From f8f94515cfac8cf119f78d241400166192d451a6 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 21 Mar 2024 21:03:19 +0000 Subject: [PATCH] Auto-Update: 2024-03-21T21:00:30.860215+00:00 --- CVE-2021/CVE-2021-12xx/CVE-2021-1262.json | 26 +++++++- CVE-2021/CVE-2021-15xx/CVE-2021-1513.json | 20 +++--- CVE-2021/CVE-2021-344xx/CVE-2021-34452.json | 12 ++-- CVE-2022/CVE-2022-445xx/CVE-2022-44595.json | 5 +- CVE-2023/CVE-2023-498xx/CVE-2023-49837.json | 5 +- CVE-2024/CVE-2024-13xx/CVE-2024-1394.json | 13 +++- CVE-2024/CVE-2024-17xx/CVE-2024-1727.json | 59 ++++++++++++++++++ CVE-2024/CVE-2024-25xx/CVE-2024-2578.json | 5 +- CVE-2024/CVE-2024-25xx/CVE-2024-2579.json | 5 +- CVE-2024/CVE-2024-25xx/CVE-2024-2580.json | 5 +- CVE-2024/CVE-2024-263xx/CVE-2024-26308.json | 13 ++-- CVE-2024/CVE-2024-271xx/CVE-2024-27190.json | 5 +- CVE-2024/CVE-2024-272xx/CVE-2024-27277.json | 5 +- CVE-2024/CVE-2024-279xx/CVE-2024-27956.json | 5 +- CVE-2024/CVE-2024-279xx/CVE-2024-27962.json | 5 +- CVE-2024/CVE-2024-279xx/CVE-2024-27963.json | 5 +- CVE-2024/CVE-2024-279xx/CVE-2024-27964.json | 5 +- CVE-2024/CVE-2024-279xx/CVE-2024-27965.json | 5 +- CVE-2024/CVE-2024-279xx/CVE-2024-27968.json | 5 +- CVE-2024/CVE-2024-282xx/CVE-2024-28252.json | 8 ++- CVE-2024/CVE-2024-285xx/CVE-2024-28535.json | 68 +++++++++++++++++++-- CVE-2024/CVE-2024-285xx/CVE-2024-28553.json | 68 +++++++++++++++++++-- CVE-2024/CVE-2024-291xx/CVE-2024-29180.json | 5 +- CVE-2024/CVE-2024-293xx/CVE-2024-29374.json | 20 ++++++ CVE-2024/CVE-2024-299xx/CVE-2024-29916.json | 5 +- README.md | 50 +++++++++------ _state.csv | 48 ++++++++------- 27 files changed, 355 insertions(+), 125 deletions(-) create mode 100644 CVE-2024/CVE-2024-17xx/CVE-2024-1727.json create mode 100644 CVE-2024/CVE-2024-293xx/CVE-2024-29374.json diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1262.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1262.json index 6fd9cafadb8..726499edbbf 100644 --- a/CVE-2021/CVE-2021-12xx/CVE-2021-1262.json +++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1262.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1262", "sourceIdentifier": "ykramarz@cisco.com", "published": "2021-01-20T20:15:14.970", - "lastModified": "2023-10-06T16:24:48.993", + "lastModified": "2024-03-21T20:02:29.753", "vulnStatus": "Analyzed", "descriptions": [ { @@ -117,8 +117,28 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:sd-wan_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "72C8224E-0856-4477-8DCB-73B6ABA6D361" + "criteria": "cpe:2.3:o:cisco:sd-wan_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.2.4", + "matchCriteriaId": "31234E6E-6B7F-4B47-9A77-4264C8356C43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:sd-wan_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "19.3", + "versionEndExcluding": "20.1.2", + "matchCriteriaId": "FCC94E19-7E34-4260-BA2F-0CD8A70BA1A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:sd-wan_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "20.3", + "versionEndExcluding": "20.3.2", + "matchCriteriaId": "34133B76-199A-4E35-838B-E533137B7990" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:sd-wan_firmware:20.4:*:*:*:*:*:*:*", + "matchCriteriaId": "53C982CE-0B5B-4A3E-BCBF-FE64BC899DFE" }, { "vulnerable": true, diff --git a/CVE-2021/CVE-2021-15xx/CVE-2021-1513.json b/CVE-2021/CVE-2021-15xx/CVE-2021-1513.json index 1cad13f3087..ac2f7088a37 100644 --- a/CVE-2021/CVE-2021-15xx/CVE-2021-1513.json +++ b/CVE-2021/CVE-2021-15xx/CVE-2021-1513.json @@ -2,8 +2,8 @@ "id": "CVE-2021-1513", "sourceIdentifier": "ykramarz@cisco.com", "published": "2021-05-06T13:15:10.850", - "lastModified": "2023-11-07T03:28:29.327", - "vulnStatus": "Modified", + "lastModified": "2024-03-21T20:02:24.913", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -37,7 +37,7 @@ "impactScore": 3.6 }, { - "source": "d1c1063e-7a18-46af-9102-31f8928bc633", + "source": "ykramarz@cisco.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -95,7 +95,7 @@ ] }, { - "source": "d1c1063e-7a18-46af-9102-31f8928bc633", + "source": "ykramarz@cisco.com", "type": "Secondary", "description": [ { @@ -112,6 +112,12 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "20.3.1", + "matchCriteriaId": "8782BEB0-5880-4DF8-A0E3-A8F45437E121" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*", @@ -130,12 +136,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:-:*:*:*:*:*:*:*", "matchCriteriaId": "05AFD69C-BB2C-43E0-89CF-FDA00B8F4CB5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*", - "versionEndExcluding": "20.3.1", - "matchCriteriaId": "E6F0246B-3913-42E8-85D8-9FD746D0E1AF" } ] } diff --git a/CVE-2021/CVE-2021-344xx/CVE-2021-34452.json b/CVE-2021/CVE-2021-344xx/CVE-2021-34452.json index 0518c969539..e9c3035e13f 100644 --- a/CVE-2021/CVE-2021-344xx/CVE-2021-34452.json +++ b/CVE-2021/CVE-2021-344xx/CVE-2021-34452.json @@ -2,8 +2,8 @@ "id": "CVE-2021-34452", "sourceIdentifier": "secure@microsoft.com", "published": "2021-07-16T21:15:09.710", - "lastModified": "2023-12-28T23:15:28.560", - "vulnStatus": "Modified", + "lastModified": "2024-03-21T20:02:17.453", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -109,13 +109,13 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*", - "matchCriteriaId": "4DA042D4-B14E-4DDF-8423-DFB255679EFE" + "criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*", + "matchCriteriaId": "FF177984-A906-43FA-BF60-298133FBBD6B" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:word:2019:*:*:*:*:*:*:*", - "matchCriteriaId": "AEDE27C4-A2A6-426A-9E77-2471BC10DB35" + "criteria": "cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*", + "matchCriteriaId": "4DA042D4-B14E-4DDF-8423-DFB255679EFE" } ] } diff --git a/CVE-2022/CVE-2022-445xx/CVE-2022-44595.json b/CVE-2022/CVE-2022-445xx/CVE-2022-44595.json index a31137befb3..e7333efde02 100644 --- a/CVE-2022/CVE-2022-445xx/CVE-2022-44595.json +++ b/CVE-2022/CVE-2022-445xx/CVE-2022-44595.json @@ -2,9 +2,8 @@ "id": "CVE-2022-44595", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-21T17:15:07.600", - "lastModified": "2024-03-21T17:15:07.600", - "vulnStatus": "Received", - "cveTags": [], + "lastModified": "2024-03-21T19:47:03.943", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49837.