diff --git a/CVE-2023/CVE-2023-469xx/CVE-2023-46950.json b/CVE-2023/CVE-2023-469xx/CVE-2023-46950.json index 4cf94a9cc8e..1223c022796 100644 --- a/CVE-2023/CVE-2023-469xx/CVE-2023-46950.json +++ b/CVE-2023/CVE-2023-469xx/CVE-2023-46950.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46950", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T14:15:53.030", - "lastModified": "2024-03-01T14:15:53.030", - "vulnStatus": "Received", + "lastModified": "2024-03-01T15:23:36.177", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-469xx/CVE-2023-46951.json b/CVE-2023/CVE-2023-469xx/CVE-2023-46951.json index 6eb352aa1cb..fdaddcc84a1 100644 --- a/CVE-2023/CVE-2023-469xx/CVE-2023-46951.json +++ b/CVE-2023/CVE-2023-469xx/CVE-2023-46951.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46951", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T14:15:53.087", - "lastModified": "2024-03-01T14:15:53.087", - "vulnStatus": "Received", + "lastModified": "2024-03-01T15:23:36.177", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50378.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50378.json new file mode 100644 index 00000000000..b01cac51f95 --- /dev/null +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50378.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-50378", + "sourceIdentifier": "security@apache.org", + "published": "2024-03-01T15:15:08.310", + "lastModified": "2024-03-01T15:23:36.177", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Lack of proper input validation and constraint enforcement in Apache Ambari prior to 2.7.8\u00a0\u00a0\n\n\u00a0Impact : As it will be stored XSS,\u00a0Could be exploited to perform unauthorized actions, varying from data access to session hijacking and delivering malicious payloads. \n\nUsers are recommended to upgrade to version 2.7.8 which fixes this issue.\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://lists.apache.org/thread/6hn0thq743vz9gh283s2d87wz8tqh37c", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52497.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52497.json index e09d1a82e52..19dc920ab9e 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52497.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52497.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52497", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-01T14:15:53.273", - "lastModified": "2024-03-01T14:15:53.273", - "vulnStatus": "Received", + "lastModified": "2024-03-01T15:23:36.177", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0967.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0967.json new file mode 100644 index 00000000000..2b43ac168dd --- /dev/null +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0967.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2024-0967", + "sourceIdentifier": "security@opentext.com", + "published": "2024-03-01T15:15:08.410", + "lastModified": "2024-03-01T15:23:36.177", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A potential vulnerability has been identified in OpenText / Micro Focus ArcSight Enterprise Security Manager (ESM). The vulnerability could be remotely exploited." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@opentext.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://portal.microfocus.com/s/article/KM000027060", + "source": "security@opentext.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1624.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1624.json new file mode 100644 index 00000000000..18e6b914d1b --- /dev/null +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1624.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-1624", + "sourceIdentifier": "3DS.Information-Security@3ds.com", + "published": "2024-03-01T16:15:45.723", + "lastModified": "2024-03-01T16:15:45.723", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An OS Command Injection vulnerability affecting documentation server on 3DEXPERIENCE from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x, SIMULIA Abaqus from Release 2022 through Release 2024, SIMULIA Isight from Release 2022 through Release 2024 and CATIA Composer from Release R2023 through Release R2024. A specially crafted HTTP request can lead to arbitrary command execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3DS.Information-Security@3ds.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.4, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "3DS.Information-Security@3ds.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://www.3ds.com/vulnerability/advisories", + "source": "3DS.Information-Security@3ds.