From fc216ddb56817b90b4f4b1782b7489db75aad5cf Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 22 Mar 2024 15:03:29 +0000 Subject: [PATCH] Auto-Update: 2024-03-22T15:00:40.815139+00:00 --- CVE-2024/CVE-2024-09xx/CVE-2024-0957.json | 4 + CVE-2024/CVE-2024-20xx/CVE-2024-2080.json | 4 + CVE-2024/CVE-2024-23xx/CVE-2024-2392.json | 4 + CVE-2024/CVE-2024-24xx/CVE-2024-2448.json | 59 ++++++++ CVE-2024/CVE-2024-24xx/CVE-2024-2449.json | 59 ++++++++ CVE-2024/CVE-2024-24xx/CVE-2024-2453.json | 4 + CVE-2024/CVE-2024-258xx/CVE-2024-25807.json | 4 + CVE-2024/CVE-2024-258xx/CVE-2024-25808.json | 4 + CVE-2024/CVE-2024-25xx/CVE-2024-2500.json | 4 + CVE-2024/CVE-2024-265xx/CVE-2024-26557.json | 4 + CVE-2024/CVE-2024-27xx/CVE-2024-2722.json | 55 +++++++ CVE-2024/CVE-2024-27xx/CVE-2024-2723.json | 55 +++++++ CVE-2024/CVE-2024-27xx/CVE-2024-2724.json | 55 +++++++ CVE-2024/CVE-2024-27xx/CVE-2024-2725.json | 55 +++++++ CVE-2024/CVE-2024-27xx/CVE-2024-2726.json | 55 +++++++ CVE-2024/CVE-2024-27xx/CVE-2024-2727.json | 55 +++++++ CVE-2024/CVE-2024-27xx/CVE-2024-2728.json | 55 +++++++ CVE-2024/CVE-2024-27xx/CVE-2024-2770.json | 4 + CVE-2024/CVE-2024-27xx/CVE-2024-2773.json | 4 + CVE-2024/CVE-2024-27xx/CVE-2024-2774.json | 4 + CVE-2024/CVE-2024-27xx/CVE-2024-2775.json | 4 + CVE-2024/CVE-2024-27xx/CVE-2024-2776.json | 4 + CVE-2024/CVE-2024-27xx/CVE-2024-2777.json | 4 + CVE-2024/CVE-2024-27xx/CVE-2024-2778.json | 4 + CVE-2024/CVE-2024-27xx/CVE-2024-2779.json | 4 + CVE-2024/CVE-2024-27xx/CVE-2024-2780.json | 4 + CVE-2024/CVE-2024-284xx/CVE-2024-28441.json | 4 + CVE-2024/CVE-2024-288xx/CVE-2024-28863.json | 4 + CVE-2024/CVE-2024-28xx/CVE-2024-2805.json | 4 + CVE-2024/CVE-2024-28xx/CVE-2024-2806.json | 4 + CVE-2024/CVE-2024-28xx/CVE-2024-2807.json | 4 + CVE-2024/CVE-2024-28xx/CVE-2024-2808.json | 4 + CVE-2024/CVE-2024-28xx/CVE-2024-2809.json | 4 + CVE-2024/CVE-2024-28xx/CVE-2024-2810.json | 4 + CVE-2024/CVE-2024-28xx/CVE-2024-2811.json | 4 + CVE-2024/CVE-2024-28xx/CVE-2024-2812.json | 4 + CVE-2024/CVE-2024-28xx/CVE-2024-2813.json | 4 + CVE-2024/CVE-2024-28xx/CVE-2024-2814.json | 4 + CVE-2024/CVE-2024-290xx/CVE-2024-29031.json | 4 + CVE-2024/CVE-2024-292xx/CVE-2024-29271.json | 4 + CVE-2024/CVE-2024-292xx/CVE-2024-29272.json | 4 + CVE-2024/CVE-2024-292xx/CVE-2024-29273.json | 4 + CVE-2024/CVE-2024-292xx/CVE-2024-29275.json | 4 + CVE-2024/CVE-2024-299xx/CVE-2024-29943.json | 24 +++ CVE-2024/CVE-2024-299xx/CVE-2024-29944.json | 28 ++++ README.md | 50 ++++--- _state.csv | 155 +++++++++++--------- 47 files changed, 801 insertions(+), 95 deletions(-) create mode 100644 CVE-2024/CVE-2024-24xx/CVE-2024-2448.json create mode 100644 CVE-2024/CVE-2024-24xx/CVE-2024-2449.json create mode 100644 CVE-2024/CVE-2024-27xx/CVE-2024-2722.json create mode 100644 CVE-2024/CVE-2024-27xx/CVE-2024-2723.json create mode 100644 CVE-2024/CVE-2024-27xx/CVE-2024-2724.json create mode 100644 CVE-2024/CVE-2024-27xx/CVE-2024-2725.json create mode 100644 CVE-2024/CVE-2024-27xx/CVE-2024-2726.json create mode 100644 CVE-2024/CVE-2024-27xx/CVE-2024-2727.json create mode 100644 CVE-2024/CVE-2024-27xx/CVE-2024-2728.json create mode 100644 CVE-2024/CVE-2024-299xx/CVE-2024-29943.json create mode 100644 CVE-2024/CVE-2024-299xx/CVE-2024-29944.json diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0957.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0957.json index 5b1a15dc5f4..eff78b9ba94 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0957.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0957.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The WooCommerce PDF Invoices, Packing Slips, Delivery Notes and Shipping Labels plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Customer Notes field in all versions up to, and including, 4.4.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected invoice for printing." + }, + { + "lang": "es", + "value": "El complemento WooCommerce PDF Invoices, Packing Slips, Delivery Notes and Shipping Labels para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del campo Notas del cliente en todas las versiones hasta la 4.4.1 incluida, debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una factura inyectada para imprimir." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2080.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2080.json index 4457d1c764f..a50473b8166 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2080.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2080.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The LiquidPoll \u2013 Polls, Surveys, NPS and Feedback Reviews plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.3.76 via the poller_list shortcode. This makes it possible for authenticated attackers, with contributor-level access and above, to extract information from polls that may be private." + }, + { + "lang": "es", + "value": "El complemento LiquidPoll \u2013 Polls, Surveys, NPS and Feedback Reviews para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 3.3.76 incluida a trav\u00e9s del c\u00f3digo corto poller_list. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, extraigan informaci\u00f3n de encuestas que pueden ser privadas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2392.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2392.json index 41b2dd0613d..e543508203d 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2392.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2392.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Blocksy Companion plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Newsletter widget in all versions up to, and including, 2.0.31 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Blocksy Companion para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget de bolet\u00edn informativo del complemento en todas las versiones hasta la 2.0.31 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2448.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2448.json new file mode 100644 index 00000000000..78cf9ae0fa3 --- /dev/null +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2448.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-2448", + "sourceIdentifier": "security@progress.com", + "published": "2024-03-22T14:15:08.683", + "lastModified": "2024-03-22T14:15:08.683", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An OS command injection vulnerability has been identified in LoadMaster.\u00a0 An authenticated UI user with any permission settings may be able to inject commands into a UI component using a shell command resulting in OS command injection." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@progress.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.7, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security@progress.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://progress.com/loadmaster", + "source": "security@progress.com" + }, + { + "url": "https://support.kemptechnologies.com/hc/en-us/articles/25119767150477-LoadMaster-Security-Vulnerabilities-CVE-2024-2448-and-CVE-2024-2449", + "source": "security@progress.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2449.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2449.json new file mode 100644 index 00000000000..ebe765ffd53 --- /dev/null +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2449.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-2449", + "sourceIdentifier": "security@progress.com", + "published": "2024-03-22T14:15:09.210", + "lastModified": "2024-03-22T14:15:09.210", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A cross-site request forgery vulnerability has been identified in LoadMaster.\u00a0 It is possible for a malicious actor, who has prior knowledge of the IP or hostname of a specific LoadMaster, to direct an authenticated LoadMaster administrator to a third-party site. In such a scenario, the CSRF payload hosted on the malicious site would execute HTTP transactions on behalf of the LoadMaster administrator." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@progress.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@progress.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://progress.com/loadmaster", + "source": "security@progress.com" + }, + { + "url": "https://support.kemptechnologies.com/hc/en-us/articles/25119767150477-LoadMaster-Security-Vulnerabilities-CVE-2024-2448-and-CVE-2024-2449", + "source": "security@progress.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2453.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2453.json index 2f2a6e5f99d..1d23540d237 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2453.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2453.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "\nThere is an SQL injection vulnerability in Advantech WebAccess/SCADA software that allows an authenticated attacker to remotely inject SQL code in the database. Successful exploitation of this vulnerability could allow an attacker to read or modify data on the remote database.\n\n" + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n SQL en el software Advantech WebAccess/SCADA que permite a un atacante autenticado inyectar c\u00f3digo SQL de forma remota en la base de datos. La explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda permitir a un atacante leer o modificar datos en la base de datos remota." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25807.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25807.json index cecb39edfcf..968bce13e93 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25807.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25807.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Cross Site Scripting (XSS) vulnerability in Lychee 3.1.6, allows remote attackers to execute arbitrary code and obtain sensitive information via the title parameter when creating an album." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross Site Scripting (XSS) en Lychee 3.1.6 permite a atacantes remotos ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro de t\u00edtulo al crear un \u00e1lbum." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25808.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25808.json index 8d2f117145e..730c89e868a 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25808.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25808.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Cross-site Request Forgery (CSRF) vulnerability in Lychee version 3.1.6, allows remote attackers to execute arbitrary code via the create new album function." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-site Request Forgery (CSRF) en Lychee versi\u00f3n 3.1.6, permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n de creaci\u00f3n de nuevo \u00e1lbum." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2500.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2500.json index 08aebcf5ce0..d983c5fdf8b 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2500.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2500.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The ColorMag theme for WordPress is vulnerable to Stored Cross-Site Scripting via a user's Display Name in all versions up to, and including, 3.1.6 due to insufficient input sanitization and output escaping. This makes it possible for authentciated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El tema ColorMag para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del nombre para mostrar de un usuario en todas las versiones hasta la 3.1.6 incluida, debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26557.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26557.json index 4d76df03ccf..c258561c746 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26557.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26557.