2024-03-09T10:15:06.370", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Colibri Page Builder plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the callActivateLicenseEndpoint function in all versions up to, and including, 1.0.260. This makes it possible for authenticated attackers, with subscriber access or higher, to update the license key." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/colibri-page-builder/trunk/src/License/ActivationForm.php#L356", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3045582/colibri-page-builder/trunk/src/License/ActivationForm.php?contextall=1&old=2888093&old_path=%2Fcolibri-page-builder%2Ftrunk%2Fsrc%2FLicense%2FActivationForm.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/130637ce-d70a-4831-8b88-a2a6e8a95c42?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2330.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2330.json new file mode 100644 index 00000000000..b89470c248e --- /dev/null +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2330.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-2330", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-09T09:15:05.977", + "lastModified": "2024-03-09T09:15:05.977", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Netentsec NS-ASG Application Security Gateway 6.3. It has been classified as critical. This affects an unknown part of the file /protocol/index.php. The manipulation of the argument IPAddr leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-256281 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/jikedaodao/cve/blob/main/NS-ASG-sql-addmacbind.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.256281", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.256281", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2331.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2331.json new file mode 100644 index 00000000000..a073a1a5c35 --- /dev/null +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2331.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-2331", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-09T10:15:06.570", + "lastModified": "2024-03-09T10:15:06.570", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Tourist Reservation System 1.0. It has been declared as critical. This vulnerability affects the function ad_writedata of the file System.cpp. The manipulation of the argument ad_code leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-256282 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/wkeyi0x1/vul-report/blob/main/Tourist%20Reservation%20System%20using%20C%2B%2B%20with%20Free%20Source%20Code/buffer-overflow-1.