diff --git a/CVE-2023/CVE-2023-286xx/CVE-2023-28687.json b/CVE-2023/CVE-2023-286xx/CVE-2023-28687.json new file mode 100644 index 00000000000..aeedfd9341a --- /dev/null +++ b/CVE-2023/CVE-2023-286xx/CVE-2023-28687.json @@ -0,0 +1,67 @@ +{ + "id": "CVE-2023-28687", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-26T21:15:50.477", + "lastModified": "2024-03-26T21:15:50.477", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in perfectwpthemes Glaze Blog Lite, themebeez Fascinate, themebeez Cream Blog, themebeez Cream Magazine allows Reflected XSS.This issue affects Glaze Blog Lite: from n/a through <= 1.1.4; Fascinate: from n/a through 1.0.8; Cream Blog: from n/a through 2.1.3; Cream Magazine: from n/a through 2.1.4.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/cream-blog/wordpress-cream-blog-theme-2-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + }, + { + "url": "https://patchstack.com/database/vulnerability/cream-magazine/wordpress-cream-magazine-theme-2-1-4-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + }, + { + "url": "https://patchstack.com/database/vulnerability/fascinate/wordpress-fascinate-theme-1-0-8-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + }, + { + "url": "https://patchstack.com/database/vulnerability/glaze-blog-lite/wordpress-glaze-blog-lite-theme-1-1-4-cross-site-scripting-xss-vulnerability", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28787.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28787.json new file mode 100644 index 00000000000..3495b400648 --- /dev/null +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28787.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-28787", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-26T21:15:50.693", + "lastModified": "2024-03-26T21:15:50.693", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ExpressTech Quiz And Survey Master.This issue affects Quiz And Survey Master: from n/a through 8.1.4.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/quiz-master-next/wordpress-quiz-and-survey-master-plugin-8-1-4-unauthenticated-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29386.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29386.json new file mode 100644 index 00000000000..60416aa6bc9 --- /dev/null +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29386.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-29386", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-26T21:15:50.900", + "lastModified": "2024-03-26T21:15:50.900", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Julien Crego Manager for Icomoon.This issue affects Manager for Icomoon: from n/a through 2.0.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/manager-for-icomoon/wordpress-manager-for-icommon-plugin-2-0-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-383xx/CVE-2023-38388.json b/CVE-2023/CVE-2023-383xx/CVE-2023-38388.json new file mode 100644 index 00000000000..b795e53eb42 --- /dev/null +++ b/CVE-2023/CVE-2023-383xx/CVE-2023-38388.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-38388", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-26T21:15:51.113", + "lastModified": "2024-03-26T21:15:51.113", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Artbees JupiterX Core.This issue affects JupiterX Core: from n/a through 3.3.5.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.2, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/jupiterx-core/wordpress-jupiter-x-core-plugin-3-3-0-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39307.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39307.json new file mode 100644 index 00000000000..9432369b62f --- /dev/null +++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39307.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-39307", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-26T21:15:51.330", + "lastModified": "2024-03-26T21:15:51.330", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in ThemeFusion Avada.This issue affects Avada: from n/a through 7.11.1.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/avada/wordpress-avada-theme-7-11-1-authenticated-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47842.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47842.json new file mode 100644 index 00000000000..d3adc356806 --- /dev/null +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47842.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-47842", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-26T21:15:51.530", + "lastModified": "2024-03-26T21:15:51.530", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Zachary Segal CataBlog.This issue affects CataBlog: from n/a through 1.7.0.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/catablog/wordpress-catablog-plugin-1-7-0-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47846.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47846.json new file mode 100644 index 00000000000..62334dbf5ca --- /dev/null +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47846.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-47846", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-26T21:15:51.737", + "lastModified": "2024-03-26T21:15:51.737", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Terry Lin WP Githuber MD.This issue affects WP Githuber MD: from n/a through 1.16.2.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-githuber-md/wordpress-wp-githuber-md-plugin-1-16-2-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47873.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47873.json new file mode 100644 index 00000000000..2d6bfd4d05f --- /dev/null +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47873.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-47873", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-26T21:15:51.933", + "lastModified": "2024-03-26T21:15:51.933", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in WEN Solutions WP Child Theme Generator.This issue affects WP Child Theme Generator: from n/a through 1.0.9.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-child-theme-generator/wordpress-wp-child-theme-generator-plugin-1-0-8-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-482xx/CVE-2023-48275.json b/CVE-2023/CVE-2023-482xx/CVE-2023-48275.json new file mode 100644 index 00000000000..9387896ce5c --- /dev/null +++ b/CVE-2023/CVE-2023-482xx/CVE-2023-48275.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-48275", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-26T21:15:52.143", + "lastModified": "2024-03-26T21:15:52.143", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Trustindex.Io Widgets for Google Reviews.This issue affects Widgets for Google Reviews: from n/a through 11.0.2.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-reviews-plugin-for-google/wordpress-widgets-for-google-reviews-plugin-11-0-2-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48777.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48777.json new file mode 100644 index 00000000000..001ab9a9505 --- /dev/null +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48777.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-48777", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-26T21:15:52.350", + "lastModified": "2024-03-26T21:15:52.350", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Elementor.Com Elementor Website Builder.This issue affects Elementor Website Builder: from 3.3.0 through 3.18.1.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/elementor/wordpress-elementor-plugin-3-18-0-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-511xx/CVE-2023-51146.json b/CVE-2023/CVE-2023-511xx/CVE-2023-51146.json new file mode 100644 index 00000000000..331a679a9ba --- /dev/null +++ b/CVE-2023/CVE-2023-511xx/CVE-2023-51146.