Auto-Update: 2024-03-21T21:00:30.860215+00:00

This commit is contained in:
cad-safe-bot 2024-03-21 21:03:19 +00:00
parent b5b33e63fd
commit f8f94515cf
27 changed files with 355 additions and 125 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1262",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2021-01-20T20:15:14.970",
"lastModified": "2023-10-06T16:24:48.993",
"lastModified": "2024-03-21T20:02:29.753",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -117,8 +117,28 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:sd-wan_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72C8224E-0856-4477-8DCB-73B6ABA6D361"
"criteria": "cpe:2.3:o:cisco:sd-wan_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "19.2.4",
"matchCriteriaId": "31234E6E-6B7F-4B47-9A77-4264C8356C43"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:sd-wan_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "19.3",
"versionEndExcluding": "20.1.2",
"matchCriteriaId": "FCC94E19-7E34-4260-BA2F-0CD8A70BA1A4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:sd-wan_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.3",
"versionEndExcluding": "20.3.2",
"matchCriteriaId": "34133B76-199A-4E35-838B-E533137B7990"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:sd-wan_firmware:20.4:*:*:*:*:*:*:*",
"matchCriteriaId": "53C982CE-0B5B-4A3E-BCBF-FE64BC899DFE"
},
{
"vulnerable": true,

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-1513",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2021-05-06T13:15:10.850",
"lastModified": "2023-11-07T03:28:29.327",
"vulnStatus": "Modified",
"lastModified": "2024-03-21T20:02:24.913",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
"source": "d1c1063e-7a18-46af-9102-31f8928bc633",
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -95,7 +95,7 @@
]
},
{
"source": "d1c1063e-7a18-46af-9102-31f8928bc633",
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
@ -112,6 +112,12 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "20.3.1",
"matchCriteriaId": "8782BEB0-5880-4DF8-A0E3-A8F45437E121"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*",
@ -130,12 +136,6 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05AFD69C-BB2C-43E0-89CF-FDA00B8F4CB5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*",
"versionEndExcluding": "20.3.1",
"matchCriteriaId": "E6F0246B-3913-42E8-85D8-9FD746D0E1AF"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-34452",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-07-16T21:15:09.710",
"lastModified": "2023-12-28T23:15:28.560",
"vulnStatus": "Modified",
"lastModified": "2024-03-21T20:02:17.453",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -109,13 +109,13 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*",
"matchCriteriaId": "4DA042D4-B14E-4DDF-8423-DFB255679EFE"
"criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*",
"matchCriteriaId": "FF177984-A906-43FA-BF60-298133FBBD6B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:word:2019:*:*:*:*:*:*:*",
"matchCriteriaId": "AEDE27C4-A2A6-426A-9E77-2471BC10DB35"
"criteria": "cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*",
"matchCriteriaId": "4DA042D4-B14E-4DDF-8423-DFB255679EFE"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2022-44595",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-21T17:15:07.600",
"lastModified": "2024-03-21T17:15:07.600",
"vulnStatus": "Received",
"cveTags": [],
"lastModified": "2024-03-21T19:47:03.943",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,9 +2,8 @@
"id": "CVE-2023-49837",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-21T17:15:07.917",
"lastModified": "2024-03-21T17:15:07.917",
"vulnStatus": "Received",
"cveTags": [],
"lastModified": "2024-03-21T19:47:03.943",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,13 +2,12 @@
"id": "CVE-2024-1394",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-03-21T13:00:08.037",
"lastModified": "2024-03-21T15:24:35.093",
"lastModified": "2024-03-21T19:15:09.063",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs?. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey? and ctx?. That function uses named return parameters to free pkey? and ctx? if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the \"return nil, nil, fail(...)\" pattern, meaning that pkey? and ctx? will be nil inside the deferred function that should free them."
"value": "A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs\u200b. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey\u200b and ctx\u200b. That function uses named return parameters to free pkey\u200b and ctx\u200b if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the \"return nil, nil, fail(...)\" pattern, meaning that pkey\u200b and ctx\u200b will be nil inside the deferred function that should free them."
}
],
"metrics": {
@ -52,6 +51,14 @@
"url": "https://access.redhat.com/errata/RHSA-2024:1462",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:1468",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:1472",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-1394",
"source": "secalert@redhat.com"

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-1727",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-03-21T20:15:07.620",
"lastModified": "2024-03-21T20:15:07.620",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "To prevent malicious 3rd party websites from making requests to Gradio applications running locally, this PR tightens the CORS rules around Gradio applications. In particular, it checks to see if the host header is localhost (or one of its aliases) and if so, it requires the origin header (if present) to be localhost (or one of its aliases) as well.\n\n"
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://github.com/gradio-app/gradio/commit/84802ee6a4806c25287344dce581f9548a99834a",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.com/bounties/a94d55fb-0770-4cbe-9b20-97a978a2ffff",
"source": "security@huntr.dev"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2024-2578",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-21T17:15:09.960",
"lastModified": "2024-03-21T17:15:09.960",
"vulnStatus": "Received",
"cveTags": [],
"lastModified": "2024-03-21T19:47:03.943",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,9 +2,8 @@
"id": "CVE-2024-2579",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-21T17:15:10.150",
"lastModified": "2024-03-21T17:15:10.150",
"vulnStatus": "Received",
"cveTags": [],
"lastModified": "2024-03-21T19:47:03.943",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,9 +2,8 @@
"id": "CVE-2024-2580",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-21T17:15:10.357",
"lastModified": "2024-03-21T17:15:10.357",
"vulnStatus": "Received",
"cveTags": [],
"lastModified": "2024-03-21T19:47:03.943",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26308",
"sourceIdentifier": "security@apache.org",
"published": "2024-02-19T09:15:38.277",
"lastModified": "2024-03-07T17:15:13.050",
"vulnStatus": "Modified",
"lastModified": "2024-03-21T19:54:03.230",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -60,9 +60,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:commons_compress:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.21.0",
"versionStartIncluding": "1.21",
"versionEndExcluding": "1.26.0",
"matchCriteriaId": "05574FCF-DB85-41AE-A8EF-4AC589755667"
