From e2738ddd1407980ba92b4ac97b7bff025acb3532 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 9 Apr 2024 18:03:27 +0000 Subject: [PATCH] Auto-Update: 2024-04-09T18:00:38.323673+00:00 --- CVE-2023/CVE-2023-487xx/CVE-2023-48724.json | 6 +- CVE-2023/CVE-2023-490xx/CVE-2023-49074.json | 6 +- CVE-2023/CVE-2023-491xx/CVE-2023-49133.json | 6 +- CVE-2023/CVE-2023-491xx/CVE-2023-49134.json | 6 +- CVE-2023/CVE-2023-499xx/CVE-2023-49906.json | 6 +- CVE-2023/CVE-2023-499xx/CVE-2023-49907.json | 6 +- CVE-2023/CVE-2023-499xx/CVE-2023-49908.json | 6 +- CVE-2023/CVE-2023-499xx/CVE-2023-49909.json | 6 +- CVE-2023/CVE-2023-499xx/CVE-2023-49910.json | 6 +- CVE-2023/CVE-2023-499xx/CVE-2023-49911.json | 6 +- CVE-2023/CVE-2023-499xx/CVE-2023-49912.json | 6 +- CVE-2023/CVE-2023-499xx/CVE-2023-49913.json | 6 +- CVE-2024/CVE-2024-206xx/CVE-2024-20665.json | 55 +++++ CVE-2024/CVE-2024-206xx/CVE-2024-20669.json | 55 +++++ CVE-2024/CVE-2024-206xx/CVE-2024-20670.json | 55 +++++ CVE-2024/CVE-2024-206xx/CVE-2024-20678.json | 55 +++++ CVE-2024/CVE-2024-206xx/CVE-2024-20685.json | 55 +++++ CVE-2024/CVE-2024-206xx/CVE-2024-20688.json | 55 +++++ CVE-2024/CVE-2024-206xx/CVE-2024-20689.json | 55 +++++ CVE-2024/CVE-2024-206xx/CVE-2024-20693.json | 55 +++++ CVE-2024/CVE-2024-213xx/CVE-2024-21322.json | 55 +++++ CVE-2024/CVE-2024-213xx/CVE-2024-21323.json | 55 +++++ CVE-2024/CVE-2024-213xx/CVE-2024-21324.json | 55 +++++ CVE-2024/CVE-2024-214xx/CVE-2024-21409.json | 55 +++++ CVE-2024/CVE-2024-214xx/CVE-2024-21424.json | 55 +++++ CVE-2024/CVE-2024-214xx/CVE-2024-21447.json | 55 +++++ CVE-2024/CVE-2024-261xx/CVE-2024-26158.json | 55 +++++ CVE-2024/CVE-2024-261xx/CVE-2024-26168.json | 55 +++++ CVE-2024/CVE-2024-261xx/CVE-2024-26171.json | 55 +++++ CVE-2024/CVE-2024-261xx/CVE-2024-26172.json | 55 +++++ CVE-2024/CVE-2024-261xx/CVE-2024-26175.json | 55 +++++ CVE-2024/CVE-2024-261xx/CVE-2024-26179.json | 55 +++++ CVE-2024/CVE-2024-261xx/CVE-2024-26180.json | 55 +++++ CVE-2024/CVE-2024-261xx/CVE-2024-26183.json | 55 +++++ CVE-2024/CVE-2024-261xx/CVE-2024-26189.json | 55 +++++ CVE-2024/CVE-2024-261xx/CVE-2024-26193.json | 55 +++++ CVE-2024/CVE-2024-261xx/CVE-2024-26194.json | 55 +++++ CVE-2024/CVE-2024-261xx/CVE-2024-26195.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26200.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26202.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26205.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26207.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26208.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26209.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26210.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26211.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26212.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26213.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26214.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26215.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26216.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26217.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26218.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26219.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26220.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26221.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26222.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26223.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26224.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26226.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26227.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26228.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26229.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26230.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26231.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26232.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26233.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26234.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26235.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26236.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26237.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26239.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26240.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26241.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26242.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26243.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26244.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26245.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26248.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26250.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26251.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26252.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26253.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26254.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26255.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26256.json | 55 +++++ CVE-2024/CVE-2024-262xx/CVE-2024-26257.json | 55 +++++ CVE-2024/CVE-2024-282xx/CVE-2024-28235.json | 71 +++++++ CVE-2024/CVE-2024-288xx/CVE-2024-28896.json | 55 +++++ CVE-2024/CVE-2024-288xx/CVE-2024-28897.json | 55 +++++ CVE-2024/CVE-2024-288xx/CVE-2024-28898.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28900.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28901.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28902.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28903.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28904.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28905.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28906.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28907.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28908.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28909.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28910.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28911.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28912.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28913.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28914.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28915.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28917.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28919.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28920.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28921.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28922.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28923.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28924.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28925.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28926.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28927.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28929.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28930.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28931.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28932.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28933.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28934.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28935.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28936.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28937.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28938.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28939.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28940.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28941.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28942.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28943.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28944.json | 55 +++++ CVE-2024/CVE-2024-289xx/CVE-2024-28945.json | 55 +++++ CVE-2024/CVE-2024-290xx/CVE-2024-29043.json | 55 +++++ CVE-2024/CVE-2024-290xx/CVE-2024-29044.json | 55 +++++ CVE-2024/CVE-2024-290xx/CVE-2024-29045.json | 55 +++++ CVE-2024/CVE-2024-290xx/CVE-2024-29046.json | 55 +++++ CVE-2024/CVE-2024-290xx/CVE-2024-29047.json | 55 +++++ CVE-2024/CVE-2024-290xx/CVE-2024-29048.json | 55 +++++ CVE-2024/CVE-2024-290xx/CVE-2024-29049.json | 14 +- CVE-2024/CVE-2024-290xx/CVE-2024-29050.json | 55 +++++ CVE-2024/CVE-2024-290xx/CVE-2024-29052.json | 55 +++++ CVE-2024/CVE-2024-290xx/CVE-2024-29053.json | 55 +++++ CVE-2024/CVE-2024-290xx/CVE-2024-29054.json | 55 +++++ CVE-2024/CVE-2024-290xx/CVE-2024-29055.json | 55 +++++ CVE-2024/CVE-2024-290xx/CVE-2024-29056.json | 55 +++++ CVE-2024/CVE-2024-290xx/CVE-2024-29061.json | 55 +++++ CVE-2024/CVE-2024-290xx/CVE-2024-29062.json | 55 +++++ CVE-2024/CVE-2024-290xx/CVE-2024-29063.json | 55 +++++ CVE-2024/CVE-2024-290xx/CVE-2024-29064.json | 55 +++++ CVE-2024/CVE-2024-290xx/CVE-2024-29066.json | 55 +++++ CVE-2024/CVE-2024-299xx/CVE-2024-29905.json | 59 ++++++ CVE-2024/CVE-2024-299xx/CVE-2024-29981.json | 14 +- CVE-2024/CVE-2024-299xx/CVE-2024-29982.json | 55 +++++ CVE-2024/CVE-2024-299xx/CVE-2024-29983.json | 55 +++++ CVE-2024/CVE-2024-299xx/CVE-2024-29984.json | 55 +++++ CVE-2024/CVE-2024-299xx/CVE-2024-29985.json | 55 +++++ CVE-2024/CVE-2024-299xx/CVE-2024-29988.json | 55 +++++ CVE-2024/CVE-2024-299xx/CVE-2024-29989.json | 55 +++++ CVE-2024/CVE-2024-299xx/CVE-2024-29990.json | 55 +++++ CVE-2024/CVE-2024-299xx/CVE-2024-29992.json | 55 +++++ CVE-2024/CVE-2024-299xx/CVE-2024-29993.json | 55 +++++ CVE-2024/CVE-2024-302xx/CVE-2024-30262.json | 63 ++++++ CVE-2024/CVE-2024-314xx/CVE-2024-31455.json | 67 ++++++ CVE-2024/CVE-2024-318xx/CVE-2024-31864.json | 40 ++++ CVE-2024/CVE-2024-318xx/CVE-2024-31865.json | 36 ++++ CVE-2024/CVE-2024-318xx/CVE-2024-31866.json | 36 ++++ CVE-2024/CVE-2024-318xx/CVE-2024-31867.json | 36 ++++ CVE-2024/CVE-2024-318xx/CVE-2024-31868.json | 36 ++++ CVE-2024/CVE-2024-32xx/CVE-2024-3281.json | 20 ++ README.md | 75 ++++--- _state.csv | 223 +++++++++++++++++--- 173 files changed, 8821 insertions(+), 126 deletions(-) create mode 100644 CVE-2024/CVE-2024-206xx/CVE-2024-20665.json create mode 100644 CVE-2024/CVE-2024-206xx/CVE-2024-20669.json create mode 100644 CVE-2024/CVE-2024-206xx/CVE-2024-20670.json create mode 100644 CVE-2024/CVE-2024-206xx/CVE-2024-20678.json create mode 100644 CVE-2024/CVE-2024-206xx/CVE-2024-20685.json create mode 100644 CVE-2024/CVE-2024-206xx/CVE-2024-20688.json create mode 100644 CVE-2024/CVE-2024-206xx/CVE-2024-20689.json create mode 100644 CVE-2024/CVE-2024-206xx/CVE-2024-20693.json create mode 100644 CVE-2024/CVE-2024-213xx/CVE-2024-21322.json create mode 100644 CVE-2024/CVE-2024-213xx/CVE-2024-21323.json create mode 100644 CVE-2024/CVE-2024-213xx/CVE-2024-21324.json create mode 100644 CVE-2024/CVE-2024-214xx/CVE-2024-21409.json create mode 100644 CVE-2024/CVE-2024-214xx/CVE-2024-21424.json create mode 100644 CVE-2024/CVE-2024-214xx/CVE-2024-21447.json create mode 100644 CVE-2024/CVE-2024-261xx/CVE-2024-26158.json create mode 100644 CVE-2024/CVE-2024-261xx/CVE-2024-26168.json create mode 100644 CVE-2024/CVE-2024-261xx/CVE-2024-26171.json create mode 100644 CVE-2024/CVE-2024-261xx/CVE-2024-26172.json create mode 100644 CVE-2024/CVE-2024-261xx/CVE-2024-26175.json create mode 100644 CVE-2024/CVE-2024-261xx/CVE-2024-26179.json create mode 100644 CVE-2024/CVE-2024-261xx/CVE-2024-26180.json create mode 100644 CVE-2024/CVE-2024-261xx/CVE-2024-26183.json create mode 100644 CVE-2024/CVE-2024-261xx/CVE-2024-26189.json create mode 100644 CVE-2024/CVE-2024-261xx/CVE-2024-26193.json create mode 100644 CVE-2024/CVE-2024-261xx/CVE-2024-26194.json create mode 100644 CVE-2024/CVE-2024-261xx/CVE-2024-26195.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26200.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26202.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26205.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26207.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26208.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26209.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26210.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26211.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26212.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26213.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26214.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26215.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26216.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26217.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26218.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26219.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26220.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26221.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26222.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26223.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26224.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26226.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26227.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26228.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26229.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26230.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26231.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26232.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26233.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26234.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26235.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26236.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26237.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26239.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26240.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26241.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26242.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26243.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26244.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26245.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26248.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26250.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26251.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26252.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26253.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26254.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26255.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26256.json create mode 100644 CVE-2024/CVE-2024-262xx/CVE-2024-26257.json create mode 100644 CVE-2024/CVE-2024-282xx/CVE-2024-28235.json create mode 100644 CVE-2024/CVE-2024-288xx/CVE-2024-28896.json create mode 100644 CVE-2024/CVE-2024-288xx/CVE-2024-28897.json create mode 100644 CVE-2024/CVE-2024-288xx/CVE-2024-28898.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28900.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28901.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28902.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28903.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28904.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28905.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28906.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28907.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28908.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28909.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28910.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28911.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28912.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28913.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28914.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28915.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28917.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28919.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28920.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28921.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28922.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28923.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28924.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28925.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28926.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28927.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28929.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28930.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28931.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28932.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28933.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28934.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28935.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28936.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28937.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28938.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28939.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28940.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28941.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28942.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28943.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28944.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28945.json create mode 100644 CVE-2024/CVE-2024-290xx/CVE-2024-29043.json create mode 100644 CVE-2024/CVE-2024-290xx/CVE-2024-29044.json create mode 100644 CVE-2024/CVE-2024-290xx/CVE-2024-29045.json create mode 100644 CVE-2024/CVE-2024-290xx/CVE-2024-29046.json create mode 100644 CVE-2024/CVE-2024-290xx/CVE-2024-29047.json create mode 100644 CVE-2024/CVE-2024-290xx/CVE-2024-29048.json create mode 100644 CVE-2024/CVE-2024-290xx/CVE-2024-29050.json create mode 100644 CVE-2024/CVE-2024-290xx/CVE-2024-29052.json create mode 100644 CVE-2024/CVE-2024-290xx/CVE-2024-29053.json create mode 100644 CVE-2024/CVE-2024-290xx/CVE-2024-29054.json create mode 100644 CVE-2024/CVE-2024-290xx/CVE-2024-29055.json create mode 100644 CVE-2024/CVE-2024-290xx/CVE-2024-29056.json create mode 100644 CVE-2024/CVE-2024-290xx/CVE-2024-29061.json create mode 100644 CVE-2024/CVE-2024-290xx/CVE-2024-29062.json create mode 100644 CVE-2024/CVE-2024-290xx/CVE-2024-29063.json create mode 100644 CVE-2024/CVE-2024-290xx/CVE-2024-29064.json create mode 100644 CVE-2024/CVE-2024-290xx/CVE-2024-29066.json create mode 100644 CVE-2024/CVE-2024-299xx/CVE-2024-29905.json create mode 100644 CVE-2024/CVE-2024-299xx/CVE-2024-29982.json create mode 100644 CVE-2024/CVE-2024-299xx/CVE-2024-29983.json create mode 100644 CVE-2024/CVE-2024-299xx/CVE-2024-29984.json create mode 100644 CVE-2024/CVE-2024-299xx/CVE-2024-29985.json create mode 100644 CVE-2024/CVE-2024-299xx/CVE-2024-29988.json create mode 100644 CVE-2024/CVE-2024-299xx/CVE-2024-29989.json create mode 100644 CVE-2024/CVE-2024-299xx/CVE-2024-29990.json create mode 100644 CVE-2024/CVE-2024-299xx/CVE-2024-29992.json create mode 100644 CVE-2024/CVE-2024-299xx/CVE-2024-29993.json create mode 100644 CVE-2024/CVE-2024-302xx/CVE-2024-30262.json create mode 100644 CVE-2024/CVE-2024-314xx/CVE-2024-31455.json create mode 100644 CVE-2024/CVE-2024-318xx/CVE-2024-31864.json create mode 100644 CVE-2024/CVE-2024-318xx/CVE-2024-31865.json create mode 100644 CVE-2024/CVE-2024-318xx/CVE-2024-31866.json create mode 100644 CVE-2024/CVE-2024-318xx/CVE-2024-31867.json create mode 100644 CVE-2024/CVE-2024-318xx/CVE-2024-31868.json create mode 100644 CVE-2024/CVE-2024-32xx/CVE-2024-3281.json diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48724.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48724.json index f32f254f6a4..a9755636371 100644 --- a/CVE-2023/CVE-2023-487xx/CVE-2023-48724.json +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48724.json @@ -2,7 +2,7 @@ "id": "CVE-2023-48724", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-04-09T15:15:28.397", - "lastModified": "2024-04-09T15:15:28.397", + "lastModified": "2024-04-09T17:15:31.287", "vulnStatus": "Received", "descriptions": [ { @@ -50,10 +50,6 @@ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1864", "source": "talos-cna@cisco.com" - }, - { - "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1864", - "source": "talos-cna@cisco.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-490xx/CVE-2023-49074.json b/CVE-2023/CVE-2023-490xx/CVE-2023-49074.json index 86d9c42bf7e..61e760e4ec6 100644 --- a/CVE-2023/CVE-2023-490xx/CVE-2023-49074.json +++ b/CVE-2023/CVE-2023-490xx/CVE-2023-49074.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49074", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-04-09T15:15:28.800", - "lastModified": "2024-04-09T15:15:28.800", + "lastModified": "2024-04-09T17:15:31.417", "vulnStatus": "Received", "descriptions": [ { @@ -50,10 +50,6 @@ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1861", "source": "talos-cna@cisco.com" - }, - { - "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1861", - "source": "talos-cna@cisco.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49133.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49133.json index c058342da0c..2b6cc9d30ef 100644 --- a/CVE-2023/CVE-2023-491xx/CVE-2023-49133.json +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49133.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49133", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-04-09T15:15:29.003", - "lastModified": "2024-04-09T15:15:29.003", + "lastModified": "2024-04-09T17:15:31.510", "vulnStatus": "Received", "descriptions": [ { @@ -50,10 +50,6 @@ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1862", "source": "talos-cna@cisco.com" - }, - { - "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1862", - "source": "talos-cna@cisco.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49134.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49134.json index d1527c983f0..41697e53e17 100644 --- a/CVE-2023/CVE-2023-491xx/CVE-2023-49134.json +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49134.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49134", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-04-09T15:15:29.220", - "lastModified": "2024-04-09T15:15:29.220", + "lastModified": "2024-04-09T17:15:31.600", "vulnStatus": "Received", "descriptions": [ { @@ -50,10 +50,6 @@ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1862", "source": "talos-cna@cisco.com" - }, - { - "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1862", - "source": "talos-cna@cisco.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49906.