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-51146", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-26T22:15:07.677", + "lastModified": "2024-03-26T22:15:07.677", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Buffer Overflow vulnerability in TRENDnet AC1200 TEW-821DAP with firmware version 3.00b06 allows an attacker to execute arbitrary code via the adm_add_user action." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/SpikeReply/advisories/blob/main/cve/trendnet/cve-2023-51146.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-511xx/CVE-2023-51147.json b/CVE-2023/CVE-2023-511xx/CVE-2023-51147.json new file mode 100644 index 00000000000..47e35265c09 --- /dev/null +++ b/CVE-2023/CVE-2023-511xx/CVE-2023-51147.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-51147", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-26T22:15:07.747", + "lastModified": "2024-03-26T22:15:07.747", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Buffer Overflow vulnerability in TRENDnet Trendnet AC1200 TEW-821DAP with firmware version 3.00b06 allows an attacker to execute arbitrary code via the adm_mod_pwd action." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/SpikeReply/advisories/blob/main/cve/trendnet/cve-2023-51147.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-511xx/CVE-2023-51148.json b/CVE-2023/CVE-2023-511xx/CVE-2023-51148.json new file mode 100644 index 00000000000..c5bc3db631c --- /dev/null +++ b/CVE-2023/CVE-2023-511xx/CVE-2023-51148.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-51148", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-26T21:15:52.557", + "lastModified": "2024-03-26T21:15:52.557", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue in TRENDnet Trendnet AC1200 Dual Band PoE Indoor Wireless Access Point TEW-821DAP v.3.00b06 allows an attacker to execute arbitrary code via the 'mycli' command-line interface component." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://trendnet.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/SpikeReply/advisories/blob/main/cve/trendnet/cve-2023-51148.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-254xx/CVE-2024-25420.json b/CVE-2024/CVE-2024-254xx/CVE-2024-25420.json new file mode 100644 index 00000000000..34feab194da --- /dev/null +++ b/CVE-2024/CVE-2024-254xx/CVE-2024-25420.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-25420", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-26T21:15:52.710", + "lastModified": "2024-03-26T21:15:52.710", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue in Ignite Realtime Openfire v.4.9.0 and before allows a remote attacker to escalate privileges via the admin.authorizedJIDs system property component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/igniterealtime/Openfire/blob/main/xmppserver/src/main/java/org/jivesoftware/openfire/admin/AdminManager.java", + "source": "cve@mitre.org" + }, + { + "url": "https://www.hackthebox.com/blog/openfire-cves-explained-CVE-2024-25420-CVE-2024-25421", + "source": "cve@mitre.org" + }, + { + "url": "https://www.igniterealtime.org/projects/openfire/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-254xx/CVE-2024-25421.json b/CVE-2024/CVE-2024-254xx/CVE-2024-25421.json new file mode 100644 index 00000000000..42455e3c11b --- /dev/null +++ b/CVE-2024/CVE-2024-254xx/CVE-2024-25421.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-25421", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-26T21:15:52.773", + "lastModified": "2024-03-26T21:15:52.773", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue in Ignite Realtime Openfire v.4.9.0 and before allows a remote attacker to escalate privileges via the ROOM_CACHE component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/igniterealtime/Openfire/blob/main/xmppserver/src/main/java/org/jivesoftware/openfire/muc/spi/LocalMUCRoomManager.java", + "source": "cve@mitre.org" + }, + { + "url": "https://www.hackthebox.com/blog/openfire-cves-explained-CVE-2024-25420-CVE-2024-25421", + "source": "cve@mitre.org" + }, + { + "url": "https://www.igniterealtime.org/projects/openfire/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-263xx/CVE-2024-26303.json b/CVE-2024/CVE-2024-263xx/CVE-2024-26303.json new file mode 100644 index 00000000000..a81cc73a849 --- /dev/null +++ b/CVE-2024/CVE-2024-263xx/CVE-2024-26303.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2024-26303", + "sourceIdentifier": "security-alert@hpe.com", + "published": "2024-03-26T21:15:52.827", + "lastModified": "2024-03-26T21:15:52.827", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Authenticated Denial of Service Vulnerability in ArubaOS-Switch SSH Daemon\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-alert@hpe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-003.txt", + "source": "security-alert@hpe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-275xx/CVE-2024-27521.json b/CVE-2024/CVE-2024-275xx/CVE-2024-27521.json new file mode 100644 index 00000000000..77ca2adc627 --- /dev/null +++ b/CVE-2024/CVE-2024-275xx/CVE-2024-27521.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-27521", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-26T21:15:53.013", + "lastModified": "2024-03-26T21:15:53.013", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain an unauthenticated remote command execution (RCE) vulnerability via multiple parameters in the \"setOpModeCfg\" function. This security issue allows an attacker to take complete control of the device. In detail, exploitation allows unauthenticated, remote attackers to execute arbitrary system commands with administrative privileges (i.e., as user \"root\")." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/SpikeReply/advisories/blob/main/cve/totolink/cve-2024-27521.md", + "source": "cve@mitre.org" + }, + { + "url": "https://m.totolink.net/portal/article/index/id/410.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28545.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28545.json new file mode 100644 index 00000000000..92b3521d0d0 --- /dev/null +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28545.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-28545", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-26T21:15:53.070", + "lastModified": "2024-03-26T21:15:53.070", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Tenda AC18 V15.03.05.05 contains a command injection vulnerablility in the deviceName parameter of formsetUsbUnload function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/setUsbUnload.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28551.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28551.json new file mode 100644 index 00000000000..4c2703e9d19 --- /dev/null +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28551.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-28551", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-26T21:15:53.123", + "lastModified": "2024-03-26T21:15:53.123", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Tenda AC18 V15.03.05.05 has a stack overflow vulnerability in the ssid parameter of form_fast_setting_wifi_set function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/form_fast_setting_wifi_set.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2883.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2883.json new file mode 100644 index 00000000000..2222c8161a1 --- /dev/null +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2883.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-2883", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2024-03-26T21:15:53.173", + "lastModified": "2024-03-26T21:15:53.173", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Use after free in ANGLE in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/327807820", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2885.