"matchCriteriaId": "D8C5F6D4-AAD9-4029-B819-01DB81C18DA1"
}
]
}
@ -87,7 +87,10 @@
},
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0009/",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2024-27190",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-21T17:15:08.010",
"lastModified": "2024-03-21T17:15:08.010",
"vulnStatus": "Received",
"cveTags": [],
"lastModified": "2024-03-21T19:47:03.943",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,9 +2,8 @@
"id": "CVE-2024-27277",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-03-21T17:15:08.230",
"lastModified": "2024-03-21T17:15:08.230",
"vulnStatus": "Received",
"cveTags": [],
"lastModified": "2024-03-21T19:47:03.943",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,9 +2,8 @@
"id": "CVE-2024-27956",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-21T17:15:08.437",
"lastModified": "2024-03-21T17:15:08.437",
"vulnStatus": "Received",
"cveTags": [],
"lastModified": "2024-03-21T19:47:03.943",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,9 +2,8 @@
"id": "CVE-2024-27962",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-21T17:15:08.637",
"lastModified": "2024-03-21T17:15:08.637",
"vulnStatus": "Received",
"cveTags": [],
"lastModified": "2024-03-21T19:47:03.943",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,9 +2,8 @@
"id": "CVE-2024-27963",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-21T17:15:08.850",
"lastModified": "2024-03-21T17:15:08.850",
"vulnStatus": "Received",
"cveTags": [],
"lastModified": "2024-03-21T19:47:03.943",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,9 +2,8 @@
"id": "CVE-2024-27964",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-21T17:15:09.060",
"lastModified": "2024-03-21T17:15:09.060",
"vulnStatus": "Received",
"cveTags": [],
"lastModified": "2024-03-21T19:47:03.943",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,9 +2,8 @@
"id": "CVE-2024-27965",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-21T17:15:09.277",
"lastModified": "2024-03-21T17:15:09.277",
"vulnStatus": "Received",
"cveTags": [],
"lastModified": "2024-03-21T19:47:03.943",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,9 +2,8 @@
"id": "CVE-2024-27968",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-21T17:15:09.487",
"lastModified": "2024-03-21T17:15:09.487",
"vulnStatus": "Received",
"cveTags": [],
"lastModified": "2024-03-21T19:47:03.943",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-28252",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-15T19:15:07.210",
"lastModified": "2024-03-17T22:38:29.433",
"lastModified": "2024-03-21T20:15:08.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "CoreWCF is a port of the service side of Windows Communication Foundation (WCF) to .NET Core. If you have a NetFraming based CoreWCF service, extra system resources could be consumed by connections being left established instead of closing or aborting them. There are two scenarios when this can happen. When a client established a connection to the service and sends no data, the service will wait indefinitely for the client to initiate the NetFraming session handshake. Additionally, once a client has established a session, if the client doesn't send any requests for the period of time configured in the binding ReceiveTimeout, the connection is not properly closed as part of the session being aborted. The bindings affected by this behavior are NetTcpBinding, NetNamedPipeBinding, and UnixDomainSocketBinding. Only NetTcpBinding has the ability to accept non local connections. The currently supported versions of CoreWCF are v1.4.x and v1.5.x. The fix can be found in v1.4.2 and v1.5.3 of the CoreWCF packages. Users are advised to upgrade. There are no workarounds for this issue.\n"
"value": "CoreWCF is a port of the service side of Windows Communication Foundation (WCF) to .NET Core. If you have a NetFraming based CoreWCF service, extra system resources could be consumed by connections being left established instead of closing or aborting them. There are two scenarios when this can happen. When a client established a connection to the service and sends no data, the service will wait indefinitely for the client to initiate the NetFraming session handshake. Additionally, once a client has established a session, if the client doesn't send any requests for the period of time configured in the binding ReceiveTimeout, the connection is not properly closed as part of the session being aborted. The bindings affected by this behavior are NetTcpBinding, NetNamedPipeBinding, and UnixDomainSocketBinding. Only NetTcpBinding has the ability to accept non local connections. The currently supported versions of CoreWCF are v1.4.x and v1.5.x. The fix can be found in v1.4.2 and v1.5.2 of the CoreWCF packages. Users are advised to upgrade. There are no workarounds for this issue.\n"
},
{
"lang": "es",
"value": "CoreWCF es una adaptaci\u00f3n del lado de servicio de Windows Communication Foundation (WCF) a .NET Core. Si tiene un servicio CoreWCF basado en NetFraming, se podr\u00edan consumir recursos adicionales del sistema si las conexiones se dejan establecidas en lugar de cerrarlas o cancelarlas. Hay dos escenarios en los que esto puede suceder. Cuando un cliente establece una conexi\u00f3n con el servicio y no env\u00eda datos, el servicio esperar\u00e1 indefinidamente a que el cliente inicie el protocolo de enlace de sesi\u00f3n de NetFraming. Adem\u00e1s, una vez que un cliente ha establecido una sesi\u00f3n, si el cliente no env\u00eda ninguna solicitud durante el per\u00edodo de tiempo configurado en el enlace ReceiverTimeout, la conexi\u00f3n no se cierra correctamente como parte del aborto de la sesi\u00f3n. Los enlaces afectados por este comportamiento son NetTcpBinding, NetNamedPipeBinding y UnixDomainSocketBinding. S\u00f3lo NetTcpBinding tiene la capacidad de aceptar conexiones no locales. Las versiones actualmente compatibles de CoreWCF son v1.4.x y v1.5.x. La soluci\u00f3n se puede encontrar en v1.4.2 y v1.5.3 de los paquetes CoreWCF. Se recomienda a los usuarios que actualicen. No existen workarounds para este problema."
}
],
"metrics": {

View File

@ -2,19 +2,79 @@
"id": "CVE-2024-28535",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-12T13:15:49.690",
"lastModified": "2024-03-12T16:02:33.900",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-21T20:58:46.217",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Tenda AC18 V15.03.05.05 has a stack overflow vulnerability in the mitInterface parameter of fromAddressNat function."
},
{
"lang": "es",
"value": "Tenda AC18 V15.03.05.05 tiene una vulnerabilidad de desbordamiento de pila en el par\u00e1metro mitInterface de la funci\u00f3n fromAddressNat."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ac18_firmware:15.03.05.05:*:*:*:*:*:*:*",
"matchCriteriaId": "4D5CB727-FC6B-4212-A61E-2888A0DADFB0"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromAddressNat_mitInterface.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,79 @@
"id": "CVE-2024-28553",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-12T13:15:49.763",
"lastModified": "2024-03-12T16:02:33.900",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-03-21T20:58:52.357",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Tenda AC18 V15.03.05.05 has a stack overflow vulnerability in the entrys parameter fromAddressNat function."