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2064.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2064.json index 0d295c2f85b..0c6dbe4cfdf 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2064.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2064.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2064", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-01T14:15:54.350", - "lastModified": "2024-03-01T14:15:54.350", - "vulnStatus": "Received", + "lastModified": "2024-03-01T15:23:36.177", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2065.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2065.json new file mode 100644 index 00000000000..bada1262a89 --- /dev/null +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2065.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-2065", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-01T15:15:08.627", + "lastModified": "2024-03-01T15:23:36.177", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Barangay Population Monitoring System up to 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /endpoint/update-resident.php. The manipulation of the argument full_name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-255380." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Barangay%20Population%20Monitoring%20System/Stored%20XSS%20update-resident.php%20.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.255380", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.255380", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2066.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2066.json new file mode 100644 index 00000000000..8eab0d09441 --- /dev/null +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2066.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-2066", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-01T15:15:08.853", + "lastModified": "2024-03-01T15:23:36.177", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Computer Inventory System 1.0. It has been classified as problematic. This affects an unknown part of the file /endpoint/add-computer.php. The manipulation of the argument model leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-255381 was assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 2.4, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 3.3 + }, + "baseSeverity": "LOW", + "exploitabilityScore": 6.4, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Computer%20Inventory%20System%20Using%20PHP/STORED%20XSS%20add-computer.php%20.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.255381", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.255381", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2067.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2067.json new file mode 100644 index 00000000000..d5ede9ea4e3 --- /dev/null +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2067.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-2067", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-01T15:15:09.073", + "lastModified": "2024-03-01T15:23:36.177", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Computer Inventory System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /endpoint/delete-computer.php. The manipulation of the argument computer leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-255382 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Computer%20Inventory%20System%20Using%20PHP/SQL%20Injection%20delete-computer.php%20.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.255382", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.255382", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2068.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2068.json new file mode 100644 index 00000000000..c61fb3fdf5c --- /dev/null +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2068.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-2068", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-01T16:15:46.643", + "lastModified": "2024-03-01T16:15:46.643", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Computer Inventory System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /endpoint/update-computer.php. The manipulation of the argument model leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-255383." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Computer%20Inventory%20System%20Using%20PHP/STORED%20XSS%20upadte-computer.php%20.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.255383", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.255383", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2069.