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2885.json new file mode 100644 index 00000000000..4faeae41454 --- /dev/null +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2885.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-2885", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2024-03-26T21:15:53.220", + "lastModified": "2024-03-26T21:15:53.220", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Dawn in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/328958020", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2886.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2886.json new file mode 100644 index 00000000000..95b6760469e --- /dev/null +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2886.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-2886", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2024-03-26T21:15:53.260", + "lastModified": "2024-03-26T21:15:53.260", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Use after free in WebCodecs in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/330575496", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2887.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2887.json new file mode 100644 index 00000000000..f0cbd65895d --- /dev/null +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2887.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-2887", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2024-03-26T21:15:53.300", + "lastModified": "2024-03-26T21:15:53.300", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Type Confusion in WebAssembly in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/330588502", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2903.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2903.json new file mode 100644 index 00000000000..1888907e35c --- /dev/null +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2903.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-2903", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-26T21:15:53.343", + "lastModified": "2024-03-26T21:15:53.343", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Tenda AC7 15.03.06.44. It has been classified as critical. Affected is the function GetParentControlInfo of the file /goform/GetParentControlInfo. The manipulation of the argument mac leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-257946 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/GetParentControlInfo.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.257946", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.257946", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.300452", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2909.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2909.json new file mode 100644 index 00000000000..0cc1f5daf50 --- /dev/null +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2909.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-2909", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-26T21:15:53.613", + "lastModified": "2024-03-26T21:15:53.613", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in Ruijie RG-EG350 up to 20240318. Affected by this vulnerability is the function setAction of the file /itbox_pi/networksafe.php?a=set of the component HTTP POST Request Handler. The manipulation of the argument bandwidth leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257977 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://h0e4a0r1t.github.io/2024/vulns/Ruijie%20EG350%20Easy%20Gateway%20Management%20System%20Exists%20Remote%20Code%20Execution%20Vulnerability%20networksafe.php.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.257977", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.257977", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.300368", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2910.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2910.json new file mode 100644 index 00000000000..a0060badd08 --- /dev/null +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2910.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-2910", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-26T21:15:53.880", + "lastModified": "2024-03-26T21:15:53.880", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in Ruijie RG-EG350 up to 20240318. Affected by this issue is the function vpnAction of the file /itbox_pi/vpn_quickset_service.php?a=set_vpn of the component HTTP POST Request Handler. The manipulation of the argument ip/port/user/pass/dns/startIp leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-257978 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://h0e4a0r1t.github.io/2024/vulns/Ruijie%20EG350%20Easy%20Gateway%20Management%20System%20Exists%20Remote%20Code%20Execution%20Vulnerability_vpn_quickset_service.php.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.257978", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.257978", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.300372", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2911.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2911.json new file mode 100644 index 00000000000..5fafc24719e --- /dev/null +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2911.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-2911", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-26T22:15:07.823", + "lastModified": "2024-03-26T22:15:07.823", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, was found in Tianjin PubliCMS 4.0.202302.e. This affects an unknown part. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257979. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 5.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/sweatxi/BugHub/blob/main/publiccms_csrf.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.257979", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.257979", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.300339", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2971.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2971.json new file mode 100644 index 00000000000..7f0bac58aeb --- /dev/null +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2971.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-2971", + "sourceIdentifier": "xpdf@xpdfreader.com", + "published": "2024-03-26T22:15:08.190", + "lastModified": "2024-03-26T22:15:08.190", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds array write in Xpdf 4.05 and earlier, triggered by negative object number in indirect reference in the input PDF file.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "xpdf@xpdfreader.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 2.9, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.4, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "xpdf@xpdfreader.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://www.xpdfreader.com/security-bug/CVE-2024-2971.html", + "source": "xpdf@xpdfreader.