},
{
"lang": "es",
"value": "Tenda AC18 V15.03.05.05 tiene una vulnerabilidad de desbordamiento de pila en el par\u00e1metro de entradas de la funci\u00f3n AddressNat."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ac18_firmware:15.03.05.05:*:*:*:*:*:*:*",
"matchCriteriaId": "4D5CB727-FC6B-4212-A61E-2888A0DADFB0"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromAddressNat_entrys.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2024-29180",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-21T17:15:09.690",
"lastModified": "2024-03-21T17:15:09.690",
"vulnStatus": "Received",
"cveTags": [],
"lastModified": "2024-03-21T19:47:03.943",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29374",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-21T19:15:09.377",
"lastModified": "2024-03-21T19:47:03.943",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Scripting (XSS) vulnerability exists in the way MOODLE 3.10.9 handles user input within the \"GET /?lang=\" URL parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/fir3storm/f9c7f3ec1a6496498517ed216d2640b2",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2024-29916",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-21T17:15:09.897",
"lastModified": "2024-03-21T17:15:09.897",
"vulnStatus": "Received",
"cveTags": [],
"lastModified": "2024-03-21T19:47:03.943",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-03-21T19:01:45.167107+00:00
2024-03-21T21:00:30.860215+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-03-21T17:15:10.357000+00:00
2024-03-21T20:58:52.357000+00:00
```
### Last Data Feed Release
@ -29,34 +29,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
242362
242364
```
### CVEs added in the last Commit
Recently added CVEs: `15`
Recently added CVEs: `2`
* [CVE-2022-44595](CVE-2022/CVE-2022-445xx/CVE-2022-44595.json) (`2024-03-21T17:15:07.600`)
* [CVE-2023-49837](CVE-2023/CVE-2023-498xx/CVE-2023-49837.json) (`2024-03-21T17:15:07.917`)
* [CVE-2024-2578](CVE-2024/CVE-2024-25xx/CVE-2024-2578.json) (`2024-03-21T17:15:09.960`)
* [CVE-2024-2579](CVE-2024/CVE-2024-25xx/CVE-2024-2579.json) (`2024-03-21T17:15:10.150`)
* [CVE-2024-2580](CVE-2024/CVE-2024-25xx/CVE-2024-2580.json) (`2024-03-21T17:15:10.357`)
* [CVE-2024-27190](CVE-2024/CVE-2024-271xx/CVE-2024-27190.json) (`2024-03-21T17:15:08.010`)
* [CVE-2024-27277](CVE-2024/CVE-2024-272xx/CVE-2024-27277.json) (`2024-03-21T17:15:08.230`)
* [CVE-2024-27956](CVE-2024/CVE-2024-279xx/CVE-2024-27956.json) (`2024-03-21T17:15:08.437`)
* [CVE-2024-27962](CVE-2024/CVE-2024-279xx/CVE-2024-27962.json) (`2024-03-21T17:15:08.637`)
* [CVE-2024-27963](CVE-2024/CVE-2024-279xx/CVE-2024-27963.json) (`2024-03-21T17:15:08.850`)
* [CVE-2024-27964](CVE-2024/CVE-2024-279xx/CVE-2024-27964.json) (`2024-03-21T17:15:09.060`)
* [CVE-2024-27965](CVE-2024/CVE-2024-279xx/CVE-2024-27965.json) (`2024-03-21T17:15:09.277`)
* [CVE-2024-27968](CVE-2024/CVE-2024-279xx/CVE-2024-27968.json) (`2024-03-21T17:15:09.487`)
* [CVE-2024-29180](CVE-2024/CVE-2024-291xx/CVE-2024-29180.json) (`2024-03-21T17:15:09.690`)
* [CVE-2024-29916](CVE-2024/CVE-2024-299xx/CVE-2024-29916.json) (`2024-03-21T17:15:09.897`)
* [CVE-2024-1727](CVE-2024/CVE-2024-17xx/CVE-2024-1727.json) (`2024-03-21T20:15:07.620`)
* [CVE-2024-29374](CVE-2024/CVE-2024-293xx/CVE-2024-29374.json) (`2024-03-21T19:15:09.377`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `23`
* [CVE-2021-1262](CVE-2021/CVE-2021-12xx/CVE-2021-1262.json) (`2024-03-21T20:02:29.753`)
* [CVE-2021-1513](CVE-2021/CVE-2021-15xx/CVE-2021-1513.json) (`2024-03-21T20:02:24.913`)
* [CVE-2021-34452](CVE-2021/CVE-2021-344xx/CVE-2021-34452.json) (`2024-03-21T20:02:17.453`)
* [CVE-2022-44595](CVE-2022/CVE-2022-445xx/CVE-2022-44595.json) (`2024-03-21T19:47:03.943`)
* [CVE-2023-49837](CVE-2023/CVE-2023-498xx/CVE-2023-49837.json) (`2024-03-21T19:47:03.943`)
* [CVE-2024-1394](CVE-2024/CVE-2024-13xx/CVE-2024-1394.json) (`2024-03-21T19:15:09.063`)
* [CVE-2024-2578](CVE-2024/CVE-2024-25xx/CVE-2024-2578.json) (`2024-03-21T19:47:03.943`)