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.256282", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.256282", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 6870d0ee6bc..4194e31f9c6 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-03-09T09:00:30.600417+00:00 +2024-03-09T11:00:37.027821+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-03-09T08:15:06.217000+00:00 +2024-03-09T10:15:06.570000+00:00 ``` ### Last Data Feed Release @@ -29,28 +29,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -240933 +240936 ``` ### CVEs added in the last Commit -Recently added CVEs: `8` +Recently added CVEs: `3` -* [CVE-2024-1123](CVE-2024/CVE-2024-11xx/CVE-2024-1123.json) (`2024-03-09T07:15:07.233`) -* [CVE-2024-1124](CVE-2024/CVE-2024-11xx/CVE-2024-1124.json) (`2024-03-09T07:15:08.000`) -* [CVE-2024-1125](CVE-2024/CVE-2024-11xx/CVE-2024-1125.json) (`2024-03-09T07:15:08.313`) -* [CVE-2024-1320](CVE-2024/CVE-2024-13xx/CVE-2024-1320.json) (`2024-03-09T07:15:08.730`) -* [CVE-2024-1767](CVE-2024/CVE-2024-17xx/CVE-2024-1767.json) (`2024-03-09T07:15:09.173`) -* [CVE-2024-2329](CVE-2024/CVE-2024-23xx/CVE-2024-2329.json) (`2024-03-09T08:15:06.217`) -* [CVE-2024-25501](CVE-2024/CVE-2024-255xx/CVE-2024-25501.json) (`2024-03-09T08:15:05.973`) -* [CVE-2024-28089](CVE-2024/CVE-2024-280xx/CVE-2024-28089.json) (`2024-03-09T07:15:09.577`) +* [CVE-2024-1870](CVE-2024/CVE-2024-18xx/CVE-2024-1870.json) (`2024-03-09T10:15:06.370`) +* [CVE-2024-2330](CVE-2024/CVE-2024-23xx/CVE-2024-2330.json) (`2024-03-09T09:15:05.977`) +* [CVE-2024-2331](CVE-2024/CVE-2024-23xx/CVE-2024-2331.json) (`2024-03-09T10:15:06.570`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `0` -* [CVE-2024-26450](CVE-2024/CVE-2024-264xx/CVE-2024-26450.json) (`2024-03-09T08:15:06.120`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 7146bd30c51..b6cc98285b1 100644 --- a/_state.csv +++ b/_state.csv @@ -238277,9 +238277,9 @@ CVE-2024-1118,0,0,e3fd11a546344333b8c35c35f5363b92eb521f87d371ac843fa5cdbb7cbfe4 CVE-2024-1120,0,0,936dd6469f361472c41cbe255905233eb8909005bcef59399cb5fdd735d69c83,2024-03-01T14:04:04.827000 CVE-2024-1121,0,0,5242fbff2542109039f2dccd3ecf577228b85d96ab3ffc6d3c7465fcd094d166,2024-02-13T19:42:57.107000 CVE-2024-1122,0,0,e3c7c1ad4304e630c1635693614bd197bceba74362044ae36b2d3b19524aad38,2024-02-15T19:17:26.630000 -CVE-2024-1123,1,1,9c107b33a9c78598b6d4cb189216c41a312253dd82554088b5fbe1fa2959b535,2024-03-09T07:15:07.233000 -CVE-2024-1124,1,1,7fd45c0257b35bfcb0a9a5ecc477af859ebdfa79e92eb86f8c8346309497e24d,2024-03-09T07:15:08 -CVE-2024-1125,1,1,f75fef907260e226bd45211b8eae777e3186081c448fde49a6bbc5cb8adea772,2024-03-09T07:15:08.313000 +CVE-2024-1123,0,0,9c107b33a9c78598b6d4cb189216c41a312253dd82554088b5fbe1fa2959b535,2024-03-09T07:15:07.233000 +CVE-2024-1124,0,0,7fd45c0257b35bfcb0a9a5ecc477af859ebdfa79e92eb86f8c8346309497e24d,2024-03-09T07:15:08 +CVE-2024-1125,0,0,f75fef907260e226bd45211b8eae777e3186081c448fde49a6bbc5cb8adea772,2024-03-09T07:15:08.313000 CVE-2024-1128,0,0,23e0a7ac2eb24205bc0e57b1035d2ffc364cb8e77360b281fd3875c8acaa6717,2024-02-29T13:49:29.390000 CVE-2024-1129,0,0,9e26e4f963c1529e8b107dd7310b33bd78874e7f902263578d3990ceccc8167b,2024-02-29T13:49:29.390000 