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49906.json index 663539ba4cb..ae0f4b67c32 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49906.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49906.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49906", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-04-09T15:15:29.433", - "lastModified": "2024-04-09T15:15:29.433", + "lastModified": "2024-04-09T17:15:31.697", "vulnStatus": "Received", "descriptions": [ { @@ -50,10 +50,6 @@ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1888", "source": "talos-cna@cisco.com" - }, - { - "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1888", - "source": "talos-cna@cisco.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49907.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49907.json index 4122f1fe2e5..2d2a9ef9c0c 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49907.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49907.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49907", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-04-09T15:15:29.637", - "lastModified": "2024-04-09T15:15:29.637", + "lastModified": "2024-04-09T17:15:31.783", "vulnStatus": "Received", "descriptions": [ { @@ -50,10 +50,6 @@ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1888", "source": "talos-cna@cisco.com" - }, - { - "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1888", - "source": "talos-cna@cisco.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49908.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49908.json index 38f50c24b03..c05042365f0 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49908.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49908.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49908", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-04-09T15:15:29.823", - "lastModified": "2024-04-09T15:15:29.823", + "lastModified": "2024-04-09T17:15:31.870", "vulnStatus": "Received", "descriptions": [ { @@ -50,10 +50,6 @@ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1888", "source": "talos-cna@cisco.com" - }, - { - "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1888", - "source": "talos-cna@cisco.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49909.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49909.json index c47654e44ca..a3bc2d46a4e 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49909.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49909.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49909", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-04-09T15:15:30.013", - "lastModified": "2024-04-09T15:15:30.013", + "lastModified": "2024-04-09T17:15:31.963", "vulnStatus": "Received", "descriptions": [ { @@ -50,10 +50,6 @@ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1888", "source": "talos-cna@cisco.com" - }, - { - "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1888", - "source": "talos-cna@cisco.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49910.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49910.json index e8843f6f5a9..26d4805afe8 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49910.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49910.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49910", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-04-09T15:15:30.210", - "lastModified": "2024-04-09T15:15:30.210", + "lastModified": "2024-04-09T17:15:32.053", "vulnStatus": "Received", "descriptions": [ { @@ -50,10 +50,6 @@ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1888", "source": "talos-cna@cisco.com" - }, - { - "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1888", - "source": "talos-cna@cisco.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49911.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49911.json index 997d891936e..3e6c42256fe 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49911.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49911.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49911", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-04-09T15:15:30.403", - "lastModified": "2024-04-09T15:15:30.403", + "lastModified": "2024-04-09T17:15:32.147", "vulnStatus": "Received", "descriptions": [ { @@ -50,10 +50,6 @@ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1888", "source": "talos-cna@cisco.com" - }, - { - "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1888", - "source": "talos-cna@cisco.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49912.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49912.json index 9bdc548b599..55f2f9bd235 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49912.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49912.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49912", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-04-09T15:15:30.593", - "lastModified": "2024-04-09T15:15:30.593", + "lastModified": "2024-04-09T17:15:32.227", "vulnStatus": "Received", "descriptions": [ { @@ -50,10 +50,6 @@ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1888", "source": "talos-cna@cisco.com" - }, - { - "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1888", - "source": "talos-cna@cisco.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49913.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49913.json index 2a7500228c8..214cfaa916a 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49913.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49913.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49913", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-04-09T15:15:30.783", - "lastModified": "2024-04-09T15:15:30.783", + "lastModified": "2024-04-09T17:15:32.320", "vulnStatus": "Received", "descriptions": [ { @@ -50,10 +50,6 @@ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1888", "source": "talos-cna@cisco.com" - }, - { - "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1888", - "source": "talos-cna@cisco.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20665.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20665.json new file mode 100644 index 00000000000..935d1e9e547 --- /dev/null +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20665.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-20665", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:32.413", + "lastModified": "2024-04-09T17:15:32.413", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "BitLocker Security Feature Bypass Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20665", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20669.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20669.json new file mode 100644 index 00000000000..95b930243ec --- /dev/null +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20669.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-20669", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:32.700", + "lastModified": "2024-04-09T17:15:32.700", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Secure Boot Security Feature Bypass Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20669", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20670.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20670.json new file mode 100644 index 00000000000..6b5cc977cc4 --- /dev/null +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20670.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-20670", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:32.907", + "lastModified": "2024-04-09T17:15:32.907", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Outlook for Windows Spoofing Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20670", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20678.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20678.json new file mode 100644 index 00000000000..421de35b368 --- /dev/null +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20678.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-20678", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:33.110", + "lastModified": "2024-04-09T17:15:33.110", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Remote Procedure Call Runtime Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20678", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20685.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20685.json new file mode 100644 index 00000000000..dc1eb4a353b --- /dev/null +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20685.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-20685", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:33.337", + "lastModified": "2024-04-09T17:15:33.337", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Azure Private 5G Core Denial of Service Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-130" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20685", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20688.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20688.json new file mode 100644 index 00000000000..fd0449ff5e4 --- /dev/null +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20688.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-20688", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:33.547", + "lastModified": "2024-04-09T17:15:33.547", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Secure Boot Security Feature Bypass Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20688", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20689.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20689.json new file mode 100644 index 00000000000..e7bd872c8d5 --- /dev/null +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20689.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-20689", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:33.750", + "lastModified": "2024-04-09T17:15:33.750", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Secure Boot Security Feature Bypass Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20689", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20693.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20693.json new file mode 100644 index 00000000000..5441d1bc2df --- /dev/null +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20693.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-20693", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:33.940", + "lastModified": "2024-04-09T17:15:33.940", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Kernel Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-426" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20693", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21322.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21322.json new file mode 100644 index 00000000000..f50ef2468f5 --- /dev/null +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21322.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-21322", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:34.160", + "lastModified": "2024-04-09T17:15:34.160", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Defender for IoT Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21322", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21323.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21323.json new file mode 100644 index 00000000000..5f56e745775 --- /dev/null +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21323.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-21323", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:34.380", + "lastModified": "2024-04-09T17:15:34.380", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Defender for IoT Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-36" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21323", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21324.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21324.json new file mode 100644 index 00000000000..2bd910a2616 --- /dev/null +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21324.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-21324", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:34.607", + "lastModified": "2024-04-09T17:15:34.607", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Defender for IoT Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21324", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21409.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21409.json new file mode 100644 index 00000000000..5acdb94a109 --- /dev/null +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21409.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-21409", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:34.803", + "lastModified": "2024-04-09T17:15:34.803", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": ".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21409", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21424.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21424.json new file mode 100644 index 00000000000..95b9fd3c02e --- /dev/null +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21424.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-21424", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:35.010", + "lastModified": "2024-04-09T17:15:35.010", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Azure Compute Gallery Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21424", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21447.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21447.json new file mode 100644 index 00000000000..5ab63c567da --- /dev/null +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21447.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-21447", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:35.213", + "lastModified": "2024-04-09T17:15:35.213", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Authentication Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21447", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26158.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26158.json new file mode 100644 index 00000000000..8cf4efc4e29 --- /dev/null +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26158.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26158", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:35.477", + "lastModified": "2024-04-09T17:15:35.477", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Install Service Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26158", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26168.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26168.json new file mode 100644 index 00000000000..4b61ae1d9b6 --- /dev/null +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26168.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26168", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:35.687", + "lastModified": "2024-04-09T17:15:35.687", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Secure Boot Security Feature Bypass Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26168", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26171.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26171.json new file mode 100644 index 00000000000..db66e291342 --- /dev/null +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26171.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26171", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:35.910", + "lastModified": "2024-04-09T17:15:35.910", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Secure Boot Security Feature Bypass Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26171", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26172.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26172.json new file mode 100644 index 00000000000..c4ed6111df7 --- /dev/null +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26172.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26172", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:36.137", + "lastModified": "2024-04-09T17:15:36.137", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows DWM Core Library Information Disclosure Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26172", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26175.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26175.json new file mode 100644 index 00000000000..ae2198bd23a --- /dev/null +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26175.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26175", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:36.327", + "lastModified": "2024-04-09T17:15:36.327", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Secure Boot Security Feature Bypass Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26175", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26179.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26179.json new file mode 100644 index 00000000000..ac158123514 --- /dev/null +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26179.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26179", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:36.543", + "lastModified": "2024-04-09T17:15:36.543", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26179", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26180.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26180.json new file mode 100644 index 00000000000..da6e4d7de73 --- /dev/null +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26180.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26180", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:36.747", + "lastModified": "2024-04-09T17:15:36.747", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Secure Boot Security Feature Bypass Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26180", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26183.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26183.json new file mode 100644 index 00000000000..4bb2b06501c --- /dev/null +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26183.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26183", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:36.953", + "lastModified": "2024-04-09T17:15:36.953", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Kerberos Denial of Service Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26183", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26189.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26189.json new file mode 100644 index 00000000000..b8c780f01ca --- /dev/null +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26189.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26189", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:37.170", + "lastModified": "2024-04-09T17:15:37.170", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Secure Boot Security Feature Bypass Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26189", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26193.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26193.json new file mode 100644 index 00000000000..1bb902f41b7 --- /dev/null +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26193.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26193", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:37.373", + "lastModified": "2024-04-09T17:15:37.373", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Azure Migrate Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26193", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26194.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26194.json new file mode 100644 index 00000000000..39cfe0a75ba --- /dev/null +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26194.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26194", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:37.560", + "lastModified": "2024-04-09T17:15:37.560", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Secure Boot Security Feature Bypass Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26194", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26195.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26195.json new file mode 100644 index 00000000000..77499558ac8 --- /dev/null +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26195.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26195", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:37.773", + "lastModified": "2024-04-09T17:15:37.773", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "DHCP Server Service Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26195", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26200.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26200.json new file mode 100644 index 00000000000..5e8451867d0 --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26200.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26200", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:37.970", + "lastModified": "2024-04-09T17:15:37.970", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26200", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26202.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26202.json new file mode 100644 index 00000000000..3ef8c77f379 --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26202.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26202", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:38.197", + "lastModified": "2024-04-09T17:15:38.197", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "DHCP Server Service Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26202", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26205.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26205.json new file mode 100644 index 00000000000..31ff71a0f2f --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26205.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26205", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:38.397", + "lastModified": "2024-04-09T17:15:38.397", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26205", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26207.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26207.json new file mode 100644 index 00000000000..45af325bf7c --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26207.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26207", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:38.593", + "lastModified": "2024-04-09T17:15:38.593", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Remote Access Connection Manager Information Disclosure Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26207", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26208.