* [CVE-2024-2579](CVE-2024/CVE-2024-25xx/CVE-2024-2579.json) (`2024-03-21T19:47:03.943`)
* [CVE-2024-2580](CVE-2024/CVE-2024-25xx/CVE-2024-2580.json) (`2024-03-21T19:47:03.943`)
* [CVE-2024-26308](CVE-2024/CVE-2024-263xx/CVE-2024-26308.json) (`2024-03-21T19:54:03.230`)
* [CVE-2024-27190](CVE-2024/CVE-2024-271xx/CVE-2024-27190.json) (`2024-03-21T19:47:03.943`)
* [CVE-2024-27277](CVE-2024/CVE-2024-272xx/CVE-2024-27277.json) (`2024-03-21T19:47:03.943`)
* [CVE-2024-27956](CVE-2024/CVE-2024-279xx/CVE-2024-27956.json) (`2024-03-21T19:47:03.943`)
* [CVE-2024-27962](CVE-2024/CVE-2024-279xx/CVE-2024-27962.json) (`2024-03-21T19:47:03.943`)
* [CVE-2024-27963](CVE-2024/CVE-2024-279xx/CVE-2024-27963.json) (`2024-03-21T19:47:03.943`)
* [CVE-2024-27964](CVE-2024/CVE-2024-279xx/CVE-2024-27964.json) (`2024-03-21T19:47:03.943`)
* [CVE-2024-27965](CVE-2024/CVE-2024-279xx/CVE-2024-27965.json) (`2024-03-21T19:47:03.943`)
* [CVE-2024-27968](CVE-2024/CVE-2024-279xx/CVE-2024-27968.json) (`2024-03-21T19:47:03.943`)
* [CVE-2024-28252](CVE-2024/CVE-2024-282xx/CVE-2024-28252.json) (`2024-03-21T20:15:08.050`)
* [CVE-2024-28535](CVE-2024/CVE-2024-285xx/CVE-2024-28535.json) (`2024-03-21T20:58:46.217`)
* [CVE-2024-28553](CVE-2024/CVE-2024-285xx/CVE-2024-28553.json) (`2024-03-21T20:58:52.357`)
* [CVE-2024-29180](CVE-2024/CVE-2024-291xx/CVE-2024-29180.json) (`2024-03-21T19:47:03.943`)
* [CVE-2024-29916](CVE-2024/CVE-2024-299xx/CVE-2024-29916.json) (`2024-03-21T19:47:03.943`)
## Download and Usage

View File

@ -165559,7 +165559,7 @@ CVE-2021-1258,0,0,d82f969dd17a5f3e524dde57860640835b4905edecd5741b078ad84534dab3
CVE-2021-1259,0,0,86531ec5550e6433a46b99fb6d5bcd5925dbbdba36287f07609b01bda56864ca,2021-01-29T15:15:23.147000
CVE-2021-1260,0,0,e0a128c880244e947036b72a88f6608409f654ea2383b7f657439480f4add5e0,2023-10-06T16:24:48.993000
CVE-2021-1261,0,0,22c0ca0c0b5235b43b736d4096137afa27d44452ab54e4d1dab67ebb5af5720b,2023-10-06T16:24:48.993000
CVE-2021-1262,0,0,ef7809d6c64ae152c6077f282400a35cc5959b941db6a9c1c36e64c4bc4f3678,2023-10-06T16:24:48.993000
CVE-2021-1262,0,1,2027020efb31a45ccae93610730595f2a2566a853fd41b2f4858f48375d4988c,2024-03-21T20:02:29.753000
CVE-2021-1263,0,0,4d45bea273c6e884177db62427337cdba8f80b38b26845af660d0d1789b1234f,2023-10-06T16:24:48.993000
CVE-2021-1264,0,0,81dee8876bb986a4e952a03935bd850b263032e2b547b9deacbe69c2ec8035c7,2023-11-07T03:27:49.183000
CVE-2021-1265,0,0,17a5f7ace4ccaca3dcf0661bf9760d365aaec23c6a53804524a3d586a17e43fc,2021-01-27T16:50:57.907000
@ -165791,7 +165791,7 @@ CVE-2021-1509,0,0,d7c71f1ff07c1b27324eabc6b9d1a6fbcbda43f97498e911954c3001754a12
CVE-2021-1510,0,0,2f58f05cc4ff52f87d306aef8bc3a557aaf35d7a662a15484ffc84e5b6934c1c,2023-11-07T03:28:28.943000
CVE-2021-1511,0,0,aeefe7aba6f9c34abab2d952a73403182e551eccc92674708ff7ce2e21c0f45e,2023-11-07T03:28:29.133000
CVE-2021-1512,0,0,d1a586e26565035cda4fcdffed8eb0875987f0590191ac617865b1a21c37f3a4,2023-10-16T16:35:25.220000
CVE-2021-1513,0,0,f99c33fb4d8331a13f8e31a6baa3ba657826073a7b7e1d428ef074716043a2a2,2023-11-07T03:28:29.327000
CVE-2021-1513,0,1,a25a72c26181f8fcbf0e33ec57924341e0321a71266ff29164cc87d405dbc811,2024-03-21T20:02:24.913000
CVE-2021-1514,0,0,166408dda482a95a3a4ae776cae748fec8ae0d6b29c3957ccdc7b2a10f62bd96,2023-10-16T16:35:25.220000
CVE-2021-1515,0,0,253ce2bc5373e3293a647b374083917e36279af569fd90975a8c1532c1f055e0,2023-11-07T03:28:29.533000
CVE-2021-1516,0,0,6cc3a90009fb0506c584e09732edd1f63833843c653985397edf96a1a45e75e0,2023-11-07T03:28:29.697000
@ -177528,7 +177528,7 @@ CVE-2021-34449,0,0,06602504c62be8f7c935030bea3d43a76bd231bcc6562014ab1969fb30782
CVE-2021-3445,0,0,8326494930b3f9272a5d8cd4b20ff9f890de64bd49463e9c8e25e5f9e2931b60,2023-11-07T03:38:00.453000
CVE-2021-34450,0,0,334a2ffa2eaaa26e8560ce439661f9c6b84b7e0ab039d5a580e2fd6e4be420fe,2023-12-28T23:15:28.100000
CVE-2021-34451,0,0,5671a1bcbcdeba6d0e8fed6ef4bc65187dc6749bd883cacb387b5a5293e87d22,2023-12-28T23:15:28.327000