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49837.json index 8182440805e..8ad2ce5c2b9 100644 --- a/CVE-2023/CVE-2023-498xx/CVE-2023-49837.json +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49837.json @@ -2,9 +2,8 @@ "id": "CVE-2023-49837", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-21T17:15:07.917", - "lastModified": "2024-03-21T17:15:07.917", - "vulnStatus": "Received", - "cveTags": [], + "lastModified": "2024-03-21T19:47:03.943", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1394.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1394.json index b5584687ad3..61e3aba1de1 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1394.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1394.json @@ -2,13 +2,12 @@ "id": "CVE-2024-1394", "sourceIdentifier": "secalert@redhat.com", "published": "2024-03-21T13:00:08.037", - "lastModified": "2024-03-21T15:24:35.093", + "lastModified": "2024-03-21T19:15:09.063", "vulnStatus": "Awaiting Analysis", - "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs?. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey? and ctx?. That function uses named return parameters to free pkey? and ctx? if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the \"return nil, nil, fail(...)\" pattern, meaning that pkey? and ctx? will be nil inside the deferred function that should free them." + "value": "A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs\u200b. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey\u200b and ctx\u200b. That function uses named return parameters to free pkey\u200b and ctx\u200b if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the \"return nil, nil, fail(...)\" pattern, meaning that pkey\u200b and ctx\u200b will be nil inside the deferred function that should free them." } ], "metrics": { @@ -52,6 +51,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:1462", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:1468", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:1472", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-1394", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1727.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1727.json new file mode 100644 index 00000000000..96010303c93 --- /dev/null +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1727.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-1727", + "sourceIdentifier": "security@huntr.dev", + "published": "2024-03-21T20:15:07.620", + "lastModified": "2024-03-21T20:15:07.620", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "To prevent malicious 3rd party websites from making requests to Gradio applications running locally, this PR tightens the CORS rules around Gradio applications. In particular, it checks to see if the host header is localhost (or one of its aliases) and if so, it requires the origin header (if present) to be localhost (or one of its aliases) as well.\n\n" + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/gradio-app/gradio/commit/84802ee6a4806c25287344dce581f9548a99834a", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/a94d55fb-0770-4cbe-9b20-97a978a2ffff", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2578.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2578.json index 5ce25f4de3d..34ceb037cbc 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2578.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2578.json @@ -2,9 +2,8 @@ "id": "CVE-2024-2578", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-21T17:15:09.960", - "lastModified": "2024-03-21T17:15:09.960", - "vulnStatus": "Received", - "cveTags": [], + "lastModified": "2024-03-21T19:47:03.943", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2579.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2579.json index 94d92557e01..88defe36e77 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2579.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2579.json @@ -2,9 +2,8 @@ "id": "CVE-2024-2579", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-21T17:15:10.150", - "lastModified": "2024-03-21T17:15:10.150", - "vulnStatus": "Received", - "cveTags": [], + "lastModified": "2024-03-21T19:47:03.943", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2580.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2580.json index 8a348888fd8..7f82d69d91a 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2580.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2580.json @@ -2,9 +2,8 @@ "id": "CVE-2024-2580", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-21T17:15:10.357", - "lastModified": "2024-03-21T17:15:10.357", - "vulnStatus": "Received", - "cveTags": [], + "lastModified": "2024-03-21T19:47:03.943", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-263xx/CVE-2024-26308.json b/CVE-2024/CVE-2024-263xx/CVE-2024-26308.json index cce7106c219..fc5c7514a07 100644 --- a/CVE-2024/CVE-2024-263xx/CVE-2024-26308.json +++ b/CVE-2024/CVE-2024-263xx/CVE-2024-26308.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26308", "sourceIdentifier": "security@apache.org", "published": "2024-02-19T09:15:38.277", - "lastModified": "2024-03-07T17:15:13.050", - "vulnStatus": "Modified", + "lastModified": "2024-03-21T19:54:03.230", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -60,9 +60,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:apache:commons_compress:*:*:*:*:*:*:*:*", - "versionStartIncluding": "1.21.0", + "versionStartIncluding": "1.21", "versionEndExcluding": "1.26.0", - "matchCriteriaId": "05574FCF-DB85-41AE-A8EF-4AC589755667" + "matchCriteriaId": "D8C5F6D4-AAD9-4029-B819-01DB81C18DA1" } ] } @@ -87,7 +87,10 @@ }, { "url": "https://security.netapp.com/advisory/ntap-20240307-0009/", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27190.