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2069.json new file mode 100644 index 00000000000..ebcba217d64 --- /dev/null +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2069.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-2069", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-01T16:15:46.857", + "lastModified": "2024-03-01T16:15:46.857", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in SourceCodester FAQ Management System 1.0. Affected is an unknown function of the file /endpoint/delete-faq.php. The manipulation of the argument faq leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-255384." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/SOURCECODESTER%20%5BFAQ%20Management%20System%20Using%20PHP%20and%20MySQL%5D%20SQLi%20on%20delete-faq.php.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.255384", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.255384", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2070.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2070.json new file mode 100644 index 00000000000..e7096243429 --- /dev/null +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2070.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-2070", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-01T16:15:47.063", + "lastModified": "2024-03-01T16:15:47.063", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in SourceCodester FAQ Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /endpoint/add-faq.php. The manipulation of the argument question/answer leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-255385 was assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/SOURCECODESTER%20%5BFAQ%20Management%20System%20Using%20PHP%20and%20MySQL%5D%20XSS%20on%20add-faq.php.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.255385", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.255385", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23120.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23120.json index 937debe9b9e..e5e9f38f1a1 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23120.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23120.json @@ -2,12 +2,12 @@ "id": "CVE-2024-23120", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-02-22T00:15:52.510", - "lastModified": "2024-02-22T19:07:27.197", + "lastModified": "2024-03-01T16:15:45.920", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "A maliciously crafted STP file when parsed in ASMIMPORT228A.dll through Autodesk AutoCAD can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process.\n" + "value": "A maliciously crafted STP file in ASMIMPORT228A.dll when parsed through\nAutodesk AutoCAD can force an Out-of-Bound Write. A malicious actor can\nleverage this vulnerability to cause a crash, write sensitive data, or execute\narbitrary code in the context of the current process.\n\n\n\n\n" }, { "lang": "es", @@ -31,6 +31,10 @@ { "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002", "source": "psirt@autodesk.com" + }, + { + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004", + "source": "psirt@autodesk.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24903.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24903.json index c4a5a9753a8..1d41954e96f 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24903.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24903.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24903", "sourceIdentifier": "security_alert@emc.com", "published": "2024-03-01T14:15:53.320", - "lastModified": "2024-03-01T14:15:53.320", - "vulnStatus": "Received", + "lastModified": "2024-03-01T15:23:36.177", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24904.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24904.json index 950693ac2bd..bf98c6e8c08 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24904.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24904.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24904", "sourceIdentifier": "security_alert@emc.com", "published": "2024-03-01T14:15:53.517", - "lastModified": "2024-03-01T14:15:53.517", - "vulnStatus": "Received", + "lastModified": "2024-03-01T15:23:36.177", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24905.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24905.json index 9ee95f6a123..a6a1e1c85c2 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24905.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24905.