CVE-2021-34452,0,0,29bc7f8bedb1a2ace0c6f5336cf78820c4ae429897bb1abafc9b4b1ef8a03bfe,2023-12-28T23:15:28.560000
CVE-2021-34452,0,1,3ac14191585a0bf73f46587a035f3eeaee23a188c7eed305de107944cb616e82,2024-03-21T20:02:17.453000
CVE-2021-34453,0,0,a1235b920860a9483cd53339ebc839647ae1115c38baa50c187aece5bbbb241b,2023-08-01T23:15:16.173000
CVE-2021-34454,0,0,78ff2f699dd5f4805aa53889d7c557dce2028518698297993c91bddae55e2c44,2023-12-28T23:15:28.783000
CVE-2021-34455,0,0,e4116877d5ca41f8e5bd3999b1f5c62630dd6589628f6d82e4bd4a7375a4ea19,2023-12-28T23:15:29
@ -208693,7 +208693,7 @@ CVE-2022-4459,0,0,841d23cd2517ff134527c70acbac864bd1798efca5741cdb40fc1b914c6b61
CVE-2022-44590,0,0,34e1f96684be246af4d115d74d6ad86d1677f25db158e219a386c9a7b2c1f0fd,2022-11-10T19:23:14.800000
CVE-2022-44591,0,0,8de73acec656de193157bdf7e48ae245affcf919e7ad24e4c08dfb89e483fd5f,2022-11-18T19:28:56.420000
CVE-2022-44594,0,0,b7dc479f0e8562d2f1e10e9b8c859c387aa51f72d918e1c729d08c2404508fbd,2023-04-28T03:44:57.940000
CVE-2022-44595,1,1,09b5f369e30c5041fd5979f684fca6aa6537f237f831fa4aa47a58da72638ba4,2024-03-21T17:15:07.600000
CVE-2022-44595,0,1,00f838a23a694da460800d3c10ececb250288d2ecf59a66ab6ab9d3bc830695e,2024-03-21T19:47:03.943000
CVE-2022-4460,0,0,549234db110e5b693f52fad78d6358b8e08ccb9d9c9d7ca9e6118d72a7d6c30e,2023-11-07T03:57:52.710000
CVE-2022-44606,0,0,dd9357b8301dbd8c44e690a2844baf8bea2bcc5c8cc5dc8addb6ac09082694a0,2022-12-09T21:18:22.850000
CVE-2022-44608,0,0,f6323b139a76646c7c7a6763944abd4b79185adca516d6c4f40e939231a6cbf5,2022-12-09T00:49:39.090000
@ -234617,7 +234617,7 @@ CVE-2023-49830,0,0,95c8e8a920bc6a550dd8fced96adfc49615ef3b8f6aec68dfdcf2d26ab1f8
CVE-2023-49833,0,0,75834fff665b59f3c4fb0b4b03558d32fc91b3efab25cbdeefafb0192b012059,2023-12-18T19:14:15.050000
CVE-2023-49834,0,0,f01e2730dc0b95d1b7f32c812dba24237147f33301308210a31bf1cc47cc7d0b,2023-12-20T04:26:25.007000
CVE-2023-49836,0,0,d1eaaf088ac1e6696c52a64c2e3dbfdfe00102afdcfa4bf3951b57aa3483333c,2023-12-18T18:19:51.903000
CVE-2023-49837,1,1,62913893571245a46489800f1ba9f47dd069a099b1d9789daeaf013eabdd5c7c,2024-03-21T17:15:07.917000
CVE-2023-49837,0,1,efabe1e704e190a47962d97e791147336566f4b472138d57ed70012cd72df24c,2024-03-21T19:47:03.943000
CVE-2023-4984,0,0,b568e92dbfdfa933d741a561994c5a187fe494f7ce09795a2b3a70d20f02c757,2024-03-21T02:49:56.543000
CVE-2023-49840,0,0,3007b22f6bc63fefba1a05b48a48deee17ae057500c4d492f77e27d9c865a34d,2023-12-20T04:28:39.197000
CVE-2023-49841,0,0,ad3a17229bd01d0c2bf491b86a58b899c006843c79bea01aae5bd3ff930dd743,2023-12-18T19:03:16.533000
@ -238777,7 +238777,7 @@ CVE-2024-1390,0,0,760bcdaac2db269a3249aaa20e58e1659b2977bdb995748ef5e46a1ecb8544
CVE-2024-1391,0,0,d263861df201411e95604a0f8dea4a32aa5aa465f14e9d3ee26c7cf1dddcea30,2024-03-13T18:15:58.530000
CVE-2024-1392,0,0,854e6aa0a85eb7f6e01984f9f2b39f09c3e464c67a90f670cafc735773e56736,2024-03-13T18:15:58.530000
CVE-2024-1393,0,0,139d32a27df25f29abc2bcda3159db69b338e05c68d7680abed80afd815e8ff5,2024-03-13T18:15:58.530000
CVE-2024-1394,0,0,294b053d2ffc51433a2d64e8d98c3ac8a415fb04eaae593428f7a34b72b8edc5,2024-03-21T15:24:35.093000
CVE-2024-1394,0,1,7c73506bdd53fd1dc2a1d94144983d2673f2dc3fe5d07e0b6a723a3ea487359f,2024-03-21T19:15:09.063000
CVE-2024-1397,0,0,e6d8c9c2beca75d3fdc5f918cb423cf21913a9c807f46126d5b49c29c7bd60f0,2024-03-13T12:33:51.697000
CVE-2024-1398,0,0,7a7783e481aa897afa83bd125da0d53c431d5a5a9d43f1ade8b1e715449f59a0,2024-03-04T13:58:23.447000
CVE-2024-1400,0,0,295a10f36c3e13d694d09cafc6872c0c48f9e2b4c87da0889327ecdac7abe4ac,2024-03-12T12:40:13.500000
@ -238965,6 +238965,7 @@ CVE-2024-1720,0,0,3f534b1db2e7b75966562da6fb1d468afac7b86b23a312961b1d896997e21d
CVE-2024-1722,0,0,bbfa2fe804b85c8f73b8225a9811c290a6a29ddc6e06b05c51fd071f985f9060,2024-02-29T13:49:29.390000
CVE-2024-1723,0,0,7e337e59dda9fcfb03cb2d0ee4f7926bbc1a4aeb3afb375b3ac4508c9e5d97e9,2024-03-13T18:15:58.530000
CVE-2024-1725,0,0,ee1fb8cd83e91b3cc554ef61ba8506273bf384217121fa2160f3c7c69e57a993,2024-03-08T14:02:57.420000
CVE-2024-1727,1,1,a5fa7c92f81c10c1ceddf980b8b24e0215a1f2778b409140ec0db41816e38d59,2024-03-21T20:15:07.620000