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27190.json index d25626b2e89..e5c84b8027a 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27190.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27190.json @@ -2,9 +2,8 @@ "id": "CVE-2024-27190", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-21T17:15:08.010", - "lastModified": "2024-03-21T17:15:08.010", - "vulnStatus": "Received", - "cveTags": [], + "lastModified": "2024-03-21T19:47:03.943", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27277.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27277.json index a6532de97e9..b6aa27e57c3 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27277.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27277.json @@ -2,9 +2,8 @@ "id": "CVE-2024-27277", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-03-21T17:15:08.230", - "lastModified": "2024-03-21T17:15:08.230", - "vulnStatus": "Received", - "cveTags": [], + "lastModified": "2024-03-21T19:47:03.943", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27956.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27956.json index 8617accaedc..910a9a0b9b9 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27956.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27956.json @@ -2,9 +2,8 @@ "id": "CVE-2024-27956", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-21T17:15:08.437", - "lastModified": "2024-03-21T17:15:08.437", - "vulnStatus": "Received", - "cveTags": [], + "lastModified": "2024-03-21T19:47:03.943", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27962.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27962.json index c0bbb4ce6a7..dd1b7e0171a 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27962.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27962.json @@ -2,9 +2,8 @@ "id": "CVE-2024-27962", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-21T17:15:08.637", - "lastModified": "2024-03-21T17:15:08.637", - "vulnStatus": "Received", - "cveTags": [], + "lastModified": "2024-03-21T19:47:03.943", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27963.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27963.json index 287bbba9653..51579a44d86 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27963.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27963.json @@ -2,9 +2,8 @@ "id": "CVE-2024-27963", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-21T17:15:08.850", - "lastModified": "2024-03-21T17:15:08.850", - "vulnStatus": "Received", - "cveTags": [], + "lastModified": "2024-03-21T19:47:03.943", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27964.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27964.json index 474d633879b..5ed7e451fb4 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27964.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27964.json @@ -2,9 +2,8 @@ "id": "CVE-2024-27964", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-21T17:15:09.060", - "lastModified": "2024-03-21T17:15:09.060", - "vulnStatus": "Received", - "cveTags": [], + "lastModified": "2024-03-21T19:47:03.943", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27965.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27965.json index e72049b3826..ea0d5c7a5af 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27965.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27965.json @@ -2,9 +2,8 @@ "id": "CVE-2024-27965", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-21T17:15:09.277", - "lastModified": "2024-03-21T17:15:09.277", - "vulnStatus": "Received", - "cveTags": [], + "lastModified": "2024-03-21T19:47:03.943", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27968.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27968.json index 411a2c26d94..9bb9e15dd8d 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27968.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27968.json @@ -2,9 +2,8 @@ "id": "CVE-2024-27968", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-21T17:15:09.487", - "lastModified": "2024-03-21T17:15:09.487", - "vulnStatus": "Received", - "cveTags": [], + "lastModified": "2024-03-21T19:47:03.943", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-282xx/CVE-2024-28252.json b/CVE-2024/CVE-2024-282xx/CVE-2024-28252.json index a7a9928ad47..df8723af4fa 100644 --- a/CVE-2024/CVE-2024-282xx/CVE-2024-28252.json +++ b/CVE-2024/CVE-2024-282xx/CVE-2024-28252.json @@ -2,12 +2,16 @@ "id": "CVE-2024-28252", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-15T19:15:07.210", - "lastModified": "2024-03-17T22:38:29.433", + "lastModified": "2024-03-21T20:15:08.050", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "CoreWCF is a port of the service side of Windows Communication Foundation (WCF) to .NET Core. If you have a NetFraming based CoreWCF service, extra system resources could be consumed by connections being left established instead of closing or aborting them. There are two scenarios when this can happen. When a client established a connection to the service and sends no data, the service will wait indefinitely for the client to initiate the NetFraming session handshake. Additionally, once a client has established a session, if the client doesn't send any requests for the period of time configured in the binding ReceiveTimeout, the connection is not properly closed as part of the session being aborted. The bindings affected by this behavior are NetTcpBinding, NetNamedPipeBinding, and UnixDomainSocketBinding. Only NetTcpBinding has the ability to accept non local connections. The currently supported versions of CoreWCF are v1.4.x and v1.5.x. The fix can be found in v1.4.2 and v1.5.3 of the CoreWCF packages. Users are advised to upgrade. There are no workarounds for this issue.