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26208.json new file mode 100644 index 00000000000..caa402cf1b4 --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26208.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26208", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:38.803", + "lastModified": "2024-04-09T17:15:38.803", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26208", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26209.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26209.json new file mode 100644 index 00000000000..0f7ebeca074 --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26209.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26209", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:39.000", + "lastModified": "2024-04-09T17:15:39.000", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26209", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26210.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26210.json new file mode 100644 index 00000000000..cc804785513 --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26210.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26210", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:39.240", + "lastModified": "2024-04-09T17:15:39.240", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26210", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26211.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26211.json new file mode 100644 index 00000000000..ab147c49782 --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26211.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26211", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:39.443", + "lastModified": "2024-04-09T17:15:39.443", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Remote Access Connection Manager Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26211", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26212.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26212.json new file mode 100644 index 00000000000..399ed44927d --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26212.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26212", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:39.640", + "lastModified": "2024-04-09T17:15:39.640", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "DHCP Server Service Denial of Service Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26212", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26213.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26213.json new file mode 100644 index 00000000000..8b958574cde --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26213.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26213", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:39.847", + "lastModified": "2024-04-09T17:15:39.847", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Brokering File System Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-822" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26213", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26214.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26214.json new file mode 100644 index 00000000000..d6b8da83d33 --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26214.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26214", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:40.043", + "lastModified": "2024-04-09T17:15:40.043", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft WDAC SQL Server ODBC Driver Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26214", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26215.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26215.json new file mode 100644 index 00000000000..0ceab09f96c --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26215.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26215", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:40.240", + "lastModified": "2024-04-09T17:15:40.240", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "DHCP Server Service Denial of Service Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26215", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26216.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26216.json new file mode 100644 index 00000000000..6394e1cfaf8 --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26216.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26216", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:40.447", + "lastModified": "2024-04-09T17:15:40.447", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows File Server Resource Management Service Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26216", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26217.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26217.json new file mode 100644 index 00000000000..898bb77e1ff --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26217.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26217", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:40.640", + "lastModified": "2024-04-09T17:15:40.640", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Remote Access Connection Manager Information Disclosure Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26217", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26218.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26218.json new file mode 100644 index 00000000000..4e577960e0b --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26218.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26218", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:40.840", + "lastModified": "2024-04-09T17:15:40.840", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Kernel Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26218", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26219.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26219.json new file mode 100644 index 00000000000..e6cda37fc20 --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26219.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26219", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:41.037", + "lastModified": "2024-04-09T17:15:41.037", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "HTTP.sys Denial of Service Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26219", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26220.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26220.json new file mode 100644 index 00000000000..9909892212e --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26220.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26220", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:41.247", + "lastModified": "2024-04-09T17:15:41.247", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Mobile Hotspot Information Disclosure Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26220", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26221.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26221.json new file mode 100644 index 00000000000..15644b285d4 --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26221.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26221", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:41.443", + "lastModified": "2024-04-09T17:15:41.443", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows DNS Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26221", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26222.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26222.json new file mode 100644 index 00000000000..71301d6036c --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26222.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26222", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:41.637", + "lastModified": "2024-04-09T17:15:41.637", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows DNS Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26222", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26223.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26223.json new file mode 100644 index 00000000000..8821949c35c --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26223.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26223", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:41.843", + "lastModified": "2024-04-09T17:15:41.843", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows DNS Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26223", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26224.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26224.json new file mode 100644 index 00000000000..49801d192c1 --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26224.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26224", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:42.040", + "lastModified": "2024-04-09T17:15:42.040", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows DNS Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26224", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26226.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26226.json new file mode 100644 index 00000000000..1c319d5ef63 --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26226.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26226", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:42.233", + "lastModified": "2024-04-09T17:15:42.233", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Distributed File System (DFS) Information Disclosure Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26226", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26227.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26227.json new file mode 100644 index 00000000000..7aec46d4ef6 --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26227.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26227", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:42.430", + "lastModified": "2024-04-09T17:15:42.430", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows DNS Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26227", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26228.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26228.json new file mode 100644 index 00000000000..e57d606b8e8 --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26228.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26228", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:42.627", + "lastModified": "2024-04-09T17:15:42.627", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Cryptographic Services Security Feature Bypass Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-310" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26228", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26229.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26229.json new file mode 100644 index 00000000000..ab4494dcfb4 --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26229.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26229", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:42.823", + "lastModified": "2024-04-09T17:15:42.823", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows CSC Service Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26229", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26230.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26230.json new file mode 100644 index 00000000000..bb322fc3275 --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26230.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26230", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:43.027", + "lastModified": "2024-04-09T17:15:43.027", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Telephony Server Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26230", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26231.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26231.json new file mode 100644 index 00000000000..061dba5540e --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26231.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26231", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:43.260", + "lastModified": "2024-04-09T17:15:43.260", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows DNS Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26231", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26232.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26232.json new file mode 100644 index 00000000000..4ad3ffdd508 --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26232.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26232", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:43.460", + "lastModified": "2024-04-09T17:15:43.460", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26232", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26233.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26233.json new file mode 100644 index 00000000000..e4921b90b8f --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26233.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26233", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:43.650", + "lastModified": "2024-04-09T17:15:43.650", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows DNS Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26233", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26234.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26234.json new file mode 100644 index 00000000000..332b745ba9b --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26234.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26234", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:43.853", + "lastModified": "2024-04-09T17:15:43.853", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Proxy Driver Spoofing Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26234", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26235.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26235.json new file mode 100644 index 00000000000..dd172373c1f --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26235.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26235", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:44.040", + "lastModified": "2024-04-09T17:15:44.040", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Update Stack Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26235", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26236.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26236.json new file mode 100644 index 00000000000..5db8084c6ee --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26236.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26236", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:44.230", + "lastModified": "2024-04-09T17:15:44.230", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Update Stack Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-591" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26236", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26237.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26237.json new file mode 100644 index 00000000000..3cbd118ab4e --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26237.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26237", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:44.443", + "lastModified": "2024-04-09T17:15:44.443", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Defender Credential Guard Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26237", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26239.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26239.json new file mode 100644 index 00000000000..dcdf164ca2f --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26239.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26239", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:44.660", + "lastModified": "2024-04-09T17:15:44.660", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Telephony Server Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26239", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26240.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26240.json new file mode 100644 index 00000000000..744e4e0aa76 --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26240.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26240", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:44.880", + "lastModified": "2024-04-09T17:15:44.880", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Secure Boot Security Feature Bypass Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26240", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26241.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26241.json new file mode 100644 index 00000000000..edabbea71b0 --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26241.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26241", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:45.073", + "lastModified": "2024-04-09T17:15:45.073", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Win32k Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26241", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26242.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26242.json new file mode 100644 index 00000000000..603386615e7 --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26242.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26242", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:45.270", + "lastModified": "2024-04-09T17:15:45.270", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Telephony Server Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-591" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26242", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26243.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26243.json new file mode 100644 index 00000000000..f1663aefa3c --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26243.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26243", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:45.470", + "lastModified": "2024-04-09T17:15:45.470", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows USB Print Driver Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26243", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26244.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26244.json new file mode 100644 index 00000000000..851f4337668 --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26244.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26244", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:45.727", + "lastModified": "2024-04-09T17:15:45.727", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26244", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26245.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26245.json new file mode 100644 index 00000000000..37145972c37 --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26245.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26245", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:45.933", + "lastModified": "2024-04-09T17:15:45.933", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows SMB Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26245", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26248.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26248.json new file mode 100644 index 00000000000..8899a60d5ed --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26248.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26248", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:46.120", + "lastModified": "2024-04-09T17:15:46.120", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Kerberos Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-303" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26248", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26250.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26250.json new file mode 100644 index 00000000000..d2dcaaab7b5 --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26250.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26250", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:46.327", + "lastModified": "2024-04-09T17:15:46.327", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Secure Boot Security Feature Bypass Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26250", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26251.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26251.json new file mode 100644 index 00000000000..22366246d09 --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26251.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26251", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:46.523", + "lastModified": "2024-04-09T17:15:46.523", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft SharePoint Server Spoofing Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26251", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26252.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26252.json new file mode 100644 index 00000000000..d3b33ec4bd7 --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26252.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26252", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:46.720", + "lastModified": "2024-04-09T17:15:46.720", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows rndismp6.sys Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-822" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26252", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26253.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26253.json new file mode 100644 index 00000000000..920bbe3ab4e --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26253.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26253", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:46.930", + "lastModified": "2024-04-09T17:15:46.930", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows rndismp6.sys Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26253", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26254.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26254.json new file mode 100644 index 00000000000..4359e918ed3 --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26254.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26254", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:47.133", + "lastModified": "2024-04-09T17:15:47.133", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Virtual Machine Bus (VMBus) Denial of Service Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-822" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26254", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26255.