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Codiad v2.8.4 allows reflected XSS via the components/market/dialog.php type parameter." + }, + { + "lang": "es", + "value": "Codiad v2.8.4 permite reflejar XSS a trav\u00e9s del par\u00e1metro de tipo componentes/mercado/dialog.php." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2722.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2722.json new file mode 100644 index 00000000000..6a7635b36ce --- /dev/null +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2722.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-2722", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2024-03-22T14:15:09.403", + "lastModified": "2024-03-22T14:15:09.403", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SQL injection vulnerability in the CIGESv2 system, through\u00a0/ajaxConfigTotem.php, in the 'id' parameter. The exploitation of this vulnerability could allow a remote user to retrieve all data stored in the database by sending a specially crafted SQL query." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cigesv2-system", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2723.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2723.json new file mode 100644 index 00000000000..54d0eb4c8e9 --- /dev/null +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2723.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-2723", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2024-03-22T14:15:09.643", + "lastModified": "2024-03-22T14:15:09.643", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SQL injection vulnerability in the CIGESv2 system, through\u00a0/ajaxSubServicios.php, in the 'idServicio' parameter. The exploitation of this vulnerability could allow a remote user to retrieve all data stored in the database by sending a specially crafted SQL query." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cigesv2-system", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2724.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2724.json new file mode 100644 index 00000000000..a4807597eb4 --- /dev/null +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2724.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-2724", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2024-03-22T14:15:09.857", + "lastModified": "2024-03-22T14:15:09.857", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SQL injection vulnerability in the CIGESv2 system, through\u00a0/ajaxServiciosAtencion.php, in the 'idServicio' parameter. The exploitation of this vulnerability could allow a remote user to retrieve all data stored in the database by sending a specially crafted SQL query." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cigesv2-system", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2725.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2725.json new file mode 100644 index 00000000000..ade29f06d7a --- /dev/null +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2725.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-2725", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2024-03-22T14:15:10.143", + "lastModified": "2024-03-22T14:15:10.143", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Information exposure vulnerability in the CIGESv2 system. A remote attacker might be able to access /vendor/composer/installed.json and retrieve all installed packages used by the application." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cigesv2-system", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2726.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2726.json new file mode 100644 index 00000000000..6d50b35e6b5 --- /dev/null +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2726.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-2726", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2024-03-22T14:15:10.393", + "lastModified": "2024-03-22T14:15:10.393", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Stored Cross-Site Scripting (Stored-XSS) vulnerability affecting the CIGESv2 system, allowing an attacker to execute and store malicious javascript code in the application form without prior registration." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cigesv2-system", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2727.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2727.json new file mode 100644 index 00000000000..5e97f320971 --- /dev/null +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2727.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-2727", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2024-03-22T14:15:10.593", + "lastModified": "2024-03-22T14:15:10.593", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "HTML injection vulnerability affecting the CIGESv2 system, which allows an attacker to inject arbitrary code and modify elements of the website and email confirmation message." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cigesv2-system", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2728.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2728.json new file mode 100644 index 00000000000..24e77f6be35 --- /dev/null +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2728.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-2728", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2024-03-22T14:15:10.807", + "lastModified": "2024-03-22T14:15:10.807", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Information exposure vulnerability in the CIGESv2 system. This vulnerability could allow a local attacker to intercept traffic due to the lack of proper implementation of the TLS protocol." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cigesv2-system", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2770.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2770.json index 380826035a6..9c2ae733b7b 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2770.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2770.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability was found in Campcodes Complete Online Beauty Parlor Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/contact-us.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-257606 is the identifier assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Complete Online Beauty Parlor Management System 1.0. Ha sido calificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo /admin/contact-us.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento email conduce a la inyecci\u00f3n de SQL. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-257606 es el identificador asignado a esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2773.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2773.json index 7aeadd6076f..7a9fa576da7 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2773.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2773.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability classified as problematic has been found in Campcodes Online Marriage Registration System 1.0. This affects an unknown part of the file /user/search.php. The manipulation of the argument searchdata leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257607." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en Campcodes Online Marriage Registration System 1.0 y clasificada como problem\u00e1tica. Esto afecta a una parte desconocida del archivo /user/search.php. La manipulaci\u00f3n del argumento searchdata conduce a cross-site scripting. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-257607." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2774.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2774.json index cc18f39d713..ba04941c7a2 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2774.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2774.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability classified as critical was found in Campcodes Online Marriage Registration System 1.0. This vulnerability affects unknown code of the file /user/search.php. The manipulation of the argument searchdata leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257608." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Campcodes Online Marriage Registration System 1.0 y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo /user/search.php. La manipulaci\u00f3n del argumento searchdata conduce a la inyecci\u00f3n de SQL. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-257608." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2775.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2775.json index 8c95781dea3..1f5139be807 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2775.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2775.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in Campcodes Online Marriage Registration System 1.0. This issue affects some unknown processing of the file /user/user-profile.php. The manipulation of the argument lname leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257609 was assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Campcodes Online Marriage Registration System 1.0 y clasificada como problem\u00e1tica. Este problema afecta un procesamiento desconocido del archivo /user/user-profile.php. La manipulaci\u00f3n del argumento lname conduce a cross-site scripting. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-257609." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2776.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2776.json index f8b37289914..c3b0970afbd 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2776.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2776.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Campcodes Online Marriage Registration System 1.0. Affected is an unknown function of the file /admin/search.php. The manipulation of the argument searchdata leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-257610 is the identifier assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Campcodes Online Marriage Registration System 1.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo /admin/search.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento searchdata conduce a la inyecci\u00f3n de SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-257610 es el identificador asignado a esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2777.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2777.json index 0bb53a096c3..3cb90a9cf65 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2777.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2777.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability has been found in Campcodes Online Marriage Registration System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/application-bwdates-reports-details.php. The manipulation of the argument fromdate leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257611." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en Campcodes Online Marriage Registration System 1.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo /admin/application-bwdates-reports-details.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento fromdate conduce a la inyecci\u00f3n de SQL. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-257611." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2778.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2778.json index 1bc3c5d21e8..7b7a56b2642 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2778.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2778.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability was found in Campcodes Online Marriage Registration System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/search.php. The manipulation of the argument searchdata leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257612." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Campcodes Online Marriage Registration System 1.0 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo /admin/search.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento searchdata conduce a cross-site scripting. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-257612." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2779.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2779.json index 87f9ffe2bf4..5e6fb2b7887 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2779.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2779.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability was found in Campcodes Online Marriage Registration System 1.0. It has been classified as problematic. This affects an unknown part of the file /admin/application-bwdates-reports-details.php. The manipulation of the argument fromdate leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257613 was assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Online Marriage Registration System 1.0. Ha sido clasificada como problem\u00e1tica. Esto afecta a una parte desconocida del archivo /admin/application-bwdates-reports-details.php. La manipulaci\u00f3n del argumento fromdate conduce a cross-site scripting. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-257613." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2780.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2780.json index d6cbdc3bd11..f104f577655 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2780.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2780.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability was found in Campcodes Online Marriage Registration System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/admin-profile.php. The manipulation of the argument adminname leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-257614 is the identifier assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Online Marriage Registration System 1.0. Ha sido declarada problem\u00e1tica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/admin-profile.php. La manipulaci\u00f3n del argumento adminname conduce a cross-site scripting. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-257614 es el identificador asignado a esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-284xx/CVE-2024-28441.json b/CVE-2024/CVE-2024-284xx/CVE-2024-28441.json index 5f0e48a0440..dcd1ad51bd0 100644 --- a/CVE-2024/CVE-2024-284xx/CVE-2024-28441.json +++ b/CVE-2024/CVE-2024-284xx/CVE-2024-28441.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "File Upload vulnerability in magicflue v.7.0 and before allows a remote attacker to execute arbitrary code via a crafted request to the messageid parameter of the mail/mailupdate.jsp endpoint." + }, + { + "lang": "es", + "value": "Vulnerabilidad de carga de archivos en magicflue v.7.0 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud manipulada al par\u00e1metro messageid del endpoint mail/mailupdate.jsp." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28863.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28863.json index ec8c5ea3110..e31b7786b8b 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28863.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28863.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "node-tar is a Tar for Node.js. node-tar prior to version 6.2.1 has no limit on the number of sub-folders created in the folder creation process. An attacker who generates a large number of sub-folders can consume memory on the system running node-tar and even crash the Node.js client within few seconds of running it using a path with too many sub-folders inside. Version 6.2.1 fixes this issue by preventing extraction in excessively deep sub-folders." + }, + { + "lang": "es", + "value": "node-tar es un Tar para Node.js. Node-tar anterior a la versi\u00f3n 6.2.1 no tiene l\u00edmite en la cantidad de subcarpetas creadas en el proceso de creaci\u00f3n de carpetas. Un atacante que genera una gran cantidad de subcarpetas puede consumir memoria en el sistema que ejecuta node-tar e incluso bloquear el cliente Node.js a los pocos segundos de ejecutarlo usando una ruta con demasiadas subcarpetas dentro. La versi\u00f3n 6.2.1 soluciona este problema impidiendo la extracci\u00f3n en subcarpetas excesivamente profundas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2805.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2805.json index 0787a0b1c49..c7d4d52d770 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2805.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2805.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability was found in Tenda AC15 15.03.05.18/15.03.20_multi. It has been rated as critical. Affected by this issue is the function formSetSpeedWan of the file /goform/SetSpeedWan. The manipulation of the argument speed_dir leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257660. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Tenda AC15 15.03.05.18/15.03.20_multi. Ha sido calificada como cr\u00edtica. La funci\u00f3n formSetSpeedWan del archivo /goform/SetSpeedWan es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento speed_dir provoca un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-257660. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2806.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2806.json index e1bfc7309ca..4072f97ee59 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2806.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2806.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability classified as critical has been found in Tenda AC15 15.03.05.18/15.03.20_multi. This affects the function addWifiMacFilter of the file /goform/addWifiMacFilter. The manipulation of the argument deviceId/deviceMac leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257661 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en Tenda AC15 15.03.05.18/15.03.20_multi y clasificada como cr\u00edtica. Esto afecta a la funci\u00f3n addWifiMacFilter del fichero /goform/addWifiMacFilter. La manipulaci\u00f3n del argumento deviceId/deviceMac conduce a un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-257661. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2807.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2807.json index 1db01d438b2..e80fce78a61 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2807.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2807.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability classified as critical was found in Tenda AC15 15.03.05.18/15.03.20_multi. This vulnerability affects the function formExpandDlnaFile of the file /goform/expandDlnaFile. The manipulation of the argument filePath leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-257662 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Tenda AC15 15.03.05.18/15.03.20_multi y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n formExpandDlnaFile del archivo /goform/expandDlnaFile. La manipulaci\u00f3n del argumento filePath conduce a un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-257662 es el identificador asignado a esta vulnerabilidad. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2808.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2808.json index 39eac05ea66..2c0ecb8cb21 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2808.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2808.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Tenda AC15 15.03.05.18/15.03.20_multi. This issue affects the function formQuickIndex of the file /goform/QuickIndex. The manipulation of the argument PPPOEPassword leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257663. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Tenda AC15 15.03.05.18/15.03.20_multi y clasificada como cr\u00edtica. Este problema afecta la funci\u00f3n formQuickIndex del archivo /goform/QuickIndex. La manipulaci\u00f3n del argumento PPPOEPassword provoca un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-257663. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2809.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2809.json index fcdab044bfe..9998df37a45 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2809.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2809.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Tenda AC15 15.03.05.18/15.03.20_multi. Affected is the function formSetFirewallCfg of the file /goform/SetFirewallCfg. The manipulation of the argument firewallEn leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257664. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Tenda AC15 15.03.05.18/15.03.20_multi y clasificada como cr\u00edtica. La funci\u00f3n formSetFirewallCfg del fichero /goform/SetFirewallCfg es afectada por la vulnerabilidad. La manipulaci\u00f3n del argumento firewallEn conduce a un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-257664. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2810.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2810.json index 7f54707cf77..532274e4a12 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2810.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2810.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability has been found in Tenda AC15 15.03.05.18/15.03.20_multi and classified as critical. Affected by this vulnerability is the function formWifiWpsOOB of the file /goform/WifiWpsOOB. The manipulation of the argument index leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257665 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en Tenda AC15 15.03.05.18/15.03.20_multi y clasificada como cr\u00edtica. La funci\u00f3n formWifiWpsOOB del archivo /goform/WifiWpsOOB es afectada por esta vulnerabilidad. La manipulaci\u00f3n del \u00edndice de argumentos conduce a un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-257665. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2811.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2811.json index fe603fc0b15..4b066033e69 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2811.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2811.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability was found in Tenda AC15 15.03.20_multi and classified as critical. Affected by this issue is the function formWifiWpsStart of the file /goform/WifiWpsStart. The manipulation of the argument index leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-257666 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Tenda AC15 15.03.20_multi y clasificada como cr\u00edtica. La funci\u00f3n formWifiWpsStart del archivo /goform/WifiWpsStart es afectada por esta vulnerabilidad. La manipulaci\u00f3n del \u00edndice de argumentos conduce a un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-257666 es el identificador asignado a esta vulnerabilidad. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2812.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2812.json index bba071db727..f435a4decbc 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2812.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2812.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability was found in Tenda AC15 15.03.05.18/15.03.20_multi. It has been classified as critical. This affects the function formWriteFacMac of the file /goform/WriteFacMac. The manipulation of the argument mac leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257667. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Tenda AC15 15.03.05.18/15.03.20_multi. Ha sido clasificada como cr\u00edtica. Esto afecta a la funci\u00f3n formWriteFacMac del archivo /goform/WriteFacMac. La manipulaci\u00f3n del argumento mac conduce a la inyecci\u00f3n de comandos del sistema operativo. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-257667. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2813.