CVE-2024-1731,0,0,a54dfdadfcd6666506c62883f073482e904182fadeecad8ff7a349f271e0661b,2024-03-05T13:41:01.900000
CVE-2024-1733,0,0,d9cf8004467e67497b484a605a620c0a0db32312b35f534ec3be854a6ce160fc,2024-03-17T22:38:29.433000
CVE-2024-1735,0,0,fef99247045161df3b08e17c74949b5db371420b96202703c89efa90d1969060,2024-02-26T16:32:25.577000
@ -241406,9 +241407,9 @@ CVE-2024-25767,0,0,5e5d85efb5a949e2d407dc5470a1026f931741e6d3d19a638a7a6f425b54d
CVE-2024-25768,0,0,80ced9e42f994d6a00a0057cb00581829176f61a4dfa1e97abbae3afb8561c8a,2024-02-26T22:10:40.463000
CVE-2024-2577,0,0,c843620e43b4656c06ef8ee9254a21713fc5cfa1bda4a16ceabcb16830382f60,2024-03-21T02:52:39.510000
CVE-2024-25770,0,0,d105bd95abb6afbf92cef5c1765f81d4416c38d2a6067fe6216eb1ee17388748,2024-02-26T22:10:40.463000
CVE-2024-2578,1,1,5fb7a6ff438d59dec3fa95e3e0691e9b82eb399464e626c191faeebf2e14002b,2024-03-21T17:15:09.960000
CVE-2024-2579,1,1,34db16e32c53928e8f66e886a8a5a35582a050b7263fd19c5439041e8f97e239,2024-03-21T17:15:10.150000
CVE-2024-2580,1,1,9619a5906517ac4b75a00fb98804d3bf72ad790c19614edcb13cd58567dc2cf9,2024-03-21T17:15:10.357000
CVE-2024-2578,0,1,8067579b1ebf336ee1daf98516c926ae1ffceb32460cd545b41c51aab9076f37,2024-03-21T19:47:03.943000
CVE-2024-2579,0,1,82ab7736c7cd2bae37cca14333922f5ac036820dddbd265831a9ea551e48aa62,2024-03-21T19:47:03.943000
CVE-2024-2580,0,1,17c770530b9c88c0a0bc27203561d8211df9836f86fe3343fde81a78a162c0d5,2024-03-21T19:47:03.943000
CVE-2024-25801,0,0,86d0a2f88d637a38d728e68507deae5ad1ee66b74383784e4b403b33b5149a86,2024-02-22T19:07:27.197000
CVE-2024-25802,0,0,cb029cdbf03ee0051152f36415381bb55ee304fcb50819490e22f017c52403c6,2024-02-22T19:07:27.197000
CVE-2024-2581,0,0,6eca5564f5891085eb56e7f4cce8a941d50b5c5d945724a4654e0a645ab887e7,2024-03-21T02:52:39.600000
@ -241670,7 +241671,7 @@ CVE-2024-26300,0,0,957ff2fceea083c23710802994700a4cf17bc21a9f298857e1101271f2e4e
CVE-2024-26301,0,0,ca5ba4fc82d74473f58bbb8ab53e52870805c492ae0704dcd3113ae9fe8a11a4,2024-02-28T14:06:45.783000
CVE-2024-26302,0,0,af4ef1bb4da1c0ac0e7b0a0b03804bb031d31d0e464ca3573002ab0828a12d88,2024-02-28T14:06:45.783000
CVE-2024-26307,0,0,9bdd86f1164e19b9b7e171833e6f17ecff380db1e609df57649c593081a62eb2,2024-03-21T12:58:51.093000
CVE-2024-26308,0,0,82b0ecfd78ac1924ca4de8327395ad25f7b35e7d9f3c5c23f6744c8d052e1727,2024-03-07T17:15:13.050000
CVE-2024-26308,0,1,2ba9e28d3969717f6516b4803ddc13ceecd3ad2f69b64fd95ab4756f662bdfa5,2024-03-21T19:54:03.230000
CVE-2024-26309,0,0,f36b82bfd58135529029d2dbb3557eae73d94f3c7d43b34f799072bc28e25580,2024-03-08T14:02:57.420000
CVE-2024-2631,0,0,4ce8c252c50d2a4573b6db6829ce390aacb977173215dab753e6b59d6e346a30,2024-03-20T17:18:21.343000
CVE-2024-26310,0,0,cdf3231f7a059b92520dd591ab7449fe300f81e89c81c63cb479e44416fa612e,2024-02-22T19:07:27.197000
@ -241871,7 +241872,7 @@ CVE-2024-2717,0,0,60956d204776e8fc2f79250d188a534a8f231639d58b0eebc608181972adc9
CVE-2024-2718,0,0,69219abfd430b6a0a0008d330dbe89494263528e572419109c92a9fc419b6f63,2024-03-21T12:58:51.093000
CVE-2024-27189,0,0,515e61fa1831b3fd92525b0004dfafde618646c72fb29e4527e0a2fb9466806f,2024-03-15T16:26:49.320000
CVE-2024-2719,0,0,a4ab17264d9d4de02148162ae470cd2b2fdd972306f561edebd77c0e41dd9d7a,2024-03-21T12:58:51.093000
CVE-2024-27190,1,1,c0ec98950a3c95237b99d183acabce2dcd6ae1cadac3030b7377fcab423a5787,2024-03-21T17:15:08.010000
CVE-2024-27190,0,1,1aa0bf9b04d8ad0cd0d83da443ced72d3db96666d7e8636691ac4635aaeee635,2024-03-21T19:47:03.943000
CVE-2024-27192,0,0,0ff7a489a9c185cda73564233ae30b76c3279bb0d352bc83dbf6b8e10c6212e5,2024-03-15T16:26:49.320000
CVE-2024-27193,0,0,1a2f1126258ed9b0f5281770f95fad5056f0f1e4993150f3d871f6ef458a3533,2024-03-15T16:26:49.320000
CVE-2024-27194,0,0,b8200fea2f0a79d9b8f1fbf40aca3e6d111a7a732357978a250e1964deaa7251,2024-03-17T22:38:29.433000
@ -241914,7 +241915,7 @@ CVE-2024-27237,0,0,952387726c7567ea2371af0e500cab297b027867a108431eaa82a39745a31
CVE-2024-27255,0,0,07d4523d50b3b6ceec1ed85c31e8859376bfd63a9732f2f4d2cf6e5b4c34b76b,2024-03-04T13:58:23.447000