\n" + "value": "CoreWCF is a port of the service side of Windows Communication Foundation (WCF) to .NET Core. If you have a NetFraming based CoreWCF service, extra system resources could be consumed by connections being left established instead of closing or aborting them. There are two scenarios when this can happen. When a client established a connection to the service and sends no data, the service will wait indefinitely for the client to initiate the NetFraming session handshake. Additionally, once a client has established a session, if the client doesn't send any requests for the period of time configured in the binding ReceiveTimeout, the connection is not properly closed as part of the session being aborted. The bindings affected by this behavior are NetTcpBinding, NetNamedPipeBinding, and UnixDomainSocketBinding. Only NetTcpBinding has the ability to accept non local connections. The currently supported versions of CoreWCF are v1.4.x and v1.5.x. The fix can be found in v1.4.2 and v1.5.2 of the CoreWCF packages. Users are advised to upgrade. There are no workarounds for this issue.\n" + }, + { + "lang": "es", + "value": "CoreWCF es una adaptaci\u00f3n del lado de servicio de Windows Communication Foundation (WCF) a .NET Core. Si tiene un servicio CoreWCF basado en NetFraming, se podr\u00edan consumir recursos adicionales del sistema si las conexiones se dejan establecidas en lugar de cerrarlas o cancelarlas. Hay dos escenarios en los que esto puede suceder. Cuando un cliente establece una conexi\u00f3n con el servicio y no env\u00eda datos, el servicio esperar\u00e1 indefinidamente a que el cliente inicie el protocolo de enlace de sesi\u00f3n de NetFraming. Adem\u00e1s, una vez que un cliente ha establecido una sesi\u00f3n, si el cliente no env\u00eda ninguna solicitud durante el per\u00edodo de tiempo configurado en el enlace ReceiverTimeout, la conexi\u00f3n no se cierra correctamente como parte del aborto de la sesi\u00f3n. Los enlaces afectados por este comportamiento son NetTcpBinding, NetNamedPipeBinding y UnixDomainSocketBinding. S\u00f3lo NetTcpBinding tiene la capacidad de aceptar conexiones no locales. Las versiones actualmente compatibles de CoreWCF son v1.4.x y v1.5.x. La soluci\u00f3n se puede encontrar en v1.4.2 y v1.5.3 de los paquetes CoreWCF. Se recomienda a los usuarios que actualicen. No existen workarounds para este problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28535.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28535.json index d4d1238c9e0..f86c1686513 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28535.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28535.json @@ -2,19 +2,79 @@ "id": "CVE-2024-28535", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-12T13:15:49.690", - "lastModified": "2024-03-12T16:02:33.900", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-03-21T20:58:46.217", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Tenda AC18 V15.03.05.05 has a stack overflow vulnerability in the mitInterface parameter of fromAddressNat function." + }, + { + "lang": "es", + "value": "Tenda AC18 V15.03.05.05 tiene una vulnerabilidad de desbordamiento de pila en el par\u00e1metro mitInterface de la funci\u00f3n fromAddressNat." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac18_firmware:15.03.05.05:*:*:*:*:*:*:*", + "matchCriteriaId": "4D5CB727-FC6B-4212-A61E-2888A0DADFB0" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromAddressNat_mitInterface.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28553.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28553.json index 5435b2f6413..80634848de1 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28553.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28553.json @@ -2,19 +2,79 @@ "id": "CVE-2024-28553", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-12T13:15:49.763", - "lastModified": "2024-03-12T16:02:33.900", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-03-21T20:58:52.357", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Tenda AC18 V15.03.05.05 has a stack overflow vulnerability in the entrys parameter fromAddressNat function." + }, + { + "lang": "es", + "value": "Tenda AC18 V15.03.05.05 tiene una vulnerabilidad de desbordamiento de pila en el par\u00e1metro de entradas de la funci\u00f3n AddressNat." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac18_firmware:15.03.05.05:*:*:*:*:*:*:*", + "matchCriteriaId": "4D5CB727-FC6B-4212-A61E-2888A0DADFB0" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromAddressNat_entrys.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29180.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29180.json index 55576977bc6..d2d5c55728a 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29180.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29180.json @@ -2,9 +2,8 @@ "id": "CVE-2024-29180", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-21T17:15:09.690", - "lastModified": "2024-03-21T17:15:09.690", - "vulnStatus": "Received", - "cveTags": [], + "lastModified": "2024-03-21T19:47:03.943", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-293xx/CVE-2024-29374.json b/CVE-2024/CVE-2024-293xx/CVE-2024-29374.json new file mode 100644 index 00000000000..7760a9d240b --- /dev/null +++ b/CVE-2024/CVE-2024-293xx/CVE-2024-29374.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-29374", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-21T19:15:09.377", + "lastModified": "2024-03-21T19:47:03.943", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A Cross-Site Scripting (XSS) vulnerability exists in the way MOODLE 3.10.9 handles user input within the \"GET /?lang=\" URL parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/fir3storm/f9c7f3ec1a6496498517ed216d2640b2", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29916.