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 589cccf92d0..5a72b4ca3b2 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-03-26T21:00:38.651774+00:00 +2024-03-26T23:00:38.368914+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-03-26T20:15:11.710000+00:00 +2024-03-26T22:15:08.190000+00:00 ``` ### Last Data Feed Release @@ -33,39 +33,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -242756 +242784 ``` ### CVEs added in the last Commit -Recently added CVEs: `15` +Recently added CVEs: `28` -\* [CVE-2023-23656](CVE-2023/CVE-2023-236xx/CVE-2023-23656.json) (`2024-03-26T20:15:08.067`) -\* [CVE-2023-25965](CVE-2023/CVE-2023-259xx/CVE-2023-25965.json) (`2024-03-26T20:15:08.280`) -\* [CVE-2023-27440](CVE-2023/CVE-2023-274xx/CVE-2023-27440.json) (`2024-03-26T20:15:08.483`) -\* [CVE-2023-27459](CVE-2023/CVE-2023-274xx/CVE-2023-27459.json) (`2024-03-26T20:15:08.737`) -\* [CVE-2023-27630](CVE-2023/CVE-2023-276xx/CVE-2023-27630.json) (`2024-03-26T20:15:08.953`) -\* [CVE-2023-6091](CVE-2023/CVE-2023-60xx/CVE-2023-6091.json) (`2024-03-26T20:15:09.167`) -\* [CVE-2024-22436](CVE-2024/CVE-2024-224xx/CVE-2024-22436.json) (`2024-03-26T19:15:48.550`) -\* [CVE-2024-28442](CVE-2024/CVE-2024-284xx/CVE-2024-28442.json) (`2024-03-26T20:15:09.670`) -\* [CVE-2024-2897](CVE-2024/CVE-2024-28xx/CVE-2024-2897.json) (`2024-03-26T19:15:48.857`) -\* [CVE-2024-2898](CVE-2024/CVE-2024-28xx/CVE-2024-2898.json) (`2024-03-26T19:15:49.130`) -\* [CVE-2024-2899](CVE-2024/CVE-2024-28xx/CVE-2024-2899.json) (`2024-03-26T19:15:49.410`) -\* [CVE-2024-2900](CVE-2024/CVE-2024-29xx/CVE-2024-2900.json) (`2024-03-26T20:15:10.500`) -\* [CVE-2024-2901](CVE-2024/CVE-2024-29xx/CVE-2024-2901.json) (`2024-03-26T20:15:10.933`) -\* [CVE-2024-2902](CVE-2024/CVE-2024-29xx/CVE-2024-2902.json) (`2024-03-26T20:15:11.203`) -\* [CVE-2024-2955](CVE-2024/CVE-2024-29xx/CVE-2024-2955.json) (`2024-03-26T20:15:11.710`) +\* [CVE-2023-38388](CVE-2023/CVE-2023-383xx/CVE-2023-38388.json) (`2024-03-26T21:15:51.113`) +\* [CVE-2023-39307](CVE-2023/CVE-2023-393xx/CVE-2023-39307.json) (`2024-03-26T21:15:51.330`) +\* [CVE-2023-47842](CVE-2023/CVE-2023-478xx/CVE-2023-47842.json) (`2024-03-26T21:15:51.530`) +\* [CVE-2023-47846](CVE-2023/CVE-2023-478xx/CVE-2023-47846.json) (`2024-03-26T21:15:51.737`) +\* [CVE-2023-47873](CVE-2023/CVE-2023-478xx/CVE-2023-47873.json) (`2024-03-26T21:15:51.933`) +\* [CVE-2023-48275](CVE-2023/CVE-2023-482xx/CVE-2023-48275.json) (`2024-03-26T21:15:52.143`) +\* [CVE-2023-48777](CVE-2023/CVE-2023-487xx/CVE-2023-48777.json) (`2024-03-26T21:15:52.350`) +\* [CVE-2023-51146](CVE-2023/CVE-2023-511xx/CVE-2023-51146.json) (`2024-03-26T22:15:07.677`) +\* [CVE-2023-51147](CVE-2023/CVE-2023-511xx/CVE-2023-51147.json) (`2024-03-26T22:15:07.747`) +\* [CVE-2023-51148](CVE-2023/CVE-2023-511xx/CVE-2023-51148.json) (`2024-03-26T21:15:52.557`) +\* [CVE-2024-25420](CVE-2024/CVE-2024-254xx/CVE-2024-25420.json) (`2024-03-26T21:15:52.710`) +\* [CVE-2024-25421](CVE-2024/CVE-2024-254xx/CVE-2024-25421.json) (`2024-03-26T21:15:52.773`) +\* [CVE-2024-26303](CVE-2024/CVE-2024-263xx/CVE-2024-26303.json) (`2024-03-26T21:15:52.827`) +\* [CVE-2024-27521](CVE-2024/CVE-2024-275xx/CVE-2024-27521.json) (`2024-03-26T21:15:53.013`) +\* [CVE-2024-28545](CVE-2024/CVE-2024-285xx/CVE-2024-28545.json) (`2024-03-26T21:15:53.070`) +\* [CVE-2024-28551](CVE-2024/CVE-2024-285xx/CVE-2024-28551.json) (`2024-03-26T21:15:53.123`) +\* [CVE-2024-2883](CVE-2024/CVE-2024-28xx/CVE-2024-2883.json) (`2024-03-26T21:15:53.173`) +\* [CVE-2024-2885](CVE-2024/CVE-2024-28xx/CVE-2024-2885.json) (`2024-03-26T21:15:53.220`) +\* [CVE-2024-2886](CVE-2024/CVE-2024-28xx/CVE-2024-2886.json) (`2024-03-26T21:15:53.260`) +\* [CVE-2024-2887](CVE-2024/CVE-2024-28xx/CVE-2024-2887.json) (`2024-03-26T21:15:53.300`) +\* [CVE-2024-2903](CVE-2024/CVE-2024-29xx/CVE-2024-2903.json) (`2024-03-26T21:15:53.343`) +\* [CVE-2024-2909](CVE-2024/CVE-2024-29xx/CVE-2024-2909.json) (`2024-03-26T21:15:53.613`) +\* [CVE-2024-2910](CVE-2024/CVE-2024-29xx/CVE-2024-2910.json) (`2024-03-26T21:15:53.880`) +\* [CVE-2024-2911](CVE-2024/CVE-2024-29xx/CVE-2024-2911.json) (`2024-03-26T22:15:07.823`) +\* [CVE-2024-2971](CVE-2024/CVE-2024-29xx/CVE-2024-2971.json) (`2024-03-26T22:15:08.190`) ### CVEs modified in the last Commit -Recently modified CVEs: `5` +Recently modified CVEs: `0` -\* [CVE-2023-39340](CVE-2023/CVE-2023-393xx/CVE-2023-39340.json) (`2024-03-26T19:18:28.943`) -\* [CVE-2023-41719](CVE-2023/CVE-2023-417xx/CVE-2023-41719.json) (`2024-03-26T19:26:49.713`) -\* [CVE-2023-41720](CVE-2023/CVE-2023-417xx/CVE-2023-41720.json) (`2024-03-26T19:27:41.727`) -\* [CVE-2024-23252](CVE-2024/CVE-2024-232xx/CVE-2024-23252.json) (`2024-03-26T19:15:48.757`) -\* [CVE-2024-2485](CVE-2024/CVE-2024-24xx/CVE-2024-2485.json) (`2024-03-26T20:15:09.860`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 341e30f7988..482bfea53ab 100644 --- a/_state.csv +++ b/_state.csv @@ -216438,7 +216438,7 @@ CVE-2023-2365,0,0,2b641966f73da1c03bac76f197cc25cdb025794330e95137c224f9ed081938 CVE-2023-23650,0,0,bdb43282ea7d888f54eeb4c029ba9e5c1a406d2afa563b42e6a7548e68ecb093,2023-11-07T04:07:51.107000 CVE-2023-23651,0,0,67236451a80b9f55a14752d0a0b34135a6cd3e5bc4be1a75484ace6a6c1a0cd3,2023-10-14T02:21:03.983000 CVE-2023-23654,0,0,6d31dd903ef9ef9379174f7a720524fd14097fdb73f792d32eb91eccd0b45b6c,2023-05-22T17:08:57.177000 -CVE-2023-23656,1,1,a75dffc16686b4ea09f1d724c758ef992b2e0514e587812eb9d757ab758e97ff,2024-03-26T20:15:08.067000 +CVE-2023-23656,0,0,a75dffc16686b4ea09f1d724c758ef992b2e0514e587812eb9d757ab758e97ff,2024-03-26T20:15:08.067000 CVE-2023-23657,0,0,f9c995611939bee80b60fce69760b00f7d14fc21835d54b0d99400a290e44b44,2023-05-23T18:54:10.007000 CVE-2023-23659,0,0,cdef213e979c790c823e596ef73ecdade9b047293b4aa108b66a27bc2cad5371,2023-11-07T04:07:51.230000 CVE-2023-2366,0,0,ed15702be74cf809ce5d75fa41ed676adc877c6d79d7c35130d7ba1ed1c651d5,2024-03-21T02:47:07.970000 @@ -218308,7 +218308,7 @@ CVE-2023-25961,0,0,31e0a6732f540f6917a1b6b5d3508a68522e67ae0de03ce13bbd138d765f8 CVE-2023-25962,0,0,4b86764ac537e69027b956317cbcf9c9fc22f8f441c355a28f72aebfd340b8b0,2023-05-10T02:29:05.977000 CVE-2023-25963,0,0,9327aafe21090ee3e0080b9c6ae99110509f70c0997007468a111a8ed1dde950,2023-06-22T19:48:48.483000 CVE-2023-25964,0,0,7b22724b55e21a391c842995faf0e67fccd6411b05e064deea6e494a18b5d976,2023-06-20T14:45:48.997000 -CVE-2023-25965,1,1,8a98b7afd07e87af087c49e75154db0cf3bec9684dcadbbb2fa42a8a5051eacd,2024-03-26T20:15:08.280000 +CVE-2023-25965,0,0,8a98b7afd07e87af087c49e75154db0cf3bec9684dcadbbb2fa42a8a5051eacd,2024-03-26T20:15:08.280000 CVE-2023-25967,0,0,9c3dc755573ab57072330583684d5a0ccfafd1682f61498b0546de78bdaef7bd,2023-05-08T13:44:41.297000 CVE-2023-25968,0,0,fea5f7ad1565ee9cbedd5c1ceb3cfee62c0a455aa81f74dc9b60952c3c0aae39,2023-11-07T04:09:16.290000 CVE-2023-2597,0,0,6cc8e290e260e4840e41efc9aaeddabe788a6e7ccac7fda76a06f95efa4bdb4c,2023-05-30T21:32:32.543000 @@ -219326,7 +219326,7 @@ CVE-2023-27436,0,0,b0caec624f07aa2674ca9cf73465606bd64f5388b6c821e66d91e5649c784 CVE-2023-27438,0,0,5be0f579772e68b81f545a98e4ef90f61e8a2d38cccc27e3ec3103a8d20b96e0,2023-11-15T19:12:13.987000 CVE-2023-27439,0,0,e78320b1d1cd6cd11ce4f0b7074e10ed4bb0a9d26bddd73278d8796f5cb702c5,2023-06-27T20:54:24.717000 CVE-2023-2744,0,0,52d31477da03b6d03cb7cbec9b1fb880499c8f8304e18c6a878c67a90a6d440a,2023-11-07T04:13:15.560000 -CVE-2023-27440,1,1,f7b148d3b7aed705a7bcc4ec8cd78d0dcd052ec5a116e3310c04812a3d277560,2024-03-26T20:15:08.483000 +CVE-2023-27440,0,0,f7b148d3b7aed705a7bcc4ec8cd78d0dcd052ec5a116e3310c04812a3d277560,2024-03-26T20:15:08.483000 CVE-2023-27441,0,0,ebfa08ad136b1620df5e502d2f427908beb2416e3e07d1bcf8c575dbe0f1d40c,2023-11-15T19:15:28.277000 CVE-2023-27442,0,0,65446bf943eed43ba92190c90858cfd42d8caed68c959a6123994e47e8202f09,2023-11-27T22:08:45.050000 CVE-2023-27443,0,0,e70a6b1c796ac11415e202ca17f07dcc6233dc38e7b06100261f3e321ddddcbb,2023-06-28T16:01:26.587000 @@ -219343,7 +219343,7 @@ CVE-2023-27453,0,0,ee071e586fd895bda9aadad5e737702076d121a85b852525dba6f456b0e0f CVE-2023-27455,0,0,7e32e8ad48a7824fd11c180849e8ede25b549547ecace669f4090b4f566ed004,2023-05-16T21:43:52.443000 CVE-2023-27457,0,0,6a6b95f6e1965667d65b9ab16b546fc7c64c0640a898b8db40aaceb9a901aff5,2023-11-30T19:44:39.023000 CVE-2023-27458,0,0,8f4bf85bfa600ead504bb2798ec3dc271ef7cc4efe1718deebe7ef63f402ef8d,2023-11-30T19:41:51.770000 -CVE-2023-27459,1,1,c28b3e932c1aec22594bc80dd4a57b72c28d826de344bf5086b48bab6c6e24ce,2024-03-26T20:15:08.737000 +CVE-2023-27459,0,0,c28b3e932c1aec22594bc80dd4a57b72c28d826de344bf5086b48bab6c6e24ce,2024-03-26T20:15:08.737000 CVE-2023-2746,0,0,189d0393932e2d9dc55b6f912ad82e4a97a7e551c0597cdf074171620345d1e2,2023-07-18T19:26:41.327000 CVE-2023-27461,0,0,820e9f8cdace996b5a4700f4726e6326898ef3adb42497085b1aae66b21c3ae3,2023-11-30T15:26:18.103000 CVE-2023-27462,0,0,61fd4f9772445cd7d5c02748d8dadac37d825a79bed367257ae702b32ea75e04,2023-03-17T17:08:26.373000 @@ -219498,7 +219498,7 @@ CVE-2023-27627,0,0,9a15daa7472d5aaf33aca757cd7d1a633dc6cb30118d7b7951fbbab74ec99 CVE-2023-27628,0,0,6821355c8ee1dd2c2bac02a7bd738a2a4ca0c2ac34c6a239588410041d688ab4,2023-09-29T18:38:01.643000 CVE-2023-27629,0,0,c7bdbf7f70e7ff884f174fbcaf472262dd344c8876ffc6bcbd454b2e4d8c35cb,2023-06-28T03:28:24.817000 CVE-2023-2763,0,0,902c2a829b97eeb5cdb5ef73f11e8cac31787b838427aeff2459e6cf73fb5649,2023-07-20T01:56:00.570000 -CVE-2023-27630,1,1,a461f215e620df29e38ad686c7d2f5a2aebe4286c233d2fc877e60edf20c53e1,2024-03-26T20:15:08.953000 +CVE-2023-27630,0,0,a461f215e620df29e38ad686c7d2f5a2aebe4286c233d2fc877e60edf20c53e1,2024-03-26T20:15:08.953000 CVE-2023-27631,0,0,243c34486db3b62aaccae00faaedfdf15aca3fc5e1c8f960ee009b611a3ba79c,2023-06-28T03:27:49.077000 CVE-2023-27632,0,0,c0f75ba197626880fad4e5bd26d8ec95adffab87af57cc725356c0d01e9a9e0e,2023-11-17T19:29:14.953000 CVE-2023-27633,0,0,46dbf1daeb8d87e6e0cea8b6b6068c1b297802da2f2d7b505dbc71c6acb74609,2023-11-30T19:19:27.577000 @@ -220440,6 +220440,7 @@ CVE-2023-28683,0,0,1733b26d2cdf5a7bd82da3f30166803dd12e37b31dad64f72c0c417886c46 CVE-2023-28684,0,0,52e458c0997ebfa4b20c4438f3ae0ee693ec6734f07e98e9c3601f11e52a37fa,2023-04-09T01:39:27.213000 CVE-2023-28685,0,0,e0c53e4d57fbbe9363125daac9bbea48b9f569285b626c82aa9179387e96130c,2023-03-24T20:29:16.710000 CVE-2023-28686,0,0,ff0f81c3808b267f1168e84a1b7f6568ae99144e544141691c65bb9332d832c4,2023-11-07T04:10:48.177000 +CVE-2023-28687,1,1,c4917f4a91e2dba4646f41ec34881b6ea2b095284f549e68b1b411f721d5f039,2024-03-26T21:15:50.477000 CVE-2023-2869,0,0,83553b82bf3815b48b9963a130e6249e5c327eac582c2d1bb40f5c08c7922d57,2023-11-07T04:13:27.033000 CVE-2023-28690,0,0,d6f4066692a313db06779ad080208a8a77b53b35431f2a3194e0e3a9774a7efe,2023-08-23T14:37:43.853000 CVE-2023-28692,0,0,2eac38bd971b0deca5fb5c3ca9afabc90e5401629f9dd7513fa908109af5ddee,2023-09-01T12:06:48.337000 @@ -220537,6 +220538,7 @@ CVE-2023-28783,0,0,e4c28333c63d896a6dc1ea6c8187784dc3c3ca1e3bc214dc379b95f415b17 CVE-2023-28784,0,0,29cdcdd3bc5507bc4d53dd65d7f1e38f826588b263e9e74689bd5af44bd699a8,2023-06-28T07:16:11.527000 CVE-2023-28785,0,0,17b3419351958dcb6281c0c7b61ce71cd15d14e0831bf2f0d915b7adc8ec13cc,2023-06-01T03:53:04.007000 CVE-2023-28786,0,0,f9e06605c0fd16a90753e36a648b3b280d8079e30c1ac0bf77a72f5c69889c25,2024-01-10T19:27:54.720000 +CVE-2023-28787,1,1,4c615d7e636962e317801ff25b0344a479a208a233a2df7998a91d47db5055ae,2024-03-26T21:15:50.693000 CVE-2023-28788,0,0,17e2028e1fc2374a1fa9f52d26e1ad3fd4714947a2df331bdaf2d8d947a993af,2023-12-27T15:04:40.417000 CVE-2023-28789,0,0,1f2c73f47a1cbc214f389d7f5befcba08b4db6006e669fddc19a4562c69da497,2023-11-07T04:10:54.090000 CVE-2023-2879,0,0,5bc69743d5fb9a107ed6b1d66b72862cd1695c7112d0d395c95f138b25f17969,2023-10-20T17:52:45.083000 @@ -221039,6 +221041,7 @@ CVE-2023-29382,0,0,85e4295ac4892fd7ccf01715e0068bf61079e02658153ad107806b168baff CVE-2023-29383,0,0,8013620007555caf82fb95e58995ea6168ae836387103f7e8a04f762ed02d6e3,2023-04-24T18:05:30.313000 CVE-2023-29384,0,0,9a489d28cc6ab1408ae57d3cf7990767e7bb1769ecbc71eccb1fc726d788c4e2,2023-12-28T13:34:45.667000 CVE-2023-29385,0,0,0caec3d51cd9fb8894e51725a4068abeec6d5436e3ab36ed98317f64012693e5,2023-06-16T03:57:35.310000 +CVE-2023-29386,1,1,287eb706c77a59567a3f21b059a2930a0358e405edd355fe510a48ce63958456,2024-03-26T21:15:50.900000 CVE-2023-29387,0,0,ed00151bb5609ce481cb305b72e41d715ca3d8145030d4ad83d11188ebf72faf,2023-08-22T23:22:36.473000 CVE-2023-29388,0,0,cedb7e8cd22d8e7c03665a218d69ad6009d176cbbb758b47f852d52b220862fc,2023-11-07T04:11:10.300000 CVE-2023-29389,0,0,e2e59fa269c64b0c4c3c8a6a07a365712c3d14cfeda8282033c47134e3fce270,2023-04-14T16:03:43.527000 @@ -227237,6 +227240,7 @@ CVE-2023-38381,0,0,580e87b333e058d175503c85ff5b2c721d6b8ea39eca9d994a48ef8de7325 CVE-2023-38382,0,0,95233def5985e85c0df5206014d24c06949c4b4bc39503e9f9d91f0c02293126,2023-11-10T04:19:37.937000 CVE-2023-38384,0,0,a2ec4d64fe4cdf3d4501234addd0ab1c03265aad8ceda5fd8d3665c9c7fc3ef9,2023-08-10T03:49:13.217000 CVE-2023-38387,0,0,c4c528bf05b8cb8ec536fe16db68e8c5b50c07d822a650a8e987dee0e2444378,2023-09-08T14:39:10.543000 +CVE-2023-38388,1,1,00ca38b0449e6b3650b86cf2c68a7a4db34c9eafe89c8d9b062dda396eca11b6,2024-03-26T21:15:51.113000 CVE-2023-3839,0,0,c17e4be0a7daa4d01e33f457772e1f4edb268cb14ad6c2f748878e8a404781bd,2024-03-21T02:48:47.827000 CVE-2023-38390,0,0,a8ddb08e6640474b7c20c14af215057166b935398c10611e08cf7ad2b1521ce6,2023-10-04T19:58:33.723000 CVE-2023-38391,0,0,344147f660134030bcbbaa890dae6516b557e6ede35f44154d334296e9591473,2023-11-09T20:07:33.613000 @@ -227947,6 +227951,7 @@ CVE-2023-39299,0,0,4a4fe470a2bcfff30902e0b9d0b07fed9c3238f5a3ae755d2d216adf6ed07 CVE-2023-39301,0,0,f99ca5c14f2281e592a0eb5c38c92820cdd533a72f6c4acb102a1e81f6e4c87e,2023-11-14T15:29:43.047000 CVE-2023-39302,0,0,db9cae95c32f91811eb0f0ecdd3b63c519262646f87f4bc925e27b437fe46983,2024-02-06T19:54:10.380000 CVE-2023-39303,0,0,d81a0865c899018b1bf357d592ab28d95ab5876f93fb600c5e62942433b060c9,2024-02-06T19:57:03.963000 +CVE-2023-39307,1,1,9c5bb6bcaa0e4070eaada5953d292b439b97b8adf03b545b0ad50aa15f9f843a,2024-03-26T21:15:51.330000 CVE-2023-39308,0,0,0a6368135905c51e4bfc8658e86115693ae2beb292d59faa84b5dcfe3424348f,2023-10-02T19:36:52.837000 CVE-2023-39314,0,0,ea740e75552d6dc1c0cf1f6c4b3f96de5bf219ab1a6cac778aaf3dfb58fa2dc3,2023-08-15T00:14:54.643000 CVE-2023-39316,0,0,bd233c030a147eb3f789ee38efc103e8bf004636997da3293bc77e895bbfe866,2024-01-11T18:05:52.470000 @@ -227967,7 +227972,7 @@ CVE-2023-39335,0,0,de59ab60bb008cb37e35574265db4c70c7230619b6903b4fa71f9b7575236 CVE-2023-39336,0,0,b977d6f2b7c9b0fd92c0a178a796d6d1f323429aaee5398b0e65e7fe7b72e509,2024-01-12T18:56:43.137000 CVE-2023-39337,0,0,7360ad9ae1e4772f326d77e9e9c1e47262f5e3a444a43e8bfca2327242053227,2023-11-22T15:06:22.787000 CVE-2023-3934,0,0,6345841b35fbbcfefb4a859ac4c6d40f27ac65e6bcc5a003199d21257c6bfebf,2024-01-31T06:15:45.870000 -CVE-2023-39340,0,1,3368dfefc612854e047c3fc5ef638ab44c0909626506bac01853af02cbaf8d7c,2024-03-26T19:18:28.943000 +CVE-2023-39340,0,0,3368dfefc612854e047c3fc5ef638ab44c0909626506bac01853af02cbaf8d7c,2024-03-26T19:18:28.943000 CVE-2023-39341,0,0,42681de016b238b4476c42354bb83127e65376d05d62332b44e95e6a83861c6d,2023-11-07T04:17:30.083000 CVE-2023-39342,0,0,962ce35ed3734feb09c3ddb7acfe108cdc33245badc292e940d62e0398cd2c0d,2023-08-16T15:35:33.843000 CVE-2023-39343,0,0,fe019f2f6fc1ba334aef3b124ee735ef2454159d53a9821fbdd909e44d21861b,2023-08-08T18:55:13.367000 @@ -229572,9 +229577,9 @@ CVE-2023-41713,0,0,8de855d49c465f8aca52c2c0d301e3860de25752ca68f69195e8b754f1aec CVE-2023-41715,0,0,5d0463fe232efdccd6d5a3222f2209f2b7e7333636d080892cfe530119500012,2023-10-19T16:43:38.577000 CVE-2023-41717,0,0,01ab6cc0acc3f6331aa80f1a1cfcf962a04bcc42f841936e5d005f2b62f9e241,2023-09-07T19:11:38.933000 CVE-2023-41718,0,0,740b343c56aaea285c5d63967d3064cda8f011d6fe6a98f69d68bdab33bfac12,2023-11-22T15:06:11.117000 -CVE-2023-41719,0,1,08dc2fbc37647af52cf5c58a206c6f44f65b6fd78dd6ef69aecc648638392ed7,2024-03-26T19:26:49.713000 +CVE-2023-41719,0,0,08dc2fbc37647af52cf5c58a206c6f44f65b6fd78dd6ef69aecc648638392ed7,2024-03-26T19:26:49.713000 CVE-2023-4172,0,0,7d864af5899760e5fd916de8d5b7cb4c836384b557d17d8798fea9491ff22d5a,2024-03-21T02:49:41.560000 -CVE-2023-41720,0,1,8e9fc1420effd6ecd9db2851fddc14d3419717893d5acef5b2ea72a58b50524c,2024-03-26T19:27:41.727000 +CVE-2023-41720,0,0,8e9fc1420effd6ecd9db2851fddc14d3419717893d5acef5b2ea72a58b50524c,2024-03-26T19:27:41.727000 CVE-2023-41721,0,0,b8fe1a9595e9621301ef0bca4addee7da64b2a00520a510a37f29d2e79188e54,2023-10-31T20:02:00.777000 CVE-2023-41723,0,0,2c6f443b87b008a8a9e627848e133dd59ab18ee4f518502f55e24551d97a1e0a,2023-11-14T20:30:54.470000 CVE-2023-41725,0,0,ef65a845340b2e5995978b7ff227127be0d8e07ed7a8d62bd421fd7106110973,2023-11-09T20:48:01.590000 @@ -233378,7 +233383,9 @@ CVE-2023-47834,0,0,920967a055b2bc21ff0798aa9e7d238eed9616b66b2486f71c8817a961673 