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24905", "sourceIdentifier": "security_alert@emc.com", "published": "2024-03-01T14:15:53.683", - "lastModified": "2024-03-01T14:15:53.683", - "vulnStatus": "Received", + "lastModified": "2024-03-01T15:23:36.177", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24907.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24907.json index 1d2b65a257b..b2629600461 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24907.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24907.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24907", "sourceIdentifier": "security_alert@emc.com", "published": "2024-03-01T14:15:53.843", - "lastModified": "2024-03-01T14:15:53.843", - "vulnStatus": "Received", + "lastModified": "2024-03-01T15:23:36.177", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27138.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27138.json new file mode 100644 index 00000000000..0d3364f41b8 --- /dev/null +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27138.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-27138", + "sourceIdentifier": "security@apache.org", + "published": "2024-03-01T16:15:45.983", + "lastModified": "2024-03-01T16:15:45.983", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "** UNSUPPORTED WHEN ASSIGNED ** Incorrect Authorization vulnerability in Apache Archiva.\n\nApache Archiva has a setting to disable user registration, however this restriction can be bypassed. As Apache Archiva has been retired, we do not expect to release a version of Apache Archiva that fixes this issue. You are recommended to look into migrating to a different solution, or isolate your instance from any untrusted users.\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://lists.apache.org/thread/070qcpclcb3sqk1hn8j5lvzohp30k1m2", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27139.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27139.json new file mode 100644 index 00000000000..e6beb93025c --- /dev/null +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27139.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-27139", + "sourceIdentifier": "security@apache.org", + "published": "2024-03-01T16:15:46.067", + "lastModified": "2024-03-01T16:15:46.067", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "** UNSUPPORTED WHEN ASSIGNED **\n\nIncorrect Authorization vulnerability in Apache Archiva: a vulnerability in Apache Archiva allows an unauthenticated attacker to modify account data, potentially leading to account takeover.\n\nThis issue affects Apache Archiva: from 2.0.0.\n\nAs this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer.\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://lists.apache.org/thread/qr8b7r86p1hkn0dc0q827s981kf1bgd8", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27140.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27140.json new file mode 100644 index 00000000000..95e21a7ccff --- /dev/null +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27140.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-27140", + "sourceIdentifier": "security@apache.org", + "published": "2024-03-01T16:15:46.143", + "lastModified": "2024-03-01T16:15:46.143", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "** UNSUPPORTED WHEN ASSIGNED **\n\nImproper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Archiva.\n\nThis issue affects Apache Archiva: from 2.0.0.\n\nAs this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users. Alternatively, you could configure a HTTP proxy in front of your Archiva instance to only forward requests that do not have malicious characters in the URL.\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer.\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://lists.apache.org/thread/xrn6nt904ozh3jym60c3f5hj2fb75pjy", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27295.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27295.json new file mode 100644 index 00000000000..a5dff6788d9 --- /dev/null +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27295.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-27295", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-03-01T16:15:46.227", + "lastModified": "2024-03-01T16:15:46.227", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Directus is a real-time API and App dashboard for managing SQL database content. The password reset mechanism of the Directus backend allows attackers to receive a password reset email of a victim user, specifically having it arrive at a similar email address as the victim with a one or more characters changed to use accents. This is due to the fact that by default MySQL/MariaDB are configured for accent-insensitive and case-insensitive comparisons. This vulnerability is fixed in version 10.8.3.