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29916.json index 5aac9d585f7..50de7b13d72 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29916.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29916.json @@ -2,9 +2,8 @@ "id": "CVE-2024-29916", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-21T17:15:09.897", - "lastModified": "2024-03-21T17:15:09.897", - "vulnStatus": "Received", - "cveTags": [], + "lastModified": "2024-03-21T19:47:03.943", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index a6626dee785..4c64ff74ff7 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-03-21T19:01:45.167107+00:00 +2024-03-21T21:00:30.860215+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-03-21T17:15:10.357000+00:00 +2024-03-21T20:58:52.357000+00:00 ``` ### Last Data Feed Release @@ -29,34 +29,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -242362 +242364 ``` ### CVEs added in the last Commit -Recently added CVEs: `15` +Recently added CVEs: `2` -* [CVE-2022-44595](CVE-2022/CVE-2022-445xx/CVE-2022-44595.json) (`2024-03-21T17:15:07.600`) -* [CVE-2023-49837](CVE-2023/CVE-2023-498xx/CVE-2023-49837.json) (`2024-03-21T17:15:07.917`) -* [CVE-2024-2578](CVE-2024/CVE-2024-25xx/CVE-2024-2578.json) (`2024-03-21T17:15:09.960`) -* [CVE-2024-2579](CVE-2024/CVE-2024-25xx/CVE-2024-2579.json) (`2024-03-21T17:15:10.150`) -* [CVE-2024-2580](CVE-2024/CVE-2024-25xx/CVE-2024-2580.json) (`2024-03-21T17:15:10.357`) -* [CVE-2024-27190](CVE-2024/CVE-2024-271xx/CVE-2024-27190.json) (`2024-03-21T17:15:08.010`) -* [CVE-2024-27277](CVE-2024/CVE-2024-272xx/CVE-2024-27277.json) (`2024-03-21T17:15:08.230`) -* [CVE-2024-27956](CVE-2024/CVE-2024-279xx/CVE-2024-27956.json) (`2024-03-21T17:15:08.437`) -* [CVE-2024-27962](CVE-2024/CVE-2024-279xx/CVE-2024-27962.json) (`2024-03-21T17:15:08.637`) -* [CVE-2024-27963](CVE-2024/CVE-2024-279xx/CVE-2024-27963.json) (`2024-03-21T17:15:08.850`) -* [CVE-2024-27964](CVE-2024/CVE-2024-279xx/CVE-2024-27964.json) (`2024-03-21T17:15:09.060`) -* [CVE-2024-27965](CVE-2024/CVE-2024-279xx/CVE-2024-27965.json) (`2024-03-21T17:15:09.277`) -* [CVE-2024-27968](CVE-2024/CVE-2024-279xx/CVE-2024-27968.json) (`2024-03-21T17:15:09.487`) -* [CVE-2024-29180](CVE-2024/CVE-2024-291xx/CVE-2024-29180.json) (`2024-03-21T17:15:09.690`) -* [CVE-2024-29916](CVE-2024/CVE-2024-299xx/CVE-2024-29916.json) (`2024-03-21T17:15:09.897`) +* [CVE-2024-1727](CVE-2024/CVE-2024-17xx/CVE-2024-1727.json) (`2024-03-21T20:15:07.620`) +* [CVE-2024-29374](CVE-2024/CVE-2024-293xx/CVE-2024-29374.json) (`2024-03-21T19:15:09.377`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `23` +* [CVE-2021-1262](CVE-2021/CVE-2021-12xx/CVE-2021-1262.json) (`2024-03-21T20:02:29.753`) +* [CVE-2021-1513](CVE-2021/CVE-2021-15xx/CVE-2021-1513.json) (`2024-03-21T20:02:24.913`) +* [CVE-2021-34452](CVE-2021/CVE-2021-344xx/CVE-2021-34452.json) (`2024-03-21T20:02:17.453`) +* [CVE-2022-44595](CVE-2022/CVE-2022-445xx/CVE-2022-44595.json) (`2024-03-21T19:47:03.943`) +* [CVE-2023-49837](CVE-2023/CVE-2023-498xx/CVE-2023-49837.json) (`2024-03-21T19:47:03.943`) +* [CVE-2024-1394](CVE-2024/CVE-2024-13xx/CVE-2024-1394.json) (`2024-03-21T19:15:09.063`) +* [CVE-2024-2578](CVE-2024/CVE-2024-25xx/CVE-2024-2578.json) (`2024-03-21T19:47:03.943`) +* [CVE-2024-2579](CVE-2024/CVE-2024-25xx/CVE-2024-2579.json) (`2024-03-21T19:47:03.943`) +* [CVE-2024-2580](CVE-2024/CVE-2024-25xx/CVE-2024-2580.json) (`2024-03-21T19:47:03.943`) +* [CVE-2024-26308](CVE-2024/CVE-2024-263xx/CVE-2024-26308.json) (`2024-03-21T19:54:03.230`) +* [CVE-2024-27190](CVE-2024/CVE-2024-271xx/CVE-2024-27190.json) (`2024-03-21T19:47:03.943`) +* [CVE-2024-27277](CVE-2024/CVE-2024-272xx/CVE-2024-27277.json) (`2024-03-21T19:47:03.943`) +* [CVE-2024-27956](CVE-2024/CVE-2024-279xx/CVE-2024-27956.json) (`2024-03-21T19:47:03.943`) +* [CVE-2024-27962](CVE-2024/CVE-2024-279xx/CVE-2024-27962.json) (`2024-03-21T19:47:03.943`) +* [CVE-2024-27963](CVE-2024/CVE-2024-279xx/CVE-2024-27963.json) (`2024-03-21T19:47:03.943`) +* [CVE-2024-27964](CVE-2024/CVE-2024-279xx/CVE-2024-27964.json) (`2024-03-21T19:47:03.943`) +* [CVE-2024-27965](CVE-2024/CVE-2024-279xx/CVE-2024-27965.json) (`2024-03-21T19:47:03.943`) +* [CVE-2024-27968](CVE-2024/CVE-2024-279xx/CVE-2024-27968.json) (`2024-03-21T19:47:03.943`) +* [CVE-2024-28252](CVE-2024/CVE-2024-282xx/CVE-2024-28252.json) (`2024-03-21T20:15:08.050`) +* [CVE-2024-28535](CVE-2024/CVE-2024-285xx/CVE-2024-28535.json) (`2024-03-21T20:58:46.217`) +* [CVE-2024-28553](CVE-2024/CVE-2024-285xx/CVE-2024-28553.json) (`2024-03-21T20:58:52.357`) +* [CVE-2024-29180](CVE-2024/CVE-2024-291xx/CVE-2024-29180.json) (`2024-03-21T19:47:03.943`) +* [CVE-2024-29916](CVE-2024/CVE-2024-299xx/CVE-2024-29916.json) (`2024-03-21T19:47:03.943`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 2655539ed3e..8b527a82de3 100644 --- a/_state.csv +++ b/_state.csv @@ -165559,7 +165559,7 @@ CVE-2021-1258,0,0,d82f969dd17a5f3e524dde57860640835b4905edecd5741b078ad84534dab3 CVE-2021-1259,0,0,86531ec5550e6433a46b99fb6d5bcd5925dbbdba36287f07609b01bda56864ca,2021-01-29T15:15:23.147000 CVE-2021-1260,0,0,e0a128c880244e947036b72a88f6608409f654ea2383b7f657439480f4add5e0,2023-10-06T16:24:48.993000 CVE-2021-1261,0,0,22c0ca0c0b5235b43b736d4096137afa27d44452ab54e4d1dab67ebb5af5720b,2023-10-06T16:24:48.993000 -CVE-2021-1262,0,0,ef7809d6c64ae152c6077f282400a35cc5959b941db6a9c1c36e64c4bc4f3678,2023-10-06T16:24:48.993000 +CVE-2021-1262,0,1,2027020efb31a45ccae93610730595f2a2566a853fd41b2f4858f48375d4988c,2024-03-21T20:02:29.753000 CVE-2021-1263,0,0,4d45bea273c6e884177db62427337cdba8f80b38b26845af660d0d1789b1234f,2023-10-06T16:24:48.993000 CVE-2021-1264,0,0,81dee8876bb986a4e952a03935bd850b263032e2b547b9deacbe69c2ec8035c7,2023-11-07T03:27:49.183000 