CVE-2024-27265,0,0,caf2cbef481f9d0206d06f75a38ca052c5291ba0582e91875cea8f52e6d86a34,2024-03-19T16:52:02.767000
CVE-2024-27266,0,0,f3ab0f27c5fbbc81843b4329fa53134d5b91174cad9bacbbc5dbf01cfacc3864,2024-03-19T16:52:35.400000
CVE-2024-27277,1,1,2893029a36e14e5ab3184a9454057ceb5ab630c8cf9f2be73af6f80c2c96beb9,2024-03-21T17:15:08.230000
CVE-2024-27277,0,1,eb365bab444835328458e82045190ce3a564e0755801fc1f65f8b5d9bbf59bcb,2024-03-21T19:47:03.943000
CVE-2024-27278,0,0,2ef9546b6eb3a76ad70be700186038d995dd630654759ed72b9b3d10968f6d39,2024-03-06T15:18:08.093000
CVE-2024-27279,0,0,a0a465925dfcee0f633443a4d3db070f2bf023c10d4135b020d1a0fbe76c5a4b,2024-03-12T12:40:13.500000
CVE-2024-27283,0,0,d0d6cc69e38ce7977029c4d3a011dff4f743808fa73bec6f0327124024522ffa,2024-02-22T19:07:27.197000
@ -242056,17 +242057,17 @@ CVE-2024-27949,0,0,12ee9b935394b527d1677a59b517c94d0df067a0b32bfff31d7cb2be5b4b5
CVE-2024-27950,0,0,56d632dad56c45d949d3327de16e5b70b08683cea8ce7876ca8c59cc37ee8062,2024-03-01T14:04:04.827000
CVE-2024-27952,0,0,184c933cd3d4f7d9f291de87daadba6c6d2dcb57a0cab449b4798a27658d2d98,2024-03-13T18:15:58.530000
CVE-2024-27953,0,0,9606a5ea342585cc8ea605f674c63e8d870327e37e1ba285dba38be6126632a2,2024-03-13T18:15:58.530000
CVE-2024-27956,1,1,66736e6e1f13442348a9d13aa6cfaa4a2498e3146af1c03a16111d845446d69b,2024-03-21T17:15:08.437000
CVE-2024-27956,0,1,eeea096f0e7e7487ea049c194ac62702e3efa47a3d999d9e69a572f09e5c15e8,2024-03-21T19:47:03.943000
CVE-2024-27957,0,0,5098f1a90cb829431de95b5de6e60aa2ea5ee4aedd8c9f7d7d4297d6dc37ff37,2024-03-17T22:38:29.433000
CVE-2024-27958,0,0,2ee086fb447798c561fd1c831c754d734514f619f6ebb04cf96679cb78dfef40,2024-03-17T22:38:29.433000
CVE-2024-27959,0,0,e2d4c3e5066dc506643038067fab6e9f26070ced2f7f327a18ffcd82b243c593,2024-03-17T22:38:29.433000
CVE-2024-27960,0,0,6ff911c5617586aebae672070284633e223cb5b14cbbc3b1801f17c292900f46,2024-03-17T22:38:29.433000
CVE-2024-27961,0,0,3162bfbc67900a83a9b4114dba265e7189f0bad8c0ddf2d85f6724674d13510a,2024-03-17T22:38:29.433000
CVE-2024-27962,1,1,7a8e9f7f1bf2c5e021e039a30a7f35c08db002c7dd09f57dc2677205586d1178,2024-03-21T17:15:08.637000
CVE-2024-27963,1,1,48168dc4b5b237659851f8dbd76235a3409a0946b5c51543657605f6aa2c6940,2024-03-21T17:15:08.850000
CVE-2024-27964,1,1,035a89dc336730735b9b0b4b76282144341f56bb37d97a7914c6d26fa2472aa0,2024-03-21T17:15:09.060000
CVE-2024-27965,1,1,8ec84e693e8c40e9a1f30f2f6bcba3ae6ddff6f90f1b3547c641f3f44eb39aac,2024-03-21T17:15:09.277000
CVE-2024-27968,1,1,6a5aa5d883cb61fd2a08f978d66dacf333b85ba305e93e277b14fb83383a38c4,2024-03-21T17:15:09.487000
CVE-2024-27962,0,1,1c94df9110462a34df55d8f671d128860266ccb77dd29f389b2324600ca07680,2024-03-21T19:47:03.943000
CVE-2024-27963,0,1,1fe8e45c3046e4191d77b36670840383914d58f1ba31efb184b266de4ae6b144,2024-03-21T19:47:03.943000
CVE-2024-27964,0,1,f723b903bea75dee5cd9d094fb735ccf35df44ec2a2fe82d8cd63bd7e33ad323,2024-03-21T19:47:03.943000
CVE-2024-27965,0,1,07b2c962b6af72a3fa4d6e0cca49f1bed68d7474aaf9839141a5bebbc2988945,2024-03-21T19:47:03.943000
CVE-2024-27968,0,1,62d1484625b8ff1b6da2393031085b35a7b07168c520f9d4ac0420345380cdc9,2024-03-21T19:47:03.943000
CVE-2024-27974,0,0,c5d12161a6a294fb4d33a068888d07d2dec693f9073d8d47f06182bf4fe2779a,2024-03-18T12:38:25.490000
CVE-2024-27986,0,0,221ac31a72264e8303bc0dc716d0bcad27f92aa2e3b64824247f9d02601983b8,2024-03-14T12:52:09.877000
CVE-2024-27987,0,0,ce6fd0b1730cd837f285c0aaaa1258cf6aa8505469e7f313401adb363ee7f395,2024-03-15T12:53:06.423000
@ -242157,7 +242158,7 @@ CVE-2024-28248,0,0,b617812c524b85d27f2a46b3a739648463fa9ffb5a6e46ea47ba0c68bd3fa
CVE-2024-28249,0,0,7f01b3731d6ed3594265964b9061da88eb89dfe99b6d59bfec8413859c3ac454,2024-03-19T13:26:46
CVE-2024-28250,0,0,dacc68b6e843dc808e1d498d69054a425a6f10e258af235d9a1256f74372900d,2024-03-19T13:26:46
CVE-2024-28251,0,0,19fc23d56f5d00fa3c69d993b0deb280b2d4a1df9b73eb3d828c9ec8b6104ec4,2024-03-14T12:52:16.723000
CVE-2024-28252,0,0,ac84484303fc0c017048b9d298c82aac04da864eaa9b564555df184d62c4afa2,2024-03-17T22:38:29.433000