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2813.json index df499386691..2901c1a66f9 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2813.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2813.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability was found in Tenda AC15 15.03.20_multi. It has been declared as critical. This vulnerability affects the function form_fast_setting_wifi_set of the file /goform/fast_setting_wifi_set. The manipulation of the argument ssid leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257668. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Tenda AC15 15.03.20_multi. Ha sido declarada cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n form_fast_setting_wifi_set del archivo /goform/fast_setting_wifi_set. La manipulaci\u00f3n del argumento ssid provoca un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-257668. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2814.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2814.json index 55c89e44241..d152750b333 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2814.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2814.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability was found in Tenda AC15 15.03.20_multi. It has been rated as critical. This issue affects the function fromDhcpListClient of the file /goform/DhcpListClient. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257669 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Tenda AC15 15.03.20_multi. Ha sido calificada como cr\u00edtica. Este problema afecta la funci\u00f3n fromDhcpListClient del archivo /goform/DhcpListClient. La manipulaci\u00f3n de la p\u00e1gina de argumentos provoca un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-257669. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29031.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29031.json index e7138eeb008..c14844de68c 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29031.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29031.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Meshery is an open source, cloud native manager that enables the design and management of Kubernetes-based infrastructure and applications. A SQL injection vulnerability in Meshery prior to version 0.7.17 allows a remote attacker to obtain sensitive information via the `order` parameter of `GetMeshSyncResources`. Version 0.7.17 contains a patch for this issue." + }, + { + "lang": "es", + "value": "Meshery es un administrador nativo de la nube de c\u00f3digo abierto que permite el dise\u00f1o y la administraci\u00f3n de infraestructura y aplicaciones basadas en Kubernetes. Una vulnerabilidad de inyecci\u00f3n SQL en Meshery anterior a la versi\u00f3n 0.7.17 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro `order` de `GetMeshSyncResources`. La versi\u00f3n 0.7.17 contiene un parche para este problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29271.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29271.json index 028ce4972bc..b73f1a7d2ef 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29271.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29271.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Reflected Cross-Site Scripting (XSS) vulnerability in VvvebJs before version 1.7.7, allows remote attackers to execute arbitrary code and obtain sensitive information via the action parameter in save.php." + }, + { + "lang": "es", + "value": "Vulnerabilidad reflejada de cross-site scripting (XSS) en VvvebJs anteriores a la versi\u00f3n 1.7.7, permite a atacantes remotos ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro de acci\u00f3n en save.php." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29272.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29272.json index e9dfb67d4b1..23807507858 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29272.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29272.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Arbitrary File Upload vulnerability in VvvebJs before version 1.7.5, allows unauthenticated remote attackers to execute arbitrary code and obtain sensitive information via the sanitizeFileName parameter in save.php." + }, + { + "lang": "es", + "value": "Vulnerabilidad de carga arbitraria de archivos en VvvebJs anterior a la versi\u00f3n 1.7.5, permite a atacantes remotos no autenticados ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro sanitizeFileName en save.php." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29273.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29273.json index 88534655c6a..04e288df656 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29273.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29273.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "There is Stored Cross-Site Scripting (XSS) in dzzoffice 2.02.1 SC UTF8 in uploadfile to index.php, with the XSS payload in an SVG document." + }, + { + "lang": "es", + "value": "Hay cross-site scripting almacenadas (XSS) en dzzoffice 2.02.1 SC UTF8 en el archivo de carga en index.php, con el payload XSS en un documento SVG." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29275.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29275.json index 12c60f8f503..9c71869e533 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29275.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29275.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "SQL injection vulnerability in SeaCMS version 12.9, allows remote unauthenticated attackers to execute arbitrary code and obtain sensitive information via the id parameter in class.php." + }, + { + "lang": "es", + "value": "Vulnerabilidad de inyecci\u00f3n SQL en SeaCMS versi\u00f3n 12.9, permite a atacantes remotos no autenticados ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro id en class.php." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29943.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29943.json new file mode 100644 index 00000000000..db0d9320551 --- /dev/null +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29943.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-29943", + "sourceIdentifier": "security@mozilla.org", + "published": "2024-03-22T13:15:07.440", + "lastModified": "2024-03-22T13:15:07.440", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An attacker was able to perform an out-of-bounds read or write on a JavaScript object by fooling range-based bounds check elimination. This vulnerability affects Firefox < 124.0.1." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1886849", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-15/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29944.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29944.json new file mode 100644 index 00000000000..ba179aeaf55 --- /dev/null +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29944.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-29944", + "sourceIdentifier": "security@mozilla.org", + "published": "2024-03-22T13:15:07.503", + "lastModified": "2024-03-22T13:15:07.503", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An attacker was able to inject an event handler into a privileged object that would allow arbitrary JavaScript execution in the parent process. This vulnerability affects Firefox < 124.0.1 and Firefox ESR < 115.9.1." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1886852", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-15/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-16/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 8e54a67fb8a..4cd20078703 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-03-22T13:00:38.389982+00:00 +2024-03-22T15:00:40.815139+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-03-22T12:45:36.130000+00:00 +2024-03-22T14:15:10.807000+00:00 ``` ### Last Data Feed Release @@ -29,46 +29,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -242432 +242443 ``` ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `11` -* [CVE-2024-0638](CVE-2024/CVE-2024-06xx/CVE-2024-0638.json) (`2024-03-22T11:15:46.183`) -* [CVE-2024-1742](CVE-2024/CVE-2024-17xx/CVE-2024-1742.json) (`2024-03-22T11:15:46.457`) -* [CVE-2024-1848](CVE-2024/CVE-2024-18xx/CVE-2024-1848.json) (`2024-03-22T11:15:46.633`) -* [CVE-2024-25168](CVE-2024/CVE-2024-251xx/CVE-2024-25168.json) (`2024-03-22T12:15:07.717`) -* [CVE-2024-28559](CVE-2024/CVE-2024-285xx/CVE-2024-28559.json) (`2024-03-22T12:15:07.790`) -* [CVE-2024-28560](CVE-2024/CVE-2024-285xx/CVE-2024-28560.json) (`2024-03-22T12:15:07.860`) -* [CVE-2024-28824](CVE-2024/CVE-2024-288xx/CVE-2024-28824.json) (`2024-03-22T11:15:46.830`) +* [CVE-2024-2448](CVE-2024/CVE-2024-24xx/CVE-2024-2448.json) (`2024-03-22T14:15:08.683`) +* [CVE-2024-2449](CVE-2024/CVE-2024-24xx/CVE-2024-2449.json) (`2024-03-22T14:15:09.210`) +* [CVE-2024-2722](CVE-2024/CVE-2024-27xx/CVE-2024-2722.json) (`2024-03-22T14:15:09.403`) +* [CVE-2024-2723](CVE-2024/CVE-2024-27xx/CVE-2024-2723.json) (`2024-03-22T14:15:09.643`) +* [CVE-2024-2724](CVE-2024/CVE-2024-27xx/CVE-2024-2724.json) (`2024-03-22T14:15:09.857`) +* [CVE-2024-2725](CVE-2024/CVE-2024-27xx/CVE-2024-2725.json) (`2024-03-22T14:15:10.143`) +* [CVE-2024-2726](CVE-2024/CVE-2024-27xx/CVE-2024-2726.json) (`2024-03-22T14:15:10.393`) +* [CVE-2024-2727](CVE-2024/CVE-2024-27xx/CVE-2024-2727.json) (`2024-03-22T14:15:10.593`) +* [CVE-2024-2728](CVE-2024/CVE-2024-27xx/CVE-2024-2728.json) (`2024-03-22T14:15:10.807`) +* [CVE-2024-29943](CVE-2024/CVE-2024-299xx/CVE-2024-29943.json) (`2024-03-22T13:15:07.440`) +* [CVE-2024-29944](CVE-2024/CVE-2024-299xx/CVE-2024-29944.json) (`2024-03-22T13:15:07.503`) ### CVEs modified in the last Commit -Recently modified CVEs: `65` +Recently modified CVEs: `34` +* [CVE-2024-2773](CVE-2024/CVE-2024-27xx/CVE-2024-2773.json) (`2024-03-22T12:45:36.130`) +* [CVE-2024-2774](CVE-2024/CVE-2024-27xx/CVE-2024-2774.json) (`2024-03-22T12:45:36.130`) +* [CVE-2024-2775](CVE-2024/CVE-2024-27xx/CVE-2024-2775.json) (`2024-03-22T12:45:36.130`) +* [CVE-2024-2776](CVE-2024/CVE-2024-27xx/CVE-2024-2776.json) (`2024-03-22T12:45:36.130`) +* [CVE-2024-2777](CVE-2024/CVE-2024-27xx/CVE-2024-2777.json) (`2024-03-22T12:45:36.130`) +* [CVE-2024-2778](CVE-2024/CVE-2024-27xx/CVE-2024-2778.json) (`2024-03-22T12:45:36.130`) +* [CVE-2024-2779](CVE-2024/CVE-2024-27xx/CVE-2024-2779.json) (`2024-03-22T12:45:36.130`) +* [CVE-2024-2780](CVE-2024/CVE-2024-27xx/CVE-2024-2780.json) (`2024-03-22T12:45:36.130`) +* [CVE-2024-2805](CVE-2024/CVE-2024-28xx/CVE-2024-2805.json) (`2024-03-22T12:45:36.130`) +* [CVE-2024-2806](CVE-2024/CVE-2024-28xx/CVE-2024-2806.json) (`2024-03-22T12:45:36.130`) +* [CVE-2024-2807](CVE-2024/CVE-2024-28xx/CVE-2024-2807.json) (`2024-03-22T12:45:36.130`) * [CVE-2024-2808](CVE-2024/CVE-2024-28xx/CVE-2024-2808.json) (`2024-03-22T12:45:36.130`) * [CVE-2024-2809](CVE-2024/CVE-2024-28xx/CVE-2024-2809.json) (`2024-03-22T12:45:36.130`) * [CVE-2024-2810](CVE-2024/CVE-2024-28xx/CVE-2024-2810.json) (`2024-03-22T12:45:36.130`) * [CVE-2024-2811](CVE-2024/CVE-2024-28xx/CVE-2024-2811.json) (`2024-03-22T12:45:36.130`) -* [CVE-2024-28116](CVE-2024/CVE-2024-281xx/CVE-2024-28116.json) (`2024-03-22T12:45:36.130`) -* [CVE-2024-28117](CVE-2024/CVE-2024-281xx/CVE-2024-28117.json) (`2024-03-22T12:45:36.130`) -* [CVE-2024-28118](CVE-2024/CVE-2024-281xx/CVE-2024-28118.json) (`2024-03-22T12:45:36.130`) -* [CVE-2024-28119](CVE-2024/CVE-2024-281xx/CVE-2024-28119.json) (`2024-03-22T12:45:36.130`) * [CVE-2024-2812](CVE-2024/CVE-2024-28xx/CVE-2024-2812.json) (`2024-03-22T12:45:36.130`) * [CVE-2024-2813](CVE-2024/CVE-2024-28xx/CVE-2024-2813.json) (`2024-03-22T12:45:36.130`) * [CVE-2024-2814](CVE-2024/CVE-2024-28xx/CVE-2024-2814.json) (`2024-03-22T12:45:36.130`) -* [CVE-2024-2815](CVE-2024/CVE-2024-28xx/CVE-2024-2815.json) (`2024-03-22T12:45:36.130`) -* [CVE-2024-2816](CVE-2024/CVE-2024-28xx/CVE-2024-2816.json) (`2024-03-22T12:45:36.130`) -* [CVE-2024-2817](CVE-2024/CVE-2024-28xx/CVE-2024-2817.json) (`2024-03-22T12:45:36.130`) -* [CVE-2024-28171](CVE-2024/CVE-2024-281xx/CVE-2024-28171.json) (`2024-03-22T12:45:36.130`) * [CVE-2024-28441](CVE-2024/CVE-2024-284xx/CVE-2024-28441.json) (`2024-03-22T12:45:36.130`) -* [CVE-2024-28521](CVE-2024/CVE-2024-285xx/CVE-2024-28521.json) (`2024-03-22T12:45:36.130`) -* [CVE-2024-28756](CVE-2024/CVE-2024-287xx/CVE-2024-28756.json) (`2024-03-22T12:45:36.130`) * [CVE-2024-28863](CVE-2024/CVE-2024-288xx/CVE-2024-28863.json) (`2024-03-22T12:45:36.130`) -* [CVE-2024-28891](CVE-2024/CVE-2024-288xx/CVE-2024-28891.json) (`2024-03-22T12:45:36.130`) * [CVE-2024-29031](CVE-2024/CVE-2024-290xx/CVE-2024-29031.json) (`2024-03-22T12:45:36.130`) * [CVE-2024-29271](CVE-2024/CVE-2024-292xx/CVE-2024-29271.json) (`2024-03-22T12:45:36.130`) * [CVE-2024-29272](CVE-2024/CVE-2024-292xx/CVE-2024-29272.json) (`2024-03-22T12:45:36.130`) diff --git a/_state.csv b/_state.csv index 66a75ad93c4..977a8bd9d3d 100644 --- a/_state.csv +++ b/_state.csv @@ -169462,7 +169462,7 @@ CVE-2021-23433,0,0,b2776fd93a740aec110e19aa61149b3d7fb8ff56c797a923029c3929e2a72 CVE-2021-23434,0,0,ceac5d27ebb108299f54485d441ee80e58c3fc576e68182971e6755ffa745eb1,2023-01-30T18:24:02.727000 CVE-2021-23435,0,0,a93ccb0e71ca4cf74b74b602169866d6d253c2624dfe5b7d1536ef28140796aa,2021-09-23T17:33:28.967000 CVE-2021-23436,0,0,d43e750b60c6d58e450b6a09c83c8b51c21faaa3df37449937c2fd2c44358384,2021-09-10T13:33:17.097000 -CVE-2021-23437,0,1,594f8d8574d2535253d24dfb7acfed07aba4e5f32ce03adc22f66570c3b1e985,2024-03-22T11:15:45.353000 +CVE-2021-23437,0,0,594f8d8574d2535253d24dfb7acfed07aba4e5f32ce03adc22f66570c3b1e985,2024-03-22T11:15:45.353000 CVE-2021-23438,0,0,a2ba5ddca006c7fb9f995ef32cc1418fd5b76584e1d92ca3d4f11ddb7f0cef46,2021-09-10T15:23:21.947000 CVE-2021-23439,0,0,b93dc0c2aeafbd9e2161bbc111810808ab6b87a725da968c82776f53028a38d6,2021-09-10T19:46:37.847000 CVE-2021-2344,0,0,d1959cac8c46e2b5c2412baeace0d0eec49e23f539e87736dab15004e4c436ac,2021-07-22T22:33:58.470000 @@ -191436,7 +191436,7 @@ CVE-2022-22813,0,0,14e619740a9a4770a045635f86e3b2761c5468c2d2be634cc8de3d94aa65a CVE-2022-22814,0,0,e3eaede5c26fd69dcc699a8b528801d82b3cb928e5ded9594a01199c1dd8e32e,2022-03-15T19:45:27.253000 CVE-2022-22815,0,0,d57ef4407062512fc8feb27b52847428e1f4bc2ea27f2cfa9701949f9b377684,2023-01-31T17:27:36.360000 CVE-2022-22816,0,0,d5952ede1ae505cbae419495ba93a78d823118186eef6fb4b49e894312957deb,2023-01-31T17:41:46.750000 -CVE-2022-22817,0,1,c58ba3807735e1898722875705ddbea951451c8b58a32c72807bb32362db4487,2024-03-22T11:15:45.900000 +CVE-2022-22817,0,0,c58ba3807735e1898722875705ddbea951451c8b58a32c72807bb32362db4487,2024-03-22T11:15:45.900000 CVE-2022-22818,0,0,4fd33db9036533015bf6c29a2f8f0f4cc47c46a3e640a7c9f42df7aef83e0f52,2023-11-07T03:43:59.953000 CVE-2022-22819,0,0,7e40f131dace9443ee95d247a581f9521ecae37150b490560ba8cffb27685b43,2022-04-15T18:16:34.460000 CVE-2022-2282,0,0,e9697ca1b224a9a3b896349240d60f06f43eac4492774943e345e0ccd051731f,2023-11-07T03:46:24.137000 @@ -230285,7 +230285,7 @@ CVE-2023-4295,0,0,ec56fb9406b5889c47288aaf0ca0b50df9da68e8409e0f183bd2d96adf912d CVE-2023-42951,0,0,f47d9d53b96327a99c3cf9d9b6178395ac7e4f6ffb9fc1067e40ded2ecc60fdb,2024-02-22T19:07:27.197000 CVE-2023-42952,0,0,f7dadd56b6a68a714e4e042690efb1e01d718cc903255fad9804058d56088666,2024-02-22T19:07:27.197000 CVE-2023-42953,0,0,0ea855ba33bbd4297f25ae9925400ebda739241895a723a394f07f9bd3e18595,2024-02-22T19:07:27.197000 -CVE-2023-42954,0,1,4ff84847c56efbc3f637425a9807eb7b381f4c2cedb6bf16f12c3ca640d4fba3,2024-03-22T12:45:36.130000 +CVE-2023-42954,0,0,4ff84847c56efbc3f637425a9807eb7b381f4c2cedb6bf16f12c3ca640d4fba3,2024-03-22T12:45:36.130000 CVE-2023-4296,0,0,d2ae4b9dc4bd1f62bf026bddbb5b57fabef675b1476686b487fb198d6eb084a6,2023-11-07T04:22:26.050000 CVE-2023-4297,0,0,2c1c4e8e16b8093dbd67367ad04a33c7dee7987a75a3f105a73f15afb0fc121e,2023-11-30T05:15:24.520000 CVE-2023-4298,0,0,8d44cb3045014d8716e0dbcd1489dfd2b845690c0f9918da8a0ecf5aeaadb4f7,2023-11-07T04:22:26.147000 @@ -231088,7 +231088,7 @@ CVE-2023-44267,0,0,f716114bc1138d91aaa3aef3879ca1159b5aef8bf9a2ab35b1b476fe4255c CVE-2023-44268,0,0,0ba2834ae84d2099198b0c2e5a8633114e4ea817e540586788a14e1fff0ff6ea,2024-01-02T19:15:10.403000 CVE-2023-4427,0,0,d877e9fa4ef165a222c97fa3e4f26b62e8234dff613f0155f4530528ed0e28da,2024-01-31T17:15:16.043000 CVE-2023-44270,0,0,5afd2325a69f7ec28483dc127bab6685eed7a7ff12b34b63fa160150c8844ce7,2023-10-10T17:19:55.690000 -CVE-2023-44271,0,1,f193f0342a06850015aae273b8901e3f9941649a0fe51ffaf4d332bdffad8f4c,2024-03-22T11:15:46.063000 +CVE-2023-44271,0,0,f193f0342a06850015aae273b8901e3f9941649a0fe51ffaf4d332bdffad8f4c,2024-03-22T11:15:46.063000 CVE-2023-44272,0,0,83c2ce194c7d88319574e0a015dc9e0b02900f1ee3d06d815bfe66cd7de4baf8,2023-10-10T13:31:11.370000 CVE-2023-44273,0,0,70fd1482516ce85c19730c580bd0595b26f55bc9cc52f3a7e0c599b6c1f7aeac,2023-10-02T21:06:10.147000 CVE-2023-44275,0,0,311c9a72d382e36b26d1888b7b4c0262b5afa5f6165a6243e6e9644a9ade9670,2023-10-02T18:42:50.667000 @@ -238197,7 +238197,7 @@ CVE-2024-0625,0,0,e6db3236f3f3d4946f9c7470ea75c8f4fd101b44f963c82c90bc3a0f21b31d CVE-2024-0628,0,0,6929f2a7a44b9bc6b3b457ec8d478ddb1d9368f01ad7383ad0399a751f886828,2024-02-13T19:18:46.020000 CVE-2024-0630,0,0,49e9d42e1e8004a90a8d62b54ea8a5d5f6ebecab9fac26e6e82dc914d2e02636,2024-02-13T15:42:35.563000 CVE-2024-0631,0,0,2f5c2ea731c38b842212d56f60f3b6dadcbef37badf95ddbebb4424c79d6cc97,2024-03-13T18:16:18.563000 -CVE-2024-0638,1,1,670847b0d970db122b3c23c1c351801a3e9da2204e4d04822c0f94a07c61f9c7,2024-03-22T12:45:36.130000 +CVE-2024-0638,0,0,670847b0d970db122b3c23c1c351801a3e9da2204e4d04822c0f94a07c61f9c7,2024-03-22T12:45:36.130000 CVE-2024-0639,0,0,70e6108a4833d98566f9bceea8a86b5fbfb00264d1679279f76ea7c5de48b4aa,2024-02-14T13:15:08.107000 CVE-2024-0641,0,0,a011c2128d997633c3943566b2966020fb742742c755347ad42b0febd95e3094,2024-02-14T13:15:08.363000 CVE-2024-0642,0,0,a90bcf6571ee802087327f525ede816b704f8421563c66e3216693601bbf1072,2024-01-24T19:29:41.893000 @@ -238443,7 +238443,7 @@ CVE-2024-0951,0,0,70f9d7a0b27e7f387a1ff2598314019880c5177c538c6128833bb679ac3ee6 CVE-2024-0953,0,0,56fda260ffe976a7ef0af83f343a5276bf8287ea78e25bf62da55b0bd2fa66b4,2024-02-09T16:38:45.380000 CVE-2024-0954,0,0,92d487f8352d875ad7c9643d44b7db6d2cc982c57e78aa26aa47eabfd56c0e18,2024-02-13T19:44:56.887000 CVE-2024-0955,0,0,cfbac7d3febc68cf4fd877d8d46446e6f6653d1e6237b8fd255083aebefa3781,2024-02-14T18:15:04.450000 -CVE-2024-0957,0,1,7922b3769391ec8b458fd713641215b05316a324b89aa400aeea2cde81e28aff,2024-03-22T12:45:36.130000 +CVE-2024-0957,0,1,b8f649b77bd6304910e8212cad80c7c052ff9790be5337b573c49cdc67104203,2024-03-22T12:45:36.130000 CVE-2024-0958,0,0,bb1de1520fff55b820215353b073f7beca1ac95c14382b0305a1d3b87252c969,2024-03-21T02:51:29.353000 CVE-2024-0959,0,0,b37da110a344aaef12dcd11555873ccf199e6c06da5c5f0b4d2f858f2707809c,2024-03-21T02:51:29.457000 CVE-2024-0960,0,0,90f2c16328a9579861cfb524e15dc7586206117534086ffb1373ad4853812daf,2024-03-21T02:51:29.553000 @@ -238968,11 +238968,11 @@ CVE-2024-1720,0,0,3f534b1db2e7b75966562da6fb1d468afac7b86b23a312961b1d896997e21d CVE-2024-1722,0,0,bbfa2fe804b85c8f73b8225a9811c290a6a29ddc6e06b05c51fd071f985f9060,2024-02-29T13:49:29.390000 CVE-2024-1723,0,0,7e337e59dda9fcfb03cb2d0ee4f7926bbc1a4aeb3afb375b3ac4508c9e5d97e9,2024-03-13T18:15:58.530000 CVE-2024-1725,0,0,ee1fb8cd83e91b3cc554ef61ba8506273bf384217121fa2160f3c7c69e57a993,2024-03-08T14:02:57.420000 -CVE-2024-1727,0,1,f4e653a98477d638f895ffe05e108bd41757e63f270b3b4944ff32c3013cd3b1,2024-03-22T12:45:36.130000 +CVE-2024-1727,0,0,f4e653a98477d638f895ffe05e108bd41757e63f270b3b4944ff32c3013cd3b1,2024-03-22T12:45:36.130000 CVE-2024-1731,0,0,a54dfdadfcd6666506c62883f073482e904182fadeecad8ff7a349f271e0661b,2024-03-05T13:41:01.900000 CVE-2024-1733,0,0,d9cf8004467e67497b484a605a620c0a0db32312b35f534ec3be854a6ce160fc,2024-03-17T22:38:29.433000 CVE-2024-1735,0,0,fef99247045161df3b08e17c74949b5db371420b96202703c89efa90d1969060,2024-02-26T16:32:25.577000 -CVE-2024-1742,1,1,49a014e71feeebf0985e26bc6d9858143440f2617b6f3a9f2dea0afb22280114,2024-03-22T12:45:36.130000 +CVE-2024-1742,0,0,49a014e71feeebf0985e26bc6d9858143440f2617b6f3a9f2dea0afb22280114,2024-03-22T12:45:36.130000 CVE-2024-1748,0,0,a1dc98a9081cf73f47d608f84388fd9e1d6663e40c50dbfb283535778827ec26,2024-03-21T02:51:45.040000 CVE-2024-1749,0,0,4b591dad7740802113c665ceda12f8a50246d60996cd4895b30a69f97068386e,2024-03-21T02:51:45.117000 CVE-2024-1750,0,0,2c5d0228a637c37f3f121f1e7fcc9f9b6be5eacb2ceb4e3205185263509a639c,2024-03-21T02:51:45.190000 @@ -239035,7 +239035,7 @@ CVE-2024-1834,0,0,34efbd36d642aefb77d373bb68d86d8c401bbf1dbf4148f42d1403ddb4b77b CVE-2024-1843,0,0,979d0dff9637d9cab00bf6a14f591ee68b79b4ec3300ebdf02b15cf0e8a60188,2024-03-13T18:15:58.530000 CVE-2024-1844,0,0,8eafa490137dd0762fdf2a9173e258dc01143942e9be70a3263d7ca4a0a3afc7,2024-03-20T13:00:16.367000 CVE-2024-1847,0,0,152f4d845ce8c23980172297d934e8efa3d32af4a304d4db000f4175545dd48b,2024-02-29T13:49:47.277000 -CVE-2024-1848,1,1,49bc95b83fdcb1de57fb16649e6cabd4575c1a454c9061d01fd7a6bea1c0c44e,2024-03-22T12:45:36.130000 +CVE-2024-1848,0,0,49bc95b83fdcb1de57fb16649e6cabd4575c1a454c9061d01fd7a6bea1c0c44e,2024-03-22T12:45:36.130000 CVE-2024-1851,0,0,ac07ab34f3e596527407cf2fcb93e785fa1a213045982c8aadd05f9e543a11a5,2024-03-08T14:02:57.420000 CVE-2024-1853,0,0,d8883604ae63cf7a1fbe4fa65bd3207340a5327b7afe017b25b83cfed4793944,2024-03-15T12:53:06.423000 CVE-2024-1854,0,0,67720ca675e573934fd73c30069aead563244277f4e5c6d2e86973e2c6bd9b5b,2024-03-13T18:15:58.530000 @@ -239337,7 +239337,7 @@ CVE-2024-20768,0,0,7801fe19f37e045dfaa63591debdec338bb248ebe98979bd1417c8db12646 CVE-2024-2077,0,0,5ca3f9022129534f614f35499858c838a2901ea9cdb4aa8c5469f82f0ebb4ea1,2024-03-21T02:52:29 CVE-2024-2078,0,0,c5cf1f8224dc1437cc5c72b4c20f193ca60f923ea1195c1e3b8d6f13446a32c9,2024-03-01T14:04:04.827000 CVE-2024-2079,0,0,d19df912ca8f24c4783570207f7ead00a2f333eee11795e142007ff6a5180cfc,2024-03-14T12:52:16.723000 -CVE-2024-2080,0,1,9678e6b2bd19e458e9afd4afe23013b56dd990bdf344fb6cc8cb0cebe808ca2d,2024-03-22T12:45:36.130000 +CVE-2024-2080,0,1,32a4465f2fc45199bcb0563622cd911532e367b79194bc4a312258059486223d,2024-03-22T12:45:36.130000 CVE-2024-20802,0,0,09b0e538ab7892d37fab32a8e5c61289f6ef8af3dfbdfbb048a6512fa7396094,2024-01-10T16:14:57.787000 CVE-2024-20803,0,0,6c415e68c0cc04850639517c5e65b145b62c937ecdd266efbaf3b8a7e936e490,2024-01-10T16:11:26.313000 CVE-2024-20804,0,0,f961cce5ac55cac12f82f1b9af1706ecad8b5889d74e0d2cb7f3ec9a86f51549,2024-01-10T16:10:45.437000 @@ -240425,7 +240425,7 @@ CVE-2024-23479,0,0,347fa1fab90846375f3cbda9f21578cf079b96a3697a975655102d71cb94c CVE-2024-23488,0,0,57450458303c48f58f7accf28de637666e8c4b38b2ec58f4dc15eb09b92be21a,2024-02-29T13:49:29.390000 CVE-2024-23492,0,0,7ac211a2a1c5c083cd2cd2691020edf3a51548a70085e44c956a49351fc4de8b,2024-03-21T02:52:07.353000 CVE-2024-23493,0,0,91cbf193a715aa0c526237151c4d36164df1ccaf1f366a7cf8bdf551267e12ba,2024-02-29T13:49:29.390000 -CVE-2024-23494,0,1,b0caf2085e392cc3bc68ca55116da91c21555e60e2c1de42e26200119e65e7a6,2024-03-22T12:45:36.130000 +CVE-2024-23494,0,0,b0caf2085e392cc3bc68ca55116da91c21555e60e2c1de42e26200119e65e7a6,2024-03-22T12:45:36.130000 CVE-2024-23496,0,0,54460b511136d506c1739ae0305dae6652e35c7827e88f55ee2e0b0ef3ab3902,2024-02-26T18:15:07.580000 CVE-2024-23501,0,0,b3e85809586c989dd0a69f1f88e280acf334973e6408d57bc052ae66513752bd,2024-02-29T13:49:29.390000 CVE-2024-23502,0,0,8f894ed7c8e8f8359294a01d255055a873ed16e9a79e2948ed3ac6f5d8f8da9f,2024-02-09T14:46:17.743000 @@ -240679,7 +240679,7 @@ CVE-2024-23905,0,0,2d8ebad5c05b335845d8a0c6b27832798a9c27087f41f1dd4daf5a7e2afef CVE-2024-2391,0,0,5eb10c991275accc4f0c04c536ff0ab64c132e711d4ba9c8aec48c31334f05e4,2024-03-21T02:52:33.807000 CVE-2024-23910,0,0,ee793d9b54a2b016ed958b8f34e12c76d98107f9ab2799f3866e1d534fa290cd,2024-02-29T13:49:47.277000 