CVE-2024-1130,0,0,66f1630830ed1d095eb852a3f063099a0dc3b2263f9c4f8743191411b15cbd61,2024-02-29T13:49:29.390000 @@ -238380,7 +238380,7 @@ CVE-2024-1316,0,0,71137ee023059efde9ea6dfce3b572409e6580b9426330a66bdb1f551ebc3e CVE-2024-1317,0,0,677d2e22c876d1f8a2362f14eec614350ca5518b287bd87de6939bf8afc48e88,2024-02-29T13:49:29.390000 CVE-2024-1318,0,0,422c230b919b2aed39d902af5834079d78461435b9de398b39e0ef988ed8aaa2,2024-02-29T13:49:29.390000 CVE-2024-1319,0,0,4e669b4210ff650707325897da6b55c2caa5cb41a85cef69c41685513463c6d1,2024-03-05T13:41:01.900000 -CVE-2024-1320,1,1,1ec4c9d7ddd78591eeb95f58f24f0c9de688126a662923fad0897d041207c299,2024-03-09T07:15:08.730000 +CVE-2024-1320,0,0,1ec4c9d7ddd78591eeb95f58f24f0c9de688126a662923fad0897d041207c299,2024-03-09T07:15:08.730000 CVE-2024-1322,0,0,55eb557d746bd5b316565e48cf52968ab1ba8b0aa245d5ad47a485b7878e6771,2024-02-29T13:49:29.390000 CVE-2024-1323,0,0,f857e29b0540aed96943a25b1179a5166e6aff501672f2c505f52ee84f4e77cb,2024-02-27T14:20:06.637000 CVE-2024-1329,0,0,c251ab89131ed5db620ce7b9371daf5508a26377e3f0f0d0996003e3074e8cd1,2024-02-15T18:27:28.837000 @@ -238560,7 +238560,7 @@ CVE-2024-1758,0,0,6de6dd43b2bb9af7fe1358bc4934bd64904e9488104279e3470618b288cbda CVE-2024-1760,0,0,0a20f47041faa81845898be9ba0faa3a27a19a140e382ff1058d2f999acd0fd1,2024-03-06T15:18:08.093000 CVE-2024-1761,0,0,9e36bbb76f5c2b7f4a9f5c6274a1f378aa86f86f618e6f962a515dfe593dc5f7,2024-03-07T13:52:27.110000 CVE-2024-1764,0,0,c434e7eb3867d4e9c121215628110f61b78b54be2a078e3d4abbb0d2595e2437,2024-03-06T15:18:08.093000 -CVE-2024-1767,1,1,af9b58271fe2cff932396ea250a3d29b3f8069abd3d5a9539a5dfec0d691577f,2024-03-09T07:15:09.173000 +CVE-2024-1767,0,0,af9b58271fe2cff932396ea250a3d29b3f8069abd3d5a9539a5dfec0d691577f,2024-03-09T07:15:09.173000 CVE-2024-1769,0,0,4b17a6efe485c004cbf1cc71fd32ae864ff319587ea6998c7a1ad28d6dff65e5,2024-03-05T13:41:01.900000 CVE-2024-1771,0,0,cc7280a085dd6f03eb9687c2eff5425926f2bc0e4a81dde799379b7786c7a87e,2024-03-06T15:18:08.093000 CVE-2024-1773,0,0,eea85e1a4bb87da89a486d39c94ff7ae4042032c41aee54c0645824074a798c9,2024-03-08T14:02:57.420000 @@ -238606,6 +238606,7 @@ CVE-2024-1864,0,0,797c711e6b44e5bc5fc07b8a96b3914e190ffab8282378f1e76f968098d889 CVE-2024-1865,0,0,72c248580cf80b6b26359b857531fc6d6bafece63af2cd2d90fccedf68d28d3b,2024-02-27T22:15:14.847000 CVE-2024-1866,0,0,c996e8524f8bc688a87621835a946e6cc299eedbf430cec590d1bba5d1e5a6d0,2024-02-27T22:15:14.887000 CVE-2024-1869,0,0,cff6c8f0755d6d4ba55d7545c106c11346669d86f984fb79783c8f1f4307c285,2024-03-01T22:22:25.913000 +CVE-2024-1870,1,1,76546a68428ba841f53ec4dee04b600b2576be6162e8fd5d6eacdf81d67c7e03,2024-03-09T10:15:06.370000 CVE-2024-1871,0,0,c60dbb1c934e80a64fb33a6e2c256794451ba2b4a16b3deb27a47189bebba050,2024-02-29T09:15:06.190000 CVE-2024-1875,0,0,6b658f389b536cea98293568c7ee6644587a9b1bef069f774207e95c99ee5146,2024-02-29T01:43:56.130000 