CVE-2021-1265,0,0,17a5f7ace4ccaca3dcf0661bf9760d365aaec23c6a53804524a3d586a17e43fc,2021-01-27T16:50:57.907000 @@ -165791,7 +165791,7 @@ CVE-2021-1509,0,0,d7c71f1ff07c1b27324eabc6b9d1a6fbcbda43f97498e911954c3001754a12 CVE-2021-1510,0,0,2f58f05cc4ff52f87d306aef8bc3a557aaf35d7a662a15484ffc84e5b6934c1c,2023-11-07T03:28:28.943000 CVE-2021-1511,0,0,aeefe7aba6f9c34abab2d952a73403182e551eccc92674708ff7ce2e21c0f45e,2023-11-07T03:28:29.133000 CVE-2021-1512,0,0,d1a586e26565035cda4fcdffed8eb0875987f0590191ac617865b1a21c37f3a4,2023-10-16T16:35:25.220000 -CVE-2021-1513,0,0,f99c33fb4d8331a13f8e31a6baa3ba657826073a7b7e1d428ef074716043a2a2,2023-11-07T03:28:29.327000 +CVE-2021-1513,0,1,a25a72c26181f8fcbf0e33ec57924341e0321a71266ff29164cc87d405dbc811,2024-03-21T20:02:24.913000 CVE-2021-1514,0,0,166408dda482a95a3a4ae776cae748fec8ae0d6b29c3957ccdc7b2a10f62bd96,2023-10-16T16:35:25.220000 CVE-2021-1515,0,0,253ce2bc5373e3293a647b374083917e36279af569fd90975a8c1532c1f055e0,2023-11-07T03:28:29.533000 CVE-2021-1516,0,0,6cc3a90009fb0506c584e09732edd1f63833843c653985397edf96a1a45e75e0,2023-11-07T03:28:29.697000 @@ -177528,7 +177528,7 @@ CVE-2021-34449,0,0,06602504c62be8f7c935030bea3d43a76bd231bcc6562014ab1969fb30782 CVE-2021-3445,0,0,8326494930b3f9272a5d8cd4b20ff9f890de64bd49463e9c8e25e5f9e2931b60,2023-11-07T03:38:00.453000 CVE-2021-34450,0,0,334a2ffa2eaaa26e8560ce439661f9c6b84b7e0ab039d5a580e2fd6e4be420fe,2023-12-28T23:15:28.100000 CVE-2021-34451,0,0,5671a1bcbcdeba6d0e8fed6ef4bc65187dc6749bd883cacb387b5a5293e87d22,2023-12-28T23:15:28.327000 -CVE-2021-34452,0,0,29bc7f8bedb1a2ace0c6f5336cf78820c4ae429897bb1abafc9b4b1ef8a03bfe,2023-12-28T23:15:28.560000 +CVE-2021-34452,0,1,3ac14191585a0bf73f46587a035f3eeaee23a188c7eed305de107944cb616e82,2024-03-21T20:02:17.453000 CVE-2021-34453,0,0,a1235b920860a9483cd53339ebc839647ae1115c38baa50c187aece5bbbb241b,2023-08-01T23:15:16.173000 CVE-2021-34454,0,0,78ff2f699dd5f4805aa53889d7c557dce2028518698297993c91bddae55e2c44,2023-12-28T23:15:28.783000 CVE-2021-34455,0,0,e4116877d5ca41f8e5bd3999b1f5c62630dd6589628f6d82e4bd4a7375a4ea19,2023-12-28T23:15:29 @@ -208693,7 +208693,7 @@ CVE-2022-4459,0,0,841d23cd2517ff134527c70acbac864bd1798efca5741cdb40fc1b914c6b61 CVE-2022-44590,0,0,34e1f96684be246af4d115d74d6ad86d1677f25db158e219a386c9a7b2c1f0fd,2022-11-10T19:23:14.800000 CVE-2022-44591,0,0,8de73acec656de193157bdf7e48ae245affcf919e7ad24e4c08dfb89e483fd5f,2022-11-18T19:28:56.420000 CVE-2022-44594,0,0,b7dc479f0e8562d2f1e10e9b8c859c387aa51f72d918e1c729d08c2404508fbd,2023-04-28T03:44:57.940000 -CVE-2022-44595,1,1,09b5f369e30c5041fd5979f684fca6aa6537f237f831fa4aa47a58da72638ba4,2024-03-21T17:15:07.600000 +CVE-2022-44595,0,1,00f838a23a694da460800d3c10ececb250288d2ecf59a66ab6ab9d3bc830695e,2024-03-21T19:47:03.943000 CVE-2022-4460,0,0,549234db110e5b693f52fad78d6358b8e08ccb9d9c9d7ca9e6118d72a7d6c30e,2023-11-07T03:57:52.710000 CVE-2022-44606,0,0,dd9357b8301dbd8c44e690a2844baf8bea2bcc5c8cc5dc8addb6ac09082694a0,2022-12-09T21:18:22.850000 CVE-2022-44608,0,0,f6323b139a76646c7c7a6763944abd4b79185adca516d6c4f40e939231a6cbf5,2022-12-09T00:49:39.090000 @@ -234617,7 +234617,7 @@ CVE-2023-49830,0,0,95c8e8a920bc6a550dd8fced96adfc49615ef3b8f6aec68dfdcf2d26ab1f8 CVE-2023-49833,0,0,75834fff665b59f3c4fb0b4b03558d32fc91b3efab25cbdeefafb0192b012059,2023-12-18T19:14:15.050000 CVE-2023-49834,0,0,f01e2730dc0b95d1b7f32c812dba24237147f33301308210a31bf1cc47cc7d0b,2023-12-20T04:26:25.007000 CVE-2023-49836,0,0,d1eaaf088ac1e6696c52a64c2e3dbfdfe00102afdcfa4bf3951b57aa3483333c,2023-12-18T18:19:51.903000 -CVE-2023-49837,1,1,62913893571245a46489800f1ba9f47dd069a099b1d9789daeaf013eabdd5c7c,2024-03-21T17:15:07.917000 +CVE-2023-49837,0,1,efabe1e704e190a47962d97e791147336566f4b472138d57ed70012cd72df24c,2024-03-21T19:47:03.943000 CVE-2023-4984,0,0,b568e92dbfdfa933d741a561994c5a187fe494f7ce09795a2b3a70d20f02c757,2024-03-21T02:49:56.543000 CVE-2023-49840,0,0,3007b22f6bc63fefba1a05b48a48deee17ae057500c4d492f77e27d9c865a34d,2023-12-20T04:28:39.197000 CVE-2023-49841,0,0,ad3a17229bd01d0c2bf491b86a58b899c006843c79bea01aae5bd3ff930dd743,2023-12-18T19:03:16.533000 @@ -238777,7 +238777,7 @@ CVE-2024-1390,0,0,760bcdaac2db269a3249aaa20e58e1659b2977bdb995748ef5e46a1ecb8544 CVE-2024-1391,0,0,d263861df201411e95604a0f8dea4a32aa5aa465f14e9d3ee26c7cf1dddcea30,2024-03-13T18:15:58.530000 CVE-2024-1392,0,0,854e6aa0a85eb7f6e01984f9f2b39f09c3e464c67a90f670cafc735773e56736,2024-03-13T18:15:58.530000 CVE-2024-1393,0,0,139d32a27df25f29abc2bcda3159db69b338e05c68d7680abed80afd815e8ff5,2024-03-13T18:15:58.530000 -CVE-2024-1394,0,0,294b053d2ffc51433a2d64e8d98c3ac8a415fb04eaae593428f7a34b72b8edc5,2024-03-21T15:24:35.093000 +CVE-2024-1394,0,1,7c73506bdd53fd1dc2a1d94144983d2673f2dc3fe5d07e0b6a723a3ea487359f,2024-03-21T19:15:09.063000 CVE-2024-1397,0,0,e6d8c9c2beca75d3fdc5f918cb423cf21913a9c807f46126d5b49c29c7bd60f0,2024-03-13T12:33:51.697000 CVE-2024-1398,0,0,7a7783e481aa897afa83bd125da0d53c431d5a5a9d43f1ade8b1e715449f59a0,2024-03-04T13:58:23.447000 CVE-2024-1400,0,0,295a10f36c3e13d694d09cafc6872c0c48f9e2b4c87da0889327ecdac7abe4ac,2024-03-12T12:40:13.500000 @@ -238965,6 +238965,7 @@ CVE-2024-1720,0,0,3f534b1db2e7b75966562da6fb1d468afac7b86b23a312961b1d896997e21d CVE-2024-1722,0,0,bbfa2fe804b85c8f73b8225a9811c290a6a29ddc6e06b05c51fd071f985f9060,2024-02-29T13:49:29.390000 CVE-2024-1723,0,0,7e337e59dda9fcfb03cb2d0ee4f7926bbc1a4aeb3afb375b3ac4508c9e5d97e9,2024-03-13T18:15:58.530000 CVE-2024-1725,0,0,ee1fb8cd83e91b3cc554ef61ba8506273bf384217121fa2160f3c7c69e57a993,2024-03-08T14:02:57.420000 +CVE-2024-1727,1,1,a5fa7c92f81c10c1ceddf980b8b24e0215a1f2778b409140ec0db41816e38d59,2024-03-21T20:15:07.620000 CVE-2024-1731,0,0,a54dfdadfcd6666506c62883f073482e904182fadeecad8ff7a349f271e0661b,2024-03-05T13:41:01.900000 CVE-2024-1733,0,0,d9cf8004467e67497b484a605a620c0a0db32312b35f534ec3be854a6ce160fc,2024-03-17T22:38:29.433000 