CVE-2024-23917,0,0,43acd2786eef775b4e5af3da03e8f628e79a58b917087bea0e9c91638665592f,2024-02-09T01:05:22.180000 -CVE-2024-2392,0,1,d6265410c66b5a26bb5d104e30cecbc8e0b6530c6a08e2c3c74df1ed21670318,2024-03-22T12:45:36.130000 +CVE-2024-2392,0,1,42336a48d6bafcd50dc6522fe24a4d56dee45c4fa6295037e9d4d2226834e64c,2024-03-22T12:45:36.130000 CVE-2024-2393,0,0,8cedba0180a7b00def73b6261f8c72d770c30f1bb7624197b9fba956f17cd30c,2024-03-21T02:52:33.897000 CVE-2024-2394,0,0,51ed08a9d2d11c04bf80b3b8c464e981a2e910ed0b3ed1a99202d774fc30b086,2024-03-21T02:52:33.977000 CVE-2024-23940,0,0,88f3246b7d729e9740dbc7accb734f511d890171cb976d7dde750494e61216dd,2024-02-06T19:19:33.920000 @@ -240688,7 +240688,7 @@ CVE-2024-23944,0,0,d7189cd17bc8529e11b77c38b3cbb5d227e8a7f862bb2fe75d66b288543ad CVE-2024-23946,0,0,32194d05d3f7a3a80cd0b416a872a66ff74b3120ea9e0897100b1fe32331e71d,2024-03-12T17:29:17.243000 CVE-2024-2395,0,0,1fdafc69366cd072c6108b6d86410a63c85cce9eeaa62bcac076c3a2bc3a1766,2024-03-13T12:33:51.697000 CVE-2024-23952,0,0,89289c4c1b03193a134cbe14ed609452617a970c4d8ae9dfbad6f91cd36db610,2024-02-14T14:16:07.460000 -CVE-2024-23975,0,1,baeca8d4c06e1a18eea86da121d0a833b4b39a471498d57fc82722b025e37962,2024-03-22T12:45:36.130000 +CVE-2024-23975,0,0,baeca8d4c06e1a18eea86da121d0a833b4b39a471498d57fc82722b025e37962,2024-03-22T12:45:36.130000 CVE-2024-23976,0,0,c6327f87e3c19d6c46c6a7ff9e0644c74688322bbd7d7b77f1f15872b56e20b5,2024-02-14T18:04:45.380000 CVE-2024-23978,0,0,50b9b56dcf99994468c287c3928875335c0c7eb104dcf6bd6ec21318911061dd,2024-03-21T02:52:09.667000 CVE-2024-23979,0,0,5e1dc647eec92472a586c7319077fa782b48d632d4a171a926ee19c9f0ee9a24,2024-02-14T18:04:45.380000 @@ -240787,7 +240787,7 @@ CVE-2024-24263,0,0,a7faff23323264f34f9c62262fa3f03aa668fa6eb0738632fbcd67b53dcba CVE-2024-24265,0,0,af394545ccd1a804e78a325f17868ed02a0d7133b6c62faa71b15705be7c579e,2024-02-07T23:06:25.303000 CVE-2024-24266,0,0,af2222be5080c2bad50dea6cff249c7d07d0b0a9a7e6f3a785220071b883839d,2024-02-07T23:28:17.213000 CVE-2024-24267,0,0,95558cbe9d72e85c3d366ac9b6c161da57c7f083ab6736f7e86204c7be33f1c7,2024-02-07T23:28:24.530000 -CVE-2024-24272,0,1,8f6883745a139dd4938d495410234eff50fc737ee779757f8e18a902dca99341,2024-03-22T12:45:36.130000 +CVE-2024-24272,0,0,8f6883745a139dd4938d495410234eff50fc737ee779757f8e18a902dca99341,2024-03-22T12:45:36.130000 CVE-2024-24275,0,0,5ee5552d1ccdff1349c63c1ee819e4122e7275d9cd64505362d94567de774ca6,2024-03-06T15:18:08.093000 CVE-2024-24276,0,0,c0b996f05c041cdec9f97004ccc67bd94d1c66cbf22b8df3dba73751978abd1f,2024-03-06T15:18:08.093000 CVE-2024-24278,0,0,3f7eb60b847e1971c5f65cb683e6174dee6547147c3195ceb2f7499f12bdbd36,2024-03-06T15:18:08.093000 @@ -240846,8 +240846,10 @@ CVE-2024-24475,0,0,da128c239114738663c22cbcb468c90723f598d143228b589356daf690131 CVE-2024-24476,0,0,c6a79e6b679134d6e56eb6290a1a74b009876304d1bc61a6bd2473a9a7f51827,2024-03-21T02:52:10.613000 CVE-2024-24478,0,0,ae4578688dc9e3461c0fdedac5d3a771e3cdb8c7bfd00151650d654178548c13,2024-03-21T02:52:10.653000 CVE-2024-24479,0,0,6fa4dced88a956e3946a50eb9b98a8741313ace42fb10780fb0018f1512f325f,2024-03-21T02:52:10.690000 +CVE-2024-2448,1,1,f3220267333f680ed63839d4f9aaa0b4db07d5c9c6e3700855cad8112a4df3a2,2024-03-22T14:15:08.683000 CVE-2024-24482,0,0,d0c5de64fed42524f00b63fd5c9fd6582210b6f756383f7c85fd22e6463f36a5,2024-02-12T17:46:35.760000 CVE-2024-24488,0,0,1834d834c06b744231a786a072c029583b1651fcc4f266317ba3be41edb13e03,2024-02-15T02:23:45.887000 +CVE-2024-2449,1,1,6afe6088c073070f165f3f7d3ceaa6053a6561238ffea9b0db222b2a9a305c4b,2024-03-22T14:15:09.210000 CVE-2024-24494,0,0,942a90800617c3456df5cee3b91fb8289ef00c4e11442995fdf45eb40ccdbcd2,2024-02-09T01:37:59.330000 CVE-2024-24495,0,0,85b476ee903b981e44768f930a7e6f08423d0eeff2df2b9bb45af20131c5e4c5,2024-02-22T03:38:09.717000 CVE-2024-24496,0,0,d3af8fed4f9dc5ab516231a6a765383283bf96cc93c20c6077308e5e48b88c15,2024-02-22T03:38:14.123000 @@ -240861,7 +240863,7 @@ CVE-2024-24520,0,0,1c17a865e2018472844eee3eeb32382c844b7628a24e3ba8ccf07a6f4355d CVE-2024-24524,0,0,40ecb02cd326bdc34833c61cf5eb3e9f45f526d45502f51591361c36d1938c63,2024-02-09T16:30:43.830000 CVE-2024-24525,0,0,13b50b322b70c1ba78c523473a9882b44cc13b59455e3e47dd336806a91a1148,2024-02-29T13:49:29.390000 CVE-2024-24528,0,0,184f3e16e059f6b990b79bbe85c13104f1b7059f71d8a1713060531c24aa2c42,2024-02-26T19:15:07.247000 -CVE-2024-2453,0,1,1a1e30ab1ddfd877b3c40a8485954e71abb846433897a6c65447e66a0da04466,2024-03-22T12:45:36.130000 +CVE-2024-2453,0,1,3516619c9d1ad877533ff47d2854d77f923dcb6e13d6b386a451fa313ccb4d47,2024-03-22T12:45:36.130000 CVE-2024-24539,0,0,f93dd0b0f28d93142ebc045d2b13c802b69814cdafc34403acf2ae3cd69400ec,2024-03-18T12:38:25.490000 CVE-2024-24543,0,0,f516e88d85199344e1e2c4ae69468b4de7248951f71da4710fc97171a286ff1a,2024-02-14T17:13:32.827000 CVE-2024-24548,0,0,9dbe1af5af4a9b865bf88b2a305b739ac231a7ce95c9c8ed04344b3144708c91,2024-02-08T18:53:14.107000 @@ -241090,7 +241092,7 @@ CVE-2024-24975,0,0,c403197a52452c60ee17afdfbf9edd4a6993ed059ba65add25a9b2620ac53 CVE-2024-24988,0,0,5be9c22e9d6c42885be25053a8e3f832fee202eb91ce1cb05a36918eae761d1a,2024-02-29T13:49:29.390000 CVE-2024-24989,0,0,39be90963d0952b8475635420a2f64ca0893f9b2941aa846029d2a39bd57b9e9,2024-02-14T18:04:45.380000 CVE-2024-24990,0,0,f549c5a0bfcab6df0ca6e0a5d66e4c65b77814eac3b9adbe63217da37b030524,2024-02-14T18:04:45.380000 -CVE-2024-2500,0,1,eeca690a82fee58ccb89521313e0d372bedaedad32c8a23ee2edf63168d49334,2024-03-22T12:45:36.130000 +CVE-2024-2500,0,1,f5c841f144cdfe7169c1d4e3da08b5dd9b9f87140741671656f61d60bd0ec54e,2024-03-22T12:45:36.130000 CVE-2024-25001,0,0,c1f11a8c76d43265d10cf34f1d6db6525f3220be11629d1b39a2f52375286f02,2024-02-02T09:15:37.527000 CVE-2024-25003,0,0,81fc44567692de3ff8c7fc733c0c0e2d235894df02bbd6e47e58282e052331c4,2024-02-14T20:15:45.910000 CVE-2024-25004,0,0,7a3e97355ce2dbcf95cced55d21b2139e157cf3c2ca72e6e2fce6c561e1f0059,2024-02-14T20:15:45.980000 @@ -241161,7 +241163,7 @@ CVE-2024-25164,0,0,cb09965552a1f390f4064031a22c4e145a720dca523f49b901fb7b90f192d CVE-2024-25165,0,0,416a8b518b9c4a5742bbec94408d835314b2b53d43ae0a8909f15e16fbbd1a92,2024-02-15T06:23:39.303000 CVE-2024-25166,0,0,129a95ebe90cc2b383c4fe37f7a5c2e5cdcb882bd64dbe64af9759fbd5ff754c,2024-02-27T14:20:06.637000 CVE-2024-25167,0,0,314d29be8aff0effafef809690355662eec6786582244dd076bbe65fcc11776b,2024-03-21T12:58:51.093000 -CVE-2024-25168,1,1,4c60c5970e5a6dc00889c796b84dfd134e4159d26b6ab895ebebfb3b8b49de65,2024-03-22T12:45:36.130000 +CVE-2024-25168,0,0,4c60c5970e5a6dc00889c796b84dfd134e4159d26b6ab895ebebfb3b8b49de65,2024-03-22T12:45:36.130000 CVE-2024-25169,0,0,085f93c697cbc9b87909098278959f0cd92cdefab08c3f134d9cf1b867f4821c,2024-02-29T13:49:47.277000 CVE-2024-2517,0,0,0441abadbeedd264efa656d79b5db1b209dff164938452b2b5564307f14e6df7,2024-03-21T02:52:35.810000 CVE-2024-25170,0,0,8c10b04ca5b0dc9d98ec03819b8af4a2061c2ed0e688a9769189e27171052682,2024-02-29T13:49:47.277000 @@ -241313,7 +241315,7 @@ CVE-2024-25553,0,0,7897cd9b8668fce1d605300c650e28167f9921d03a4fde26bc34f4ebe4511 CVE-2024-25554,0,0,a87c08d7479e0670c1de7ac680e974b7c966b7f12d7b309312798a5acd199088,2024-03-01T08:15:38.107000 CVE-2024-25559,0,0,621d2089e4066088e4f2e7151d4c52b797349073e2e5f4d074059dc172fb61d6,2024-02-15T06:23:39.303000 CVE-2024-2556,0,0,7dda608d4c973332c242425a23922df86f3028261d216807853df92150e28261,2024-03-21T02:52:37.803000 -CVE-2024-25567,0,1,bbb8c64eb3dcee3e8e89951734f837d0c3bea66c11459a30529f4c9133593805,2024-03-22T12:45:36.130000 +CVE-2024-25567,0,0,bbb8c64eb3dcee3e8e89951734f837d0c3bea66c11459a30529f4c9133593805,2024-03-22T12:45:36.130000 CVE-2024-2557,0,0,bd3cbcd6fdd2bc53d05ad0a21dcf76dc9100645c8cd39cc3bfd0cd796821c2ef,2024-03-21T02:52:37.887000 CVE-2024-25578,0,0,ff68f9ee0e3394b3fa83fe8766f2e044325a5fd043b437de063c0cd80654c610,2024-03-01T14:04:26.010000 CVE-2024-25579,0,0,91953a88eab65ef3b6eb3b0fbea08ce09211ffa83ae8783d4b439f2092b924fc,2024-02-29T13:49:47.277000 @@ -241426,8 +241428,8 @@ CVE-2024-2579,0,0,82ab7736c7cd2bae37cca14333922f5ac036820dddbd265831a9ea551e48aa CVE-2024-2580,0,0,17c770530b9c88c0a0bc27203561d8211df9836f86fe3343fde81a78a162c0d5,2024-03-21T19:47:03.943000 CVE-2024-25801,0,0,86d0a2f88d637a38d728e68507deae5ad1ee66b74383784e4b403b33b5149a86,2024-02-22T19:07:27.197000 CVE-2024-25802,0,0,cb029cdbf03ee0051152f36415381bb55ee304fcb50819490e22f017c52403c6,2024-02-22T19:07:27.197000 -CVE-2024-25807,0,1,c1d489498752464908d00a69b000ccd460d21a563d21c07e19126031176b1c9d,2024-03-22T12:45:36.130000 -CVE-2024-25808,0,1,ddcb104e0376c8efdf3e08360567a1acc93a07401be091355dfd344d9568dfd0,2024-03-22T12:45:36.130000 +CVE-2024-25807,0,1,85b77c366cf2c1b2fb4937292fdfeb60a9ca99d654220e8140288f7d8bd4e1f3,2024-03-22T12:45:36.130000 +CVE-2024-25808,0,1,ca13d6f7a3f0ddba59e23086161ff278d84f97c260daa4e5edc64c08473aaaeb,2024-03-22T12:45:36.130000 CVE-2024-2581,0,0,6eca5564f5891085eb56e7f4cce8a941d50b5c5d945724a4654e0a645ab887e7,2024-03-21T02:52:39.600000 CVE-2024-25811,0,0,17589bbc78cc5e463e6c2e2c6ba06158f5e6effb7ffe3523769d8c6653c9997a,2024-03-21T12:58:51.093000 CVE-2024-25817,0,0,8244c17ffec667dd25976664571f96aed86930fb569e330976ea19223cb10648,2024-03-06T15:18:08.093000 @@ -241500,7 +241502,7 @@ CVE-2024-25932,0,0,b47ba5ecf2a19427a2d0c7404d84cf9b82c7d738bc913534568255e831392 CVE-2024-25933,0,0,093a19179e6e045a94069a9cabb14922ac900e3b53f12387034c6f0b19d4fd7f,2024-03-17T22:38:29.433000 CVE-2024-25934,0,0,abf29b2c8bd2941b97b5a50ee19174b7389e9c0ccc1df25f4fdb8e591190b306,2024-03-15T16:26:49.320000 CVE-2024-25936,0,0,8effd82663b8db2d960ef33e023d14a22fda9a759a9ee34ebfd84341bfced171,2024-03-15T16:26:49.320000 -CVE-2024-25937,0,1,1f88a2f538501c9a5e7330b6711634f15b5e71a777b351782ce36d2d18999cc6,2024-03-22T12:45:36.130000 +CVE-2024-25937,0,0,1f88a2f538501c9a5e7330b6711634f15b5e71a777b351782ce36d2d18999cc6,2024-03-22T12:45:36.130000 CVE-2024-2594,0,0,62f22797cf1e847607c0f48ec8428fa7570128cbcbde2cadf780cc6697bdf9c5,2024-03-18T19:40:00.173000 CVE-2024-25940,0,0,81faf8084be28ad3443bfad1349de788b40c215e318cb61e901b3079aac1c24e,2024-02-15T06:23:39.303000 CVE-2024-25941,0,0,ca1cef65d30f17057b47421c2700ecf50e418e7bf4da35eb3fcc2989f17ef1eb,2024-02-15T06:23:39.303000 @@ -241755,7 +241757,7 @@ CVE-2024-26529,0,0,ceb7dffe95e5cd49d7bba0e418c1f06e328c8386f0796095312ed90a87d2d CVE-2024-26540,0,0,617635ef0e8a400c648ca8f83ffa7f30619dec90da8a875f959e523aa0d1f776,2024-03-15T12:53:06.423000 CVE-2024-26542,0,0,84bcc676050237f7706e936cd8d9d490aa0a127cdccddbe7afe739c073267e25,2024-02-28T14:06:45.783000 CVE-2024-26548,0,0,7b31129407d10e539a4174451b23a0f83a48cdb246d6dd13af61036fdc95df1c,2024-03-01T14:04:26.010000 -CVE-2024-26557,0,1,ad7f99c48fc96762a0d3e7f15f8b2f76b6c9e61a3219eb9865098d24b51325cc,2024-03-22T12:45:36.130000 +CVE-2024-26557,0,1,413b34482d1eed582f272b955524fa71f7b68414d25ad46ae764ef2e2b3412f9,2024-03-22T12:45:36.130000 CVE-2024-26559,0,0,3b7b5127dd0e422a83fadfb79310bdd57e4fb71532d47a597a5aa1449637c0ce,2024-02-29T13:49:47.277000 CVE-2024-26566,0,0,c84607e263dfbb2bafdffa5f1605a228a50fe6eb3d5c21b9f493cf56aab5c61a,2024-03-07T13:52:27.110000 CVE-2024-26578,0,0,631d617cd0985d9923eed32b0cb4b9e9025809830b6a3ca2ef1a468d4f2a7124,2024-02-22T19:07:27.197000 @@ -241914,6 +241916,7 @@ CVE-2024-27213,0,0,33892e4d94d0b54e6d4249626fe053cc0b69e36c215b31fa7aad394b03921 CVE-2024-27215,0,0,651ced2c4948681508a9ad090546fd018840608eea0c7482bdd7848315ac417f,2024-02-21T18:15:52.060000 CVE-2024-27218,0,0,c7e909155330ee918ef1bfc60d0a60842268f5244100d74ebd3f7830cb6dafd2,2024-03-15T20:15:08.960000 CVE-2024-27219,0,0,7a0a76842ad14d87eee010cdcc49f2a5889b1688d4e2b22f53088926c2436c2a,2024-03-12T12:40:13.500000 +CVE-2024-2722,1,1,82a65376bf568784c58599423375594094c1a6dd82d1367ee1d534d57ecd40bb,2024-03-22T14:15:09.403000 CVE-2024-27220,0,0,05f7f92e2760eddc99f200918af1193f6066d555fdf8748b8c79cea0c03d1787,2024-03-15T20:15:09.010000 CVE-2024-27221,0,0,30d226cc1b28f53b3043707465681fd56b18d560784ced431797bdb9a5a89396,2024-03-15T20:15:09.050000 