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-706" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/directus/directus/security/advisories/GHSA-qw9g-7549-7wg5", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27296.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27296.json new file mode 100644 index 00000000000..b11d6d5f68e --- /dev/null +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27296.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-27296", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-03-01T16:15:46.413", + "lastModified": "2024-03-01T16:15:46.413", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Directus is a real-time API and App dashboard for managing SQL database content. Prior to version 10.8.3, the exact Directus version number was being shipped in compiled JS bundles which are accessible without authentication. With this information a malicious attacker can trivially look for known vulnerabilities in Directus core or any of its shipped dependencies in that specific running version. The problem has been resolved in versions 10.8.3 and newer." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/directus/directus/commit/a5a1c26ac48795ed3212a4c51b9523588aff4fa0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/directus/directus/security/advisories/GHSA-5mhg-wv8w-p59j", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27497.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27497.json new file mode 100644 index 00000000000..41f2ceed30e --- /dev/null +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27497.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-27497", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-01T15:15:08.580", + "lastModified": "2024-03-01T15:23:36.177", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Linksys E2000 Ver.1.0.06 build 1 is vulnerable to authentication bypass via the position.js file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://warp-desk-89d.notion.site/Linksys-E-2000-efcd532d8dcf4710a4af13fca131a5b8", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27499.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27499.json new file mode 100644 index 00000000000..9c0167db59f --- /dev/null +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27499.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-27499", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-01T16:15:46.597", + "lastModified": "2024-03-01T16:15:46.597", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Bagisto v1.5.1 is vulnerable for Cross site scripting(XSS) via png file upload vulnerability in product review option." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Ek-Saini/security/blob/main/xss-bagisto-v1.5.1", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/bagisto/bagisto/pull/9474", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-275xx/CVE-2024-27567.json b/CVE-2024/CVE-2024-275xx/CVE-2024-27567.json index 75cc66af19f..f5a3ec3228d 100644 --- a/CVE-2024/CVE-2024-275xx/CVE-2024-27567.json +++ b/CVE-2024/CVE-2024-275xx/CVE-2024-27567.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27567", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T14:15:54.143", - "lastModified": "2024-03-01T14:15:54.143", - "vulnStatus": "Received", + "lastModified": "2024-03-01T15:23:36.177", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-275xx/CVE-2024-27568.json b/CVE-2024/CVE-2024-275xx/CVE-2024-27568.json index 3fe9945fab0..db6815293cc 100644 --- a/CVE-2024/CVE-2024-275xx/CVE-2024-27568.json +++ b/CVE-2024/CVE-2024-275xx/CVE-2024-27568.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27568", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T14:15:54.180", - "lastModified": "2024-03-01T14:15:54.180", - "vulnStatus": "Received", + "lastModified": "2024-03-01T15:23:36.177", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-275xx/CVE-2024-27569.json b/CVE-2024/CVE-2024-275xx/CVE-2024-27569.json index befe6d356f5..e02e13e0104 100644 --- a/CVE-2024/CVE-2024-275xx/CVE-2024-27569.json +++ b/CVE-2024/CVE-2024-275xx/CVE-2024-27569.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27569", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T14:15:54.213", - "lastModified": "2024-03-01T14:15:54.213", - "vulnStatus": "Received", + "lastModified": "2024-03-01T15:23:36.177", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-275xx/CVE-2024-27570.json b/CVE-2024/CVE-2024-275xx/CVE-2024-27570.json index 4f8599f7e2a..3ebe8559358 100644 --- a/CVE-2024/CVE-2024-275xx/CVE-2024-27570.json +++ b/CVE-2024/CVE-2024-275xx/CVE-2024-27570.