CVE-2024-1876,0,0,82560fab1f4fbe2b28673412a54026b5c1806e6e970cf396594ce5608059f917,2024-02-29T09:15:06.320000 @@ -239726,7 +239727,7 @@ CVE-2024-23286,0,0,3a3ac4fe44c85fe94cea0225e0a064200cd84c6a8d195e01d14bfa256f0d1 CVE-2024-23287,0,0,c58ae62f6494d2a94d4353ea0420ad2d83bdf90a920ca47b31647814cce0d864,2024-03-08T14:02:57.420000 CVE-2024-23288,0,0,2220ac70f77367cd88bd84f6b11703e03e7de54d6801f402f025b7c5ef4a9069,2024-03-08T14:02:57.420000 CVE-2024-23289,0,0,74d35dbe495c7642f763a5758de5555020e63f0e9c4c7fb71c0a62313b1a48a1,2024-03-08T14:02:57.420000 -CVE-2024-2329,1,1,9c8e65a4fd5d602fe14cf87a0b1612d024c6a1ed1e9c03669d8d941edd5ca8c1,2024-03-09T08:15:06.217000 +CVE-2024-2329,0,0,9c8e65a4fd5d602fe14cf87a0b1612d024c6a1ed1e9c03669d8d941edd5ca8c1,2024-03-09T08:15:06.217000 CVE-2024-23290,0,0,ae16c7bd64254777e8ec093a5acaa858f7d0f54b3f14d450d5952c05173f9f60,2024-03-08T14:02:57.420000 CVE-2024-23291,0,0,04df7ee4b5e53fb596d12b117323f7b0b3bbb5f6de58ae6aeeee1ebbd555c499,2024-03-08T14:02:57.420000 CVE-2024-23292,0,0,52f99bdd63acae4b605d2ded28155ff671a22b372187b5bb34f67711a2b6ca46,2024-03-08T14:02:57.420000 @@ -239735,6 +239736,7 @@ CVE-2024-23294,0,0,57c91e91a2082dfe96663ac4b06553ebfe4af3f38ebcc64fc4b91852476bd CVE-2024-23295,0,0,11339cc0778c5660cfdfde02f62fcb9fc218757d722b581630970bfb87b76f02,2024-03-08T14:02:57.420000 CVE-2024-23296,0,0,70f66a07da76489183592b282c10bccbbe2df9dbdd0480c70367e69713458ad2,2024-03-07T19:15:11.687000 CVE-2024-23297,0,0,24ee6fcfdad75d10a074c7f7c8c3078e2c905d064d4f4a83f74c1bc6866f52d0,2024-03-08T14:02:57.420000 +CVE-2024-2330,1,1,f750c6de0b993e7ca0cb7ea32ed94526e38e9a42251838f7fc8de884202b9223,2024-03-09T09:15:05.977000 CVE-2024-23301,0,0,95f1c4c0d3c3f56beb5ca2f43c481bd416943d89ac106cdf8ea6bddea7fc220a,2024-02-21T03:15:08.950000 CVE-2024-23302,0,0,863344aa30e4660a85cb1dadb5cc739d77d5cca4411a54dffe0a3cc5e6d4c938,2024-02-29T13:49:29.390000 CVE-2024-23304,0,0,f4bc63f089c081f8de89565719320483c4f38e3af47af8e7dc8d4d30748891c3,2024-02-13T22:49:18.687000 @@ -239742,6 +239744,7 @@ CVE-2024-23305,0,0,b70f6c5806a40ee812b208fff2ce28f5f3b7f49be205944ff9372794cc2b6 CVE-2024-23306,0,0,b32b8210ccda58dcc1f1ee55cd283a062221bce6519a58fb2184ccff58dcc4fc,2024-02-14T18:04:45.380000 CVE-2024-23307,0,0,82ea106241eb58ab4d192216f2f5a2d110882416a201ecd04c1f9cfb732634bc,2024-01-31T20:38:12.743000 CVE-2024-23308,0,0,0eaa9f4723448107ead01ec4175db96e103411e07435a0e191d2a95ba6f22d1e,2024-02-14T18:04:45.380000 +CVE-2024-2331,1,1,1a09ed5ec8fc305c8d02b62047dc395bbc7b828d7dec62d39cd89e1cf9121aa6,2024-03-09T10:15:06.570000 CVE-2024-23310,0,0,c7355a50b4bca7bc3b633f9707105f29200f0be36a2fd5cfb29df38b858909c7,2024-02-20T19:50:53.960000 CVE-2024-23313,0,0,ca34781688f7e9926dc7e3cf4b6af4657420b9da713475de2ea189c35b7183d1,2024-02-20T19:50:53.960000 CVE-2024-23314,0,0,b1c4a7acc71e147348da30d8a66dbeab4342e6585976e49de7252a67ae54f62d,2024-02-14T18:04:45.380000 @@ -240502,7 +240505,7 @@ CVE-2024-25461,0,0,ff9c7389dbf883803b3d7ff0b96f823d8c83a19a6abab9dd2ebda71c398b5 