CVE-2024-27222,0,0,4d7014f731a9b273fc3bdf911c925709a4272fe6575a06a86054132ac7e23a36,2024-03-12T12:40:13.500000 @@ -241924,18 +241927,24 @@ CVE-2024-27226,0,0,e9bb2a833fa0468fc09ed7c25714fcd1effc75d684941bfd1b213432ccd67 CVE-2024-27227,0,0,25b75979d509c434d8a1ec02afab54ebb41e39081e3ebb295aeff86f8a83ac15,2024-03-15T20:15:09.153000 CVE-2024-27228,0,0,ac326317e51dc7851c1f82ec4a32af90f437c21efaddc59cfa9f583daaf12379,2024-03-15T20:15:09.193000 CVE-2024-27229,0,0,a723b1ad8491c1fc93802f8fecc343d9d1e4f0951b98a1a99f181cf2ba1aa848,2024-03-12T12:40:13.500000 +CVE-2024-2723,1,1,71c589d54710635c25a306da17a45f4fc7bdd7d6e69b30328f7f0254094d35f3,2024-03-22T14:15:09.643000 CVE-2024-27230,0,0,c7763bc0ef3ba362ff27028ad0a4ee6dc51f834ec1d74bc7b4e735a7089dbf69,2024-03-12T12:40:13.500000 CVE-2024-27233,0,0,7b8043ee4b07bedf143f62926829193f3e94b62f5f4f2482d3d5d7a8d5b8b166,2024-03-12T12:40:13.500000 CVE-2024-27234,0,0,3c37943874f6fa961c0722ff27eeaaa90af5bf119e771a7f4501c93ac13ff648,2024-03-12T12:40:13.500000 CVE-2024-27235,0,0,286299f74e536cbf38771d33b6488ac94632f33ebda885a5c2222182d4672636,2024-03-15T20:15:09.253000 CVE-2024-27236,0,0,050a1052e26047f2e5d0b58d8351e3e856ec1c52f1b2daf95f02084addfb027c,2024-03-12T12:40:13.500000 CVE-2024-27237,0,0,952387726c7567ea2371af0e500cab297b027867a108431eaa82a39745a31338,2024-03-12T12:40:13.500000 +CVE-2024-2724,1,1,cba43ce3e0f6dc996b6453e111dbad08d6dc09d02bd64a7dd722baaac44e4cb1,2024-03-22T14:15:09.857000 +CVE-2024-2725,1,1,ee73384c36e65cc7f1d1b47d02db77c7c5020cab6f136fc5e95f9af9ee6fa73b,2024-03-22T14:15:10.143000 CVE-2024-27255,0,0,07d4523d50b3b6ceec1ed85c31e8859376bfd63a9732f2f4d2cf6e5b4c34b76b,2024-03-04T13:58:23.447000 +CVE-2024-2726,1,1,7cd0c91d46f5583dd6bad6f8aa4d86360946360d37fa76ae57f5f6693a3c787c,2024-03-22T14:15:10.393000 CVE-2024-27265,0,0,caf2cbef481f9d0206d06f75a38ca052c5291ba0582e91875cea8f52e6d86a34,2024-03-19T16:52:02.767000 CVE-2024-27266,0,0,f3ab0f27c5fbbc81843b4329fa53134d5b91174cad9bacbbc5dbf01cfacc3864,2024-03-19T16:52:35.400000 +CVE-2024-2727,1,1,745dd27a7dca7ee981aab79d40ffecfb69a7ae9786417b50e671247ae87fecd2,2024-03-22T14:15:10.593000 CVE-2024-27277,0,0,eb365bab444835328458e82045190ce3a564e0755801fc1f65f8b5d9bbf59bcb,2024-03-21T19:47:03.943000 CVE-2024-27278,0,0,2ef9546b6eb3a76ad70be700186038d995dd630654759ed72b9b3d10968f6d39,2024-03-06T15:18:08.093000 CVE-2024-27279,0,0,a0a465925dfcee0f633443a4d3db070f2bf023c10d4135b020d1a0fbe76c5a4b,2024-03-12T12:40:13.500000 +CVE-2024-2728,1,1,9e3bd97b972921f181bf15e291c906c1c225a7f13fd2f4c0fdd3d1157d3b781a,2024-03-22T14:15:10.807000 CVE-2024-27283,0,0,d0d6cc69e38ce7977029c4d3a011dff4f743808fa73bec6f0327124024522ffa,2024-02-22T19:07:27.197000 CVE-2024-27284,0,0,175f1326a6788bb22369d3d45f083399d573a3449ac45961b1b25c8fedd102cb,2024-02-29T13:49:29.390000 CVE-2024-27285,0,0,0fe4482c13c2e3db37265fee5caab7ccfcdd141d862d09da03f598c92197dec9,2024-03-21T03:15:48.103000 @@ -242005,58 +242014,58 @@ CVE-2024-27623,0,0,335934f06c4afd03c24d8ea0f13e9520a06db4e45dc99de31e76f91b777e3 CVE-2024-27625,0,0,e1c123c7cbb72c1152f10bec7c5db687cd4b211c6f1247bce688ef0105bc5f48,2024-03-05T14:27:46.090000 CVE-2024-27626,0,0,06fb1dce28f844815c1d8334673afd42b5ad67647a67d11a7a830eb63a50770e,2024-03-21T12:58:51.093000 CVE-2024-27627,0,0,2adc4718290b7f1d1d408d1d5d79989d398cde78693706b86dff52f1322eb9c4,2024-03-05T14:27:46.090000 -CVE-2024-2763,0,1,8e9d345d7389664f80611635b46c2cef2ec874e0b9963bec2a0f291297e78b38,2024-03-22T12:45:36.130000 -CVE-2024-2764,0,1,3ec67dc4c0d54764b942178e18d5d6721bd9017d0e5926b52df0eec1f7386756,2024-03-22T12:45:36.130000 +CVE-2024-2763,0,0,8e9d345d7389664f80611635b46c2cef2ec874e0b9963bec2a0f291297e78b38,2024-03-22T12:45:36.130000 +CVE-2024-2764,0,0,3ec67dc4c0d54764b942178e18d5d6721bd9017d0e5926b52df0eec1f7386756,2024-03-22T12:45:36.130000 CVE-2024-27655,0,0,65a637f75a188da438b32cc13f4600329f3f424dcd0f437c9989c4c9314e002f,2024-03-01T14:04:26.010000 CVE-2024-27656,0,0,2f731c51e226b6152416f771e826d74f69590b91bf713c56222b4fac3d8f2331,2024-03-01T14:04:26.010000 CVE-2024-27657,0,0,6c517d302d2c56a9786119bf2465fe9b50134a18e449436c88637119f49f73a6,2024-03-01T14:04:26.010000 CVE-2024-27658,0,0,de292d8f17e3b6a4b54092716a03244494548bb536dcb3cbcaab392d9ac50e07,2024-03-01T14:04:26.010000 CVE-2024-27659,0,0,490ce783956f55fbb1652cd0208e0f99fff65361983f109fc8e1a66b3e797355,2024-03-01T14:04:26.010000 -CVE-2024-2766,0,1,4e487dce8706c2f2c58dd838f16b1ab1ed0d307b3817f352862cd66b8ce76780,2024-03-22T12:45:36.130000 +CVE-2024-2766,0,0,4e487dce8706c2f2c58dd838f16b1ab1ed0d307b3817f352862cd66b8ce76780,2024-03-22T12:45:36.130000 CVE-2024-27660,0,0,ebc867d9e8ab77866712caf2c77523ce69fe475473038494b2e093ce6c793b8c,2024-03-01T14:04:26.010000 CVE-2024-27661,0,0,86da8e187830fd36888e5a846b7303cd63252f868f903b0bf7eaad6fbe1ac85e,2024-03-01T14:04:26.010000 CVE-2024-27662,0,0,3251284bf234434361d463758a344d1bc61b65e736c70ed013176b4fc1a3abef,2024-03-01T14:04:26.010000 CVE-2024-27668,0,0,255f8ec9db75a1b2656a5d8885c3aab9aaa34449ee65d35c3a707a7e7b8d15ff,2024-03-04T15:35:25.673000 -CVE-2024-2767,0,1,c4f3ef33c6b0b7a202adc2b08ccea44fddb6b9f4eb3379b56c5325411f48ac13,2024-03-22T12:45:36.130000 -CVE-2024-2768,0,1,a0d8649edade3cea62cd589aa7d89c8b541c4231222b07201942aa597a0c6f25,2024-03-22T12:45:36.130000 +CVE-2024-2767,0,0,c4f3ef33c6b0b7a202adc2b08ccea44fddb6b9f4eb3379b56c5325411f48ac13,2024-03-22T12:45:36.130000 +CVE-2024-2768,0,0,a0d8649edade3cea62cd589aa7d89c8b541c4231222b07201942aa597a0c6f25,2024-03-22T12:45:36.130000 CVE-2024-27680,0,0,96c9e2b516bb3c42b6c5a857a748e4b2bf1f8d01976f5c4ab9824d25b192009b,2024-03-04T15:35:25.673000 CVE-2024-27684,0,0,265733b871b65fcd052263479536d66d42340f95cd723628ecb5857c3bcfe5a9,2024-03-04T15:35:25.673000 CVE-2024-27689,0,0,f4ebc1e59160fdab518bfa3aa9af1f1ba832ce6045359e8a975bb23df8ccddfc,2024-03-01T22:22:25.913000 -CVE-2024-2769,0,1,7fe73dfd69d5289395228851a3bd91c6545f77090b1bd49bb5f0db9ba01a5abc,2024-03-22T12:45:36.130000 +CVE-2024-2769,0,0,7fe73dfd69d5289395228851a3bd91c6545f77090b1bd49bb5f0db9ba01a5abc,2024-03-22T12:45:36.130000 CVE-2024-27692,0,0,96cf609944e6476718d8d1c519869d6f251f131a1b19ff614e15f00c454cdd33,2024-03-01T17:15:07.617000 CVE-2024-27694,0,0,f3214413fbbba6e4989cb23c7682c51f2973a0b48d2e319f7c34a38e30c11001,2024-03-05T13:41:01.900000 CVE-2024-27698,0,0,ac54888b0a03034871f07f7d36cab166990ef3007932a85c3ddd7d9b6a6ab747,2024-03-09T23:15:49.403000 -CVE-2024-2770,0,1,7e7140d9f25890806cf91449a03d0e20f31a9461f53f3f18cc97765eb2d421da,2024-03-22T12:45:36.130000 +CVE-2024-2770,0,1,91ce0539e2b4c2c9bcbf359ca33c6a5a73fe7b14a0f0e721ae6fc81b19b90cfb,2024-03-22T12:45:36.130000 CVE-2024-27703,0,0,2b79380c63baf4bc3c9abfadfdc13a8325f8dae30b340951dc89a1b9f1e8f730,2024-03-14T12:52:16.723000 CVE-2024-27707,0,0,bd4780ccfe95d75b10e00a8c73b93480b3348a16006d364b38b5efca7ebc67cb,2024-03-08T14:02:57.420000 CVE-2024-27718,0,0,1278a2a8cee5a68342beae95f220d454fcd35e5e3853b311cb50bcc440948ebc,2024-03-05T13:41:01.900000 -CVE-2024-2773,0,1,6ba7db1f055b1d4a090709c65b33a53d57dc5daccce5c393bf02d37aeed24901,2024-03-22T12:45:36.130000 +CVE-2024-2773,0,1,a496f0cb5087b43beee53b92abbecafaebd5c845457d928b71195576f2802c0c,2024-03-22T12:45:36.130000 CVE-2024-27733,0,0,8d363cf969790e7f98247f28db2e0a162d296bdeea0f77bb77693ca2f7a6137e,2024-03-08T14:02:57.420000 CVE-2024-27734,0,0,3c0f551c79bd519411a50f44170878bc190cec512cea2012a65cd2d3219a1ee2,2024-03-01T22:22:25.913000 -CVE-2024-2774,0,1,045088c6fcc4ce8ce2e2f52857710fdd9f6883f68d8d4f06063f93e1f183285b,2024-03-22T12:45:36.130000 +CVE-2024-2774,0,1,e75a892829a5218282c8c6828129381997129cc86df474a2b203212e3b5dd76d,2024-03-22T12:45:36.130000 CVE-2024-27743,0,0,69a5e2d8c49bcfbf0b9f2f2f3b35b9cf6afe8c9f20e8371fcf519a2d380509ef,2024-03-13T07:15:36.253000 CVE-2024-27744,0,0,c100d4ba8f49a307e8f166c43dcf72396c641c27bc5c30f424e004f4b4c33d3f,2024-03-13T07:15:36.410000 CVE-2024-27746,0,0,6f3ddced2e2b26bef51987507b4e7466957a803a9da415c8c1c8b245cafe1423,2024-03-13T07:15:36.470000 CVE-2024-27747,0,0,eff635f872515818dfe20352d610bb047327d7f6971e953c63bc92feb6bf3ebe,2024-03-13T07:15:36.523000 -CVE-2024-2775,0,1,facfb92b9a28ab475faa0750425cd3c62a1fece721cf804add9539674b8271e9,2024-03-22T12:45:36.130000 +CVE-2024-2775,0,1,324304d3daf3f8232d8549c8aac7991bd17ad8e74cddabbe779660d692eff015,2024-03-22T12:45:36.130000 CVE-2024-27756,0,0,aebfc12c95eee1aa3d95acbf6fc8b0650b6e3d2e490fe1817d1c49f0782fe0c7,2024-03-15T12:53:06.423000 CVE-2024-27757,0,0,758da8d428041fb55cda5e8ed49e42184e30c0310dfccc74e01819218179190e,2024-03-18T12:38:25.490000 CVE-2024-27758,0,0,6abe87e0a8905ac150ade2fec85250ff5e7fbf580c101c16b193b98f7d58141f,2024-03-12T17:46:17.273000 -CVE-2024-2776,0,1,33aa8f6c65c8e0d5208ad07a463d520a4acd128c6ca52e7c39416f29e2489b08,2024-03-22T12:45:36.130000 +CVE-2024-2776,0,1,a2dca86eeda4163cb75b40ad2e671bae21e52f796052ecc38e114bfa3f2fcc33,2024-03-22T12:45:36.130000 CVE-2024-27764,0,0,a6da085213081f41482d74001d5b27250ddae1567bc465fa0f4b1023f8322f06,2024-03-06T15:18:08.093000 CVE-2024-27765,0,0,c9283b485df441e5cf44e98a2bcaa6921e6b7ae7825314dc1fd3bb862197fb6e,2024-03-06T15:18:08.093000 CVE-2024-27767,0,0,23a8031034bde0b5ceee28d38d7f7c79bc1873c7bee50ed7c60a4fb3b3b3ea4b,2024-03-18T19:40:00.173000 CVE-2024-27768,0,0,f75a9e4f3ec0657a1204e738acd041a45f6c9912c901fa6ef316f735a18eab7b,2024-03-18T19:40:00.173000 CVE-2024-27769,0,0,52f20a87bb41ccb822e8aa51a4742f59620ead216e7613c70ab86a27dc4f13e3,2024-03-18T19:40:00.173000 -CVE-2024-2777,0,1,c96715e630adf472fe4af7d78ce29db0fa51298e712ef1ab56726ee5c84e34a7,2024-03-22T12:45:36.130000 +CVE-2024-2777,0,1,998b4b7c13188d37e17c14a3cf1ac9b7a8c0db094ff8da5f8b7539110d7ac036,2024-03-22T12:45:36.130000 CVE-2024-27770,0,0,190564f325054d14fda5e252d56c9924f1728ab2a93003418609ae86f45cd007,2024-03-18T19:40:00.173000 CVE-2024-27771,0,0,0aee7dce542e3846fc61fcb0b334acd3d3866184b33df64f8377358b3bfecce5,2024-03-18T19:40:00.173000 CVE-2024-27772,0,0,a17826d9a0874c3f3ffc19dd6a14e32a35c360a62820ef43132537b66b4def32,2024-03-18T19:40:00.173000 CVE-2024-27773,0,0,2024b60af24687a3b3ee666dada367802136074a0282a48cfcb9d5e3649d7c7f,2024-03-18T19:40:00.173000 CVE-2024-27774,0,0,faaf7adce2033b4161afd1d606bbef075c5b779f6cc928fc6a617e115b9369f0,2024-03-18T19:40:00.173000 -CVE-2024-2778,0,1,a974a1ca9f167f3a4565cac1d7d7e76abf23178a4ff8459eb0b4e4614831d27d,2024-03-22T12:45:36.130000 -CVE-2024-2779,0,1,ebc0e0c2e1b62408e5fe8b8e1ce8d77ecd8054b45914a3a73215796bdf90ceb0,2024-03-22T12:45:36.130000 -CVE-2024-2780,0,1,57252a332f3fa451052783c032872e6e6ab5737b88f5b417954cd656cc711692,2024-03-22T12:45:36.130000 +CVE-2024-2778,0,1,606da7002eecf8b4a69d2bd07186555e4fbaaa2eba41bedbde660e768d517807,2024-03-22T12:45:36.130000 +CVE-2024-2779,0,1,a46cbcced54f990ec3ab00dcc310828877345eeeff0a3332adcf6734f8a63516,2024-03-22T12:45:36.130000 +CVE-2024-2780,0,1,bdcceeee0c00953c03148d72ca9c4da28e2649db6e5c4d572065a841b8ee9aa9,2024-03-22T12:45:36.130000 CVE-2024-27889,0,0,a24eb09c70fc8e243900497cf84a2002dc9fb9fdcf0cc7381ab2bee2e01200d8,2024-03-05T13:41:01.900000 CVE-2024-27894,0,0,249999fc9487c1b63574e09bae3fbcbcdf7b20ef335df69d9151a0f5ea4d74a1,2024-03-13T12:33:51.697000 CVE-2024-27900,0,0,00f9885d5a06fec36b56a14fdc3be21ddc255c1561a408e91e09aee1b7ac8b37,2024-03-12T12:40:13.500000 @@ -242071,7 +242080,7 @@ CVE-2024-27916,0,0,57603b4ae0cd7b53b3d4b7465c5e0da26ce7f8961f1ab6e4b1173461736f1 CVE-2024-27917,0,0,af242c2d21e7486c1314f58994d4b13c43efcfe28649da8aeb5e5a5a818348df,2024-03-06T21:42:48.053000 CVE-2024-27918,0,0,3664ec04f7d9a719220c7fe5f6ddc241af99de6538768ed6a6d6b43526064a3c,2024-03-21T12:58:51.093000 CVE-2024-27920,0,0,f0490af99419d039a483091f0cc2cfbd25508df9b9a1d7fb05a10eecef5acab6,2024-03-17T22:38:29.433000 -CVE-2024-27921,0,1,1c81355f605d7298cbc75753b2712a3de8e2ce04eb2251f7609b0efa7c732356,2024-03-22T12:45:36.130000 +CVE-2024-27921,0,0,1c81355f605d7298cbc75753b2712a3de8e2ce04eb2251f7609b0efa7c732356,2024-03-22T12:45:36.130000 CVE-2024-27922,0,0,d5b1b9b28631478cfaa086e0b605c7345d21c041c30a4843fe35c87fffd7f1e1,2024-03-21T12:58:51.093000 