CVE-2024-28252,0,1,ef5b49a93a934440796c2d3d79cb29d26eeed77accae4ad9797588db77e6bd30,2024-03-21T20:15:08.050000
CVE-2024-28253,0,0,b0d1b906324ecf48e7bcfd3c9d0c313a69a8c6ff9baa313b92164ce1f64f0b92,2024-03-17T22:38:29.433000
CVE-2024-28254,0,0,ba6384e5d24a90ea0036dcbe7f89cd48d629aea12c2d3808708fa9f619d07a5b,2024-03-21T02:52:24.507000
CVE-2024-28255,0,0,abc37b2c1df4d41f872020a3754e2ae86c707a3247848b9d32abc1bd5f67bb13,2024-03-17T22:38:29.433000
@ -242195,11 +242196,11 @@ CVE-2024-28431,0,0,148c6be422e12f315897bdd57f5208c74e8137e452c7019eafe29f97f527c
CVE-2024-28432,0,0,4bc8c3df18623e8712ef966fb24c80f6754436b2eb6a0c14d5d3c56f5a161090,2024-03-13T14:28:45.217000
CVE-2024-28446,0,0,e3b0d814ee24ce9a2740eda808696f714c3071d6722fa7bd76f62923d12a194d,2024-03-19T13:26:46
CVE-2024-28447,0,0,729795bf39bd106c71b5b798b10fa8f526cc5d6a6eb2785b0edfa8459a535a4c,2024-03-19T13:26:46
CVE-2024-28535,0,0,05b59fc574e3ec1a67ffae1023c5999e94849ce19d6ee2f539dda71a994d8b6c,2024-03-12T16:02:33.900000
CVE-2024-28535,0,1,174c70ce71a26af929a40c7b6a103a5242ac3321f34f35a982d598e918b67152,2024-03-21T20:58:46.217000
CVE-2024-28537,0,0,ff6bf2a37289dca28bccb57e311acb6479e1a577841d298af6b3b484403dfc2c,2024-03-18T19:40:00.173000
CVE-2024-28547,0,0,a2de8a258b087cbf7c5442c921d96afce5895db417e9c628fe7656334d2bb7cc,2024-03-18T19:40:00.173000
CVE-2024-28550,0,0,55b413fc03c0e6dbaa5c4b6ccf0c8e244ea995bce860e043c8086ce78f470aae,2024-03-18T19:40:00.173000
CVE-2024-28553,0,0,805b633f3af1b0b015d2f8e90520174ed99391ad33f4ee744bfc3e783d7c9257,2024-03-12T16:02:33.900000
CVE-2024-28553,0,1,f74a5d2edd657e610cfc2b884ed1530d128afd106cc0a285c1f4868830f65cd2,2024-03-21T20:58:52.357000
CVE-2024-28562,0,0,91433a4c4f462713402770533ad7f25e56b67cc00fab70587df3692124b0273d,2024-03-20T13:00:16.367000
CVE-2024-28563,0,0,a656ef0aa8710291541ea7c711ec135274e970f2c247f821eefbeaee78f8b4d1,2024-03-20T13:00:16.367000
CVE-2024-28564,0,0,2abccbe60536fbfc04ad1cc3dd03bdffb43e6097953ebe8e099f5edfe9491595,2024-03-20T13:00:16.367000
@ -242333,9 +242334,10 @@ CVE-2024-29143,0,0,a3f92e2c9ae6aaf4168f841be16c13a544cace199faa049656661980aa53e
CVE-2024-29151,0,0,ef852a662e1eaee7e15d971ee7451f2c3e954b3d808a30cb9a36bbe68bb24c8f,2024-03-18T12:38:25.490000
CVE-2024-29154,0,0,dab131c9ff393e828252009730d8617a5e1a4fb5cfb7f2db054056bc6f27c2ba,2024-03-18T12:38:25.490000
CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2326,2024-03-18T12:38:25.490000
CVE-2024-29180,1,1,9b826c84b71b0bb4e6d83bccac4cac9e366568fb0ec59defe9778c2d6dfb3214,2024-03-21T17:15:09.690000
CVE-2024-29180,0,1,e32bebc90fbd05fe3a3edfae9506df906c8ca56e295fcb3cc3f3f384d12528c8,2024-03-21T19:47:03.943000
CVE-2024-29243,0,0,80b3eab65af2d9fbeb7b6048e074697688a19de63e1138c377d0b826523dd7db,2024-03-21T15:24:35.093000
CVE-2024-29244,0,0,ab4dadc4ff7b45a2c285edb922de956bae0828f007627c62339f15145e95a7b7,2024-03-21T15:24:35.093000
CVE-2024-29374,1,1,f8a146770d52182e0c10b15b21ebc5da7e22091690385e976078b28de6736be7,2024-03-21T19:47:03.943000
CVE-2024-29419,0,0,1f113c646466febbefbd1317ecc5036f9bdf6e219db156971cfdda70e05f32f0,2024-03-20T17:18:21.343000
CVE-2024-29469,0,0,acf93e04574e9669a29498319a75720c9b5a03ff4de2c06070b1f52ac9f365b7,2024-03-21T12:58:51.093000
CVE-2024-29470,0,0,ec8cc83a60b9ef7edaa49e0605acc097203825f31a2e1ca35494b606ac2473df,2024-03-21T12:58:51.093000
@ -242360,4 +242362,4 @@ CVE-2024-29877,0,0,5b6a7271e346dceec62c9141f9ae12b0e5342a31cc26366c653fe20c26c8b
CVE-2024-29878,0,0,59bd69937e12e8238cdc5eae96014d85a453bedc37861446ca2ffcb7373dda8d,2024-03-21T15:24:35.093000
CVE-2024-29879,0,0,f281e5565c18f62981e30c243c39ad05583d9bbab1631a620c93b3c78846e1db,2024-03-21T15:24:35.093000
CVE-2024-29880,0,0,e4ba47a3336aba44b26bc2b767c682c9997cfe6f0e16a9457e7fe50a3abeaa1c,2024-03-21T15:24:35.093000
CVE-2024-29916,1,1,c593638d593f32d48054769da500835bee87049ab2a9e191e4f3cba11e171290,2024-03-21T17:15:09.897000
CVE-2024-29916,0,1,dd300e18b662f862d3dd0881eace85d81be3f3aaeb79c908bcef100a80a89dd1,2024-03-21T19:47:03.943000

Can't render this file because it is too large.