CVE-2023-47835,0,0,7a712355ce5c48eadcb9e26f4f27778335f03b4bfa9861aa3fd9d0cda8b8d8fa,2023-11-28T20:21:32.220000 CVE-2023-47839,0,0,7480547339b9b3ac3798f9c06e00c706f49ca35ebe73ec8189117729e422f769,2023-11-28T21:07:29.180000 CVE-2023-47840,0,0,7e24f7bfe5242765e69f6a2a237de2196af9eb411219ff1fe89053605cf27eb0,2024-01-04T21:27:45.337000 +CVE-2023-47842,1,1,d3507476c0f89b7eb81a25b2c1827d0dfa222b33d68c90cf76009153bb746256,2024-03-26T21:15:51.530000 CVE-2023-47844,0,0,741d209d5f9025e6891615bc08c4470c63d9aa75d230c481c60846b322e1cd21,2023-12-05T22:05:16.770000 +CVE-2023-47846,1,1,b940e213e4172039d976637ec7d4871f520eae9864fec94d82c58a2bceb09d1b,2024-03-26T21:15:51.737000 CVE-2023-47848,0,0,21fbbbf4e86fa9dec45730eda9a909888845fbee735e966e936dc57fecf04f7d,2023-12-05T22:04:43.287000 CVE-2023-4785,0,0,f96e6528e6daa35443c5249dce1ce895d9db73477dc922f40615878f59aeec17,2023-09-19T16:02:53.477000 CVE-2023-47850,0,0,4e30d6342a01ec31cf4caaa45a8bc6148a7b39f98e1d311620e4bf661def1ca7,2023-12-05T18:43:19.487000 @@ -233394,6 +233401,7 @@ CVE-2023-47865,0,0,32fa35a5f49e53820f0f3e7e18baa49e7d1a42f1ea968b0971bedfa95dd76 CVE-2023-47867,0,0,f0daeea1876f3aa3ee56ae4ce7d7661f589dadc3080e71dc64c8d64873856975,2024-03-21T02:49:28.240000 CVE-2023-47870,0,0,3ef3a3cb3a2fda83b71ba119ab1f1059e42a472e888c4548e4b65f20b1078ab2,2023-12-06T15:21:19.540000 CVE-2023-47872,0,0,550c4b6c5a7977fe1c0956c9594b5fd895299230fa3f6c497e2343527689fbfb,2023-12-06T02:44:27.170000 +CVE-2023-47873,1,1,a02bcbad7c96f462b94d211431945c7b5d743c5335348d8246159f6e196fbee6,2024-03-26T21:15:51.933000 CVE-2023-47874,0,0,d3d8a772c5fdbc6315a3e7634808399ae50d5a644d3ff497877112fdbb85c10b,2024-02-29T13:49:29.390000 CVE-2023-47875,0,0,75c1548edb875fa8f906ef110d5c91faf3a0d0d074f683de789b85b1a121a6c5,2023-12-06T02:48:34.940000 CVE-2023-47876,0,0,7c97d9a50607cd23bf47f8ee7a04359ad4dbf465ccc017db28473d0e6347533a,2023-12-06T02:55:08.670000 @@ -233576,6 +233584,7 @@ CVE-2023-48266,0,0,d6f171231beb0ee1180aa8d7b71e94eefc1322fbdfbaea0d5770850886438 CVE-2023-48268,0,0,7fbc38e1f3021e6f57ddbb59802c5c032dea61c9b04627258986c5e024d76a9e,2023-12-01T21:30:14.497000 CVE-2023-4827,0,0,660cb613242cf8fb9cab965004afed839f4beeb124259e7181eab5017ac3219d,2023-11-07T04:23:00.800000 CVE-2023-48272,0,0,6b4df1e347c87fa206b94499a385869f076cd0e708e56b463683f8e1d53c3c9b,2023-12-06T03:01:23.517000 +CVE-2023-48275,1,1,0454ac7ec5ed5768dd0b9a53097121220b63beb9c68852b412f948f7b39211b0,2024-03-26T21:15:52.143000 CVE-2023-48278,0,0,b8b615ff398a78f2adcd1913a459812b30de22df732a4689ed336a4365900549,2023-12-06T03:09:04.530000 CVE-2023-48279,0,0,677bb12e80f04b87e5ac81a35a4d9bd35cc895da5798b0a5048d841cd32d97ee,2023-12-05T20:02:01.297000 CVE-2023-4828,0,0,de71ddef24d1de419c259578328ce0906fdc3b49b667c2f893d38ed7e21b3702,2023-10-13T22:15:10.717000 @@ -234057,6 +234066,7 @@ CVE-2023-48770,0,0,6c816255ef32856561403ee946964a1334c6ea4b20c017dd01ad793fa1d5d CVE-2023-48771,0,0,c3aa1b504f72498da7a69fcf6a31e6ac6c25e045f2b6b038ed9880c9730ae16f,2023-12-19T02:39:37.777000 CVE-2023-48772,0,0,51bd166fc46eaec2256d292949fc7c1fffbe58afcdeee9dafb9515859c364e06,2023-12-22T09:49:18.993000 CVE-2023-48773,0,0,d9b8ea1beb8af0a39107f0247c63f63cd08c23650a0d149c69ac4052bd7174a3,2023-12-22T09:48:23.130000 +CVE-2023-48777,1,1,5b92f5fc5ddfe4b34aca867ee8c0d866fbeb9668c615a115633e3c47cac77890,2024-03-26T21:15:52.350000 CVE-2023-48778,0,0,f85ca09064426197f94634dc326db73c0a5834f3817de960e68c36d9f8a7afd9,2023-12-22T09:48:10.170000 CVE-2023-4878,0,0,1fe826e0162bbd8607eac5c8754ffeeacc160bcce353137db7175d21b5c9afcb,2023-09-19T01:16:52.127000 CVE-2023-48780,0,0,81a46aadc83bef693702f0587720fb307d57733c38a40b0e9a0adbf977d5c943,2023-12-19T17:54:07.470000 @@ -235358,6 +235368,9 @@ CVE-2023-51133,0,0,d4cbab034ce8105e49fc17df3288ec6653237538f125fb29562b759ab1355 CVE-2023-51135,0,0,d5dfa726f5577ba7508ce233e276424bad2252ba782866f323d5eaf18aca14e7,2024-01-05T18:31:15.977000 CVE-2023-51136,0,0,2ca511da0623e4727922981a3a33dc85c47c0550d43a47bc34e3bca00a268bc6,2024-01-05T18:30:58.837000 CVE-2023-5114,0,0,4dc648ab97c5eb644a86e5f721a5758a4aff62f3c04184e8d35bd31381edc6f3,2023-11-13T17:48:55.993000 +CVE-2023-51146,1,1,71895b9bd64dfaa01eef4516d118aab0edfeaa522f9a575a21302192a8cd2112,2024-03-26T22:15:07.677000 +CVE-2023-51147,1,1,beb2c86fbbce6339d956bc36da6f24d399db592b55de8d5bc92c6c9ebe77dad9,2024-03-26T22:15:07.747000 +CVE-2023-51148,1,1,d719546cb851478f4718f8cd8cc41bdeb643e81b4b58768466274f8fc577b0ce,2024-03-26T21:15:52.557000 CVE-2023-5115,0,0,cfd83bdfc62ea6a4db87d1b30a892254d6139791be4cc4c9f6b956be56be0deb,2023-12-29T17:57:50.077000 CVE-2023-51154,0,0,c0c1d5a118a8aca4530efcd110e61e63479b767365ec9d0e207af20fa04dc96f,2024-01-10T15:58:18.733000 CVE-2023-5116,0,0,8c93aca719da557b19846fd94520f46b1652d53677bb8ae463252688e7b2bb43,2023-11-07T04:23:28.397000 @@ -236956,7 +236969,7 @@ CVE-2023-6087,0,0,e865af7ea935fc22144ce6a037d1e9eedb83e9943260f825273789b70edc8f CVE-2023-6088,0,0,844257b81940c854c48827db2cfdd5ff63d458427ad4781ef82ad295558ee290,2023-11-14T00:15:09.027000 CVE-2023-6089,0,0,73d6dfb1d97c3ceb536cf08d930057b79a5ca0369be397c478f41bcf571d0256,2023-11-14T00:15:09.073000 CVE-2023-6090,0,0,a9eb342d355ca2f60d72c77ce67482d1115896f2d9c4ca3a7c9993e7419f4bc1,2024-02-29T13:49:29.390000 -CVE-2023-6091,1,1,e4583415d0de8e3eeacb935758369a1cf2e141875316b2af617b7897d781cc6d,2024-03-26T20:15:09.167000 +CVE-2023-6091,0,0,e4583415d0de8e3eeacb935758369a1cf2e141875316b2af617b7897d781cc6d,2024-03-26T20:15:09.167000 CVE-2023-6092,0,0,29d6c12d74742133215ae81895362e8792ffaeaedc68872f3a97584c78958e27,2023-11-14T00:15:09.117000 CVE-2023-6093,0,0,cdcbd1e1997de9b83295e1322a460ec7a9df4b733c53160638c79ab78836ce70,2024-01-08T19:09:29.700000 CVE-2023-6094,0,0,fe64a29ca809dd77087aaa4828738c31a5bbe16b56c0195785a6e8bedba08bc7,2024-01-09T14:55:23.847000 @@ -240187,7 +240200,7 @@ CVE-2024-22428,0,0,d92a5a80e616f72d015e3df366132cde5205daf6f1415ae7d5800097348c1 CVE-2024-22430,0,0,2e5779ce610960aa54065a985f7d7b4d5fc66005f09960beaac23d15bb28ba31,2024-02-03T00:30:48.593000 CVE-2024-22432,0,0,a5ce1013533b36d94c95ad06d489dc2a6480ecc8fe7741cd230ce585b643d9e0,2024-02-01T17:00:46.647000 CVE-2024-22433,0,0,15060e68251742f26417bd26381576269dfd06519ddd1ac4517720d4b647a719,2024-02-13T22:51:37.293000 -CVE-2024-22436,1,1,1a6ca03e82f15ba09d256dc4d1cfbe8c473cd6ccbc09b8293ead87668477e67b,2024-03-26T19:15:48.550000 +CVE-2024-22436,0,0,1a6ca03e82f15ba09d256dc4d1cfbe8c473cd6ccbc09b8293ead87668477e67b,2024-03-26T19:15:48.550000 CVE-2024-22445,0,0,874153d1fc6b93fe9f1bc951c0a860f76df46d0b4a1da0ccdd296d9b31c66c08,2024-02-27T16:51:44.013000 CVE-2024-22449,0,0,bbda7843d9766542fd731dac4991558c835fbecfc00731f79a512d8c0e63a23d,2024-02-03T00:30:30.737000 CVE-2024-2245,0,0,691730e073363309cbbedda1561ea8c86cfdfccb1b6917a0eaaacd61f92e651b,2024-03-07T13:52:27.110000 @@ -240463,7 +240476,7 @@ CVE-2024-23247,0,0,8cedc356a5f40bb739283e8e4d0d6f8d8deae5a1378794e92c4d7ce373c0a CVE-2024-23248,0,0,3b100f3348e9ddca065d4f3fd478aec1907931fa96a4ed3377d05be33d175a96,2024-03-13T21:15:56.690000 CVE-2024-23249,0,0,e0d7f2aee237d26c7b0c8ad64668a6a03d87d4b0174d6e350f019a0b7d59e493,2024-03-13T21:15:56.730000 CVE-2024-23250,0,0,23972341b564827ce5b9505c9a1f83d7e8d72dc9e37716cac001382a6c566edd,2024-03-13T22:15:10.157000 -CVE-2024-23252,0,1,0664eeb2c9608aca7ada566c98a3c55b1e928a3feb65097958db8fb31b3c0f73,2024-03-26T19:15:48.757000 +CVE-2024-23252,0,0,0664eeb2c9608aca7ada566c98a3c55b1e928a3feb65097958db8fb31b3c0f73,2024-03-26T19:15:48.757000 CVE-2024-23253,0,0,236890f266aeb2a0ef621837a0a5e82d7bb89a3a03220dfe0920fc94f8f6fd50,2024-03-13T21:15:56.870000 CVE-2024-23254,0,0,31cb2ca8b372067663ff19288cb5bb0509a8c85018595f64afd9fcbbb0601b82,2024-03-13T23:15:46.657000 CVE-2024-23255,0,0,50d24cf515724bff8276e52606e9845d547a501552c168c6d0b36213b6b0f202,2024-03-13T21:15:56.963000 @@ -241179,7 +241192,7 @@ CVE-2024-24846,0,0,6890a12a2a75edd735a365e4f936d5236ba568d73a773641099ac2fe0c58d CVE-2024-24847,0,0,b4fa9a61260da316bc833192464fabd12095e29ea013df2a2fb0faf16c78be6a,2024-02-07T23:30:27.567000 