CVE-2024-25466,0,0,c4ed87974de177e036ba4c046a8b808bfb2e5d37116e1f3dbea09f35fe2aed68,2024-02-16T13:37:51.433000 CVE-2024-25468,0,0,689cbd3de116ed2f097be6892186e0dd30daa2bde9afea2c256b5d624b13afab,2024-02-20T19:50:53.960000 CVE-2024-25469,0,0,96be9bcc7fde8f9b63f103d576b0d22a9c84a3c5935374af13a2466b2f2f5aa2,2024-02-26T13:42:22.567000 -CVE-2024-25501,1,1,0b5a69cce4f8803c71ec78b9ab7cd2cf9ae54c805ca80db0c8cc815c858b5a95,2024-03-09T08:15:05.973000 +CVE-2024-25501,0,0,0b5a69cce4f8803c71ec78b9ab7cd2cf9ae54c805ca80db0c8cc815c858b5a95,2024-03-09T08:15:05.973000 CVE-2024-25502,0,0,50331b6b298e51ff1fb5155b43730c3887534f74eacaa5eabfebdbefa930be85,2024-02-16T13:38:00.047000 CVE-2024-25551,0,0,08dea6730d2a3539d15dd516547ab3c25a1bf59710632ae63632a88cbff77b71,2024-03-04T13:58:23.447000 CVE-2024-25552,0,0,d883aeb50248972b9f86293464fb83b3894fa14aa0a35cda83456c82f7157e6f,2024-03-01T14:04:26.010000 @@ -240716,7 +240719,7 @@ CVE-2024-26350,0,0,1f62ec8cd425e84b1282a5e55493461489796820c50a425af585677fa2bae CVE-2024-26351,0,0,61b98d66760f09ba8a0757ca890b9ad836349a62d566c880c0eb8336d14dbb04,2024-02-22T19:07:27.197000 CVE-2024-26352,0,0,ed876b320273da7c752d57a08640f2d98ce80b026324bdf46d0712ec0097ce54,2024-02-22T19:07:27.197000 CVE-2024-26445,0,0,3735cabd04dab3a1baa3e135ef467df65425520025be25bd7cf66dc1b1b0bf61,2024-02-22T19:07:27.197000 -CVE-2024-26450,0,1,e70e1c7044e1447bb73bfa4a556135e1953f1916a7225089ba5c38735bf8ee34,2024-03-09T08:15:06.120000 +CVE-2024-26450,0,0,e70e1c7044e1447bb73bfa4a556135e1953f1916a7225089ba5c38735bf8ee34,2024-03-09T08:15:06.120000 CVE-2024-26455,0,0,b8d798122eed5fa7dc5e81852b3374f7f4b40339c21e80b998d09e1a756fc71d,2024-02-26T22:10:40.463000 CVE-2024-26458,0,0,4b2bac12846011765db5a8d92c99fed71bd0c8fd706ee4d4f4c7e419547c7ad4,2024-02-29T13:49:29.390000 CVE-2024-26461,0,0,904046a1bdb8d57e836285398ec79f3a5f035120c749bfa545aeddc73ebaca7d,2024-02-29T13:49:29.390000 @@ -240892,7 +240895,7 @@ CVE-2024-27949,0,0,12ee9b935394b527d1677a59b517c94d0df067a0b32bfff31d7cb2be5b4b5 CVE-2024-27950,0,0,56d632dad56c45d949d3327de16e5b70b08683cea8ce7876ca8c59cc37ee8062,2024-03-01T14:04:04.827000 CVE-2024-28084,0,0,2ea238298cc724e9290d5587502d4eedb8db15dd1861547724435b977511956c,2024-03-04T13:58:23.447000 CVE-2024-28088,0,0,9a10dd503198550e89a078bdf745e1ea7de71394ab5735ab0f1469895e72b20d,2024-03-04T13:58:23.447000 -CVE-2024-28089,1,1,86c02185c28f01854145b18859cb689806d221e7f2a4a66edfd83a90b723ef69,2024-03-09T07:15:09.577000 +CVE-2024-28089,0,0,86c02185c28f01854145b18859cb689806d221e7f2a4a66edfd83a90b723ef69,2024-03-09T07:15:09.577000 CVE-2024-28094,0,0,45821c38270b8552e50f50b73436d99164a20d22d9b4b8876276d92b2a0a88d9,2024-03-07T13:52:27.110000 CVE-2024-28095,0,0,cc359d20cf58cf4c4e6a4bc345ac1d1135a557dfb7920f405bfe639456bcfe46,2024-03-07T13:52:27.110000 CVE-2024-28096,0,0,bd233bb77c2105c8f9ae41f3196895f407f421cf037a91cc0eb753e3f00e4372,2024-03-07T13:52:27.110000