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26255.json new file mode 100644 index 00000000000..82b0cce0d5c --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26255.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26255", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:47.323", + "lastModified": "2024-04-09T17:15:47.323", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Remote Access Connection Manager Information Disclosure Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26255", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26256.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26256.json new file mode 100644 index 00000000000..d31d99e45d4 --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26256.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26256", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:47.507", + "lastModified": "2024-04-09T17:15:47.507", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "libarchive Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26256", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26257.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26257.json new file mode 100644 index 00000000000..2a9e8aa8313 --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26257.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26257", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:47.687", + "lastModified": "2024-04-09T17:15:47.687", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Excel Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26257", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-282xx/CVE-2024-28235.json b/CVE-2024/CVE-2024-282xx/CVE-2024-28235.json new file mode 100644 index 00000000000..2657db36867 --- /dev/null +++ b/CVE-2024/CVE-2024-282xx/CVE-2024-28235.json @@ -0,0 +1,71 @@ +{ + "id": "CVE-2024-28235", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-04-09T16:15:07.863", + "lastModified": "2024-04-09T16:15:07.863", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Contao is an open source content management system. Starting in version 4.9.0 and prior to versions 4.13.40 and 5.3.4, when checking for broken links on protected pages, Contao sends the cookie header to external urls as well, the passed options for the http client are used for all requests. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, disable crawling protected pages." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://contao.org/en/security-advisories/session-cookie-disclosure-in-the-crawler", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/contao/contao/blob/14e9ef4bc8b82936ba2d0e04164581145a075e2a/core-bundle/src/Resources/contao/classes/Crawl.php#L129", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/contao/contao/commit/73a2770e2d3535ec9f1b03d54be00e56ebb8ff16", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/contao/contao/commit/79b7620d01ce8f46ce2b331455e0d95e5208de3d", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/contao/contao/security/advisories/GHSA-9jh5-qf84-x6pr", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28896.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28896.json new file mode 100644 index 00000000000..f055f7fd7c6 --- /dev/null +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28896.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28896", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:47.893", + "lastModified": "2024-04-09T17:15:47.893", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Secure Boot Security Feature Bypass Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28896", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28897.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28897.json new file mode 100644 index 00000000000..5d95fa2a72e --- /dev/null +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28897.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28897", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:48.080", + "lastModified": "2024-04-09T17:15:48.080", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Secure Boot Security Feature Bypass Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28897", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28898.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28898.json new file mode 100644 index 00000000000..62772a29640 --- /dev/null +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28898.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28898", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:48.260", + "lastModified": "2024-04-09T17:15:48.260", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Secure Boot Security Feature Bypass Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28898", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28900.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28900.json new file mode 100644 index 00000000000..83ee72ca51d --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28900.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28900", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:48.447", + "lastModified": "2024-04-09T17:15:48.447", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Remote Access Connection Manager Information Disclosure Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28900", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28901.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28901.json new file mode 100644 index 00000000000..72dcb290637 --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28901.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28901", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:48.647", + "lastModified": "2024-04-09T17:15:48.647", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Remote Access Connection Manager Information Disclosure Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28901", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28902.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28902.json new file mode 100644 index 00000000000..48bbf8b9e0c --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28902.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28902", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:48.833", + "lastModified": "2024-04-09T17:15:48.833", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Remote Access Connection Manager Information Disclosure Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28902", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28903.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28903.json new file mode 100644 index 00000000000..ee1ff23f7ff --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28903.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28903", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:49.020", + "lastModified": "2024-04-09T17:15:49.020", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Secure Boot Security Feature Bypass Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28903", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28904.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28904.json new file mode 100644 index 00000000000..3b4e8f6c5d2 --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28904.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28904", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:49.210", + "lastModified": "2024-04-09T17:15:49.210", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Brokering File System Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28904", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28905.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28905.json new file mode 100644 index 00000000000..20d2d6da8f3 --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28905.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28905", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:49.403", + "lastModified": "2024-04-09T17:15:49.403", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Brokering File System Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28905", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28906.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28906.json new file mode 100644 index 00000000000..4b86ee80147 --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28906.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28906", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:49.593", + "lastModified": "2024-04-09T17:15:49.593", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28906", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28907.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28907.json new file mode 100644 index 00000000000..84e3b462f4b --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28907.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28907", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:49.790", + "lastModified": "2024-04-09T17:15:49.790", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Brokering File System Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28907", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28908.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28908.json new file mode 100644 index 00000000000..a56f68fe08f --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28908.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28908", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:49.973", + "lastModified": "2024-04-09T17:15:49.973", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28908", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28909.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28909.json new file mode 100644 index 00000000000..56f619679fa --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28909.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28909", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:50.163", + "lastModified": "2024-04-09T17:15:50.163", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28909", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28910.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28910.json new file mode 100644 index 00000000000..607f48cab50 --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28910.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28910", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:50.350", + "lastModified": "2024-04-09T17:15:50.350", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28910", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28911.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28911.json new file mode 100644 index 00000000000..1aac5d952c3 --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28911.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28911", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:50.537", + "lastModified": "2024-04-09T17:15:50.537", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28911", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28912.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28912.json new file mode 100644 index 00000000000..e2233bec9c4 --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28912.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28912", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:50.737", + "lastModified": "2024-04-09T17:15:50.737", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28912", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28913.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28913.json new file mode 100644 index 00000000000..0653da9a5b0 --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28913.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28913", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:50.950", + "lastModified": "2024-04-09T17:15:50.950", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28913", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28914.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28914.json new file mode 100644 index 00000000000..b75c1ec741d --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28914.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28914", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:51.150", + "lastModified": "2024-04-09T17:15:51.150", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28914", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28915.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28915.json new file mode 100644 index 00000000000..ab21a9236e1 --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28915.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28915", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:51.343", + "lastModified": "2024-04-09T17:15:51.343", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28915", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28917.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28917.json new file mode 100644 index 00000000000..c846c571863 --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28917.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28917", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:51.533", + "lastModified": "2024-04-09T17:15:51.533", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Azure Arc-enabled Kubernetes Extension Cluster-Scope Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28917", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28919.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28919.json new file mode 100644 index 00000000000..ad9f071ec06 --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28919.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28919", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:51.717", + "lastModified": "2024-04-09T17:15:51.717", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Secure Boot Security Feature Bypass Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28919", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28920.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28920.json new file mode 100644 index 00000000000..6b40c9f9c5d --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28920.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28920", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:51.930", + "lastModified": "2024-04-09T17:15:51.930", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Secure Boot Security Feature Bypass Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28920", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28921.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28921.json new file mode 100644 index 00000000000..b6e226b8629 --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28921.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28921", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:52.153", + "lastModified": "2024-04-09T17:15:52.153", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Secure Boot Security Feature Bypass Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28921", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28922.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28922.json new file mode 100644 index 00000000000..89fce6d61f1 --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28922.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28922", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:52.470", + "lastModified": "2024-04-09T17:15:52.470", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Secure Boot Security Feature Bypass Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 4.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28922", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28923.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28923.json new file mode 100644 index 00000000000..ba8e50a0efa --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28923.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28923", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:52.680", + "lastModified": "2024-04-09T17:15:52.680", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Secure Boot Security Feature Bypass Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28923", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28924.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28924.json new file mode 100644 index 00000000000..c6b96b41c59 --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28924.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28924", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:52.877", + "lastModified": "2024-04-09T17:15:52.877", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Secure Boot Security Feature Bypass Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28924", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28925.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28925.json new file mode 100644 index 00000000000..5e94835b997 --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28925.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28925", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:53.083", + "lastModified": "2024-04-09T17:15:53.083", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Secure Boot Security Feature Bypass Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28925", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28926.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28926.json new file mode 100644 index 00000000000..62620924192 --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28926.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28926", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:53.277", + "lastModified": "2024-04-09T17:15:53.277", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28926", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28927.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28927.json new file mode 100644 index 00000000000..be6183beed2 --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28927.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28927", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:53.477", + "lastModified": "2024-04-09T17:15:53.477", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28927", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28929.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28929.json new file mode 100644 index 00000000000..af7c69466fb --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28929.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28929", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:53.673", + "lastModified": "2024-04-09T17:15:53.673", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28929", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28930.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28930.json new file mode 100644 index 00000000000..06eef5af7ad --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28930.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28930", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:53.887", + "lastModified": "2024-04-09T17:15:53.887", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28930", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28931.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28931.json new file mode 100644 index 00000000000..4b10481feaa --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28931.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28931", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:54.097", + "lastModified": "2024-04-09T17:15:54.097", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28931", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28932.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28932.json new file mode 100644 index 00000000000..f86c1b6800a --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28932.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28932", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:54.297", + "lastModified": "2024-04-09T17:15:54.297", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28932", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28933.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28933.json new file mode 100644 index 00000000000..0259afe56b0 --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28933.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28933", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:54.503", + "lastModified": "2024-04-09T17:15:54.503", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28933", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28934.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28934.json new file mode 100644 index 00000000000..718ad55394a --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28934.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28934", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:54.697", + "lastModified": "2024-04-09T17:15:54.697", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28934", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28935.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28935.json new file mode 100644 index 00000000000..fea011e4744 --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28935.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28935", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:54.980", + "lastModified": "2024-04-09T17:15:54.980", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28935", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28936.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28936.json new file mode 100644 index 00000000000..7da4a79cf47 --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28936.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28936", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:55.193", + "lastModified": "2024-04-09T17:15:55.193", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28936", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28937.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28937.json new file mode 100644 index 00000000000..aa90f511ddb --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28937.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28937", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:55.393", + "lastModified": "2024-04-09T17:15:55.393", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28937", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28938.