CVE-2024-24848,0,0,40caff22a3243fb89666855618bfb8dcbc9fcd477abdaa3c19527de1aee97a51,2024-02-07T23:30:36.817000 CVE-2024-24849,0,0,7310ea40ba14819a766bfed2718d0ae7c9bf655c4a04b330968acbdb73d5a918,2024-02-22T19:07:27.197000 -CVE-2024-2485,0,1,91d591c098e21e60f32736bf3e0fbe05d2390dc55eb3613eaaabf8a0a461a1ee,2024-03-26T20:15:09.860000 +CVE-2024-2485,0,0,91d591c098e21e60f32736bf3e0fbe05d2390dc55eb3613eaaabf8a0a461a1ee,2024-03-26T20:15:09.860000 CVE-2024-24855,0,0,53926eea6176e5ec7dac755182b92f74698401115acbca0c88724948db080e51,2024-02-10T04:06:40.840000 CVE-2024-24857,0,0,bd0a671ef627655a534b97d40879c56dc0a8ee5f900294aaa10a2d6428455f4e,2024-02-10T04:06:50.263000 CVE-2024-24858,0,0,249d6bf347d8c64c978bec670161d1545cd8d4294041793438e8d2c55804ba1b,2024-02-10T04:06:20.077000 @@ -241445,6 +241458,8 @@ CVE-2024-25415,0,0,bbea7e03f98d3ff090986796c578947b874b9a857b6b9b0efb421dfb81e37 CVE-2024-25417,0,0,ce0d2fee8c5d9d7e51d76e43f6a312ae4efb9da0c42980a6b1e85c18318f17f3,2024-02-12T21:39:48.423000 CVE-2024-25418,0,0,35d59f7ff89650ff446db0ea3767d5b73417e01c12581b05b798d1e230ed55f5,2024-02-12T21:39:57.963000 CVE-2024-25419,0,0,401cee772789e651c957846e5c67785cb38697dc7bb6f05ffb07d4d6143c7033,2024-02-12T21:40:04.610000 +CVE-2024-25420,1,1,e91990fd238309df03a12a63b362ace404adf96b87ac3e0559e09894783aadff,2024-03-26T21:15:52.710000 +CVE-2024-25421,1,1,df25e1245f8afad7f6b93f3480e4caf70a63ca9c65773203adbb70af83aeb3ee,2024-03-26T21:15:52.773000 CVE-2024-25422,0,0,cb343876745657927a9a3aa4eefb40458b43d13348692326da3da2bb97c73701,2024-02-29T13:49:47.277000 CVE-2024-25423,0,0,33cd9c56ae4cfa1d6cc2435a00a829df789b80150b430b34308e45329f20c67c,2024-02-22T19:07:27.197000 CVE-2024-25428,0,0,c9a4a68822ce56f9f70c0633568698e7786e1f54738d13d0ca759099f302c24e,2024-02-22T19:07:37.840000 @@ -241861,6 +241876,7 @@ CVE-2024-2630,0,0,4ae7a7f3ab879de5be47b2ccdb73f467c2c129b3bdab1f916d00784469083d CVE-2024-26300,0,0,957ff2fceea083c23710802994700a4cf17bc21a9f298857e1101271f2e4ee8e,2024-02-28T14:06:45.783000 CVE-2024-26301,0,0,ca5ba4fc82d74473f58bbb8ab53e52870805c492ae0704dcd3113ae9fe8a11a4,2024-02-28T14:06:45.783000 CVE-2024-26302,0,0,af4ef1bb4da1c0ac0e7b0a0b03804bb031d31d0e464ca3573002ab0828a12d88,2024-02-28T14:06:45.783000 +CVE-2024-26303,1,1,3ed42bba35456c98692a2027d790eeedffd8e917aeec7efbcf133ea6941c281e,2024-03-26T21:15:52.827000 CVE-2024-26307,0,0,9bdd86f1164e19b9b7e171833e6f17ecff380db1e609df57649c593081a62eb2,2024-03-21T12:58:51.093000 CVE-2024-26308,0,0,2ba9e28d3969717f6516b4803ddc13ceecd3ad2f69b64fd95ab4756f662bdfa5,2024-03-21T19:54:03.230000 CVE-2024-26309,0,0,f36b82bfd58135529029d2dbb3557eae73d94f3c7d43b34f799072bc28e25580,2024-03-08T14:02:57.420000 @@ -242177,6 +242193,7 @@ CVE-2024-27508,0,0,040c763fe5f3ce1aa685f7456be4b1599a5d1d348a6a3ea3969c861bb92ef CVE-2024-27515,0,0,f99f7250526320b1e7250419a5b3dff4ee674d7e75fbaa06a1a665327078fcdc,2024-02-28T14:06:45.783000 CVE-2024-27516,0,0,bc77d943dca3237cfc969969b912fe04cfc9a7bb141bbb351e6e03a84319d787,2024-03-22T03:15:07.923000 CVE-2024-27517,0,0,97c5c6df0e60dd69b6d0aac6af969ac4b47e672031be447025dad2dd6eb96394,2024-02-29T13:49:29.390000 +CVE-2024-27521,1,1,5f6f1563f42c1644e0814ed1590cd75d5c4166565946e2848454985e9240a0a6,2024-03-26T21:15:53.013000 CVE-2024-2754,0,0,085e82c1a95661c61fef6d127ca8d427c59ef0abe344921cba5cdafc9ab6e1f3,2024-03-21T12:58:51.093000 CVE-2024-27558,0,0,9eb3609e180b0082ba997e86c85d07a5ab4b31705e8b33d9a86b38769d49fa33,2024-03-01T22:22:25.913000 CVE-2024-27559,0,0,197a94c92d57823a11d32d7ab09a8d3a649d2150b43720db8b2e13739dd842b7,2024-03-01T22:22:25.913000 @@ -242475,7 +242492,7 @@ CVE-2024-28432,0,0,4bc8c3df18623e8712ef966fb24c80f6754436b2eb6a0c14d5d3c56f5a161 CVE-2024-28434,0,0,9ce149b3f63fd248825bfe2b0448af1d6b935cc8ea03a3087e8dd17d0b451340,2024-03-25T16:43:06.137000 CVE-2024-28435,0,0,528401926238753caeca6996705f7f059321761f7aa1e186f9618f4c79a626b5,2024-03-25T16:43:06.137000 CVE-2024-28441,0,0,5f38f329aa34d3551b4435a62b00ae0d72806d981cac257e26fcd8895c19c6be,2024-03-22T12:45:36.130000 -CVE-2024-28442,1,1,e6da2a2c25c8561aa3f7d720b8d50ce6f798b21adf3c0f255188b1236bf2d476,2024-03-26T20:15:09.670000 +CVE-2024-28442,0,0,e6da2a2c25c8561aa3f7d720b8d50ce6f798b21adf3c0f255188b1236bf2d476,2024-03-26T20:15:09.670000 CVE-2024-28446,0,0,e3b0d814ee24ce9a2740eda808696f714c3071d6722fa7bd76f62923d12a194d,2024-03-19T13:26:46 CVE-2024-28447,0,0,729795bf39bd106c71b5b798b10fa8f526cc5d6a6eb2785b0edfa8459a535a4c,2024-03-19T13:26:46 CVE-2024-2849,0,0,689f01009061efff1ee0cd29db14c96053c4b561f68402f2590b4aaf791eded8,2024-03-26T09:15:11.360000 @@ -242487,9 +242504,11 @@ CVE-2024-2853,0,0,e510059736f729514b8634c28eabbedda89b99502b90c04b4a57c0f56252c1 CVE-2024-28535,0,0,174c70ce71a26af929a40c7b6a103a5242ac3321f34f35a982d598e918b67152,2024-03-21T20:58:46.217000 CVE-2024-28537,0,0,ff6bf2a37289dca28bccb57e311acb6479e1a577841d298af6b3b484403dfc2c,2024-03-18T19:40:00.173000 CVE-2024-2854,0,0,4d9650c5f6f9a8e97a81ecdc5d981ff248ee9a6c0a655eb847d3bd000f194314,2024-03-26T03:15:56.933000 +CVE-2024-28545,1,1,2b629ff94069f81548093cb36371ebc63186c415c2c9e7006893b419dfee7eef,2024-03-26T21:15:53.070000 CVE-2024-28547,0,0,a2de8a258b087cbf7c5442c921d96afce5895db417e9c628fe7656334d2bb7cc,2024-03-18T19:40:00.173000 CVE-2024-2855,0,0,e69353ff45d51e90ba00dbf38253e3bd4d6755a4bd9fc7e219558fd74c8029a5,2024-03-26T03:15:59.320000 CVE-2024-28550,0,0,55b413fc03c0e6dbaa5c4b6ccf0c8e244ea995bce860e043c8086ce78f470aae,2024-03-18T19:40:00.173000 +CVE-2024-28551,1,1,ea74e28ea826c7c3cffa423b78f72a17850e9734674f6b0184e1546a76f685ed,2024-03-26T21:15:53.123000 CVE-2024-28553,0,0,f74a5d2edd657e610cfc2b884ed1530d128afd106cc0a285c1f4868830f65cd2,2024-03-21T20:58:52.357000 CVE-2024-28559,0,0,0614f972b1018fef175a5be020062e1808da1307fa27e18c6ccd6df48da36c98,2024-03-22T12:45:36.130000 CVE-2024-2856,0,0,15fc8ee8643f2d738e004abc8e00d4040db42ff6c4333ea56bb7e74735fedf8b,2024-03-26T03:16:09.907000 @@ -242561,22 +242580,26 @@ CVE-2024-28757,0,0,6f674e74da8b1d303f1997061736a8f7699c424c20f0aba68e441f140f441 CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000 CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e9dc,2024-03-11T12:47:42.653000 CVE-2024-28824,0,0,29abf61aa992ee5bcede73dcd8363195f5ccb0f240073ed24aaff3a2acefaab4,2024-03-22T12:45:36.130000 +CVE-2024-2883,1,1,df7e0047c4d867af976c2e6c4f6b5534e142ec8c85e89c002da04adf61ef9f55,2024-03-26T21:15:53.173000 CVE-2024-28834,0,0,841718fd8fddff124f231102263dad7d394e02b19e9697b20d411d85f567df2c,2024-03-21T15:24:35.093000 CVE-2024-28835,0,0,807354fa6b4609be92d801df299988ca81259642594a0e94cba8cafe4de90346,2024-03-21T12:58:51.093000 CVE-2024-28847,0,0,77ca7298b6799783b77992e414cebfaaf69a1bd2c05124cbdf6b914d3e0bb310,2024-03-17T22:38:29.433000 CVE-2024-28848,0,0,f738fe56a5bc4cdb728fabdb4b9cb52618afbf9827db3dbc12ec3f1fb91169bf,2024-03-21T02:52:25.197000 CVE-2024-28849,0,0,5e73d26630408070b9f2d0554aca63f533ce0044a2d97ed66eab06494ab2be18,2024-03-23T03:15:11.970000 +CVE-2024-2885,1,1,3a2c72f79961f6885820c2d07909d3c34e1314254b05fccc7d5bfa0f002492ad,2024-03-26T21:15:53.220000 CVE-2024-28850,0,0,3f010e48b33d8f74ceb957fab8d6defaf56ad7dc42ab2eb1e3bf15c4cfbd82b3,2024-03-26T12:55:05.010000 CVE-2024-28851,0,0,f15187ac52243f1288d6dabed456ab5bd2287b2db60c97a538d0582f4f0ba12d,2024-03-17T22:38:29.433000 CVE-2024-28854,0,0,8cb03aded6b194ffbf5e93b6a999bfbf01ac8f736343c4fc752b0e38a8bc9f90,2024-03-17T22:38:29.433000 CVE-2024-28855,0,0,2384a3330fde47f752f152bfa13a6226cb6b236bb18ff2466f5e886c7d3e893c,2024-03-19T13:26:46 CVE-2024-28859,0,0,2d0407c7b83f2786a493b842ae3fe3ce3f906494adee8b0e0f61c75557fcb17c,2024-03-17T22:38:29.433000 +CVE-2024-2886,1,1,6f6de4d41e33ef78cdf3b87c6b292fa0e20948e924ded5bb329feafe8d50fa23,2024-03-26T21:15:53.260000 CVE-2024-28861,0,0,614b056391803730ffc563205182a9ac310eb6811e0e407400ba2dc4b494f050,2024-03-22T19:02:10.300000 CVE-2024-28862,0,0,b0dc40150b0e5f15633ecb26c2614b37fe6eefbb423911349887989b36d78640,2024-03-17T22:38:29.433000 