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27570", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T14:15:54.247", - "lastModified": "2024-03-01T14:15:54.247", - "vulnStatus": "Received", + "lastModified": "2024-03-01T15:23:36.177", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-275xx/CVE-2024-27571.json b/CVE-2024/CVE-2024-275xx/CVE-2024-27571.json index 7f8ef62f393..ec7a84b99fa 100644 --- a/CVE-2024/CVE-2024-275xx/CVE-2024-27571.json +++ b/CVE-2024/CVE-2024-275xx/CVE-2024-27571.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27571", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T14:15:54.280", - "lastModified": "2024-03-01T14:15:54.280", - "vulnStatus": "Received", + "lastModified": "2024-03-01T15:23:36.177", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-275xx/CVE-2024-27572.json b/CVE-2024/CVE-2024-275xx/CVE-2024-27572.json index 6bcc08d3f56..462f7809837 100644 --- a/CVE-2024/CVE-2024-275xx/CVE-2024-27572.json +++ b/CVE-2024/CVE-2024-275xx/CVE-2024-27572.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27572", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T14:15:54.313", - "lastModified": "2024-03-01T14:15:54.313", - "vulnStatus": "Received", + "lastModified": "2024-03-01T15:23:36.177", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index 82be4b38b2b..a24df78c182 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-03-01T15:01:14.659475+00:00 +2024-03-01T17:00:32.559867+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-03-01T14:15:54.350000+00:00 +2024-03-01T16:15:47.063000+00:00 ``` ### Last Data Feed Release @@ -29,66 +29,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -240211 +240227 ``` ### CVEs added in the last Commit -Recently added CVEs: `22` +Recently added CVEs: `16` -* [CVE-2023-39254](CVE-2023/CVE-2023-392xx/CVE-2023-39254.json) (`2024-03-01T13:15:07.673`) -* [CVE-2023-48674](CVE-2023/CVE-2023-486xx/CVE-2023-48674.json) (`2024-03-01T13:15:07.877`) -* [CVE-2023-46950](CVE-2023/CVE-2023-469xx/CVE-2023-46950.json) (`2024-03-01T14:15:53.030`) -* [CVE-2023-46951](CVE-2023/CVE-2023-469xx/CVE-2023-46951.json) (`2024-03-01T14:15:53.087`) -* [CVE-2023-52497](CVE-2023/CVE-2023-524xx/CVE-2023-52497.json) (`2024-03-01T14:15:53.273`) -* [CVE-2024-24900](CVE-2024/CVE-2024-249xx/CVE-2024-24900.json) (`2024-03-01T13:15:08.090`) -* [CVE-2024-24906](CVE-2024/CVE-2024-249xx/CVE-2024-24906.json) (`2024-03-01T13:15:08.277`) -* [CVE-2024-2060](CVE-2024/CVE-2024-20xx/CVE-2024-2060.json) (`2024-03-01T13:15:08.460`) -* [CVE-2024-2061](CVE-2024/CVE-2024-20xx/CVE-2024-2061.json) (`2024-03-01T13:15:08.670`) -* [CVE-2024-2062](CVE-2024/CVE-2024-20xx/CVE-2024-2062.json) (`2024-03-01T13:15:08.913`) -* [CVE-2024-2063](CVE-2024/CVE-2024-20xx/CVE-2024-2063.json) (`2024-03-01T13:15:09.130`) -* [CVE-2024-24903](CVE-2024/CVE-2024-249xx/CVE-2024-24903.json) (`2024-03-01T14:15:53.320`) -* [CVE-2024-24904](CVE-2024/CVE-2024-249xx/CVE-2024-24904.json) (`2024-03-01T14:15:53.517`) -* [CVE-2024-24905](CVE-2024/CVE-2024-249xx/CVE-2024-24905.json) (`2024-03-01T14:15:53.683`) -* [CVE-2024-24907](CVE-2024/CVE-2024-249xx/CVE-2024-24907.json) (`2024-03-01T14:15:53.843`) -* [CVE-2024-27567](CVE-2024/CVE-2024-275xx/CVE-2024-27567.json) (`2024-03-01T14:15:54.143`) -* [CVE-2024-27568](CVE-2024/CVE-2024-275xx/CVE-2024-27568.json) (`2024-03-01T14:15:54.180`) -* [CVE-2024-27569](CVE-2024/CVE-2024-275xx/CVE-2024-27569.json) (`2024-03-01T14:15:54.213`) -* [CVE-2024-27570](CVE-2024/CVE-2024-275xx/CVE-2024-27570.json) (`2024-03-01T14:15:54.247`) -* [CVE-2024-27571](CVE-2024/CVE-2024-275xx/CVE-2024-27571.json) (`2024-03-01T14:15:54.280`) -* [CVE-2024-27572](CVE-2024/CVE-2024-275xx/CVE-2024-27572.json) (`2024-03-01T14:15:54.313`) -* [CVE-2024-2064](CVE-2024/CVE-2024-20xx/CVE-2024-2064.json) (`2024-03-01T14:15:54.350`) +* [CVE-2023-50378](CVE-2023/CVE-2023-503xx/CVE-2023-50378.json) (`2024-03-01T15:15:08.310`) +* [CVE-2024-0967](CVE-2024/CVE-2024-09xx/CVE-2024-0967.json) (`2024-03-01T15:15:08.410`) +* [CVE-2024-27497](CVE-2024/CVE-2024-274xx/CVE-2024-27497.json) (`2024-03-01T15:15:08.580`) +* [CVE-2024-2065](CVE-2024/CVE-2024-20xx/CVE-2024-2065.json) (`2024-03-01T15:15:08.627`) +* [CVE-2024-2066](CVE-2024/CVE-2024-20xx/CVE-2024-2066.json) (`2024-03-01T15:15:08.853`) +* [CVE-2024-2067](CVE-2024/CVE-2024-20xx/CVE-2024-2067.json) (`2024-03-01T15:15:09.073`) +* [CVE-2024-1624](CVE-2024/CVE-2024-16xx/CVE-2024-1624.json) (`2024-03-01T16:15:45.723`) +* [CVE-2024-27138](CVE-2024/CVE-2024-271xx/CVE-2024