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28938.json new file mode 100644 index 00000000000..bd13c9b16a7 --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28938.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28938", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:55.600", + "lastModified": "2024-04-09T17:15:55.600", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28938", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28939.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28939.json new file mode 100644 index 00000000000..f451f38aadb --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28939.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28939", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:55.807", + "lastModified": "2024-04-09T17:15:55.807", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-209" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28939", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28940.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28940.json new file mode 100644 index 00000000000..2cbc2127af1 --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28940.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28940", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:56.030", + "lastModified": "2024-04-09T17:15:56.030", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28940", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28941.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28941.json new file mode 100644 index 00000000000..72a2665ca74 --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28941.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28941", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:56.233", + "lastModified": "2024-04-09T17:15:56.233", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28941", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28942.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28942.json new file mode 100644 index 00000000000..29fa78bed93 --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28942.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28942", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:56.433", + "lastModified": "2024-04-09T17:15:56.433", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28942", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28943.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28943.json new file mode 100644 index 00000000000..1c0928ad03d --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28943.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28943", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:56.630", + "lastModified": "2024-04-09T17:15:56.630", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28943", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28944.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28944.json new file mode 100644 index 00000000000..e63cf6b5813 --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28944.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28944", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:56.847", + "lastModified": "2024-04-09T17:15:56.847", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-197" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28944", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28945.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28945.json new file mode 100644 index 00000000000..8f418a00b7b --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28945.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28945", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:57.053", + "lastModified": "2024-04-09T17:15:57.053", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28945", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29043.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29043.json new file mode 100644 index 00000000000..0da7a420ddd --- /dev/null +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29043.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29043", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:57.257", + "lastModified": "2024-04-09T17:15:57.257", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29043", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29044.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29044.json new file mode 100644 index 00000000000..316b5d5a691 --- /dev/null +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29044.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29044", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:57.453", + "lastModified": "2024-04-09T17:15:57.453", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29044", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29045.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29045.json new file mode 100644 index 00000000000..af5ae770a64 --- /dev/null +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29045.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29045", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:57.650", + "lastModified": "2024-04-09T17:15:57.650", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29045", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29046.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29046.json new file mode 100644 index 00000000000..661e29ca3ee --- /dev/null +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29046.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29046", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:57.847", + "lastModified": "2024-04-09T17:15:57.847", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29046", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29047.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29047.json new file mode 100644 index 00000000000..5156925ce79 --- /dev/null +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29047.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29047", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:58.060", + "lastModified": "2024-04-09T17:15:58.060", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29047", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29048.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29048.json new file mode 100644 index 00000000000..3a1f9167a9c --- /dev/null +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29048.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29048", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:58.250", + "lastModified": "2024-04-09T17:15:58.250", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29048", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29049.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29049.json index b0cf04ac0bf..e3376d5f2f9 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29049.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29049.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29049", "sourceIdentifier": "secure@microsoft.com", "published": "2024-04-04T22:15:08.827", - "lastModified": "2024-04-05T12:40:52.763", + "lastModified": "2024-04-09T17:15:58.440", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -38,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29049", diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29050.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29050.json new file mode 100644 index 00000000000..b3f8a329ba5 --- /dev/null +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29050.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29050", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:58.540", + "lastModified": "2024-04-09T17:15:58.540", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Cryptographic Services Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-197" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29050", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29052.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29052.json new file mode 100644 index 00000000000..0a7a68d2140 --- /dev/null +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29052.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29052", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:58.737", + "lastModified": "2024-04-09T17:15:58.737", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Storage Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29052", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29053.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29053.json new file mode 100644 index 00000000000..2726c2d9495 --- /dev/null +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29053.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29053", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:58.930", + "lastModified": "2024-04-09T17:15:58.930", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Defender for IoT Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-36" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29053", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29054.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29054.json new file mode 100644 index 00000000000..2b24c29bed0 --- /dev/null +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29054.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29054", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:59.123", + "lastModified": "2024-04-09T17:15:59.123", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Defender for IoT Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29054", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29055.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29055.json new file mode 100644 index 00000000000..1578ecdcac3 --- /dev/null +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29055.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29055", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:59.320", + "lastModified": "2024-04-09T17:15:59.320", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Defender for IoT Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29055", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29056.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29056.json new file mode 100644 index 00000000000..45467629454 --- /dev/null +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29056.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29056", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:59.510", + "lastModified": "2024-04-09T17:15:59.510", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Authentication Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-327" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29056", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29061.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29061.json new file mode 100644 index 00000000000..dbbda6904b5 --- /dev/null +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29061.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29061", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:59.720", + "lastModified": "2024-04-09T17:15:59.720", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Secure Boot Security Feature Bypass Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29061", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29062.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29062.json new file mode 100644 index 00000000000..48062969218 --- /dev/null +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29062.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29062", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:15:59.917", + "lastModified": "2024-04-09T17:15:59.917", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Secure Boot Security Feature Bypass Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29062", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29063.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29063.json new file mode 100644 index 00000000000..09f94c9890a --- /dev/null +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29063.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29063", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:16:00.127", + "lastModified": "2024-04-09T17:16:00.127", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Azure AI Search Information Disclosure Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29063", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29064.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29064.json new file mode 100644 index 00000000000..86b116c2e8f --- /dev/null +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29064.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29064", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:16:00.343", + "lastModified": "2024-04-09T17:16:00.343", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Hyper-V Denial of Service Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-130" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29064", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29066.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29066.json new file mode 100644 index 00000000000..d16e5645d4c --- /dev/null +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29066.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29066", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:16:00.537", + "lastModified": "2024-04-09T17:16:00.537", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Distributed File System (DFS) Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29066", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29905.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29905.json new file mode 100644 index 00000000000..e217419d4d8 --- /dev/null +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29905.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-29905", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-04-09T17:16:00.730", + "lastModified": "2024-04-09T17:16:00.730", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "DIRAC is an interware, meaning a software framework for distributed computing. Prior to version 8.0.41, during the proxy generation process (e.g., when using `dirac-proxy-init`), it is possible for unauthorized users on the same machine to gain read access to the proxy. This allows the user to then perform any action that is possible with the original proxy. This vulnerability only exists for a short period of time (sub-millsecond) during the generation process. Version 8.0.41 contains a patch for the issue. As a workaround, setting the `X509_USER_PROXY` environment variable to a path that is inside a directory that is only readable to the current user avoids the potential risk. After the file has been written, it can be safely copied to the standard location (`/tmp/x509up_uNNNN`)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.5, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-668" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/DIRACGrid/DIRAC/commit/1faa709341969a6321e29c843ca94039d33b2c3d", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/DIRACGrid/DIRAC/security/advisories/GHSA-v6f3-gh5h-mqwx", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29981.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29981.json index 5482de4d048..c2b5000b8f0 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29981.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29981.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29981", "sourceIdentifier": "secure@microsoft.com", "published": "2024-04-04T22:15:09.153", - "lastModified": "2024-04-05T12:40:52.763", + "lastModified": "2024-04-09T17:16:00.943", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -38,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29981", diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29982.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29982.json new file mode 100644 index 00000000000..5ddaa60af77 --- /dev/null +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29982.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29982", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:16:01.043", + "lastModified": "2024-04-09T17:16:01.043", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29982", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29983.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29983.json new file mode 100644 index 00000000000..e2820f10a57 --- /dev/null +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29983.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29983", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:16:01.237", + "lastModified": "2024-04-09T17:16:01.237", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29983", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29984.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29984.json new file mode 100644 index 00000000000..4b2ef5aabe4 --- /dev/null +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29984.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29984", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:16:01.437", + "lastModified": "2024-04-09T17:16:01.437", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29984", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29985.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29985.json new file mode 100644 index 00000000000..eefb5f71e71 --- /dev/null +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29985.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29985", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:16:01.630", + "lastModified": "2024-04-09T17:16:01.630", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29985", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29988.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29988.json new file mode 100644 index 00000000000..39f457ecc0b --- /dev/null +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29988.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29988", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:16:01.830", + "lastModified": "2024-04-09T17:16:01.830", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SmartScreen Prompt Security Feature Bypass Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29988", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29989.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29989.json new file mode 100644 index 00000000000..ff990efe837 --- /dev/null +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29989.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29989", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:16:02.030", + "lastModified": "2024-04-09T17:16:02.030", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Azure Monitor Agent Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29989", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29990.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29990.json new file mode 100644 index 00000000000..5ab715786a7 --- /dev/null +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29990.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29990", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:16:02.237", + "lastModified": "2024-04-09T17:16:02.237", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.2, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29990", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29992.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29992.json new file mode 100644 index 00000000000..d8767c857aa --- /dev/null +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29992.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29992", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:16:02.437", + "lastModified": "2024-04-09T17:16:02.437", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Azure Identity Library for .NET Information Disclosure Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29992", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29993.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29993.json new file mode 100644 index 00000000000..59edcd49fb4 --- /dev/null +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29993.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29993", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-04-09T17:16:02.640", + "lastModified": "2024-04-09T17:16:02.640", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Azure CycleCloud Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29993", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30262.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30262.json new file mode 100644 index 00000000000..0784d00066e --- /dev/null +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30262.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2024-30262", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-04-09T17:16:02.850", + "lastModified": "2024-04-09T17:16:02.850", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Contao is an open source content management system. Prior to version 4.13.40, when a frontend member changes their password in the personal data or the password lost module, the corresponding remember-me tokens are not removed. If someone compromises an account and is able to get a remember-me token, changing the password would not be enough to reclaim control over the account. Version 4.13.40 contains a fix for the issue. As a workaround, disable \"Allow auto login\" in the login module.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-384" + }, + { + "lang": "en", + "value": "CWE-613" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/contao/contao/commit/3032baa456f607169ffae82a8920354adb338fe9", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/contao/contao/security/advisories/GHSA-r4r6-j2j3-7pp5", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31455.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31455.json new file mode 100644 index 00000000000..c871bb2553c --- /dev/null +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31455.json @@ -0,0 +1,67 @@ +{ + "id": "CVE-2024-31455", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-04-09T17:16:03.043", + "lastModified": "2024-04-09T17:16:03.043", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Minder by Stacklok is an open source software supply chain security platform. A refactoring in commit `5c381cf` added the ability to get GitHub repositories registered to a project without specifying a specific provider. Unfortunately, the SQL query for doing so was missing parenthesis, and would select a random repository. This issue is patched in pull request 2941. As a workaround, revert prior to `5c381cf`, or roll forward past `2eb94e7`." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/stacklok/minder/commit/11b6573ad62cfdd783a8bb52f3fce461466037f4", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/stacklok/minder/commit/5c381cfbf3e4b7ce040ed8511a1fae1a78a0014b", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/stacklok/minder/pull/2941", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/stacklok/minder/security/advisories/GHSA-ggp5-28x4-xcj9", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31864.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31864.json new file mode 100644 index 00000000000..050f2026c9d --- /dev/null +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31864.json @@ -0,0 +1,40 @@ +{ + "id": "CVE-2024-31864", + "sourceIdentifier": "security@apache.org", + "published": "2024-04-09T16:15:08.113", + "lastModified": "2024-04-09T16:15:08.113", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Zeppelin.\n\nThe attacker can inject sensitive configuration or malicious code when connecting MySQL database via JDBC driver.\nThis issue affects Apache Zeppelin: before 0.11.1.\n\nUsers are recommended to upgrade to version 0.11.1, which fixes the issue.\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/apache/zeppelin/pull/4709", + "source": "security@apache.org" + }, + { + "url": "https://lists.apache.org/thread/752qdk0rnkd9nqtornz734zwb7xdwcdb", + "source": "security@apache.org" + }, + { + "url": "https://www.cve.org/CVERecord?id=CVE-2020-11974", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31865.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31865.json new file mode 100644 index 00000000000..bcbaa0d0b79 --- /dev/null +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31865.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2024-31865", + "sourceIdentifier": "security@apache.org", + "published": "2024-04-09T16:15:08.213", + "lastModified": "2024-04-09T16:15:08.213", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Input Validation vulnerability in Apache Zeppelin.\n\nThe attackers can call updating cron API with invalid or improper privileges so that the notebook can run with the privileges.\n\nThis issue affects Apache Zeppelin: from 0.8.2 before 0.11.1.\n\nUsers are recommended to upgrade to version 0.11.1, which fixes the issue.\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/apache/zeppelin/pull/4631", + "source": "security@apache.org" + }, + { + "url": "https://lists.apache.org/thread/slm1sf0slwc11f4m4r0nd6ot2rf7w81l", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31866.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31866.json new file mode 100644 index 00000000000..6edbfe8c024 --- /dev/null +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31866.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2024-31866", + "sourceIdentifier": "security@apache.org", + "published": "2024-04-09T16:15:08.307", + "lastModified": "2024-04-09T16:15:08.307", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Encoding or Escaping of Output vulnerability in Apache Zeppelin.\n\nThe attackers can execute shell scripts or malicious code by overriding configuration like\u00a0ZEPPELIN_INTP_CLASSPATH_OVERRIDES.\nThis issue affects Apache Zeppelin: from 0.8.2 before 0.11.1.\n\nUsers are recommended to upgrade to version 0.11.1, which fixes the issue.\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-116" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/apache/zeppelin/pull/4715", + "source": "security@apache.org" + }, + { + "url": "https://lists.apache.org/thread/jpkbq3oktopt34x2n5wnhzc2r1410ddd", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31867.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31867.json new file mode 100644 index 00000000000..ebddb26146e --- /dev/null +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31867.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2024-31867", + "sourceIdentifier": "security@apache.org", + "published": "2024-04-09T17:16:03.237", + "lastModified": "2024-04-09T17:16:03.237", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Input Validation vulnerability in Apache Zeppelin.\n\nThe attackers can execute malicious queries by setting improper configuration properties to LDAP search filter.\nThis issue affects Apache Zeppelin: from 0.8.2 before 0.11.1.\n\nUsers are recommended to upgrade to version 0.11.1, which fixes the issue.\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/apache/zeppelin/pull/4714", + "source": "security@apache.org" + }, + { + "url": "https://lists.apache.org/thread/s4scw8bxdhrjs0kg0lhb68xqd8y9lrtf", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31868.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31868.json new file mode 100644 index 00000000000..b7c239abde9 --- /dev/null +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31868.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2024-31868", + "sourceIdentifier": "security@apache.org", + "published": "2024-04-09T16:15:08.413", + "lastModified": "2024-04-09T16:15:08.413", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Encoding or Escaping of Output vulnerability in Apache Zeppelin.\n\nThe attackers can modify helium.json and exposure XSS attacks to normal users.\nThis issue affects Apache Zeppelin: from 0.8.2 before 0.11.1.\n\nUsers are recommended to upgrade to version 0.11.1, which fixes the issue.\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-116" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/apache/zeppelin/pull/4728", + "source": "security@apache.org" + }, + { + "url": "https://lists.apache.org/thread/55mqs673plsxmgnq7fdf2flftpllyf11", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3281.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3281.json new file mode 100644 index 00000000000..e623a3ea0b6 --- /dev/null +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3281.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-3281", + "sourceIdentifier": "hp-security-alert@hp.com", + "published": "2024-04-09T16:15:08.510", + "lastModified": "2024-04-09T16:15:08.510", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was discovered in the firmware builds after 8.0.2.3267 and prior to 8.1.3.1301 in CCX devices. A flaw in the firmware build process did not properly restrict access to a resource from an unauthorized actor." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.hp.com/us-en/document/ish_10388650-10388701-16/hpsbpy03929", + "source": "hp-security-alert@hp.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index dae21cbdfe1..d0e7c0acd4c 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-04-09T16:00:38.670684+00:00 +2024-04-09T18:00:38.323673+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-04-09T15:15:31.753000+00:00 +2024-04-09T17:16:03.237000+00:00 ``` ### Last Data Feed Release @@ -33,45 +33,58 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -244578 +244735 ``` ### CVEs added in the last Commit -Recently added CVEs: `30` +Recently added CVEs: `157` -- [CVE-2023-48724](CVE-2023/CVE-2023-487xx/CVE-2023-48724.json) (`2024-04-09T15:15:28.397`) -- [CVE-2023-48784](CVE-2023/CVE-2023-487xx/CVE-2023-48784.json) (`2024-04-09T15:15:28.617`) -- [CVE-2023-49074](CVE-2023/CVE-2023-490xx/CVE-2023-49074.json) (`2024-04-09T15:15:28.800`) -- [CVE-2023-49133](CVE-2023/CVE-2023-491xx/CVE-2023-49133.json) (`2024-04-09T15:15:29.003`) -- [CVE-2023-49134](CVE-2023/CVE-2023-491xx/CVE-2023-49134.json) (`2024-04-09T15:15:29.220`) -- [CVE-2023-49906](CVE-2023/CVE-2023-499xx/CVE-2023-49906.json) (`2024-04-09T15:15:29.433`) -- [CVE-2023-49907](CVE-2023/CVE-2023-499xx/CVE-2023-49907.json) (`2024-04-09T15:15:29.637`) -- [CVE-2023-49908](CVE-2023/CVE-2023-499xx/CVE-2023-49908.json) (`2024-04-09T15:15:29.823`) -- [CVE-2023-49909](CVE-2023/CVE-2023-499xx/CVE-2023-49909.json) (`2024-04-09T15:15:30.013`) -- [CVE-2023-49910](CVE-2023/CVE-2023-499xx/CVE-2023-49910.json) (`2024-04-09T15:15:30.210`) -- [CVE-2023-49911](CVE-2023/CVE-2023-499xx/CVE-2023-49911.json) (`2024-04-09T15:15:30.403`) -- [CVE-2023-49912](CVE-2023/CVE-2023-499xx/CVE-2023-49912.json) (`2024-04-09T15:15:30.593`) -- [CVE-2023-49913](CVE-2023/CVE-2023-499xx/CVE-2023-49913.json) (`2024-04-09T15:15:30.783`) -- [CVE-2023-6317](CVE-2023/CVE-2023-63xx/CVE-2023-6317.json) (`2024-04-09T14:15:07.683`) -- [CVE-2023-6318](CVE-2023/CVE-2023-63xx/CVE-2023-6318.json) (`2024-04-09T14:15:07.897`) -- [CVE-2023-6319](CVE-2023/CVE-2023-63xx/CVE-2023-6319.json) (`2024-04-09T14:15:08.093`) -- [CVE-2023-6320](CVE-2023/CVE-2023-63xx/CVE-2023-6320.json) (`2024-04-09T14:15:08.287`) -- [CVE-2024-21755](CVE-2024/CVE-2024-217xx/CVE-2024-21755.json) (`2024-04-09T15:15:30.977`) -- [CVE-2024-21756](CVE-2024/CVE-2024-217xx/CVE-2024-21756.json) (`2024-04-09T15:15:31.173`) -- [CVE-2024-23662](CVE-2024/CVE-2024-236xx/CVE-2024-23662.json) (`2024-04-09T15:15:31.370`) -- [CVE-2024-23671](CVE-2024/CVE-2024-236xx/CVE-2024-23671.json) (`2024-04-09T15:15:31.560`) -- [CVE-2024-28190](CVE-2024/CVE-2024-281xx/CVE-2024-28190.json) (`2024-04-09T14:15:08.503`) -- [CVE-2024-28191](CVE-2024/CVE-2024-281xx/CVE-2024-28191.json) (`2024-04-09T14:15:08.710`) -- [CVE-2024-28234](CVE-2024/CVE-2024-282xx/CVE-2024-28234.json) (`2024-04-09T14:15:08.897`) -- [CVE-2024-31487](CVE-2024/CVE-2024-314xx/CVE-2024-31487.json) (`2024-04-09T15:15:31.753`) +- [CVE-2024-29055](CVE-2024/CVE-2024-290xx/CVE-2024-29055.json) (`2024-04-09T17:15:59.320`) +- [CVE-2024-29056](CVE-2024/CVE-2024-290xx/CVE-2024-29056.json) (`2024-04-09T17:15:59.510`) +- [CVE-2024-29061](CVE-2024/CVE-2024-290xx/CVE-2024-29061.json) (`2024-04-09T17:15:59.720`) +- [CVE-2024-29062](CVE-2024/CVE-2024-290xx/CVE-2024-29062.json) (`2024-04-09T17:15:59.917`) +- [CVE-2024-29063](CVE-2024/CVE-2024-290xx/CVE-2024-29063.json) (`2024-04-09T17:16:00.127`) +- [CVE-2024-29064](CVE-2024/CVE-2024-290xx/CVE-2024-29064.json) (`2024-04-09T17:16:00.343`) +- [CVE-2024-29066](CVE-2024/CVE-2024-290xx/CVE-2024-29066.json) (`2024-04-09T17:16:00.537`) +- [CVE-2024-29905](CVE-2024/CVE-2024-299xx/CVE-2024-29905.json) (`2024-04-09T17:16:00.730`) +- [CVE-2024-29982](CVE-2024/CVE-2024-299xx/CVE-2024-29982.json) (`2024-04-09T17:16:01.043`) +- [CVE-2024-29983](CVE-2024/CVE-2024-299xx/CVE-2024-29983.json) (`2024-04-09T17:16:01.237`) +- [CVE-2024-29984](CVE-2024/CVE-2024-299xx/CVE-2024-29984.json) (`2024-04-09T17:16:01.437`) +- [CVE-2024-29985](CVE-2024/CVE-2024-299xx/CVE-2024-29985.json) (`2024-04-09T17:16:01.630`) +- [CVE-2024-29988](CVE-2024/CVE-2024-299xx/CVE-2024-29988.json) (`2024-04-09T17:16:01.830`) +- [CVE-2024-29989](CVE-2024/CVE-2024-299xx/CVE-2024-29989.json) (`2024-04-09T17:16:02.030`) +- [CVE-2024-29990](CVE-2024/CVE-2024-299xx/CVE-2024-29990.json) (`2024-04-09T17:16:02.237`) +- [CVE-2024-29992](CVE-2024/CVE-2024-299xx/CVE-2024-29992.json) (`2024-04-09T17:16:02.437`) +- [CVE-2024-29993](CVE-2024/CVE-2024-299xx/CVE-2024-29993.json) (`2024-04-09T17:16:02.640`) +- [CVE-2024-30262](CVE-2024/CVE-2024-302xx/CVE-2024-30262.json) (`2024-04-09T17:16:02.850`) +- [CVE-2024-31455](CVE-2024/CVE-2024-314xx/CVE-2024-31455.json) (`2024-04-09T17:16:03.043`) +- [CVE-2024-31864](CVE-2024/CVE-2024-318xx/CVE-2024-31864.json) (`2024-04-09T16:15:08.113`) +- [CVE-2024-31865](CVE-2024/CVE-2024-318xx/CVE-2024-31865.json) (`2024-04-09T16:15:08.213`) +- [CVE-2024-31866](CVE-2024/CVE-2024-318xx/CVE-2024-31866.json) (`2024-04-09T16:15:08.307`) +- [CVE-2024-31867](CVE-2024/CVE-2024-318xx/CVE-2024-31867.json) (`2024-04-09T17:16:03.237`) +- [CVE-2024-31868](CVE-2024/CVE-2024-318xx/CVE-2024-31868.json) (`2024-04-09T16:15:08.413`) +- [CVE-2024-3281](CVE-2024/CVE-2024-32xx/CVE-2024-3281.json) (`2024-04-09T16:15:08.510`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `14` -- [CVE-2022-0001](CVE-2022/CVE-2022-00xx/CVE-2022-0001.json) (`2024-04-09T15:15:26.797`) +- [CVE-2023-48724](CVE-2023/CVE-2023-487xx/CVE-2023-48724.json) (`2024-04-09T17:15:31.287`) +- [CVE-2023-49074](CVE-2023/CVE-2023-490xx/CVE-2023-49074.json) (`2024-04-09T17:15:31.417`) +- [CVE-2023-49133](CVE-2023/CVE-2023-491xx/CVE-2023-49133.json) (`2024-04-09T17:15:31.510`) +- [CVE-2023-49134](CVE-2023/CVE-2023-491xx/CVE-2023-49134.json) (`2024-04-09T17:15:31.600`) +- [CVE-2023-49906](CVE-2023/CVE-2023-499xx/CVE-2023-49906.json) (`2024-04-09T17:15:31.697`) +- [CVE-2023-49907](CVE-2023/CVE-2023-499xx/CVE-2023-49907.json) (`2024-04-09T17:15:31.783`) +- [CVE-2023-49908](CVE-2023/CVE-2023-499xx/CVE-2023-49908.json) (`2024-04-09T17:15:31.870`) +- [CVE-2023-49909](CVE-2023/CVE-2023-499xx/CVE-2023-49909.json) (`2024-04-09T17:15:31.963`) +- [CVE-2023-49910](CVE-2023/CVE-2023-499xx/CVE-2023-49910.json) (`2024-04-09T17:15:32.053`) +- [CVE-2023-49911](CVE-2023/CVE-2023-499xx/CVE-2023-49911.json) (`2024-04-09T17:15:32.147`) +- [CVE-2023-49912](CVE-2023/CVE-2023-499xx/CVE-2023-49912.json) (`2024-04-09T17:15:32.227`) +- [CVE-2023-49913](CVE-2023/CVE-2023-499xx/CVE-2023-49913.json) (`2024-04-09T17:15:32.320`) +- [CVE-2024-29049](CVE-2024/CVE-2024-290xx/CVE-2024-29049.json) (`2024-04-09T17:15:58.440`) +- [CVE-2024-29981](CVE-2024/CVE-2024-299xx/CVE-2024-29981.json) (`2024-04-09T17:16:00.943`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 16e73b33448..0313b424603 100644 --- a/_state.csv +++ b/_state.csv @@ -186908,7 +186908,7 @@ CVE-2021-47178,0,0,d62a0b0430d909fcce88ca031870efdb985e58c953eb3149d1b68d4f1ab3f CVE-2021-47179,0,0,b000bf7d856337be976af2349b8f73420ab8bf8fd491053a6643b7a7d226e562,2024-04-04T14:15:08.920000 CVE-2021-47180,0,0,afc9fd20c69c989d18f2e23ff0432fb8cf966ef1d2dccd25cb3768f2bf56673b,2024-03-25T13:47:14.087000 CVE-2021-47208,0,0,57c6e04cc3294191b13b85e8749af75b7a3cf7dd62e5631fa202db0d597dd575,2024-04-08T18:48:40.217000 -CVE-2022-0001,0,1,d8fdf66a3692474461fa30afb4569bb8513a7a0b04c6840c7e2c146df6b5709c,2024-04-09T15:15:26.797000 +CVE-2022-0001,0,0,d8fdf66a3692474461fa30afb4569bb8513a7a0b04c6840c7e2c146df6b5709c,2024-04-09T15:15:26.797000 CVE-2022-0002,0,0,4ba989879ca817729e7cddc36d35dc20834fb13fd71d0cce189890fe2defbd53,2022-08-19T12:28:50.667000 CVE-2022-0004,0,0,4891f62a2edc2f307dec62ec3f2089232f3fddba4652b7ef635786ed0f8a2286,2022-06-10T20:52:37.810000 CVE-2022-0005,0,0,8a5388e94d1341c0422103ad4d43194ac1a72df15fd1cb5f3d83d7b780180d87,2023-08-08T14:21:49.707000 @@ -229614,7 +229614,7 @@ CVE-2023-41672,0,0,701169e96a982f458276c5bf1421b24cf87ec1a37cbd6e2104ba995ffeec3 CVE-2023-41673,0,0,dd8132c0522783af5ee2376cce12c3ecb9f5d6592fe92710b52edbdbb42ff4b0,2023-12-15T19:10:46.137000 CVE-2023-41675,0,0,0ae1a5035d33330fd4a6a353b75af4bc2ad84d42edfa84f1e33d0bc3f8ccae9e,2023-11-07T04:21:04.410000 CVE-2023-41676,0,0,36c933286752ad7523065926766df538ff4c67a887209724cd00db232a66d0cd,2023-11-21T01:36:19.403000 -CVE-2023-41677,1,1,e604f0b81cdfea08b2c156724d2f98157dea560146b6a1f39e61f0d152e211c9,2024-04-09T15:15:27.400000 +CVE-2023-41677,0,0,e604f0b81cdfea08b2c156724d2f98157dea560146b6a1f39e61f0d152e211c9,2024-04-09T15:15:27.400000 CVE-2023-41678,0,0,da87a666a4a57a0d93a3383fd85969ac9e3d67438cc4440ec5ac1997cba8b245,2023-12-15T19:31:27.400000 CVE-2023-41679,0,0,fb46f735ce75ea63a0abedf7f71ce6b9910a5f32bc0285907e6127ad42129702,2023-11-07T04:21:04.513000 CVE-2023-4168,0,0,9105b5838f0e1492b593a0b7aa88067760685441dda945320860dc1871cb4d94,2024-03-21T02:49:41.237000 @@ -231913,7 +231913,7 @@ CVE-2023-45582,0,0,ec3038d8e89bbe4a7db2f562aaf37c6a90f550f4c48b131a2c62e29f98347 CVE-2023-45585,0,0,f8948e6ae3dd3172522e4847e92a91dd603a009d568e79de2b51810b9e36e369,2023-11-18T03:29:09.223000 CVE-2023-45587,0,0,a9cb60a58e0c672e26b5905c5a5990c316a4eadd694972cc6304e59e4e2c383e,2023-12-15T19:41:03.370000 CVE-2023-4559,0,0,a8c76b8cf6cfb7293a17f0ac3d53b05a61a34fc2a8aa34aa5f8bb4f14c4e82cd,2024-03-21T02:49:49.723000 -CVE-2023-45590,1,1,36f1ff4a8bf589affc0f68cd6d5265f19c8a07cdd7b65cb89dbb6c1e529de97c,2024-04-09T15:15:27.627000 +CVE-2023-45590,0,0,36f1ff4a8bf589affc0f68cd6d5265f19c8a07cdd7b65cb89dbb6c1e529de97c,2024-04-09T15:15:27.627000 CVE-2023-45591,0,0,59e0e290570a33256ead5cd03a248fd939e29365d0ce5c906334216f5f80fc10,2024-03-05T13:41:01.900000 CVE-2023-45592,0,0,2941ec5bfe1caf7e9575b01add63862e95944ed4f3bc17e33a573383017a43d0,2024-03-05T13:41:01.900000 CVE-2023-45593,0,0,a7decca146ee12a4c87882013d98f33447acb38dd333ac108560bcca14897e11,2024-03-05T13:41:01.900000 @@ -233292,9 +233292,9 @@ CVE-2023-47534,0,0,81a5c657381b573d19aa39a0b2a9c5cefb1552d1a7cd2bbc725130b38cdd6 CVE-2023-47536,0,0,c92809299ce994fe002984e3ea770aaca21d26ac58ae60aa42bd9b1f93a95802,2023-12-18T17:19:51.397000 CVE-2023-47537,0,0,e819c54cb454cf4f0620df9dd3d6930b398a1b42288f9e331fa69cbd987badb2,2024-02-22T15:26:01.937000 CVE-2023-4754,0,0,d1a60aeff3e1b2426ae95f9ba5659b82b6b06e64889df384bdf47a9b7ba058b6,2023-09-06T22:23:47.563000 -CVE-2023-47540,1,1,d3c4dd009bb297e9e111f97975bf11d356fb2db7b59a66129143f42cc6beb6a7,2024-04-09T15:15:27.833000 -CVE-2023-47541,1,1,b7443b9d6a7e61d1aa8bc5ab12f33308d240f1314b2a91b08f3cef2746113db1,2024-04-09T15:15:28.020000 -CVE-2023-47542,1,1,abcb71cd035d73aedcf1e613772c1ad58fc0dc8ab4fd8faefcf115997539bd5e,2024-04-09T15:15:28.207000 +CVE-2023-47540,0,0,d3c4dd009bb297e9e111f97975bf11d356fb2db7b59a66129143f42cc6beb6a7,2024-04-09T15:15:27.833000 +CVE-2023-47541,0,0,b7443b9d6a7e61d1aa8bc5ab12f33308d240f1314b2a91b08f3cef2746113db1,2024-04-09T15:15:28.020000 +CVE-2023-47542,0,0,abcb71cd035d73aedcf1e613772c1ad58fc0dc8ab4fd8faefcf115997539bd5e,2024-04-09T15:15:28.207000 CVE-2023-47544,0,0,74a441f4f77a4621b886a1416c40c51bc2362c461a054f5d2e1a6477464ff2fa,2023-11-20T20:29:18.980000 CVE-2023-47545,0,0,41120a1766a824a28cac2c99cc626dd434d3f35147c984dffcb5895b5696e466,2023-11-20T20:28:54.547000 CVE-2023-47546,0,0,bd56aed1ac9a9698908401f32f3ade73a17b9443433cb85112e459fdf5c01493,2023-11-20T20:28:19.373000 @@ -234146,7 +234146,7 @@ CVE-2023-48720,0,0,71e46ed990f77e5e1ab7e573b7ce199df9e319357ad7189c0aedad622b34f CVE-2023-48721,0,0,8c47109b9e61cc40969444ae2ead7963b8d4bdd6b8b65c475e745b38f8da5161,2024-01-02T16:15:12.337000 CVE-2023-48722,0,0,b21bc90cd9ce1ec7c1af64c0d1da78505a33d180402299b29d84366f786b9b7d,2023-12-29T15:30:32.720000 CVE-2023-48723,0,0,51de78ba4a0fea3bc725aa980029a19ae13dc47bb89690d15ea1655fe7f3baae,2024-01-02T16:15:12.377000 -CVE-2023-48724,1,1,2d51c078435d38849ec8b24b5ec3e368839c1fd39ce0b0bc45c96a471cff2531,2024-04-09T15:15:28.397000 +CVE-2023-48724,0,1,11b6b814cc200d0e83f4841110ac6b1c2930d9e599c0fa8906b43f36572d42c1,2024-04-09T17:15:31.287000 CVE-2023-48725,0,0,e6e5b3a3cd78432765b74b2d7360c44fd933c54a4cf2f2334e127b9f4342156b,2024-03-08T14:02:57.420000 CVE-2023-48728,0,0,ed4fb3603eb3d1fb4a8089303ba944449bfea1856081f932800d0cc5bd7026e1,2024-01-17T15:19:11.497000 CVE-2023-48729,0,0,13f3c83cf7904baff3f0b31a9a04b64ff281e898cd527079412a7cd8a8ab623a,2024-02-14T18:15:46.243000 @@ -234192,7 +234192,7 @@ CVE-2023-48780,0,0,81a46aadc83bef693702f0587720fb307d57733c38a40b0e9a0adbf977d5c CVE-2023-48781,0,0,0b8167a5eef8ab6e938308c388d4115607ba3ad1846d34aa073b91ec79ad8a40,2023-12-22T09:47:10.017000 CVE-2023-48782,0,0,88145c135f3d36dc2324e589083cb79dceef7bf357c73c33782a57f9910e4f66,2023-12-15T20:01:55.773000 CVE-2023-48783,0,0,ebc0e9b096de11f5bb2feb6ecedfda87f1114290b6bb005e0f4f19fb8a6d2ef6,2024-01-17T18:24:38.617000 -CVE-2023-48784,1,1,1dd38221e437a37c1deaf4671397995259f9d5b2fa07202a8bbdb1f2699b2dd1,2024-04-09T15:15:28.617000 +CVE-2023-48784,0,0,1dd38221e437a37c1deaf4671397995259f9d5b2fa07202a8bbdb1f2699b2dd1,2024-04-09T15:15:28.617000 CVE-2023-48788,0,0,34a74b48d25913e490d4cc594c6129a6c91bce07a8d2d01b7625f50dbee729ec,2024-03-26T01:00:02.003000 CVE-2023-4879,0,0,8ff2f4fac231edfb0e8e6c6042e670dbdf0da9230931b634f3b1ed60cbdab258,2023-09-18T18:58:43.767000 CVE-2023-48791,0,0,4e7d2cae3ad6ba11c4e276624bedca77887a0ee315b409ddadb10bd81db3bb45,2023-12-15T20:09:24.010000 @@ -234334,7 +234334,7 @@ CVE-2023-49062,0,0,068484681abaf43841eb99ab0ed862f133e5253b284cc541c1c2972f2bfd5 CVE-2023-49068,0,0,c80c101a6567d5e001bf80bd192cc6c02bc83242cdfebc387037548c73e960a9,2023-12-01T13:53:23.050000 CVE-2023-4907,0,0,8641e26d9489913936718e7eae574611ae3f349b3bc3ae094cd558ba78dcb7a0,2024-01-31T17:15:17.750000 CVE-2023-49070,0,0,0534adf05a11629b68e19c072b5987401c90067fb46308aa630dac9a694c5940,2023-12-29T18:15:39.103000 -CVE-2023-49074,1,1,793726cd7128c4874818b2e68612ebd74cdf5925cd4d99f20bdfd2709ff57ba8,2024-04-09T15:15:28.800000 +CVE-2023-49074,0,1,d9d1e02b34b07d6fef61ccab6c6edb9de19db82eed428df7640de7129e1fefd5,2024-04-09T17:15:31.417000 CVE-2023-49075,0,0,913e46bb74318ee75a4ddd2acb7f1e5126a9f9e9c3cb15478c7bbdbe3f992f86,2023-12-04T17:53:15.497000 CVE-2023-49076,0,0,08cf9b7057cb4805ab4e567bd39b0c423aa49a71072cd8f82a0f9b8b94966479,2023-12-05T18:14:20.597000 CVE-2023-49077,0,0,48375974b1462e0d1d4acfad900ee40a5b9f0e2936f899dccbee7ff32126b23f,2023-12-05T17:39:23.030000 @@ -234393,8 +234393,8 @@ CVE-2023-4913,0,0,cd0281c3ea214aae7362adc6977cf8b2200973629edaa0da0ce079b555ba91 CVE-2023-49130,0,0,4c2c917ea6ccdddb6dcb4301b91405bd33b9adf99c5e517bd3d969225808c38e,2024-01-10T20:30:18.623000 CVE-2023-49131,0,0,e61e3494ed1c115d0770551e82cde72433851662b96fa72b7d10542f232ca3fd,2024-01-10T20:30:29.007000 CVE-2023-49132,0,0,ebbc7d193cdefe4939adcba7bbbe0ba52a60464d77374d32564640c93c00a285,2024-01-10T20:30:39.817000 -CVE-2023-49133,1,1,05d1f2cb7899e6e0233e54f498299c0a95341208f8fd9c23510988f77d34b8ed,2024-04-09T15:15:29.003000 -CVE-2023-49134,1,1,a53d14afef72dabc0ecc3f62727054f25d8a471abfe8038783310cd6facd29ef,2024-04-09T15:15:29.220000 +CVE-2023-49133,0,1,c9bee53930598f987a6f736cacb95f36638cad18d82121131bba34774cdb91bb,2024-04-09T17:15:31.510000 +CVE-2023-49134,0,1,69e269cd10e06349b871cfe314c59d70735256f5022a1440f9432fe8933d2664,2024-04-09T17:15:31.600000 CVE-2023-49135,0,0,9f30a2b1aec673fc3f9bb80a0a42daa84ea6c4a6016e18c100f5838afb394e2a,2024-01-05T22:04:16.437000 CVE-2023-4914,0,0,0279c4f46287c6c360e1b4fa314c6db89b8c67160845891a95205646ff8cbe91,2023-09-14T00:43:57.353000 CVE-2023-49140,0,0,7862d6efde898af8aba85584b48367b423cc13d6d094d6ae73b54169ddb58dc8,2023-12-14T20:50:01 @@ -234876,15 +234876,15 @@ CVE-2023-49880,0,0,257c43be93776568a0b52b8a6e628304074ba9fd82011c7d2857ed2bb2f10 CVE-2023-49897,0,0,870ad155edef57b65e707e243e055d6d18af07e15c1ff8359a26652388fe88f7,2023-12-22T04:15:09.130000 CVE-2023-49898,0,0,b2a1db122e368d3cde8339cc3a7f10b600032b56ed6d4a0eb150bd85f0d23b04,2024-01-05T20:00:50.767000 CVE-2023-4990,0,0,6c714ad5429626565156c819a6158c984ff4f11be9d2b200d6059e25722c351b,2023-10-16T19:14:35.937000 -CVE-2023-49906,1,1,475ea3e45634adef6b047b1b8b942d0c7cf4a9e72ab8ef3c5cec1707db4bad69,2024-04-09T15:15:29.433000 -CVE-2023-49907,1,1,25ff1c796fd075d29d9e4b4c2c3cac4c75c66b7a0a8b6b709f68e7a97a058fe3,2024-04-09T15:15:29.637000 -CVE-2023-49908,1,1,f36b4b5105b5daad91055008d0673091a5c3f9ea5b4bcdd259a990ad1625ae1f,2024-04-09T15:15:29.823000 -CVE-2023-49909,1,1,defa18b55942e9004ad379cce7fd04af93679d1dacebef9ea3d7d458ea78effc,2024-04-09T15:15:30.013000 +CVE-2023-49906,0,1,ea0b4d0509eb96acffd3aeff614fe59f3446bd4239edeaefb3d15745c9d3a388,2024-04-09T17:15:31.697000 +CVE-2023-49907,0,1,5a8b927bf4de306d9dd21ab84f2563843a7703f4104457fa9da60426d94bb956,2024-04-09T17:15:31.783000 +CVE-2023-49908,0,1,3a7ef935b16d2d73c7fbeb76d99fa5457e8a6e2fecfea7be6708207a8e16a7ce,2024-04-09T17:15:31.870000 +CVE-2023-49909,0,1,bd90361afca42595419c9c299dc906af40799c1ee5b5b9c3eca5777fa71252cb,2024-04-09T17:15:31.963000 CVE-2023-4991,0,0,5d28c47f86b7d988e0662cfc235ef621109a96b265eb8451d4a1f83045a5d773,2024-03-21T02:49:57.003000 -CVE-2023-49910,1,1,dbb78fdaf4278ad4aa6d2fc0f7d6cde24b64c64752491982ac02d0c37e3692cc,2024-04-09T15:15:30.210000 -CVE-2023-49911,1,1,db756c87e9d5d48fc224085cf6dc90b5e8c3b3cc4e2a4c15786c2076efdc845a,2024-04-09T15:15:30.403000 -CVE-2023-49912,1,1,ac6d60d5fe31a6e082f3508cb68c64863dd5399cfd558dbb5052209f0e1b57fb,2024-04-09T15:15:30.593000 -CVE-2023-49913,1,1,aa43145ba4ea9a75f4f431116e8d9a2675c506d543fb00a84b79563fc23e30c1,2024-04-09T15:15:30.783000 +CVE-2023-49910,0,1,e8ad9c67669abcf3683308cbd1fd7c5b55c80f2e57a172149bbbaa75acd2c947,2024-04-09T17:15:32.053000 +CVE-2023-49911,0,1,b5ecd6fa4314ba07862b9adf12ad4e48c7eb927ac9159726991274e2917bf34b,2024-04-09T17:15:32.147000 +CVE-2023-49912,0,1,168c8380267f3aa83c869aa3ad482c0025c399a59f4e9fac0746cd7dc47ba9b6,2024-04-09T17:15:32.227000 +CVE-2023-49913,0,1,0d527ea3382945c251c5f9ea4c400956e261760e2005829c1adc7d7b957d7f48,2024-04-09T17:15:32.320000 CVE-2023-49914,0,0,5cab0a051c77f20f0e1965440812ba29ffb7db5d89ee06f1f98d52c994286c24,2023-12-07T19:04:24.117000 CVE-2023-49920,0,0,95ad99a89e65f0f1a24a3af0d45eca609ac623e79fcc48b1b462a9d0752f0903,2023-12-28T13:49:22.483000 CVE-2023-49922,0,0,08399520b800d4342637b05f466e75991a66c2a5dc2abfe822e63cfdfcf3b210,2023-12-19T15:11:00.423000 @@ -237383,10 +237383,10 @@ CVE-2023-6313,0,0,caefbad39b70ea33c0754b26b98b1901233125cf77f58bfe97f55f93c8b121 CVE-2023-6314,0,0,f4128a234377715ed433398ed29329489185b89566c1f8948f1313fe3eb87e21,2024-01-02T13:31:21.217000 CVE-2023-6315,0,0,0ea3d757b463802bd072d80c605e85486723b96d15e4b6f43ffdbe4b27553792,2024-01-02T13:43:51.817000 CVE-2023-6316,0,0,d2a53cf9d574188a1d1db73921a61c0a0e0e318b0720f84fd1373b0184553c47,2024-01-17T20:17:22.003000 -CVE-2023-6317,1,1,511675fe4097b801cf1fe9713e0932ea78682caa58153752f1984c63e667f74f,2024-04-09T14:15:07.683000 -CVE-2023-6318,1,1,100eb8c508aad250a2954625d5b8780a2fe3f0c027d34c264c388b67b3d91100,2024-04-09T14:15:07.897000 -CVE-2023-6319,1,1,c7acf1d81d02e2b7f43493ad37cac966867a53bf502b16002ebe159429e9f9f7,2024-04-09T14:15:08.093000 -CVE-2023-6320,1,1,d2c47b6fcf66ff8011010d11563da51224c4d8bfe9911b6d6d95b635faeed3b5,2024-04-09T14:15:08.287000 +CVE-2023-6317,0,0,511675fe4097b801cf1fe9713e0932ea78682caa58153752f1984c63e667f74f,2024-04-09T14:15:07.683000 +CVE-2023-6318,0,0,100eb8c508aad250a2954625d5b8780a2fe3f0c027d34c264c388b67b3d91100,2024-04-09T14:15:07.897000 +CVE-2023-6319,0,0,c7acf1d81d02e2b7f43493ad37cac966867a53bf502b16002ebe159429e9f9f7,2024-04-09T14:15:08.093000 +CVE-2023-6320,0,0,d2c47b6fcf66ff8011010d11563da51224c4d8bfe9911b6d6d95b635faeed3b5,2024-04-09T14:15:08.287000 CVE-2023-6326,0,0,da68435ec565f5478deb03e75227a685933d8e7699006844b61a2674d05885d6,2024-03-04T13:58:23.447000 CVE-2023-6329,0,0,acb69acf796efdc21d3e11700a3115c7e39470c82b6e643969998bcd2e6b6d74,2023-12-01T20:50:45.717000 CVE-2023-6333,0,0,c9c5b2d28685d70e3694c86d73a2ffba7633a0d13b15746a0b23ea79549ea6b5,2023-12-12T20:39:57.697000 @@ -239738,9 +239738,12 @@ CVE-2024-20661,0,0,22fcd4c02b631584d56328e20c2613e617670ad18a4298cf05af75af85e26 CVE-2024-20662,0,0,0599c86b820eae57bb54681f60594f4d449a103048063d416d359fcaf78718af,2024-01-12T21:47:48.250000 CVE-2024-20663,0,0,16e2b58ef129f9d0aa366a4b23234b595020eaeb0d0ea63b8119c6690a429fe0,2024-01-12T21:45:42.930000 CVE-2024-20664,0,0,a0bf3a498d3414546e62336243bc56f232067ba5bd733a4b67104c2f9ca25816,2024-01-12T21:40:25.993000 +CVE-2024-20665,1,1,67f593ad59da8e4c677556c0441fcfd4a147dd5057e423cc3aebea11afea4002,2024-04-09T17:15:32.413000 CVE-2024-20666,0,0,0ce324407dd82e4e7a1b15cd12b40148eb641daed761ee5aba9c7d397558354d,2024-01-14T22:46:45.707000 CVE-2024-20667,0,0,0b0b0e24a7a1958d01f770ba3e121c8019f7f3fc7716632e9bdf95938785d82c,2024-02-22T15:30:25.733000 +CVE-2024-20669,1,1,7da7fa3df4188e63229d8ed57854abec874c1fe7cc3685f6b53dd60f52bc8754,2024-04-09T17:15:32.700000 CVE-2024-2067,0,0,57c17e59d49dcf933c283ed695d4feec3f72034c9c960216110bc11e0252af8f,2024-03-21T02:52:28.207000 +CVE-2024-20670,1,1,7e240e261509dc0a02a2c538cf9fc21a338325763a4986801da8619a92caba5c,2024-04-09T17:15:32.907000 CVE-2024-20671,0,0,a909e7542a4f27bac7b3c8922bc1dcc8da9c04f9b5256ff72be51b705a438f9c,2024-03-12T17:46:17.273000 CVE-2024-20672,0,0,586025d75610d6f675953991e7fedf1dd3dafae527b62b3c4bc1579cf08bc78c,2024-01-14T22:48:45.253000 CVE-2024-20673,0,0,54b4e9f241ee8ab47844805a07750d3fdabb10465652b2260f0e87e7bebbe285,2024-02-22T15:29:57.733000 @@ -239748,6 +239751,7 @@ CVE-2024-20674,0,0,d7c6662e16282211f30dd37457111eea17691669cc0c244e657068ead7a27 CVE-2024-20675,0,0,098a1c1051e51e54708ad491ffc1da84402b5013489ba95a88b69b71214102c2,2024-01-18T19:14:08.637000 CVE-2024-20676,0,0,579775666c740fd791eda792a7e52a24b6b8e9d0d14bd0023a90dc5677447d47,2024-01-14T22:38:08.740000 CVE-2024-20677,0,0,b9486dd78242be24c7ff296f75ca8770194c3200204379fdd7a794d452563c6b,2024-03-23T00:15:08.517000 +CVE-2024-20678,1,1,4c3012d741eb463798fa784febb53b6d7f9a70edfbaf3fc0ae71df4e32fbf944,2024-04-09T17:15:33.110000 CVE-2024-20679,0,0,1624b017f22f1cf58bc970d748c42b03846353e42c36ff6e40dcee02d8d7545e,2024-02-26T22:07:54.517000 CVE-2024-2068,0,0,966bae401adccdec350c28bc5241b1fac538dddea35f3b71c88bd3ce0df7f017,2024-03-21T02:52:28.280000 CVE-2024-20680,0,0,35b6f00c12f15f8755046cf5bffe1b26ae6f70d9c4c72c3072477aa5d126c0dc,2024-01-14T22:39:00.147000 @@ -239755,12 +239759,16 @@ CVE-2024-20681,0,0,b3985a5f9282900762f5475c4100b5cef5eb652176fc088062ac242619e38 CVE-2024-20682,0,0,b94051272747c4e0b2c54de8eacfdd9145f1e4095b79e687449881daa6e087c3,2024-01-14T22:24:25.350000 CVE-2024-20683,0,0,e4ba91bc9eaa6fe46db66cc020d05a17fbfc95be97343dd4c92acac929d247ee,2024-01-14T22:23:33.287000 CVE-2024-20684,0,0,38ba3bba8828a5f298156904b2a8470402ca19d121f3140f0358e7c9de913689,2024-02-26T22:07:39.783000 +CVE-2024-20685,1,1,8f5950584888f0d1a394cce336b25d844105f79126788a7b12c88dd363df19e7,2024-04-09T17:15:33.337000 CVE-2024-20686,0,0,3e6f769405234bd7c84ed3f76af2c4be0b30bc5f9fb1721087ce13fd565bd694,2024-01-14T22:06:45.580000 CVE-2024-20687,0,0,d4b9571721f8bb850f2179c75bd07111e326a3462b6e489b0993a0c46c9e5b84,2024-01-14T22:16:37.297000 +CVE-2024-20688,1,1,8e146c7d0414db119418920b46db4da335d7911829154264d59a7f9d334620cc,2024-04-09T17:15:33.547000 +CVE-2024-20689,1,1,5d297fcf461ce96dd02ffabee3c4bfdbc2fbd1876061bd03214d35968dbad678,2024-04-09T17:15:33.750000 CVE-2024-2069,0,0,7b87f4f00aa40a7a83ddcf1aa2a4045ea46e9f6c8d1780eb54a4322df74db3a6,2024-03-21T02:52:28.353000 CVE-2024-20690,0,0,f72130855251782304dad219b256f7c12f6e16373947668350450ca487232814,2024-01-14T22:18:00.680000 CVE-2024-20691,0,0,002fc7fca24cc62192fbf41357944a1e8abaf50aa032500b2e05e26f0a1aec86,2024-01-14T21:56:21.480000 CVE-2024-20692,0,0,997b6a29411601819484345bc4b064d9458ffb9f599c0dbca1d49eb3ab534711,2024-01-12T19:10:41.183000 +CVE-2024-20693,1,1,5011bf62039487b531a72caf0afd1b669d3b2e68ff5dc5f55eae0879593bdaaf,2024-04-09T17:15:33.940000 CVE-2024-20694,0,0,42fe3c5aa6e886057ad5223ce22baa5832be44ce649870a493eae5451abdadcd,2024-01-12T19:07:21.457000 CVE-2024-20695,0,0,d91d739d86a32badbe07b2daaf554bd8adbb9f953b1146b06e07adaaf1abadbe,2024-02-26T22:06:41.027000 CVE-2024-20696,0,0,9ddb63ecf2610212f2fb4de92266f273191e55cbd9902b16f9a55db815ab8ffc,2024-01-12T18:55:51.773000 @@ -240008,6 +240016,9 @@ CVE-2024-21318,0,0,c80465d55b874ce0fd733ef59866b8764e2a4e0bee3edf41d52edbe964ce5 CVE-2024-21319,0,0,844beb54db3c416104b0327e19c958e7df015dedbd0d4e4518ffb999201d3bbd,2024-01-29T18:47:58.443000 CVE-2024-2132,0,0,3b8fb3b1e21708dee38931061b6e4bb20015caa6e6f92a264bd45d8ad9d9ed3f,2024-04-08T18:48:40.217000 CVE-2024-21320,0,0,2617862d92b43edc1c23f8b91ad7a08b7cd9d26f90378902f19f86c6bcb8c03a,2024-01-12T17:14:04.587000 +CVE-2024-21322,1,1,c6e839e9a0778b193aa38522669f31d82d9c6e4aab01160dcb30e15b1b895566,2024-04-09T17:15:34.160000 +CVE-2024-21323,1,1,8a27e47a0b5b632b873019becb877928dcd7b80fb88b6bfc06a1e191dcbd1bc6,2024-04-09T17:15:34.380000 +CVE-2024-21324,1,1,ad62837ee358b4a99c396153287601c87ec60bc5b80ec8541d59f0f69f6d768a,2024-04-09T17:15:34.607000 CVE-2024-21325,0,0,40a87d4aaf57c7582e6879a425b4dde0a48326debb99e4212ce7265ac8d03b6e,2024-01-12T17:12:13.297000 CVE-2024-21326,0,0,9b99383e3910a33b7c019a2944e435999c12719dc82d122ce9f6853940851c45,2024-01-31T20:10:24.203000 CVE-2024-21327,0,0,5cd0f8db488340c5abbe3ff8352a3cbcdab4b555f5439d5981b1f38aa53bd0b7,2024-02-22T15:29:03.963000 @@ -240092,6 +240103,7 @@ CVE-2024-21405,0,0,7b2bcd85f8b75e36055a51e8d6e50e620fbb5da00673d7a82956b2dcc3d7e CVE-2024-21406,0,0,4926f610f67020e143f717a8966dfc594abc79953c895df1691f78cfff880f19,2024-03-01T22:57:15.940000 CVE-2024-21407,0,0,13806882df1727e3bbc8e26b8c7dd4da4315e03da171f9dbf0647863a4d47218,2024-03-21T21:06:06.530000 CVE-2024-21408,0,0,5325218009ff3c8f10a3b9269e4b1c5ec312eb3ea56b73f6a728479c1bad3635,2024-03-21T21:06:09.543000 +CVE-2024-21409,1,1,5b6eec931ed61c8373a0cd95a94b0868c67258cec69eeaee8fbcf6dc6696b59a,2024-04-09T17:15:34.803000 CVE-2024-2141,0,0,e26109b8e99283bdb62d5043bdd1f401aa59fc85bb3806b759e44b62f049717a,2024-04-01T01:12:59.077000 CVE-2024-21410,0,0,bd862af63cde79d77d3d96c08b20eb8ee12ef6b46d7738e8f98c5d9c8af65aee,2024-02-26T21:10:38.713000 CVE-2024-21411,0,0,8d8f952d2011bbfdff19ef0bb365756eff0dc13d4fce72dca6529e4e1e68205f,2024-03-12T17:46:17.273000 @@ -240103,6 +240115,7 @@ CVE-2024-2142,0,0,775c587e23838eccc1f05d84b61c4d1b983fbea738158d2b5672ec0ee3392f CVE-2024-21420,0,0,4d273bcd57781d22381c1e9b04ae9d3948bb039224f21455b9d56dc048627938,2024-02-13T18:22:43.577000 CVE-2024-21421,0,0,ba8423a9f096c86c4c4746df3fafea597a8042e8f3a3594375e861377c5bff3a,2024-03-12T17:46:17.273000 CVE-2024-21423,0,0,72b41cc6b131f8c33d53f5b1b9d9c002818d4d4ea0440990019a30ebd0dc6a9d,2024-02-26T13:42:22.567000 +CVE-2024-21424,1,1,99a188b127a62969bd4ceb3f7d1b3a849635b18282e31d1b0db1fc4362ffa822,2024-04-09T17:15:35.010000 CVE-2024-21426,0,0,86a12b69d99e2687e9fbda5c33ec1a0a3b31bb6bdeee999e1ae206b6f2a8a023,2024-03-12T17:46:17.273000 CVE-2024-21427,0,0,d872ed95c313b560e8cf753a17185fae76e217970a04d327c670ab53f92abd7f,2024-03-12T17:46:17.273000 CVE-2024-21429,0,0,26590e66d91bf1d28f0c4de1757f60f44591fb36e9c24b278cdb8eceb38b6bb4,2024-03-12T17:46:17.273000 @@ -240125,6 +240138,7 @@ CVE-2024-21443,0,0,b21bfc36fbe3b83aa9c9a4c2f4dbc6a3625a0f44b90591d6224c7e39103ec CVE-2024-21444,0,0,0f9605f602a8c5425fe4690b6d0f9db3de6ae05ef42ddf9bb672e36e4bdaa0ca,2024-03-12T17:46:17.273000 CVE-2024-21445,0,0,7223488399dcb1a05b122aefd3e64f1d96294e183ebd620b1d95e29f6c8c197c,2024-03-12T17:46:17.273000 CVE-2024-21446,0,0,91960ff6b69d1520fd2e87fa941a1c2b934ead5cf47daa17bca4aba915577331,2024-03-12T17:46:17.273000 +CVE-2024-21447,1,1,a9ff30976cf1f45389ecb1ff8ff082bc8ebf02e9a86d7dec1a55f466a4319f9b,2024-04-09T17:15:35.213000 CVE-2024-21448,0,0,33c2ba1d1c36ead3680b28026e95df48f6a4577908c4e999311c87f2c699583f,2024-03-12T17:46:17.273000 CVE-2024-2145,0,0,919731804e75d3d91049b3b8299b33b2d9257c98d4091deaf2e748aaf2abecd4,2024-03-21T02:52:29.410000 CVE-2024-21450,0,0,bd9b0132c284e02c9f809e476990df9d99c6a8a561ab43a4f1af930b517db1ea,2024-03-12T17:46:17.273000 @@ -240274,8 +240288,8 @@ CVE-2024-21747,0,0,35403744e7ef40fd68d659ac75e691394b3bec12407204459bb0ee7326018 CVE-2024-21749,0,0,977e78c03c745b3f2715cc5017eb627860eddebef9d26895b59c2bc8df042370,2024-02-29T13:49:47.277000 CVE-2024-21750,0,0,3e8fbe0cb62c8e56d68418bdaca88bd6a5a9359bd561d57e9822bcdabaea5468,2024-02-03T00:41:15.460000 CVE-2024-21752,0,0,80a5a3aff28e680d194d956f222c96b3f36d11392adc2ff7fd485136323ef565,2024-02-29T13:49:29.390000 -CVE-2024-21755,1,1,9043853d7198f802b3bcd4bcc2e0084040bc6f428d6613728a4819b039391f8c,2024-04-09T15:15:30.977000 -CVE-2024-21756,1,1,7519437559e42b6fd2ac7a1061c9319270ddff1ce7699e03bf120a2f64ea2b1a,2024-04-09T15:15:31.173000 +CVE-2024-21755,0,0,9043853d7198f802b3bcd4bcc2e0084040bc6f428d6613728a4819b039391f8c,2024-04-09T15:15:30.977000 +CVE-2024-21756,0,0,7519437559e42b6fd2ac7a1061c9319270ddff1ce7699e03bf120a2f64ea2b1a,2024-04-09T15:15:31.173000 CVE-2024-2176,0,0,0b1ad65e2de8a26d446910c44762983b7c0d3648d9404f5b09d2ef1eb4a5dde1,2024-03-23T03:15:12.287000 CVE-2024-21761,0,0,8ab59e75152f9d6936d0a5e25258149f4630555ed80a24ba673592c858a212ca,2024-03-21T21:04:27.653000 CVE-2024-21762,0,0,0b64c1e53b9988082cc4d4d5e4617e40dc5892047d7c058b50bd69b94b2061c8,2024-02-13T18:21:14.607000 @@ -241142,8 +241156,8 @@ CVE-2024-23656,0,0,695cb145f7353545c42b021c49ddb6b311a4d25b9fa1e7632b8b33e1235c6 CVE-2024-23658,0,0,4fd332de96fe33333de93e4a2a6d5b75daef55cd44cb46bff5d3000338fc5623,2024-04-08T18:48:40.217000 CVE-2024-23659,0,0,236290b059375e8b7040b3505591889202adcca1fe58c9cff8e0844cbcf32583,2024-01-25T14:58:22.470000 CVE-2024-23660,0,0,1b2c29c1f9877409e81cc31263cb621728177876460bb697b8348507998614a6,2024-02-15T16:01:29.370000 -CVE-2024-23662,1,1,834aff86e75afbf867e64d1d6823319156a85d5a1521aa1224a005f217514673,2024-04-09T15:15:31.370000 -CVE-2024-23671,1,1,595b595b45bf7400954e0b99696e375a32d12b2f8d55b1723089fbe791bbbb9c,2024-04-09T15:15:31.560000 +CVE-2024-23662,0,0,834aff86e75afbf867e64d1d6823319156a85d5a1521aa1224a005f217514673,2024-04-09T15:15:31.370000 +CVE-2024-23671,0,0,595b595b45bf7400954e0b99696e375a32d12b2f8d55b1723089fbe791bbbb9c,2024-04-09T15:15:31.560000 CVE-2024-23672,0,0,54bf1407d160f0bf02a84f88f834a69410f295a08745f6fc791198a038b82c2c,2024-04-06T06:15:07.717000 CVE-2024-23673,0,0,11a42dc617628e4138314e2a3d8d0f02b60cec9315a80bc3284ec5f1547fd09f,2024-02-14T00:26:41.517000 CVE-2024-23674,0,0,6ff4eec4bc6bf37404ee9cc16207f5af57bda7bc987c56668d0793a7a9ea14ad,2024-02-16T13:37:55.033000 @@ -242388,6 +242402,7 @@ CVE-2024-2615,0,0,8deedbd5a279b5495fa0c1adef180013019977fd5cce70547fc998c025867c CVE-2024-26150,0,0,6b46aadb8d2e5e55b79816d9aa737dfda01e9c2fa9c6e34d49b792a6844cf9c6,2024-02-23T19:31:25.817000 CVE-2024-26151,0,0,0ef73cfc7434fed098a8e57d421b5c1dc1bee7dc5bf46a5716bc25c82daabc74,2024-02-23T02:42:54.547000 CVE-2024-26152,0,0,6dfa64806d43fa1ca8d78e594168457fd0de54a5d328b8e252dd30bafded5674,2024-02-23T02:42:54.547000 +CVE-2024-26158,1,1,23b90c1fe7dd1379b26dd9c52d86bfde1aed6b962602684ed87ae857ae1b1743,2024-04-09T17:15:35.477000 CVE-2024-26159,0,0,448fd5aee2f117d5c82f90f3e6ccd32336f82e9c50c58f1bc1ec300d2563002a,2024-03-12T17:46:17.273000 CVE-2024-2616,0,0,e3c92b3b9aca00a51c867346d68b83b884e699ab07afe2070061dd49cd767a57,2024-03-25T17:15:52.007000 CVE-2024-26160,0,0,a47802150b9213c3d691eb5138a50ad26caf836e11a472e93745350860e84ad9,2024-03-12T17:46:17.273000 @@ -242398,32 +242413,92 @@ CVE-2024-26164,0,0,f2146f0ff66de154a10a27a96e1d3ffe95e8306b15b3090d001ae79f354ea CVE-2024-26165,0,0,a1425dd3ba6a9256a35ea0d63f285ba1e05f8153f9e51034a0497747fbc27ee4,2024-03-12T17:46:17.273000 CVE-2024-26166,0,0,96747ce17f6b54118acd08f79d1d1595d37d2f724a632775d5e05e8fef5b199e,2024-03-12T17:46:17.273000 CVE-2024-26167,0,0,c7ef30deac9cc168daf190a6134ba584248b8a1ef0f1584bf395b9e88fcd8841,2024-03-08T14:02:57.420000 +CVE-2024-26168,1,1,27938dc0da2a704b907d1e8b2384fb87f4f5d25e36befb28d7f02cd9552bbf39,2024-04-09T17:15:35.687000 CVE-2024-26169,0,0,e0b3934133f75bc50d64ec139ba7e36050af90f40445dd504f2484bd5288e462,2024-03-12T17:46:17.273000 CVE-2024-26170,0,0,f941fa3f18df7af0e07236c4a56dc018bb1e3716be4e1a0cd416d914ea52f1d4,2024-03-12T17:46:17.273000 +CVE-2024-26171,1,1,312c7b9f402e798a8dda0b999d1369a8ad5c1ae5c02823794c1a2dfd1623dd7b,2024-04-09T17:15:35.910000 +CVE-2024-26172,1,1,038fce2d053d60aacb61b44b1878b6895e3c36be3945684ccb443f82d6916436,2024-04-09T17:15:36.137000 CVE-2024-26173,0,0,e33d1fd736b59f657ec387d7529ba1e1cde39fd167abf346a667f8ac2153b5c3,2024-03-12T17:46:17.273000 CVE-2024-26174,0,0,8746c4fb885d113ff911d1570cd21b12e8330e95a89ee3f3aafa57120a5ccc35,2024-03-12T17:46:17.273000 +CVE-2024-26175,1,1,b6779ec68f4c2141b75d2a035f681bee3d172c7a46e1dccefa07438b5837816a,2024-04-09T17:15:36.327000 CVE-2024-26176,0,0,dec21699c880ff1b021f9b5176a2ff91e97e375f8624deda96de25a37a3969ce,2024-03-12T17:46:17.273000 CVE-2024-26177,0,0,526ed509ecdc83dbed27359fa4275b0d6d20e3221a35769e8e272b6cf9355817,2024-03-12T17:46:17.273000 CVE-2024-26178,0,0,f31385a8e76f512439cb68bad1fa8052a8847dc858ae2bf696c41ac5ee8dea83,2024-03-12T17:46:17.273000 +CVE-2024-26179,1,1,66e66705b79976c2e08b6f52ae803f7c680aca0eec35e0136b2643d733f22bb9,2024-04-09T17:15:36.543000 +CVE-2024-26180,1,1,5f3abf46968a77a907f6d8ca79d9f948063fca5e655410484b700e58c3a1df8b,2024-04-09T17:15:36.747000 CVE-2024-26181,0,0,3a411991e2aecfef78fa22d696562d983ee0c725c3bcbac06e5fb980d6ae1993,2024-03-12T17:46:17.273000 CVE-2024-26182,0,0,01d291b62dcd4763bb73571f3414f540d18800953db73ca7d564f941b21a67f4,2024-03-12T17:46:17.273000 +CVE-2024-26183,1,1,11bf86f1932076ccfcf0b9e81bf97a88e3fa70675d9cf75d6ae136d8f0bf47c0,2024-04-09T17:15:36.953000 CVE-2024-26185,0,0,738a6a15b299a6513da71e29e6c1cd204e2068fb9124bc2345d15274b6b93f4d,2024-03-12T17:46:17.273000 CVE-2024-26188,0,0,cbced0ad38341d6a0035f6538415d27dffda3a0d4e621c0cbaaaeee14ff9bce4,2024-02-26T13:42:22.567000 +CVE-2024-26189,1,1,a0153a5145d963c540ef2ec31ab1f70275877eebe12bf48f289ee620c46e618f,2024-04-09T17:15:37.170000 CVE-2024-26190,0,0,9cce0844f00d3b4fe7202af12ce75f8addda2c33a8e0dbe5b90aa15bc5f220d8,2024-03-12T17:46:17.273000 CVE-2024-26192,0,0,c1e942eeeb9f7e77b820994815c0152ac4eb6f717d3961fe34eee61ad41ed3ff,2024-02-26T13:42:22.567000 +CVE-2024-26193,1,1,78b2d9b57cc45d82c0d0e5e1071a7fe8f13d4f7546a4776830a74cfac6877d54,2024-04-09T17:15:37.373000 +CVE-2024-26194,1,1,347f12a861c024a0c14593cf893435a174bb6f3f23618de8f6b42a4ec509709a,2024-04-09T17:15:37.560000 +CVE-2024-26195,1,1,5bbe50eaee2b8d190005ca85ac1f19bc47c0b4f81ce4c0b420f2d7e5b0a6e251,2024-04-09T17:15:37.773000 CVE-2024-26196,0,0,1ee43aadb57b3b8ca7d28d011e60635f3daaaef1122662143a55d71dc16b6177,2024-04-01T15:23:59.877000 CVE-2024-26197,0,0,0725cafd0a829b4fda6b0812b0021e2cd01423c9dc10270724efd3d365600952,2024-03-12T17:46:17.273000 CVE-2024-26198,0,0,d3c132bc037d4a84f619b0df68fcd74e6188e0e707a271287ae10174a6dcbfbf,2024-03-12T17:46:17.273000 CVE-2024-26199,0,0,ef5c4c050b91fdfe3bc8dd8dc8c96fba459a85cac7c8ebcac50777ac41471579,2024-03-12T17:46:17.273000 CVE-2024-2620,0,0,4315b04e2e66c88944d8a5735a6d455dd3018a94844291a0ac7deb04267d25e3,2024-03-21T02:52:40.017000 +CVE-2024-26200,1,1,7f8c51110223d6c174c46b960f4de8a35209cb2f234b6fc61e1b4af7fcd08e7c,2024-04-09T17:15:37.970000 CVE-2024-26201,0,0,2b22b29b92c62acada81a8d7f49f02f9a9be5d00fc7787468bc1f6b7d1916e71,2024-03-12T17:46:17.273000 +CVE-2024-26202,1,1,74ebdf5535630496dca7d224c54fe71b8313125f7d36ed28c702efa00209f27b,2024-04-09T17:15:38.197000 CVE-2024-26203,0,0,cfcd64d2ed9ea2bec2c03595d9f4c10b032f5fc344259e4b56f67c7ea3a67b99,2024-03-12T17:46:17.273000 CVE-2024-26204,0,0,9e85fd2cc0d1824d036683649ac4329f684761de8ef9364d32f1228630336640,2024-03-12T17:46:17.273000 +CVE-2024-26205,1,1,382e907078d36418684082b69d81e3feddbb2e1c7f5520d6a2c9b43fa74022d4,2024-04-09T17:15:38.397000 +CVE-2024-26207,1,1,f87622278e6a56b0ff4cec955258cb73bca44886e1802c9d29315599aa09a1d0,2024-04-09T17:15:38.593000 +CVE-2024-26208,1,1,dc72a01425a8e550847a82be0d5dbbb4daafd6799cfe492ae00c25cd0d178159,2024-04-09T17:15:38.803000 +CVE-2024-26209,1,1,6de4f5cf3d227684f17f81152ee025bc044e1f5ad31b8e74a3081999a875cbf4,2024-04-09T17:15:39 CVE-2024-2621,0,0,5251a751f6333a6b64a052a81adc5c4ee1a9d5a432b3a02d403e06b277024dbb,2024-03-21T02:52:40.120000 +CVE-2024-26210,1,1,bf399b72772c5cfc61592670cabe22242a4d9e96781c08e5bb8b2fe8b3e217b4,2024-04-09T17:15:39.240000 +CVE-2024-26211,1,1,0d1d018adf89dc293eb5a4367ea890b6042cb9b3654a3c51bc945a68f80630a4,2024-04-09T17:15:39.443000 +CVE-2024-26212,1,1,0ea7002653850eab312cd0bf5fb76dfc1afe10ac7af7c3e5e89e804c7067c6d1,2024-04-09T17:15:39.640000 +CVE-2024-26213,1,1,ad409126d95cae33d205786e5daa3652f693802201b116a91a844d56ff23f8fa,2024-04-09T17:15:39.847000 +CVE-2024-26214,1,1,e4e72447e484c6a43e97b5037e0a718ef3ff0f51b5f96676d519bd99334cc3ef,2024-04-09T17:15:40.043000 +CVE-2024-26215,1,1,c350bad73f6d08bca8c668596eb31ca93e12949eb85c1b2da7b024a328eb13f1,2024-04-09T17:15:40.240000 +CVE-2024-26216,1,1,dfd07828ebfda4b1e95e1091a44f980ff4a89daa3135e096010eb1544b12eaa4,2024-04-09T17:15:40.447000 +CVE-2024-26217,1,1,22753bb0265428bf1a4397357728a6ff51033616dfdd4d0423b2b4b918abe25e,2024-04-09T17:15:40.640000 +CVE-2024-26218,1,1,c9dfdba6698cf495542973e9e72ade3411a064f47c2b3443b2fffa2326f19e1f,2024-04-09T17:15:40.840000 +CVE-2024-26219,1,1,13c1b0d00d5b5cdf653e38480531500806cac91c3de2e2d3731e619a8da11c55,2024-04-09T17:15:41.037000 CVE-2024-2622,0,0,b8b72dd0b1f3f22924084c8488bdbc35aeda4db541c733fc482710ee315976f8,2024-03-21T02:52:40.207000 +CVE-2024-26220,1,1,18177f25bbc01d8e3ce63a83626479f51533248f29aa3b70a6fefa78ca4e490a,2024-04-09T17:15:41.247000 +CVE-2024-26221,1,1,2064429bfc3c611c614e3728e6cb36467dd36b54577fa38ff6984b245ffb7ce6,2024-04-09T17:15:41.443000 +CVE-2024-26222,1,1,1724dd50116f935540751d1c8e03cf67db901a2d4d29f5c45d0eb15a85f5c870,2024-04-09T17:15:41.637000 +CVE-2024-26223,1,1,200a5a40b07a783ceff533db9de5175ab732df4ac183d29ad4e641cf9dc6bad0,2024-04-09T17:15:41.843000 +CVE-2024-26224,1,1,6f05c48e900c829218f91b50ca6250325c81d23a5598ac981d7d459cf56a73fb,2024-04-09T17:15:42.040000 +CVE-2024-26226,1,1,59cf0f9d7875776cf33e454fff26a4cc6b8bd0863d930771c0e44aeb9792b4de,2024-04-09T17:15:42.233000 +CVE-2024-26227,1,1,7818bbb6006cf700b9be8daa70d46b7edc4eb887a9c0a271f067af8e65d94d36,2024-04-09T17:15:42.430000 +CVE-2024-26228,1,1,103a815ee1ab566403d6171f3a74c0597dd63f3caa1bf3790d69f2524b0e8df8,2024-04-09T17:15:42.627000 +CVE-2024-26229,1,1,135545697c9d41f1f0cd813a11482a36d81ea5007ac870d7d8273d1b04b104a2,2024-04-09T17:15:42.823000 +CVE-2024-26230,1,1,c4acccdd4447629e17b081dcf39d61bf5d90659450495b874e979986426ec990,2024-04-09T17:15:43.027000 +CVE-2024-26231,1,1,8f51bba8f788df8f849cc701837c654a3f4de4792497c21c4c28ff2ca1fa0800,2024-04-09T17:15:43.260000 +CVE-2024-26232,1,1,0f8f9c97297d5f9408f32b1aada426085b810a34e483c6330faf94e447dc2a3d,2024-04-09T17:15:43.460000 +CVE-2024-26233,1,1,68b7e3c201db21269685fe471516f6597eb6d1f7f717f5a89ad1ffe6fa49bc32,2024-04-09T17:15:43.650000 +CVE-2024-26234,1,1,74e51ae9a1e00523560ab78feebe4fdd96ef192717c442e6414c202d5cea6ff8,2024-04-09T17:15:43.853000 +CVE-2024-26235,1,1,64385c591403df754387c06bb098e1aaeeedcaf2eccb597611dd3013013f7f27,2024-04-09T17:15:44.040000 +CVE-2024-26236,1,1,c6338eb5ad54bb67c310f24c72035ae56467d299cfdecae25699737a11a61680,2024-04-09T17:15:44.230000 +CVE-2024-26237,1,1,4f7bcda4db13962ff66563b5ab788e56fac80ff909c8bd91373706586af3d3cf,2024-04-09T17:15:44.443000 +CVE-2024-26239,1,1,fa5cb5a0dd2c51fb429c7b1fbdd5fb14db242193ae6ca5fa4de7e3d82c664099,2024-04-09T17:15:44.660000 +CVE-2024-26240,1,1,608958822872d2c9d0e57979c6f2f2ebd62bf3ee1cd1877c1fe71371395190c7,2024-04-09T17:15:44.880000 +CVE-2024-26241,1,1,b3567dee76a8c7f9f892b2968349a7eb68bce8b75022e8b5f9912fb3a026fd23,2024-04-09T17:15:45.073000 +CVE-2024-26242,1,1,f8dce555cb01ed7fdb9d4c2a51f89660f965e0524b9017dc5e0ad60dc621bb4b,2024-04-09T17:15:45.270000 +CVE-2024-26243,1,1,9caf0e9616551eea96939c4eb23a5c653433291a0263b24e9836f53a2834aaf1,2024-04-09T17:15:45.470000 +CVE-2024-26244,1,1,ec9ad930a5b9610e1d11e9e6d9466b03bb498256e1e1a9e18edf5aa5b87dcf2a,2024-04-09T17:15:45.727000 +CVE-2024-26245,1,1,61825f395bb3a0a6a99036f054ed8c2da9e39569ccd5b204eb96c2ae74b79c63,2024-04-09T17:15:45.933000 CVE-2024-26246,0,0,6c174a39b8e16966075834fa377a33ef3e5c5829eb1a43647414103e1222a0e5,2024-03-19T17:05:45.193000 CVE-2024-26247,0,0,ed304d3168190e2757b85fd85fc0b38856926e8e4ca6b0df56c71d50554fa5bc,2024-03-26T03:18:26.197000 +CVE-2024-26248,1,1,2357773fd718287b04157f2e7eea6b41e2e3beb30e8f546ddac4aac9b5e368dd,2024-04-09T17:15:46.120000 CVE-2024-2625,0,0,176202763572967bdd2403d6220b5ef3a0eeae1c4e7f0e46612d30bfb12e4570,2024-04-01T15:32:17.010000 +CVE-2024-26250,1,1,ec4815204fb4fe4748f1d96d4c8cb7830ec9ca437a3eb941443cb4a269d5ef3d,2024-04-09T17:15:46.327000 +CVE-2024-26251,1,1,a407dcda563e055045c13ee409576ecccacd151731f327310fd3941456700006,2024-04-09T17:15:46.523000 +CVE-2024-26252,1,1,63494686a3a9e74153394ce2fe6280a608dd41815ddb1c64853c5b2226c0f3bb,2024-04-09T17:15:46.720000 +CVE-2024-26253,1,1,a4eb1f3dec7a1026c56c4c7127096fa2da63eff80135584edce83b6e557d3aa9,2024-04-09T17:15:46.930000 +CVE-2024-26254,1,1,e8fe2485655df6813be4a35ac96750d0ba6ca657d4c5c8148f64a0230820c0d5,2024-04-09T17:15:47.133000 +CVE-2024-26255,1,1,e90a2884a1054a42ccd615529937d48e0998f77e0fdb5e85d78f38d905b77bf7,2024-04-09T17:15:47.323000 +CVE-2024-26256,1,1,cc7f1ee1e1d2b550863f5c9cbc4372567742e9b4d8acaafb3b22545e9d44ce2d,2024-04-09T17:15:47.507000 +CVE-2024-26257,1,1,49d9467b52c50085923e169d0983a174a9a7d548eaeb4fbc34a979e9d0dcefc2,2024-04-09T17:15:47.687000 CVE-2024-26258,0,0,e2948ebecdedd5be931de1508231bfb7181246b38ce20c139f19e68ae9750f3d,2024-04-04T12:48:41.700000 CVE-2024-2626,0,0,0f82bfcd678adfe2206a7b49362dbece30aa00242a9c52e3ba26851c15f6dba3,2024-04-01T15:22:37.883000 CVE-2024-26260,0,0,41c48505050cd0603f041cb40494690b052971f86cff83dd85a1f53d94faeb17,2024-02-15T06:23:39.303000 @@ -243268,8 +243343,8 @@ CVE-2024-28183,0,0,643292dec7e2c62a314435936df2f6b3b26afeacc823e8335f2b17ff913aa CVE-2024-28184,0,0,477afbf0dc7ee8d9429045c75878ff2a88abaa5598b6ce7fba2a5f1850b6b613,2024-03-23T03:15:11.827000 CVE-2024-28186,0,0,bd19020fb98c7e49f4ae9534406a8116ce29f7f2cd9253fb5db74e8880c2331b,2024-03-13T12:33:51.697000 CVE-2024-28187,0,0,622ab766d3601fab3d937cf5c750ad7e8af82148d21dbe4188ae92a13fa234a3,2024-03-12T12:40:13.500000 -CVE-2024-28190,1,1,7ce40e7eb8dfcc21b09abfa86902693287ffd58bc8cee9bd2864803ac3adef9c,2024-04-09T14:15:08.503000 -CVE-2024-28191,1,1,0ce3a8c24b57bba26a778c8ac87b82ffe2f139125cb92fbc2a89e144390ae2f6,2024-04-09T14:15:08.710000 +CVE-2024-28190,0,0,7ce40e7eb8dfcc21b09abfa86902693287ffd58bc8cee9bd2864803ac3adef9c,2024-04-09T14:15:08.503000 +CVE-2024-28191,0,0,0ce3a8c24b57bba26a778c8ac87b82ffe2f139125cb92fbc2a89e144390ae2f6,2024-04-09T14:15:08.710000 CVE-2024-28192,0,0,b174fe16c8c5d79ad271f4d2c9a4367f27378fbad36778038489438c03ab1c5e,2024-03-14T12:52:16.723000 CVE-2024-28193,0,0,8c1ca4c11484246f93cc5d645c632e9426b6a7357ef642cc72cfc1bf4fa0ff90,2024-03-14T12:52:16.723000 CVE-2024-28194,0,0,bbf543bd49e731dd9f0390cae255c29b8ec19d1f801fcc500577e5449dd9092a,2024-03-14T12:52:21.763000 @@ -243298,7 +243373,8 @@ CVE-2024-28230,0,0,1e1aea5bf150158cabb6123095cd25bf2e623dcd1551c7fc009bbc925067e CVE-2024-28231,0,0,5e761a67d0b527d5d1f49cd829677b302c9d9c476b3ca48da7a3eb960c53e613,2024-03-21T12:58:51.093000 CVE-2024-28232,0,0,8ef357538478976964b194f69d44c7b53df50fcc2e4627ca6de9a9f16fb71629,2024-04-02T12:50:42.233000 CVE-2024-28233,0,0,4aadf14c4fd4756e7a0ebfb9ca455df6b34da82a881bbdee9f58080e191197ba,2024-03-28T02:01:21.693000 -CVE-2024-28234,1,1,a60c0ea400a5eadeae957d96c1a2f10bdee8bc30e1798812cff908a97eeef70b,2024-04-09T14:15:08.897000 +CVE-2024-28234,0,0,a60c0ea400a5eadeae957d96c1a2f10bdee8bc30e1798812cff908a97eeef70b,2024-04-09T14:15:08.897000 +CVE-2024-28235,1,1,1f1bfc815b19790a00b40f31a676d26766efdda9c104891167840982c7f5f5f4,2024-04-09T16:15:07.863000 CVE-2024-28236,0,0,ea7d34bffb060eb0191757ceb4c446ee8bfa4166cb7d1e0d8e67e75c651ba966,2024-03-13T12:33:51.697000 CVE-2024-28237,0,0,e54564ebce9f53fbf47a1a617d4c2539d1d06a16522000543afac14f934cf25f,2024-03-19T13:26:46 CVE-2024-28238,0,0,38219e010007b7fe5426826144cd2eabd2e22d36d31c50aa8471901674b524b3,2024-03-13T12:33:51.697000 @@ -243510,12 +243586,58 @@ CVE-2024-2888,0,0,e48cc71bf8d96ab718c88bf59dd81f25047204b13c0446dd48014e6c60fc42 CVE-2024-2889,0,0,047900621574a9797901d8767443e859750a2765d7b4c1f50c805ec45928b2d3,2024-03-26T12:55:05.010000 CVE-2024-28891,0,0,d3e45bd47b45b967827b685dc5aca79c502a599b4c4b2ae06f1259844016862c,2024-03-22T12:45:36.130000 CVE-2024-28895,0,0,e719d13135e97e941113ab974fe7dd84c43c28aacb52b0a20894b149f6e995bb,2024-04-01T01:33:21.910000 +CVE-2024-28896,1,1,dbd0924509ee8fc380c9c0da2a2e2b972ca43a7ca9e54d49698b4269ede11e69,2024-04-09T17:15:47.893000 +CVE-2024-28897,1,1,69c77c698ac519b25ab4835b04157b3482717ef3ded58f2e99a41eab32d0db47,2024-04-09T17:15:48.080000 +CVE-2024-28898,1,1,40b185ad55358f3cdf255f47debffe89fa69eedc8408b301ca6f1ecfd4cec931,2024-04-09T17:15:48.260000 CVE-2024-2890,0,0,4c3942fb63df92293ceb0810767d0c0704e4aa5c317aa4d330866ad74b1803b2,2024-03-28T12:42:56.150000 +CVE-2024-28900,1,1,33fac27d6a5b87bbad69eb181e8a597f8a4ac55b5d75c14c7ecae0f2365428e5,2024-04-09T17:15:48.447000 +CVE-2024-28901,1,1,8fee8a0c030e654247b9815a4ee42204086db63dd96d2523e4d8dc79ec1c5c2c,2024-04-09T17:15:48.647000 +CVE-2024-28902,1,1,5c6cc65236a37ce4dd522117c88825fe0891949e7244ddf894e23c9ae6e41b15,2024-04-09T17:15:48.833000 +CVE-2024-28903,1,1,19db62d8f2873395ba04517256c1c62e03e377e85f02047db2f2e8e6b52e71c7,2024-04-09T17:15:49.020000 +CVE-2024-28904,1,1,abecd94c6d4b79ae0cdc470458d0764484e8f1ea75811eadbaffaead99efbdb6,2024-04-09T17:15:49.210000 +CVE-2024-28905,1,1,fe73ec842e93f9776564d999bacc37ebf11197ae4f53eca11aeb0ed70ca0e40f,2024-04-09T17:15:49.403000 +CVE-2024-28906,1,1,a40ce27ec4956019609f284dfe8d0c58515efe07c58c7cfe2bcb624f9c50a109,2024-04-09T17:15:49.593000 +CVE-2024-28907,1,1,83aa17dcff9e4c17a350706960ecd7ced32746c63f9bad0ff9bbdcb8a51202d9,2024-04-09T17:15:49.790000 +CVE-2024-28908,1,1,866671d667c9efee39be171fe2a5db01e9405c4882fb237803a04c285839829f,2024-04-09T17:15:49.973000 +CVE-2024-28909,1,1,0d6079b0c23a26e67980ad0c5778eb273d8be9fd3af5996d85dfefa3ac0b2ce5,2024-04-09T17:15:50.163000 CVE-2024-2891,0,0,10f42a20dc40a8eb13cba3ba5bd396d14aa81868d5965496fff704dc36f8351f,2024-03-26T17:09:53.043000 +CVE-2024-28910,1,1,e05660071348a35be2999baf6529d8080e7591980122db38d64bfc917dd55060,2024-04-09T17:15:50.350000 +CVE-2024-28911,1,1,1d93e900160b0c523f49d8be7ff15479d7fd5ef92453f7754104d24afe6039ac,2024-04-09T17:15:50.537000 +CVE-2024-28912,1,1,3bd3dd8e09cd21c6b1bd8c3d8a4658862e23369f90dbd1dcd12d201b8dc42d6f,2024-04-09T17:15:50.737000 +CVE-2024-28913,1,1,b2203b950ff33544c33b1ec2c20abc28374a3d69f6db90d13422cbe0e2ba8d30,2024-04-09T17:15:50.950000 +CVE-2024-28914,1,1,d8bfd9bdb1ec5604198bd94ce0ae1a971baa2c3bd07af7b78970665a48c5569b,2024-04-09T17:15:51.150000 +CVE-2024-28915,1,1,5094d2b334db53b49c9f6fc3b709951c67cb65ec83a7f74ec1d624ec558dd5b6,2024-04-09T17:15:51.343000 CVE-2024-28916,0,0,84c072546ea410ea13293f0749492a9c6fc43f88cd890d2ffd9bf253bd04a4ba,2024-03-21T12:58:51.093000 +CVE-2024-28917,1,1,4fc032573e6e7e2792f194e38debfa453e51169dd94090ac356b2e97df59fb93,2024-04-09T17:15:51.533000 +CVE-2024-28919,1,1,d90afc89b247b70ab26580c627acbb56c9d3564f6d7e88ca8496d388d1f77205,2024-04-09T17:15:51.717000 CVE-2024-2892,0,0,68731cecf8a220eab24c534e33692124a7488fde840638ea320037b01630a7ff,2024-03-26T17:09:53.043000 +CVE-2024-28920,1,1,c264dfd7ca007737efe1d3baf6aef0e9c5e2999bf7ae63f063b1e1084c870af0,2024-04-09T17:15:51.930000 +CVE-2024-28921,1,1,144102553596b9573b589a4d3023cc58a3c0421c7961c253db3419d72dcb6400,2024-04-09T17:15:52.153000 +CVE-2024-28922,1,1,9bec95f9c45480750a1200f893947ad61b15fad1c4b34ba1f7d6420d826bf8ff,2024-04-09T17:15:52.470000 +CVE-2024-28923,1,1,d70d42d46ffbe3cf0fe76fceecd7a8acfcc79aebd70b0f4afc54f0a8b60809be,2024-04-09T17:15:52.680000 +CVE-2024-28924,1,1,e3d926e895c6ea80139f88907de50c9ea31c80a025a9c3c9db4088e678b6c114,2024-04-09T17:15:52.877000 +CVE-2024-28925,1,1,98822fe7eadfe88da895e157176387067da0d004e900a71346c6837f0abf83ef,2024-04-09T17:15:53.083000 +CVE-2024-28926,1,1,7146738189f2646de1d9ac7d975c30eb948afa27de106a2c4318206b182602d4,2024-04-09T17:15:53.277000 +CVE-2024-28927,1,1,bd3e6b81a216dc19c7b14222fdceec0272ac50bc1d50d3dbfacc267262ef9105,2024-04-09T17:15:53.477000 +CVE-2024-28929,1,1,a209e176a9a0e9aee699c38b47cbf0c65f58960d76feed27ee019dfc5389abad,2024-04-09T17:15:53.673000 CVE-2024-2893,0,0,63faf4ffcc4fb1d866004561f401a900492be39dd72829ee9d2ea13386dae33b,2024-03-27T12:29:41.530000 +CVE-2024-28930,1,1,d792e6a85357254a2e362c5ef7beac2a4344fd5a187fd77a2ac96532ff070bc9,2024-04-09T17:15:53.887000 +CVE-2024-28931,1,1,c7a6ea30124ac5bb0f294ae7c02b14a493c07b78bb1a843e0df90c10fd6a84a4,2024-04-09T17:15:54.097000 +CVE-2024-28932,1,1,28cf3bdefa40dfa7f0e3f7df4bb0a71f19fa30f200f887da0ddeb22e8688b92a,2024-04-09T17:15:54.297000 +CVE-2024-28933,1,1,63cddd7d43c5676a15d83fc1cd9900b99338fe1e1a77fdca2581496efb4e0a29,2024-04-09T17:15:54.503000 +CVE-2024-28934,1,1,725daed675e9c0366fa430e89d74d42ab6751fc54b63236cba66b014f883e6a5,2024-04-09T17:15:54.697000 +CVE-2024-28935,1,1,2c0db8df3511221c8446715d38eed4ee5e537e5d15e30eff0d85632da7e05705,2024-04-09T17:15:54.980000 +CVE-2024-28936,1,1,77694ded962d679f00edb09363afa3c33f5947267b60c399024fa3885e217351,2024-04-09T17:15:55.193000 +CVE-2024-28937,1,1,e2cc13a419818e00ba65ab982d908786effaf57368ecc021150c1c7c79935bd7,2024-04-09T17:15:55.393000 +CVE-2024-28938,1,1,c602e095bcb0126bf59dfd4ecba249b02e008b24fa180245f8890e9528df5062,2024-04-09T17:15:55.600000 +CVE-2024-28939,1,1,890b5aee1ed32d69bd27fedebedb7da0a6b60154027c1196c356d79a60d8afee,2024-04-09T17:15:55.807000 CVE-2024-2894,0,0,fe5793bc2f37c037f66adaaa9d347995617de1caef61563c1e61d5c7a1ea58be,2024-03-27T12:29:41.530000 +CVE-2024-28940,1,1,0b7e52e34762f3021b65c66e3301a0731acdc7c35c2ac3d7deb6528db600075a,2024-04-09T17:15:56.030000 +CVE-2024-28941,1,1,a1afd6ea6263f4c0ae6207765e3c7f19c6cf30a363654e59e9809380557cf40e,2024-04-09T17:15:56.233000 +CVE-2024-28942,1,1,e413dbd5a15e08d4b666f927b495e280460c2e3773739cc6ca0c5464e441d228,2024-04-09T17:15:56.433000 +CVE-2024-28943,1,1,7e957b71282b597cb4e64817a8d001c586b0470c7534361d6b403bfcbfd20885,2024-04-09T17:15:56.630000 +CVE-2024-28944,1,1,1dd3adbaca479809b4870110db1215e6ee6d66f9df86f884839ad2d68fac6651,2024-04-09T17:15:56.847000 +CVE-2024-28945,1,1,8e769e7b0035f597c1f46aa4fe3b3b3b699d4c0c3da2be688b9aeaa111ee3ea1,2024-04-09T17:15:57.053000 CVE-2024-28949,0,0,d59e9094e037f96ff4bc86b6cb6d10d8eb628a7e17d47b677dc979654662e8ff,2024-04-05T12:40:52.763000 CVE-2024-2895,0,0,4e78767633bce48ab1dc77c80a270eff03b05a18553fcf7f775b3399e9d28d88,2024-03-27T12:29:41.530000 CVE-2024-28951,0,0,c59d22693a6783914cb02db5be2e1a6f5b0c6277d54a6ec5614d046ef86ffa02,2024-04-02T12:50:42.233000 @@ -243547,10 +243669,27 @@ CVE-2024-29037,0,0,d14590394517ae3abb6cee2c5008c5f9a159ea7cb5e3f1665632e06ebb11a CVE-2024-2904,0,0,ad94cde058aa186716aa9a9e0abda85712b8f6121542c812afe32aed48147ca1,2024-03-26T12:55:05.010000 CVE-2024-29041,0,0,062cd423858e5d93d3fcaca6dd38a28eee29d2cae2776de71c0c9845b66bbfc2,2024-03-26T12:55:05.010000 CVE-2024-29042,0,0,1acd40f3f2614341c5d235ab7d1243ecc16ed46461e3f61d34bea944cf83e729,2024-03-22T19:02:10.300000 -CVE-2024-29049,0,0,97f1c31413368c53fe5ff54808ff292f8d59ee94d523491d590a05715711e4f2,2024-04-05T12:40:52.763000 +CVE-2024-29043,1,1,55191a0e5c6ed7993f6c7cc809c2a815ef185893019ba34f11e9fcd2c751225e,2024-04-09T17:15:57.257000 +CVE-2024-29044,1,1,fb6fd63832f0deb47d9ef80f6cbc8076037aed0984d09d41dd0e8389804455af,2024-04-09T17:15:57.453000 +CVE-2024-29045,1,1,6c2188130851240a16c700cc62756f50efc78c39b9d7e40d08ff431639a5a6e7,2024-04-09T17:15:57.650000 +CVE-2024-29046,1,1,fe364bd7c9ce19294c06818ce5b03bc472849e4750b65e584b43dac62df58f6c,2024-04-09T17:15:57.847000 +CVE-2024-29047,1,1,4e497c6e9df515e2a019535f0f6f1da618a2242e9b9cc9a10224021ced108246,2024-04-09T17:15:58.060000 +CVE-2024-29048,1,1,7f9d9c6bb1efbe7956f69d12175c38100b3e3c2c8a2dd9ae13c7e81de7276072,2024-04-09T17:15:58.250000 +CVE-2024-29049,0,1,98b5dd33fb953ac1a2154bc311144d3dc2c9909067218ab4461517f82cf5b6e3,2024-04-09T17:15:58.440000 +CVE-2024-29050,1,1,79908ac4d870c7857827bc3c06324c16e889c8cfbe089217b451122ce542235b,2024-04-09T17:15:58.540000 +CVE-2024-29052,1,1,eddeabb729590bf05c01868d13dbfb7e51da0a9a355d44cab9dde522ab1dd72f,2024-04-09T17:15:58.737000 +CVE-2024-29053,1,1,3a6d6fb3cb6c063ea1d28f63a767ac9fdd268bee6777f5729a5fc7d411db24cd,2024-04-09T17:15:58.930000 +CVE-2024-29054,1,1,3f72f690de40f5450edbab408b2dc3cd2eed6ce4a5d0c8b43dd668ca7adc9401,2024-04-09T17:15:59.123000 +CVE-2024-29055,1,1,79fca11c843a421eb99f00c7236905587d287cf284b5d42be55040477fc18178,2024-04-09T17:15:59.320000 +CVE-2024-29056,1,1,e8c5be21376683522b87ae7d65e67df59c2ca3562bb4117879380792ed2b6444,2024-04-09T17:15:59.510000 CVE-2024-29057,0,0,1a7d236424310c38bf79fff65250ee548fa2fb68d692d6ba086f9244a484a161,2024-03-26T03:18:48.760000 CVE-2024-29059,0,0,d93ec606be992e55fa01c28ef1ad5d3cf38a06f675d6b6e016fe3fa040aeab38,2024-04-04T22:15:09.033000 CVE-2024-2906,0,0,7907d5a5cd3460f6f133374b708901f61c1d81fd1b49c6a2c33ea92916afc2fe,2024-03-26T17:09:53.043000 +CVE-2024-29061,1,1,9ce4b3147917cea43f1163d221a1012005616f6701673a788665047c07048f00,2024-04-09T17:15:59.720000 +CVE-2024-29062,1,1,875af571cfd8bb4bf6708917f8add9c54466e0751afaafdea61b602346a4f6ba,2024-04-09T17:15:59.917000 +CVE-2024-29063,1,1,f7fd37a9c5c89f1c209a175e470565bda5e32a3b2d7747fb486f1087e50f6c33,2024-04-09T17:16:00.127000 +CVE-2024-29064,1,1,b5a8021a4e81779250d3fe9fc56eb8835afdc1dee35fa41a31bffed8e23588d2,2024-04-09T17:16:00.343000 +CVE-2024-29066,1,1,6827623430df5648467d2408cd33e0834db7c0f44416143f8607676daa1c9563,2024-04-09T17:16:00.537000 CVE-2024-29071,0,0,5ff903755374c23b025a98d3cc2b0f06ea188aa4151e3658c02fd385bc8b4fa8,2024-03-25T13:47:14.087000 CVE-2024-29074,0,0,9e8f322269475ed9cf88d107d6401cb08d7756267afe6b14bb883cfb51c03588,2024-04-02T12:50:42.233000 CVE-2024-29086,0,0,1ba59cf7e266064553649d504d13e7bbef5ec69a70b08610439516755a245119,2024-04-02T12:50:42.233000 @@ -243868,6 +244007,7 @@ CVE-2024-2990,0,0,482f4612170da1e0b0598818577827b0753e61cf3a51eabc7ad5396b674dba CVE-2024-29900,0,0,b99cd571d8d699adcff1d9a0f6085772745471b84efa1b60422f06d61cde9485,2024-04-01T01:12:59.077000 CVE-2024-29901,0,0,b07651b5e3683d58062a2619f65cd6b587a09c22191d8a54182f7055ad9642db,2024-04-01T01:12:59.077000 CVE-2024-29904,0,0,922d3ca540b7a7a38e394677ef40fbe71374cf5fd3f36e5754c424444d9736e1,2024-04-01T01:12:59.077000 +CVE-2024-29905,1,1,ad03c4c8a564a4608c4b1eee626249a8d9f21c46cf8ed5371c73c45f59317fa2,2024-04-09T17:16:00.730000 CVE-2024-29906,0,0,5e6afa8dbe77b2ceaee29629c66d8bdf273caddf4f38f955d682aeefe9beab4c,2024-03-27T12:29:30.307000 CVE-2024-29907,0,0,95ebf1e66704307f93559559f18923b10f644f7f3c6486fedede31060b34f004,2024-03-27T12:29:30.307000 CVE-2024-29908,0,0,e8d16098eaf081188862f8dc959904187f56568ff6eac559fa0228e1e293cd7d,2024-03-27T12:29:30.307000 @@ -243914,8 +244054,17 @@ CVE-2024-2995,0,0,ba31d4fdf46a8e9145ed5495217455e3d9072a2ebb94ae2fda6621c0845110 CVE-2024-2996,0,0,0b0c96cd4401e8e1fb8060c81f23c89572ad9b0c24303b77f9fc9c7260b30593,2024-03-28T02:01:13.303000 CVE-2024-2997,0,0,c25a0bbfb8b81ba4a7609ce1db6b052bf0c441b86ae99d5b115f9aed54aacfaa,2024-03-28T02:01:13.303000 CVE-2024-2998,0,0,5681a062ccdd5a830be0384ff482de7d54d630b9f9b97e51bbdaf99053da129c,2024-03-28T02:01:13.303000 -CVE-2024-29981,0,0,740b7a7428b7d8c9d6ce59873e24813d3664bb9de131e85953b6bdbd8bbce47c,2024-04-05T12:40:52.763000 +CVE-2024-29981,0,1,c96dd694e005cfa279d5e947e4d6817df7542f096ff0bafaff31fc9da738a741,2024-04-09T17:16:00.943000 +CVE-2024-29982,1,1,337b233bae1bf4ace28178c1bb0f656131dfc51279c35bf4745b3f3406ae52a3,2024-04-09T17:16:01.043000 +CVE-2024-29983,1,1,c8485d3bc325ebada535536a6c49e759d3caadd470619a6725f795540d666474,2024-04-09T17:16:01.237000 +CVE-2024-29984,1,1,bbacb5050c4d283546e13fa19b3444804b8d2d3738b3fc8d48826737fc8ab561,2024-04-09T17:16:01.437000 +CVE-2024-29985,1,1,bc374bbb454f8e7246a942a0f1decfca88fd0cdcb827a27995e898f022bdd4c0,2024-04-09T17:16:01.630000 +CVE-2024-29988,1,1,0658f1243004d67c8fa6de3de289118b0e296461114b3ccc6c85ae7d1c0b45a7,2024-04-09T17:16:01.830000 +CVE-2024-29989,1,1,1d650d2ff56085c13999b469b4d29a63b2b33715897673a607739778b29cef5e,2024-04-09T17:16:02.030000 CVE-2024-2999,0,0,80ecdff89fed5b636507b4867b9a819cb9159e93542975d19d9e3f967fe6eba6,2024-03-28T02:01:13.303000 +CVE-2024-29990,1,1,381b1a9660883977911b4d8b324ce879e96c9fb18f6967f24e9483fe388c6710,2024-04-09T17:16:02.237000 +CVE-2024-29992,1,1,ded8d15ec7cc592d47b5799000b224f6f1868f770820e42ca66044e26a66bee9,2024-04-09T17:16:02.437000 +CVE-2024-29993,1,1,90642d9311783f01081be26ab9343b7cb8259934569cc0cf8a3da47ef3705ea1,2024-04-09T17:16:02.640000 CVE-2024-3000,0,0,f99d838672e9d5c2290539736a593838bb67e89cbadb925e87e0aba821826952,2024-03-28T02:01:13.303000 CVE-2024-3001,0,0,d9a538358fb1081709849ee14267762e99c97d14b00ed634db4923647ee7e3e9,2024-03-28T02:01:13.303000 CVE-2024-3002,0,0,81f132466fa6ffe6e1418682dc731cd31fd855cb2503c7430e0b61b8723018a6,2024-03-28T02:01:13.303000 @@ -244006,6 +244155,7 @@ CVE-2024-30254,0,0,ca73d473f0415036087aca2c59a68335788468b11a20b2908935567766161 CVE-2024-30255,0,0,7a6027ee928c41155eb75584731055507a485cc638e26b6a9a3843b7b8e81c23,2024-04-05T12:40:52.763000 CVE-2024-30260,0,0,74f21dee20293b4e8db0b1220028533b8ab90a93770744b9ecb78bcbd2afcc2c,2024-04-04T16:33:06.610000 CVE-2024-30261,0,0,f19aab5deb514133d69fbb92f923441ca17c6bd59b9ce21bf026cbe29474bb38,2024-04-04T16:33:06.610000 +CVE-2024-30262,1,1,1016413655a9c2427ca3bf1173465577ee3c63fb471ef5bba3cf8906da342722,2024-04-09T17:16:02.850000 CVE-2024-30263,0,0,865e3a568432a1e114cdb349ba49e79d9bbc223ad67092921d5af173a6615f0c,2024-04-04T19:24:50.670000 CVE-2024-30264,0,0,a36afcbf82744a440a1fca3c8df613ac17f10025eaa77ba35cbe326ee3634d26,2024-04-05T12:40:52.763000 CVE-2024-30265,0,0,8b7bd77316a7922f3fb99eedf42325c9dfd214ba3a070dae26dd8c71a6913b9c,2024-04-04T12:48:41.700000 @@ -244427,10 +244577,11 @@ CVE-2024-3144,0,0,0d76c2330ba298defd0f1b4b8583f5577295a22c7482e9267c8cbbe09aa0eb CVE-2024-31442,0,0,bd0c0777ffd79341352bfaf4bac13513052ca764dc9351410c56fde55ac0fa91,2024-04-08T18:48:40.217000 CVE-2024-31447,0,0,1686ea065902cff688a9e0e72258f816c60304799af9644c7db6f9ae37572786,2024-04-08T18:48:40.217000 CVE-2024-3145,0,0,910eeb7fc8d864d7945418c0e4535b894388c19da07aa9b0f359cad540d76837,2024-04-02T12:50:42.233000 +CVE-2024-31455,1,1,0f8371e97cf5be681635a96f09b1cfb5eb7a9682a1f85adf0bb1910592a09852,2024-04-09T17:16:03.043000 CVE-2024-3146,0,0,c53d63ca526f35fd2250cfdb239f061e8b52186457f5fd4f6bc18a291d69a364,2024-04-02T12:50:42.233000 CVE-2024-3147,0,0,02625b405a9656dc1928c253c58a24946e5b9cb50ef47acb30b3a3a470e8efd5,2024-04-02T12:50:42.233000 CVE-2024-3148,0,0,da83dea91bd5fed523ca15df13db4100d62650319dcc492fed6d52171a819a8a,2024-04-02T12:50:42.233000 -CVE-2024-31487,1,1,dbe5ce5d6792ae20fd5da327a83e53e583ed38eb608e23b19b2f1ebca4520ad4,2024-04-09T15:15:31.753000 +CVE-2024-31487,0,0,dbe5ce5d6792ae20fd5da327a83e53e583ed38eb608e23b19b2f1ebca4520ad4,2024-04-09T15:15:31.753000 CVE-2024-31498,0,0,db3c4e2337e3fccc66e084ef6016d8532925f451bef4124b0c2782f0c54d90b6,2024-04-08T00:15:08 CVE-2024-3151,0,0,dbc1fd34b22356e776c12a200bc45c40de5eea60ac1974d151d7c1d279b32bb4,2024-04-02T18:12:16.283000 CVE-2024-31544,0,0,88902b53c0f1eeb21e877882efe39d4af9f10efecf052310f4a64d08429f9d76,2024-04-09T13:15:33.557000 @@ -244465,6 +244616,11 @@ CVE-2024-31852,0,0,7a968282e2d23775fda0d6edce03c38caf21ca868b2fca3251339d962c2ec CVE-2024-31860,0,0,55dd12597bf39ae8e0517c5d55b7ea30406697589bf4efd38a9030f7ffb75da9,2024-04-09T12:48:04.090000 CVE-2024-31862,0,0,9f707e95c44d810f3a15296bc63963399801058986b2544d08155d8eb18bc340,2024-04-09T12:48:04.090000 CVE-2024-31863,0,0,c0205d004a02751e8ee7ccf780094034f2d276095c68cc3f87551a74133406a8,2024-04-09T12:48:04.090000 +CVE-2024-31864,1,1,323c42147fdd8978acd465594a81001bd5db30f3a4644653e202a8396f2f660b,2024-04-09T16:15:08.113000 +CVE-2024-31865,1,1,9a4ba8d1e402bf186533b85552ea21b137a4464b43756a8b2cc03e54e1d4d117,2024-04-09T16:15:08.213000 +CVE-2024-31866,1,1,19bb79bab4ec52a95f5ff6572dca48d4919d3b8957f3e895fdfbe9eced760e12,2024-04-09T16:15:08.307000 +CVE-2024-31867,1,1,f6490a47c7cfae070bc5b5c15456690dccb17bd01ca384bb31e6529b5b906892,2024-04-09T17:16:03.237000 +CVE-2024-31868,1,1,3b8dffa2e3b94286e24ee6ae588a96c8f9b1d689f7ac8b2a815e1c80737bb7a5,2024-04-09T16:15:08.413000 CVE-2024-31948,0,0,b8fd3eda997fc89b9e55a498d2068e6465c743165b4060fd79003e8bed0e6076,2024-04-08T18:48:40.217000 CVE-2024-31949,0,0,e7ba39ada062d71e6dcc57a3b21fdc31258fde0372c873d76cfd22b57d87a6fc,2024-04-08T18:48:40.217000 CVE-2024-31950,0,0,6cefb0ca8246a802eee33ecaeabf30a3794c53c92173f69e19945e3bf38104d7,2024-04-08T18:48:40.217000 @@ -244504,6 +244660,7 @@ CVE-2024-3270,0,0,15606b780f6a1935299d985641ac5849df983ebbda9046db7033eceae15f45 CVE-2024-3272,0,0,32d3ad93a54dc7dcb0170715c810c40dd0605ff3f1d2f7f8a6ff591782374412,2024-04-05T05:15:07.580000 CVE-2024-3273,0,0,ccbb6a5c5c4c4b06e891e32f07239c6503baf5145f7bfada1cdbd5f43ea6ab91,2024-04-07T14:15:07.753000 CVE-2024-3274,0,0,64bfe86321ec1e05b957bdddb515317b23c7b94e70b2d69aa950c222026c2d4b,2024-04-05T05:15:07.843000 +CVE-2024-3281,1,1,cf11c86dc32530c2599d3ab6b81c6db0b28166923da2b925993d0f5cfe3305b5,2024-04-09T16:15:08.510000 CVE-2024-3296,0,0,bcc39314c1e9f6d53aa0ccc8e7e7cac7c279f7f6ee5a27f19287b128ea2ed6c7,2024-04-05T12:15:37.777000 CVE-2024-3298,0,0,35145d829af4d19541380a93e6723503e514b69e11aa4b007b05099610c37f21,2024-04-04T16:33:06.610000 CVE-2024-3299,0,0,f60f2a80accdd6f345a6a9cd66637eda180121596f90c2e7d75707c9fce20eb6,2024-04-04T16:33:06.610000