CVE-2024-28863,0,0,ad7818a88579939a8a2c9b467548624411262308646c7865759640aa6d437826,2024-03-22T12:45:36.130000 CVE-2024-28864,0,0,6556868d08f3b43cf56ee8c0e31629a1275e8137bc2387bf2430488f9854bd36,2024-03-19T13:26:46 CVE-2024-28865,0,0,346bb195552b29118071ab302fbe331daaaa3a5da7b31ab976886613f922d084,2024-03-19T13:26:46 CVE-2024-28868,0,0,4e3489f3c96f97bc271ff7282115c7f5d25e2aa392efe0c1c5842c72ee9986bf,2024-03-21T12:58:51.093000 +CVE-2024-2887,1,1,8301c59ddd2e5b007e4a2882dc311ef700088a092929c47e0ed332b00192ddb6,2024-03-26T21:15:53.300000 CVE-2024-2888,0,0,e48cc71bf8d96ab718c88bf59dd81f25047204b13c0446dd48014e6c60fc42d9,2024-03-26T12:55:05.010000 CVE-2024-2889,0,0,047900621574a9797901d8767443e859750a2765d7b4c1f50c805ec45928b2d3,2024-03-26T12:55:05.010000 CVE-2024-28891,0,0,0aa614d18123b6bc2c76e9c8b5d356a2e7d71bba766bbf9db36fdc818df4c91d,2024-03-22T12:45:36.130000 @@ -242587,17 +242610,18 @@ CVE-2024-2893,0,0,03454b4172a384fcf754d0a79af98f544b770efe10848787fa0a66006ffb73 CVE-2024-2894,0,0,e073a098f20ecf49044bd1b363f575a8cb2f6afd9229aa92873c84f5fd988e53,2024-03-26T17:15:48.080000 CVE-2024-2895,0,0,3be1a99c99a4512208e842577cd86ecfd7359e00911a74bb22c4751a2f381f34,2024-03-26T18:15:10.893000 CVE-2024-2896,0,0,cfbae6b125dd4e36298bfaaddfd49990d3493209156cf15c0e63037d046146fd,2024-03-26T18:15:11.543000 -CVE-2024-2897,1,1,ad01d017a25110de8970822d9921238dcd790b222bbb80d82ac43c0dc53c025f,2024-03-26T19:15:48.857000 -CVE-2024-2898,1,1,87df37fcfe48f1aa9b590a0f55927986b314c2d86ef25f89b8f5c428581cecd3,2024-03-26T19:15:49.130000 -CVE-2024-2899,1,1,8122b6e975e018f925621598511eec50c3812b50d5007cda33a4d177dfbb51c0,2024-03-26T19:15:49.410000 -CVE-2024-2900,1,1,d115b7c840fbf40f81e7406139e772f1410c77a036e7285e8293f5b757832ed7,2024-03-26T20:15:10.500000 +CVE-2024-2897,0,0,ad01d017a25110de8970822d9921238dcd790b222bbb80d82ac43c0dc53c025f,2024-03-26T19:15:48.857000 +CVE-2024-2898,0,0,87df37fcfe48f1aa9b590a0f55927986b314c2d86ef25f89b8f5c428581cecd3,2024-03-26T19:15:49.130000 +CVE-2024-2899,0,0,8122b6e975e018f925621598511eec50c3812b50d5007cda33a4d177dfbb51c0,2024-03-26T19:15:49.410000 +CVE-2024-2900,0,0,d115b7c840fbf40f81e7406139e772f1410c77a036e7285e8293f5b757832ed7,2024-03-26T20:15:10.500000 CVE-2024-29009,0,0,e428945e790b35d2116d11f320908f919961bf6f75e41d300d21cf55f5bcc19c,2024-03-25T13:47:14.087000 -CVE-2024-2901,1,1,f29845d6342234dfa356914b26f6a628832a5a3d04e20111376a6c8f9d708a18,2024-03-26T20:15:10.933000 +CVE-2024-2901,0,0,f29845d6342234dfa356914b26f6a628832a5a3d04e20111376a6c8f9d708a18,2024-03-26T20:15:10.933000 CVE-2024-29018,0,0,996b521b7d9365d8d41596984cc4ea0a166d70f0fc41d183b4857a8a3632cdd4,2024-03-21T12:58:51.093000 -CVE-2024-2902,1,1,01b35f4082170cd7419a16a45739130bbbca7c354bb59bfd011375069556ec32,2024-03-26T20:15:11.203000 +CVE-2024-2902,0,0,01b35f4082170cd7419a16a45739130bbbca7c354bb59bfd011375069556ec32,2024-03-26T20:15:11.203000 CVE-2024-29025,0,0,2135a02640a8fe43b6f6ca4c5bc68a475f73ee669a9a1a5af697f30fa738d887,2024-03-26T12:55:05.010000 CVE-2024-29026,0,0,ae12b0436e3ecdf28001034b69d1ac66de23f0f8b6b646a25aa4e89d5c652db8,2024-03-21T12:58:51.093000 CVE-2024-29027,0,0,0443c0a5c3d136c6828a405e5e82a90c05a4f9edd7fbc1d30ba3bd5c5a4c0f72,2024-03-20T13:00:16.367000 +CVE-2024-2903,1,1,3ab5553087fed81f734dfb07aaad6dd258ac68a362d67025b789a476fcc6002f,2024-03-26T21:15:53.343000 CVE-2024-29031,0,0,7f58d37a0fe973dfcea39547446f82cfc81d56a030b41fe804de053f1e911236,2024-03-22T12:45:36.130000 CVE-2024-29032,0,0,fb02d2202c95545e773ec7caf494a1bc4414b85dfda56ba00a602bc4c558e262,2024-03-21T12:58:51.093000 CVE-2024-29033,0,0,3da47380cd3a71a38fcec215b864d4658478d80ec3a2925a5a05224fec9ea170,2024-03-21T12:58:51.093000 @@ -242612,6 +242636,7 @@ CVE-2024-29059,0,0,18e37be1e0df9e20dcfce0ba40125ed6c1baf91c43e1478b2c45015a44378 CVE-2024-2906,0,0,d03107f75ca563c85caee3d034c6f17690ce56543ec4f09885b1b99f97ccb0d6,2024-03-26T17:09:53.043000 CVE-2024-29071,0,0,5ff903755374c23b025a98d3cc2b0f06ea188aa4151e3658c02fd385bc8b4fa8,2024-03-25T13:47:14.087000 CVE-2024-29089,0,0,e5fbae925c9da8d587d9573cbc1c34db123c4510c1c1616d472538493a08c59e,2024-03-20T13:00:16.367000 +CVE-2024-2909,1,1,d774f0eba6a82e24841b3622fb0e5b97c218f955536b9b122fba2480dd38d2b8,2024-03-26T21:15:53.613000 CVE-2024-29091,0,0,b1cb764a2082d02939e32c22f722543dd831cf608e6c39b51eb933f990788962,2024-03-20T13:00:16.367000 CVE-2024-29092,0,0,beafae19b6703c9fc1f01dec7ad304174a985adb5a44a4613a96bd5d1cef6a8d,2024-03-20T13:00:16.367000 CVE-2024-29093,0,0,79ec9f256e974df7e73dc7cee3806e2485cdbcd390ebff34178dc3162a3ed589,2024-03-20T13:00:16.367000 @@ -242621,6 +242646,7 @@ CVE-2024-29096,0,0,116dfe6880c4f9de1507cd397cd58f062c158d0a94a613f54efd8ba1f5f87 CVE-2024-29097,0,0,19e0d13440c8d4b80f3bdee731a0c184e36f3f74135496da4c924c8079480570,2024-03-19T16:33:58.680000 CVE-2024-29098,0,0,6298ff15ef67a327cc7f09a990f243f97487c434df63b2f34caf6bd6d79a29d9,2024-03-19T16:33:58.680000 CVE-2024-29099,0,0,fb7d05ccd29d430018c79f33648232d07e2e28e598c3b96b6e110a9f5c781c4c,2024-03-19T16:33:58.680000 +CVE-2024-2910,1,1,da0e0d1a3036195e9576a35b88b5b216adc8a407bb7bd2e1e83c06c926d5af4f,2024-03-26T21:15:53.880000 CVE-2024-29101,0,0,aae744ac7158d50069829e5caf84d067c3dd8ecd9940ca7cc779be2b3f5e5cc2,2024-03-19T16:33:58.680000 CVE-2024-29102,0,0,c51ef308d73116b171941fde12ca2b3f8fde36f60fd9119976adb1e11a03868f,2024-03-19T16:33:58.680000 CVE-2024-29103,0,0,671b864013cb97ebbea3122f0d47ea141dd69487a47a821fe9a7e85dba7e47df,2024-03-19T16:33:58.680000 @@ -242630,6 +242656,7 @@ CVE-2024-29106,0,0,83a576d463cccd6deacc066448ac54071af2bfaaf1076d70000d82cc7cb72 CVE-2024-29107,0,0,a187741135a88848718c34f6dccc8248e03658bddfdc49d370bc1b2de775f48c,2024-03-19T16:33:58.680000 CVE-2024-29108,0,0,8eb459781eb5f89e2b382dd14b29ac49aac4b50fff525b97f95d5c7b388766ea,2024-03-19T16:33:58.680000 CVE-2024-29109,0,0,61deeebcc74310db0c65cb3af24b8cf99717898306ca7ff466d1330d2d71a7fe,2024-03-19T16:33:58.680000 +CVE-2024-2911,1,1,04e3fcc11d51580683b537e7f00bac46be78fb934eb21a6a572da06cfbf0dc30,2024-03-26T22:15:07.823000 CVE-2024-29110,0,0,9fac9429f62fbdd2684f1ecf29789b4257a7ad8d88c0d9ecb165d126b89b6b45,2024-03-19T16:33:58.680000 CVE-2024-29111,0,0,50597b6873634ca7f4144bc214b5ecf041752d2993e614727c346db8869f6277,2024-03-19T16:33:58.680000 CVE-2024-29112,0,0,adcd7a79fc3a5910eb52664004103335276eb2ab35a0c50663e93130b0b2a493,2024-03-19T16:33:58.680000 @@ -242709,11 +242736,12 @@ CVE-2024-29474,0,0,cd74b93fedbacc13ab911c0f2a2b89e07d9e578953f3b262ce40503b72930 CVE-2024-29499,0,0,bc8db29a97bf5517e5213278d0d5f5ecdec4b51f00adea3262848d25f6e735bc,2024-03-22T19:02:10.300000 CVE-2024-2951,0,0,196d384afa50e4915b3f7f1abd72164195ad83bb49221af960f012f0ea91cf3f,2024-03-26T18:15:12.160000 CVE-2024-29515,0,0,79c9f65757e49bdb19c4dcff88d6ba2d524b1951e790ac90d5ffb4f302abcf45,2024-03-26T12:55:05.010000 -CVE-2024-2955,1,1,434af8129d851694dcadd562a7be8c132241e357c2c6c3abcd25089475e2299a,2024-03-26T20:15:11.710000 +CVE-2024-2955,0,0,434af8129d851694dcadd562a7be8c132241e357c2c6c3abcd25089475e2299a,2024-03-26T20:15:11.710000 CVE-2024-29644,0,0,386d9404cd9a66783fab4191d99526a9e5bea1176409bc071a51d532c36af3ad,2024-03-26T12:55:05.010000 CVE-2024-29650,0,0,3de71c7e130cece9a4956a25a7008efc5004a21e047c073aea3bd083423d5a0e,2024-03-25T16:43:06.137000 CVE-2024-29666,0,0,a8926fce030310567330d9b7c126003f732556a2ce979a6a3fd232707f8bbd99,2024-03-26T12:55:05.010000 CVE-2024-29684,0,0,bf20e1eee3419c30e31b5c1e15077ebe4738914779e007adc0a6cf94ae84179f,2024-03-26T17:09:53.043000 +CVE-2024-2971,1,1,9ebf0b5524df5787e891001d0b2d7ed41fec1467c00a445a7f37172414b586af,2024-03-26T22:15:08.190000 CVE-2024-29732,0,0,3aff958eec55f5cf06538251c792be6423021bd21573f6f2f920d098c9ad37bd,2024-03-21T12:58:51.093000 CVE-2024-29735,0,0,1640123dfaaf4d3d57b29169fabd73ad7d0d319282e875da918e047f8134410f,2024-03-26T17:15:47.380000 CVE-2024-29808,0,0,1a083356e9d0f501470cdfed0d1c85987d8c8667e4684d7b2ae73ab2fb9e2d44,2024-03-26T17:09:53.043000