CVE-2024-1735,0,0,fef99247045161df3b08e17c74949b5db371420b96202703c89efa90d1969060,2024-02-26T16:32:25.577000 @@ -241406,9 +241407,9 @@ CVE-2024-25767,0,0,5e5d85efb5a949e2d407dc5470a1026f931741e6d3d19a638a7a6f425b54d CVE-2024-25768,0,0,80ced9e42f994d6a00a0057cb00581829176f61a4dfa1e97abbae3afb8561c8a,2024-02-26T22:10:40.463000 CVE-2024-2577,0,0,c843620e43b4656c06ef8ee9254a21713fc5cfa1bda4a16ceabcb16830382f60,2024-03-21T02:52:39.510000 CVE-2024-25770,0,0,d105bd95abb6afbf92cef5c1765f81d4416c38d2a6067fe6216eb1ee17388748,2024-02-26T22:10:40.463000 -CVE-2024-2578,1,1,5fb7a6ff438d59dec3fa95e3e0691e9b82eb399464e626c191faeebf2e14002b,2024-03-21T17:15:09.960000 -CVE-2024-2579,1,1,34db16e32c53928e8f66e886a8a5a35582a050b7263fd19c5439041e8f97e239,2024-03-21T17:15:10.150000 -CVE-2024-2580,1,1,9619a5906517ac4b75a00fb98804d3bf72ad790c19614edcb13cd58567dc2cf9,2024-03-21T17:15:10.357000 +CVE-2024-2578,0,1,8067579b1ebf336ee1daf98516c926ae1ffceb32460cd545b41c51aab9076f37,2024-03-21T19:47:03.943000 +CVE-2024-2579,0,1,82ab7736c7cd2bae37cca14333922f5ac036820dddbd265831a9ea551e48aa62,2024-03-21T19:47:03.943000 +CVE-2024-2580,0,1,17c770530b9c88c0a0bc27203561d8211df9836f86fe3343fde81a78a162c0d5,2024-03-21T19:47:03.943000 CVE-2024-25801,0,0,86d0a2f88d637a38d728e68507deae5ad1ee66b74383784e4b403b33b5149a86,2024-02-22T19:07:27.197000 CVE-2024-25802,0,0,cb029cdbf03ee0051152f36415381bb55ee304fcb50819490e22f017c52403c6,2024-02-22T19:07:27.197000 CVE-2024-2581,0,0,6eca5564f5891085eb56e7f4cce8a941d50b5c5d945724a4654e0a645ab887e7,2024-03-21T02:52:39.600000 @@ -241670,7 +241671,7 @@ CVE-2024-26300,0,0,957ff2fceea083c23710802994700a4cf17bc21a9f298857e1101271f2e4e CVE-2024-26301,0,0,ca5ba4fc82d74473f58bbb8ab53e52870805c492ae0704dcd3113ae9fe8a11a4,2024-02-28T14:06:45.783000 CVE-2024-26302,0,0,af4ef1bb4da1c0ac0e7b0a0b03804bb031d31d0e464ca3573002ab0828a12d88,2024-02-28T14:06:45.783000 CVE-2024-26307,0,0,9bdd86f1164e19b9b7e171833e6f17ecff380db1e609df57649c593081a62eb2,2024-03-21T12:58:51.093000 -CVE-2024-26308,0,0,82b0ecfd78ac1924ca4de8327395ad25f7b35e7d9f3c5c23f6744c8d052e1727,2024-03-07T17:15:13.050000 +CVE-2024-26308,0,1,2ba9e28d3969717f6516b4803ddc13ceecd3ad2f69b64fd95ab4756f662bdfa5,2024-03-21T19:54:03.230000 CVE-2024-26309,0,0,f36b82bfd58135529029d2dbb3557eae73d94f3c7d43b34f799072bc28e25580,2024-03-08T14:02:57.420000 CVE-2024-2631,0,0,4ce8c252c50d2a4573b6db6829ce390aacb977173215dab753e6b59d6e346a30,2024-03-20T17:18:21.343000 CVE-2024-26310,0,0,cdf3231f7a059b92520dd591ab7449fe300f81e89c81c63cb479e44416fa612e,2024-02-22T19:07:27.197000 @@ -241871,7 +241872,7 @@ CVE-2024-2717,0,0,60956d204776e8fc2f79250d188a534a8f231639d58b0eebc608181972adc9 CVE-2024-2718,0,0,69219abfd430b6a0a0008d330dbe89494263528e572419109c92a9fc419b6f63,2024-03-21T12:58:51.093000 CVE-2024-27189,0,0,515e61fa1831b3fd92525b0004dfafde618646c72fb29e4527e0a2fb9466806f,2024-03-15T16:26:49.320000 CVE-2024-2719,0,0,a4ab17264d9d4de02148162ae470cd2b2fdd972306f561edebd77c0e41dd9d7a,2024-03-21T12:58:51.093000 -CVE-2024-27190,1,1,c0ec98950a3c95237b99d183acabce2dcd6ae1cadac3030b7377fcab423a5787,2024-03-21T17:15:08.010000 +CVE-2024-27190,0,1,1aa0bf9b04d8ad0cd0d83da443ced72d3db96666d7e8636691ac4635aaeee635,2024-03-21T19:47:03.943000 CVE-2024-27192,0,0,0ff7a489a9c185cda73564233ae30b76c3279bb0d352bc83dbf6b8e10c6212e5,2024-03-15T16:26:49.320000 CVE-2024-27193,0,0,1a2f1126258ed9b0f5281770f95fad5056f0f1e4993150f3d871f6ef458a3533,2024-03-15T16:26:49.320000 CVE-2024-27194,0,0,b8200fea2f0a79d9b8f1fbf40aca3e6d111a7a732357978a250e1964deaa7251,2024-03-17T22:38:29.433000 @@ -241914,7 +241915,7 @@ CVE-2024-27237,0,0,952387726c7567ea2371af0e500cab297b027867a108431eaa82a39745a31 CVE-2024-27255,0,0,07d4523d50b3b6ceec1ed85c31e8859376bfd63a9732f2f4d2cf6e5b4c34b76b,2024-03-04T13:58:23.447000 CVE-2024-27265,0,0,caf2cbef481f9d0206d06f75a38ca052c5291ba0582e91875cea8f52e6d86a34,2024-03-19T16:52:02.767000 CVE-2024-27266,0,0,f3ab0f27c5fbbc81843b4329fa53134d5b91174cad9bacbbc5dbf01cfacc3864,2024-03-19T16:52:35.400000 -CVE-2024-27277,1,1,2893029a36e14e5ab3184a9454057ceb5ab630c8cf9f2be73af6f80c2c96beb9,2024-03-21T17:15:08.230000 +CVE-2024-27277,0,1,eb365bab444835328458e82045190ce3a564e0755801fc1f65f8b5d9bbf59bcb,2024-03-21T19:47:03.943000 CVE-2024-27278,0,0,2ef9546b6eb3a76ad70be700186038d995dd630654759ed72b9b3d10968f6d39,2024-03-06T15:18:08.093000 CVE-2024-27279,0,0,a0a465925dfcee0f633443a4d3db070f2bf023c10d4135b020d1a0fbe76c5a4b,2024-03-12T12:40:13.500000 CVE-2024-27283,0,0,d0d6cc69e38ce7977029c4d3a011dff4f743808fa73bec6f0327124024522ffa,2024-02-22T19:07:27.197000 @@ -242056,17 +242057,17 @@ CVE-2024-27949,0,0,12ee9b935394b527d1677a59b517c94d0df067a0b32bfff31d7cb2be5b4b5 CVE-2024-27950,0,0,56d632dad56c45d949d3327de16e5b70b08683cea8ce7876ca8c59cc37ee8062,2024-03-01T14:04:04.827000 CVE-2024-27952,0,0,184c933cd3d4f7d9f291de87daadba6c6d2dcb57a0cab449b4798a27658d2d98,2024-03-13T18:15:58.530000 CVE-2024-27953,0,0,9606a5ea342585cc8ea605f674c63e8d870327e37e1ba285dba38be6126632a2,2024-03-13T18:15:58.530000 -CVE-2024-27956,1,1,66736e6e1f13442348a9d13aa6cfaa4a2498e3146af1c03a16111d845446d69b,2024-03-21T17:15:08.437000 +CVE-2024-27956,0,1,eeea096f0e7e7487ea049c194ac62702e3efa47a3d999d9e69a572f09e5c15e8,2024-03-21T19:47:03.943000 CVE-2024-27957,0,0,5098f1a90cb829431de95b5de6e60aa2ea5ee4aedd8c9f7d7d4297d6dc37ff37,2024-03-17T22:38:29.433000 CVE-2024-27958,0,0,2ee086fb447798c561fd1c831c754d734514f619f6ebb04cf96679cb78dfef40,2024-03-17T22:38:29.433000 CVE-2024-27959,0,0,e2d4c3e5066dc506643038067fab6e9f26070ced2f7f327a18ffcd82b243c593,2024-03-17T22:38:29.433000 CVE-2024-27960,0,0,6ff911c5617586aebae672070284633e223cb5b14cbbc3b1801f17c292900f46,2024-03-17T22:38:29.433000 CVE-2024-27961,0,0,3162bfbc67900a83a9b4114dba265e7189f0bad8c0ddf2d85f6724674d13510a,2024-03-17T22:38:29.433000 -CVE-2024-27962,1,1,7a8e9f7f1bf2c5e021e039a30a7f35c08db002c7dd09f57dc2677205586d1178,2024-03-21T17:15:08.637000 -CVE-2024-27963,1,1,48168dc4b5b237659851f8dbd76235a3409a0946b5c51543657605f6aa2c6940,2024-03-21T17:15:08.850000 -CVE-2024-27964,1,1,035a89dc336730735b9b0b4b76282144341f56bb37d97a7914c6d26fa2472aa0,2024-03-21T17:15:09.060000 -CVE-2024-27965,1,1,8ec84e693e8c40e9a1f30f2f6bcba3ae6ddff6f90f1b3547c641f3f44eb39aac,2024-03-21T17:15:09.277000 -CVE-2024-27968,1,1,6a5aa5d883cb61fd2a08f978d66dacf333b85ba305e93e277b14fb83383a38c4,2024-03-21T17:15:09.487000 +CVE-2024-27962,0,1,1c94df9110462a34df55d8f671d128860266ccb77dd29f389b2324600ca07680,2024-03-21T19:47:03.943000 +CVE-2024-27963,0,1,1fe8e45c3046e4191d77b36670840383914d58f1ba31efb184b266de4ae6b144,2024-03-21T19:47:03.943000 +CVE-2024-27964,0,1,f723b903bea75dee5cd9d094fb735ccf35df44ec2a2fe82d8cd63bd7e33ad323,2024-03-21T19:47:03.943000 +CVE-2024-27965,0,1,07b2c962b6af72a3fa4d6e0cca49f1bed68d7474aaf9839141a5bebbc2988945,2024-03-21T19:47:03.943000 +CVE-2024-27968,0,1,62d1484625b8ff1b6da2393031085b35a7b07168c520f9d4ac0420345380cdc9,2024-03-21T19:47:03.943000 CVE-2024-27974,0,0,c5d12161a6a294fb4d33a068888d07d2dec693f9073d8d47f06182bf4fe2779a,2024-03-18T12:38:25.490000 CVE-2024-27986,0,0,221ac31a72264e8303bc0dc716d0bcad27f92aa2e3b64824247f9d02601983b8,2024-03-14T12:52:09.877000 CVE-2024-27987,0,0,ce6fd0b1730cd837f285c0aaaa1258cf6aa8505469e7f313401adb363ee7f395,2024-03-15T12:53:06.423000 @@ -242157,7 +242158,7 @@ CVE-2024-28248,0,0,b617812c524b85d27f2a46b3a739648463fa9ffb5a6e46ea47ba0c68bd3fa CVE-2024-28249,0,0,7f01b3731d6ed3594265964b9061da88eb89dfe99b6d59bfec8413859c3ac454,2024-03-19T13:26:46 CVE-2024-28250,0,0,dacc68b6e843dc808e1d498d69054a425a6f10e258af235d9a1256f74372900d,2024-03-19T13:26:46 CVE-2024-28251,0,0,19fc23d56f5d00fa3c69d993b0deb280b2d4a1df9b73eb3d828c9ec8b6104ec4,2024-03-14T12:52:16.723000 -CVE-2024-28252,0,0,ac84484303fc0c017048b9d298c82aac04da864eaa9b564555df184d62c4afa2,2024-03-17T22:38:29.433000 +CVE-2024-28252,0,1,ef5b49a93a934440796c2d3d79cb29d26eeed77accae4ad9797588db77e6bd30,2024-03-21T20:15:08.050000 CVE-2024-28253,0,0,b0d1b906324ecf48e7bcfd3c9d0c313a69a8c6ff9baa313b92164ce1f64f0b92,2024-03-17T22:38:29.433000 CVE-2024-28254,0,0,ba6384e5d24a90ea0036dcbe7f89cd48d629aea12c2d3808708fa9f619d07a5b,2024-03-21T02:52:24.507000 CVE-2024-28255,0,0,abc37b2c1df4d41f872020a3754e2ae86c707a3247848b9d32abc1bd5f67bb13,2024-03-17T22:38:29.433000 @@ -242195,11 +242196,11 @@ CVE-2024-28431,0,0,148c6be422e12f315897bdd57f5208c74e8137e452c7019eafe29f97f527c CVE-2024-28432,0,0,4bc8c3df18623e8712ef966fb24c80f6754436b2eb6a0c14d5d3c56f5a161090,2024-03-13T14:28:45.217000 CVE-2024-28446,0,0,e3b0d814ee24ce9a2740eda808696f714c3071d6722fa7bd76f62923d12a194d,2024-03-19T13:26:46 CVE-2024-28447,0,0,729795bf39bd106c71b5b798b10fa8f526cc5d6a6eb2785b0edfa8459a535a4c,2024-03-19T13:26:46 -CVE-2024-28535,0,0,05b59fc574e3ec1a67ffae1023c5999e94849ce19d6ee2f539dda71a994d8b6c,2024-03-12T16:02:33.900000 +CVE-2024-28535,0,1,174c70ce71a26af929a40c7b6a103a5242ac3321f34f35a982d598e918b67152,2024-03-21T20:58:46.217000 CVE-2024-28537,0,0,ff6bf2a37289dca28bccb57e311acb6479e1a577841d298af6b3b484403dfc2c,2024-03-18T19:40:00.173000 CVE-2024-28547,0,0,a2de8a258b087cbf7c5442c921d96afce5895db417e9c628fe7656334d2bb7cc,2024-03-18T19:40:00.173000 CVE-2024-28550,0,0,55b413fc03c0e6dbaa5c4b6ccf0c8e244ea995bce860e043c8086ce78f470aae,2024-03-18T19:40:00.173000 -CVE-2024-28553,0,0,805b633f3af1b0b015d2f8e90520174ed99391ad33f4ee744bfc3e783d7c9257,2024-03-12T16:02:33.900000 +CVE-2024-28553,0,1,f74a5d2edd657e610cfc2b884ed1530d128afd106cc0a285c1f4868830f65cd2,2024-03-21T20:58:52.357000 CVE-2024-28562,0,0,91433a4c4f462713402770533ad7f25e56b67cc00fab70587df3692124b0273d,2024-03-20T13:00:16.367000 CVE-2024-28563,0,0,a656ef0aa8710291541ea7c711ec135274e970f2c247f821eefbeaee78f8b4d1,2024-03-20T13:00:16.367000 CVE-2024-28564,0,0,2abccbe60536fbfc04ad1cc3dd03bdffb43e6097953ebe8e099f5edfe9491595,2024-03-20T13:00:16.367000 @@ -242333,9 +242334,10 @@ CVE-2024-29143,0,0,a3f92e2c9ae6aaf4168f841be16c13a544cace199faa049656661980aa53e CVE-2024-29151,0,0,ef852a662e1eaee7e15d971ee7451f2c3e954b3d808a30cb9a36bbe68bb24c8f,2024-03-18T12:38:25.490000 CVE-2024-29154,0,0,dab131c9ff393e828252009730d8617a5e1a4fb5cfb7f2db054056bc6f27c2ba,2024-03-18T12:38:25.490000 CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2326,2024-03-18T12:38:25.490000 -CVE-2024-29180,1,1,9b826c84b71b0bb4e6d83bccac4cac9e366568fb0ec59defe9778c2d6dfb3214,2024-03-21T17:15:09.690000 +CVE-2024-29180,0,1,e32bebc90fbd05fe3a3edfae9506df906c8ca56e295fcb3cc3f3f384d12528c8,2024-03-21T19:47:03.943000 CVE-2024-29243,0,0,80b3eab65af2d9fbeb7b6048e074697688a19de63e1138c377d0b826523dd7db,2024-03-21T15:24:35.093000 CVE-2024-29244,0,0,ab4dadc4ff7b45a2c285edb922de956bae0828f007627c62339f15145e95a7b7,2024-03-21T15:24:35.093000 +CVE-2024-29374,1,1,f8a146770d52182e0c10b15b21ebc5da7e22091690385e976078b28de6736be7,2024-03-21T19:47:03.943000 CVE-2024-29419,0,0,1f113c646466febbefbd1317ecc5036f9bdf6e219db156971cfdda70e05f32f0,2024-03-20T17:18:21.343000 CVE-2024-29469,0,0,acf93e04574e9669a29498319a75720c9b5a03ff4de2c06070b1f52ac9f365b7,2024-03-21T12:58:51.093000 CVE-2024-29470,0,0,ec8cc83a60b9ef7edaa49e0605acc097203825f31a2e1ca35494b606ac2473df,2024-03-21T12:58:51.093000 @@ -242360,4 +242362,4 @@ CVE-2024-29877,0,0,5b6a7271e346dceec62c9141f9ae12b0e5342a31cc26366c653fe20c26c8b CVE-2024-29878,0,0,59bd69937e12e8238cdc5eae96014d85a453bedc37861446ca2ffcb7373dda8d,2024-03-21T15:24:35.093000 CVE-2024-29879,0,0,f281e5565c18f62981e30c243c39ad05583d9bbab1631a620c93b3c78846e1db,2024-03-21T15:24:35.093000 CVE-2024-29880,0,0,e4ba47a3336aba44b26bc2b767c682c9997cfe6f0e16a9457e7fe50a3abeaa1c,2024-03-21T15:24:35.093000 -CVE-2024-29916,1,1,c593638d593f32d48054769da500835bee87049ab2a9e191e4f3cba11e171290,2024-03-21T17:15:09.897000 +CVE-2024-29916,0,1,dd300e18b662f862d3dd0881eace85d81be3f3aaeb79c908bcef100a80a89dd1,2024-03-21T19:47:03.943000