-27138.json) (`2024-03-01T16:15:45.983`) +* [CVE-2024-27139](CVE-2024/CVE-2024-271xx/CVE-2024-27139.json) (`2024-03-01T16:15:46.067`) +* [CVE-2024-27140](CVE-2024/CVE-2024-271xx/CVE-2024-27140.json) (`2024-03-01T16:15:46.143`) +* [CVE-2024-27295](CVE-2024/CVE-2024-272xx/CVE-2024-27295.json) (`2024-03-01T16:15:46.227`) +* [CVE-2024-27296](CVE-2024/CVE-2024-272xx/CVE-2024-27296.json) (`2024-03-01T16:15:46.413`) +* [CVE-2024-27499](CVE-2024/CVE-2024-274xx/CVE-2024-27499.json) (`2024-03-01T16:15:46.597`) +* [CVE-2024-2068](CVE-2024/CVE-2024-20xx/CVE-2024-2068.json) (`2024-03-01T16:15:46.643`) +* [CVE-2024-2069](CVE-2024/CVE-2024-20xx/CVE-2024-2069.json) (`2024-03-01T16:15:46.857`) +* [CVE-2024-2070](CVE-2024/CVE-2024-20xx/CVE-2024-2070.json) (`2024-03-01T16:15:47.063`) ### CVEs modified in the last Commit -Recently modified CVEs: `71` +Recently modified CVEs: `15` -* [CVE-2024-27656](CVE-2024/CVE-2024-276xx/CVE-2024-27656.json) (`2024-03-01T14:04:26.010`) -* [CVE-2024-27657](CVE-2024/CVE-2024-276xx/CVE-2024-27657.json) (`2024-03-01T14:04:26.010`) -* [CVE-2024-27658](CVE-2024/CVE-2024-276xx/CVE-2024-27658.json) (`2024-03-01T14:04:26.010`) -* [CVE-2024-27659](CVE-2024/CVE-2024-276xx/CVE-2024-27659.json) (`2024-03-01T14:04:26.010`) -* [CVE-2024-27660](CVE-2024/CVE-2024-276xx/CVE-2024-27660.json) (`2024-03-01T14:04:26.010`) -* [CVE-2024-27661](CVE-2024/CVE-2024-276xx/CVE-2024-27661.json) (`2024-03-01T14:04:26.010`) -* [CVE-2024-27662](CVE-2024/CVE-2024-276xx/CVE-2024-27662.json) (`2024-03-01T14:04:26.010`) -* [CVE-2024-2009](CVE-2024/CVE-2024-20xx/CVE-2024-2009.json) (`2024-03-01T14:04:26.010`) -* [CVE-2024-27294](CVE-2024/CVE-2024-272xx/CVE-2024-27294.json) (`2024-03-01T14:04:26.010`) -* [CVE-2024-0403](CVE-2024/CVE-2024-04xx/CVE-2024-0403.json) (`2024-03-01T14:04:26.010`) -* [CVE-2024-2021](CVE-2024/CVE-2024-20xx/CVE-2024-2021.json) (`2024-03-01T14:04:26.010`) -* [CVE-2024-2022](CVE-2024/CVE-2024-20xx/CVE-2024-2022.json) (`2024-03-01T14:04:26.010`) -* [CVE-2024-2045](CVE-2024/CVE-2024-20xx/CVE-2024-2045.json) (`2024-03-01T14:04:26.010`) -* [CVE-2024-1941](CVE-2024/CVE-2024-19xx/CVE-2024-1941.json) (`2024-03-01T14:04:26.010`) -* [CVE-2024-22100](CVE-2024/CVE-2024-221xx/CVE-2024-22100.json) (`2024-03-01T14:04:26.010`) -* [CVE-2024-25578](CVE-2024/CVE-2024-255xx/CVE-2024-25578.json) (`2024-03-01T14:04:26.010`) -* [CVE-2024-22891](CVE-2024/CVE-2024-228xx/CVE-2024-22891.json) (`2024-03-01T14:04:26.010`) -* [CVE-2024-25293](CVE-2024/CVE-2024-252xx/CVE-2024-25293.json) (`2024-03-01T14:04:26.010`) -* [CVE-2024-25386](CVE-2024/CVE-2024-253xx/CVE-2024-25386.json) (`2024-03-01T14:04:26.010`) -* [CVE-2024-1859](CVE-2024/CVE-2024-18xx/CVE-2024-1859.json) (`2024-03-01T14:04:26.010`) -* [CVE-2024-25552](CVE-2024/CVE-2024-255xx/CVE-2024-25552.json) (`2024-03-01T14:04:26.010`) -* [CVE-2024-27949](CVE-2024/CVE-2024-279xx/CVE-2024-27949.json) (`2024-03-01T14:04:26.010`) -* [CVE-2024-26590](CVE-2024/CVE-2024-265xx/CVE-2024-26590.json) (`2024-03-01T14:15:54.007`) -* [CVE-2024-26601](CVE-2024/CVE-2024-266xx/CVE-2024-26601.json) (`2024-03-01T14:15:54.050`) -* [CVE-2024-26603](CVE-2024/CVE-2024-266xx/CVE-2024-26603.json) (`2024-03-01T14:15:54.097`) +* [CVE-2023-46950](CVE-2023/CVE-2023-469xx/CVE-2023-46950.json) (`2024-03-01T15:23:36.177`) +* [CVE-2023-46951](CVE-2023/CVE-2023-469xx/CVE-2023-46951.json) (`2024-03-01T15:23:36.177`) +* [CVE-2023-52497](CVE-2023/CVE-2023-524xx/CVE-2023-52497.json) (`2024-03-01T15:23:36.177`) +* [CVE-2024-24903](CVE-2024/CVE-2024-249xx/CVE-2024-24903.json) (`2024-03-01T15:23:36.177`) +* [CVE-2024-24904](CVE-2024/CVE-2024-249xx/CVE-2024-24904.json) (`2024-03-01T15:23:36.177`) +* [CVE-2024-24905](CVE-2024/CVE-2024-249xx/CVE-2024-24905.json) (`2024-03-01T15:23:36.177`) +* [CVE-2024-24907](CVE-2024/CVE-2024-249xx/CVE-2024-24907.json) (`2024-03-01T15:23:36.177`) +* [CVE-2024-27567](CVE-2024/CVE-2024-275xx/CVE-2024-27567.json) (`2024-03-01T15:23:36.177`) +* [CVE-2024-27568](CVE-2024/CVE-2024-275xx/CVE-2024-27568.json) (`2024-03-01T15:23:36.177`) +* [CVE-2024-27569](CVE-2024/CVE-2024-275xx/CVE-2024-27569.json) (`2024-03-01T15:23:36.177`) +* [CVE-2024-27570](CVE-2024/CVE-2024-275xx/CVE-2024-27570.json) (`2024-03-01T15:23:36.177`) +* [CVE-2024-27571](CVE-2024/CVE-2024-275xx/CVE-2024-27571.json) (`2024-03-01T15:23:36.177`) +* [CVE-2024-27572](CVE-2024/CVE-2024-275xx/CVE-2024-27572.json) (`2024-03-01T15:23:36.177`) +* [CVE-2024-2064](CVE-2024/CVE-2024-20xx/CVE-2024-2064.json) (`2024-03-01T15:23:36.177`) +* [CVE-2024-23120](CVE-2024/CVE-2024-231xx/CVE-2024-23120.json) (`2024-03-01T16:15:45.920`) ## Download and Usage