CVE-2024-27923,0,0,e143436c1fef289cd65d521e6631dc8531653f791ec9727bdb454c80c71c0113,2024-03-21T12:58:51.093000 CVE-2024-27926,0,0,437c3e91ee05045eaf3d785b863914fe91cf5cded7548ad0feea1f658c0072c4,2024-03-21T12:58:51.093000 @@ -242111,53 +242120,53 @@ CVE-2024-27995,0,0,31db9c3046ef3b6826fd04aab15586376d26e0b529bdf84ce7eba17bac569 CVE-2024-27996,0,0,79cff30308b011c07df476cb18acc5ff1830e7bf17b14d1ca5a0d9446fa716b8,2024-03-20T13:00:16.367000 CVE-2024-27997,0,0,b42c7cf4751e4a11a6e5eeb90c0df264fce89958ee556b8b06894cd2e68b11ce,2024-03-20T13:00:16.367000 CVE-2024-27998,0,0,325b1a8419d02931fcb08c1286afe5c33e53c5bf8527e201a365155e360914cf,2024-03-20T13:00:16.367000 -CVE-2024-28029,0,1,781afd937b61df54fd314f4ba8460c1b1f1017ea2f6e7c3cf626f19494a3effc,2024-03-22T12:45:36.130000 +CVE-2024-28029,0,0,781afd937b61df54fd314f4ba8460c1b1f1017ea2f6e7c3cf626f19494a3effc,2024-03-22T12:45:36.130000 CVE-2024-28039,0,0,9ef35c96ff38e007b2fd4f37c3f1f5b6d35461c4eaa69f2b36faccd438b26411,2024-03-18T12:38:25.490000 -CVE-2024-28040,0,1,92dbc878ad6b57fc9235f8005b7929f517428204d8ea6a98b01d4757cc97218d,2024-03-22T12:45:36.130000 -CVE-2024-28045,0,1,f398328ae0e32872e31247004b322ba0fa2d2bf6f860a8ec81e7f59b3326d256,2024-03-22T12:45:36.130000 -CVE-2024-2805,0,1,fc63f22995409f2bc7ff14d7f844a811dc346d07877d7d88c8afd5f48c0db065,2024-03-22T12:45:36.130000 +CVE-2024-28040,0,0,92dbc878ad6b57fc9235f8005b7929f517428204d8ea6a98b01d4757cc97218d,2024-03-22T12:45:36.130000 +CVE-2024-28045,0,0,f398328ae0e32872e31247004b322ba0fa2d2bf6f860a8ec81e7f59b3326d256,2024-03-22T12:45:36.130000 +CVE-2024-2805,0,1,fa896267355e8bee60ef45369bdd61a50def95efdfa5e824724b711a08ae74dc,2024-03-22T12:45:36.130000 CVE-2024-28053,0,0,e281ed045d826247c32c0ccef204d2c431b80f755e75c928bfd444d7e8497772,2024-03-15T12:53:06.423000 CVE-2024-28054,0,0,fd5e34ddafff629285a62ddb2d3b6251633211261857e076506fc9aaf016b6b2,2024-03-18T19:40:00.173000 -CVE-2024-2806,0,1,4a4707e466551637d1bcdfdd6f8851e1097209b178419424f546f6f15bf62eaa,2024-03-22T12:45:36.130000 +CVE-2024-2806,0,1,ee2a3df13c9881f0ddb0b5f20a752896870d80612aaf1a24443be94364044cd4,2024-03-22T12:45:36.130000 CVE-2024-28069,0,0,bc55065fc354d40d7b16dc028d30e9ac9c120daebe64d1e74cc55e5aec96ab01,2024-03-17T22:38:29.433000 -CVE-2024-2807,0,1,87f036302b6385803dec6e4011d23218a734cc9b85abf9333798ea7b16795149,2024-03-22T12:45:36.130000 +CVE-2024-2807,0,1,f2c323deb85ff9f1ab7a51c5efe803041bccdbfb1d2adaa456d10815ef5c4850,2024-03-22T12:45:36.130000 CVE-2024-28070,0,0,d9b3309fdc4db05937449ae85d6df93a299898f40c2c79f5bb7988f4ebb25838,2024-03-17T22:38:29.433000 -CVE-2024-2808,0,1,6d47c64f951b7b39758a32a5b85985c11519478c48276ec3f58102bb32bc7ec0,2024-03-22T12:45:36.130000 +CVE-2024-2808,0,1,6027ecfddc15b059d6d866792d8d76c33953c7b9cc4ae1182ffc1c468a0cb669,2024-03-22T12:45:36.130000 CVE-2024-28084,0,0,82d4f9747e3f13eb0c41724a23d451f171722689bff23fc05fa8397eb3709338,2024-03-16T02:15:09.157000 CVE-2024-28088,0,0,d2f20b1069b24ba10d21e8bf3b61c2c6a1c6b345ff59786676752b80abbde7a4,2024-03-13T21:16:00.380000 CVE-2024-28089,0,0,830991c1dd5898b6a817a3f8bb8784922af3636f20b8b62ba1c918d5d83f6f10,2024-03-11T01:32:29.610000 -CVE-2024-2809,0,1,789bba78355f835a7289f03885fc55843211d87c54e3ead3d9fa776d189eb52a,2024-03-22T12:45:36.130000 +CVE-2024-2809,0,1,c444e537b8319cff2a830f39e2e15a89baa73a39187ef19ae5ca728af647f25a,2024-03-22T12:45:36.130000 CVE-2024-28092,0,0,67823fb0fbf08abafb7c7a38f47eac7c626c2d2412f357d855f86b0f67fb9779,2024-03-20T13:00:16.367000 CVE-2024-28094,0,0,45821c38270b8552e50f50b73436d99164a20d22d9b4b8876276d92b2a0a88d9,2024-03-07T13:52:27.110000 CVE-2024-28095,0,0,cc359d20cf58cf4c4e6a4bc345ac1d1135a557dfb7920f405bfe639456bcfe46,2024-03-07T13:52:27.110000 CVE-2024-28096,0,0,bd233bb77c2105c8f9ae41f3196895f407f421cf037a91cc0eb753e3f00e4372,2024-03-07T13:52:27.110000 CVE-2024-28097,0,0,ad0a3d7a6b96970687d28d32c41921c3200422c4265f25f269de512c4cb8079e,2024-03-07T13:52:27.110000 CVE-2024-28098,0,0,e6bafc5c1852b134e115137ad3427dd38b064af4ce40b8aa45bfc1cdd7573337,2024-03-13T12:33:51.697000 -CVE-2024-2810,0,1,db012505533f7dcd60ec7732e9c8ea929f9ba15890ac92080ebfb32e00a788c1,2024-03-22T12:45:36.130000 +CVE-2024-2810,0,1,b92d6e3c897f758ac7040d83811d4a7f895aec8457cffb8c1afb1549e2cbf96d,2024-03-22T12:45:36.130000 CVE-2024-28101,0,0,e11a50d18e90b930590d2818b294820a502a44e40046d3b082407cc261fb1fa1,2024-03-21T12:58:51.093000 CVE-2024-28102,0,0,5173038e442300ac4f9841553f79acc51f599800474c7e2979929429acf935f8,2024-03-21T12:58:51.093000 -CVE-2024-2811,0,1,570e251ebab794f8489a1cbca814d0c65eb8dddddde71288631f31f5eebd7bd8,2024-03-22T12:45:36.130000 +CVE-2024-2811,0,1,f7057bb7f00ea7a6844ea17aaf27f5b41bb400a788aa8b2ef4be0037da4fe7f5,2024-03-22T12:45:36.130000 CVE-2024-28110,0,0,0aa63c709bee34101fee09332c67840fa8b7d5aea01ed58b7f238cd7f26f2f87,2024-03-07T13:52:27.110000 CVE-2024-28111,0,0,ef109000cb681b8950a504435d888106cd334990070bd9ca1f33bba165c1974a,2024-03-07T13:52:27.110000 CVE-2024-28112,0,0,13394bf321439a7b80b31ae63012fb69faf271f01573bdf4d69e6f1d90267eaa,2024-03-13T12:33:51.697000 CVE-2024-28113,0,0,4285de229101312bf59190b9237f9b0ffa56ca0930f139097955359a41ebcab5,2024-03-13T12:33:51.697000 CVE-2024-28114,0,0,7da8b099613e387d1a8ac16fa6023879524d5796fc9bbb4a91069a4438dcd4dc,2024-03-13T12:33:51.697000 CVE-2024-28115,0,0,3e0e705412ec4ecfb9fabefcb95634cd838a6bf7c9c03087d677ba199986f693,2024-03-08T14:02:57.420000 -CVE-2024-28116,0,1,d2ac398591c4a66db85750af35916cc58b0a261e6ff894693072c47916895ffd,2024-03-22T12:45:36.130000 -CVE-2024-28117,0,1,4aafb05dd8917575e853c7560b44eacf554ccd0bc88b839cfe2fe2962d5fe2ed,2024-03-22T12:45:36.130000 -CVE-2024-28118,0,1,c9ecc84dbe9d9ad42051bededf9f72daf1695609dd82764a5c0b508ec68da240,2024-03-22T12:45:36.130000 -CVE-2024-28119,0,1,9e20f1c76dd208cea9dee85f1085497184d5efb0680399f9869e2c210cfcdef6,2024-03-22T12:45:36.130000 -CVE-2024-2812,0,1,5e3baf2dc6ea20372caf670c7e2fa292fd1c6cd5fa001c3eb3d67e1c5f43415f,2024-03-22T12:45:36.130000 +CVE-2024-28116,0,0,d2ac398591c4a66db85750af35916cc58b0a261e6ff894693072c47916895ffd,2024-03-22T12:45:36.130000 +CVE-2024-28117,0,0,4aafb05dd8917575e853c7560b44eacf554ccd0bc88b839cfe2fe2962d5fe2ed,2024-03-22T12:45:36.130000 +CVE-2024-28118,0,0,c9ecc84dbe9d9ad42051bededf9f72daf1695609dd82764a5c0b508ec68da240,2024-03-22T12:45:36.130000 +CVE-2024-28119,0,0,9e20f1c76dd208cea9dee85f1085497184d5efb0680399f9869e2c210cfcdef6,2024-03-22T12:45:36.130000 +CVE-2024-2812,0,1,725668bb1af5965a2ff682c3f561041410c4fda1c53d7867a7827ddf8d1232e8,2024-03-22T12:45:36.130000 CVE-2024-28120,0,0,1945ab744b479cd2a55b16e82913f94d84bcc236918a39e22cfe06aca7010c4c,2024-03-12T12:40:13.500000 CVE-2024-28121,0,0,6ad3b99e4c8dd1459c44e51d2edc62f08f0aa4d5ffd25ea4a2fe7aa5af2916e8,2024-03-13T21:16:00.460000 CVE-2024-28122,0,0,3209f9a611aea4804720e8e5b4eeb3a02772982f302e787ac8040299af464092,2024-03-11T01:32:39.697000 CVE-2024-28123,0,0,dfd9df3abc549b63a4493e5b0d3ca5d363816f355d7deaee3d34da1ecc59baf6,2024-03-21T12:58:51.093000 CVE-2024-28125,0,0,48170c214569f7f7bd3fe8e6fc82db281b481f061afde6074b351e6aca43c615,2024-03-18T12:38:25.490000 CVE-2024-28128,0,0,ef4664596358b3dc6747b9cba3aab3612190b1b010cfc8ac1373f0312ebe3b50,2024-03-18T12:38:25.490000 -CVE-2024-2813,0,1,65a366e67db852bf8b526f40aaa357784e53cd9d136e8d35f0954ede68bdf198,2024-03-22T12:45:36.130000 -CVE-2024-2814,0,1,b4d64b56998f48b6ea81b2b2c425aab430d1092461ede1375b23080b666a31df,2024-03-22T12:45:36.130000 +CVE-2024-2813,0,1,41f622d3818c235aeeb8b453b0941529950bc244d596eaa13ec62faea5fa8533,2024-03-22T12:45:36.130000 +CVE-2024-2814,0,1,455d042c3aaebfc459d831c1e9bb12785314655c18988496f7491ce911b2b4bd,2024-03-22T12:45:36.130000 CVE-2024-28149,0,0,bb1327eb2ceb44ae2cc8e952fde2f54b109f1740591e1ece1b912c644025402b,2024-03-06T21:42:54.697000 -CVE-2024-2815,0,1,897f2753d365111b0c9fa024605c8f418838ccaa86fe8d43e737fb0463edb5ec,2024-03-22T12:45:36.130000 +CVE-2024-2815,0,0,897f2753d365111b0c9fa024605c8f418838ccaa86fe8d43e737fb0463edb5ec,2024-03-22T12:45:36.130000 CVE-2024-28150,0,0,bd9c785686979f74fc956d3a9d80b65ba208ec849a10e17a7f0c9226761980a2,2024-03-06T21:42:54.697000 CVE-2024-28151,0,0,473d59d35d2166d8f0877541c6be6e5f16e5683e6e89c2ed65e060f312f6c9a8,2024-03-06T21:42:54.697000 CVE-2024-28152,0,0,a7b9fa0093cb4672504036fe1d6553f752def5272f8858d8d1fc301b9a327c4d,2024-03-06T21:42:54.697000 @@ -242168,13 +242177,13 @@ CVE-2024-28156,0,0,1a4b3b2ef5e0daf541e96843c1c989bc4abe70122fe584c4af87150c4b6d1 CVE-2024-28157,0,0,ed8ebbe5fee0f55a8a4fde9d919001d31436455287216eb740cac4690bdc29f2,2024-03-06T21:42:54.697000 CVE-2024-28158,0,0,26b253f18727ee3caf630e107a7a89e61a580a0db3fe2a0ced2ad90bc360e7a9,2024-03-06T21:42:54.697000 CVE-2024-28159,0,0,03ab5419913406dda33ba2555a6f6cb8daff27a74103bcc7559c9bf5674b1cce,2024-03-06T21:42:54.697000 -CVE-2024-2816,0,1,2f254252d972979909dc24db0485913750de905e9e843a635b66c83756605a0d,2024-03-22T12:45:36.130000 +CVE-2024-2816,0,0,2f254252d972979909dc24db0485913750de905e9e843a635b66c83756605a0d,2024-03-22T12:45:36.130000 CVE-2024-28160,0,0,56d3ee6a5af0d0e09e6c9aa1c04c5e7191044a0b97474702c1a3af2bea0d6256,2024-03-06T21:42:54.697000 CVE-2024-28161,0,0,a8b5439e973c7cdb8f91b0ae68db3c77b6c3c773d21694d3bca0cd7aa286762f,2024-03-06T21:42:54.697000 CVE-2024-28162,0,0,9f95dea899a301f3d7e776202ce6567032bc57cf37ea2c387cd5d210ccf05a4b,2024-03-06T21:42:54.697000 CVE-2024-28163,0,0,e6f158d88c83d394762ccab484b2ad85c85d5028e78ed16fd0744829e8f59484,2024-03-12T12:40:13.500000 -CVE-2024-2817,0,1,0a0027830647612beb9b287e8d4ab5d722da0a12174e7f01d50026442ee3b289,2024-03-22T12:45:36.130000 -CVE-2024-28171,0,1,c1f19d20247dc1e3f04cbf911cc73142848c14a173b812d8f71f312ba63d2b48,2024-03-22T12:45:36.130000 +CVE-2024-2817,0,0,0a0027830647612beb9b287e8d4ab5d722da0a12174e7f01d50026442ee3b289,2024-03-22T12:45:36.130000 +CVE-2024-28171,0,0,c1f19d20247dc1e3f04cbf911cc73142848c14a173b812d8f71f312ba63d2b48,2024-03-22T12:45:36.130000 CVE-2024-28173,0,0,e0fed71b03fa1080cdfc47a71a0b80da5e87b19e624557c11c0e172f4b2c098a,2024-03-06T21:42:54.697000 CVE-2024-28174,0,0,fa1674b985861bddf4d0ff5ab075ec0e4328a9665c668bfe339f9f0de580d6b1,2024-03-06T21:42:54.697000 CVE-2024-28175,0,0,c8f25bff8e97476e2963865ef2e9cf777aae8f2ef724b2ba6f372c990cea8179,2024-03-14T12:52:16.723000 @@ -242249,17 +242258,17 @@ CVE-2024-28429,0,0,caaa64487b84149266e9e941a72e13f93e6070c94b1fe7355fb56db4eb5b2 CVE-2024-28430,0,0,bf34fb49e742ebf9176808c1e05b7467ed1662a29a5c18afe29f976454928e37,2024-03-13T14:28:45.217000 CVE-2024-28431,0,0,148c6be422e12f315897bdd57f5208c74e8137e452c7019eafe29f97f527c418,2024-03-13T14:28:45.217000 CVE-2024-28432,0,0,4bc8c3df18623e8712ef966fb24c80f6754436b2eb6a0c14d5d3c56f5a161090,2024-03-13T14:28:45.217000 -CVE-2024-28441,0,1,976e68ff1b522e8dc25f7777b3923699bbfd5550546f2a6e75c4323f9b8406be,2024-03-22T12:45:36.130000 +CVE-2024-28441,0,1,5f38f329aa34d3551b4435a62b00ae0d72806d981cac257e26fcd8895c19c6be,2024-03-22T12:45:36.130000 CVE-2024-28446,0,0,e3b0d814ee24ce9a2740eda808696f714c3071d6722fa7bd76f62923d12a194d,2024-03-19T13:26:46 CVE-2024-28447,0,0,729795bf39bd106c71b5b798b10fa8f526cc5d6a6eb2785b0edfa8459a535a4c,2024-03-19T13:26:46 -CVE-2024-28521,0,1,8ab5b6bd1cc025dda03cab07eeddd7e1f81756c34e55025f1870bf6a0feb8a5b,2024-03-22T12:45:36.130000 +CVE-2024-28521,0,0,8ab5b6bd1cc025dda03cab07eeddd7e1f81756c34e55025f1870bf6a0feb8a5b,2024-03-22T12:45:36.130000 CVE-2024-28535,0,0,174c70ce71a26af929a40c7b6a103a5242ac3321f34f35a982d598e918b67152,2024-03-21T20:58:46.217000 CVE-2024-28537,0,0,ff6bf2a37289dca28bccb57e311acb6479e1a577841d298af6b3b484403dfc2c,2024-03-18T19:40:00.173000 CVE-2024-28547,0,0,a2de8a258b087cbf7c5442c921d96afce5895db417e9c628fe7656334d2bb7cc,2024-03-18T19:40:00.173000 CVE-2024-28550,0,0,55b413fc03c0e6dbaa5c4b6ccf0c8e244ea995bce860e043c8086ce78f470aae,2024-03-18T19:40:00.173000 CVE-2024-28553,0,0,f74a5d2edd657e610cfc2b884ed1530d128afd106cc0a285c1f4868830f65cd2,2024-03-21T20:58:52.357000 -CVE-2024-28559,1,1,0614f972b1018fef175a5be020062e1808da1307fa27e18c6ccd6df48da36c98,2024-03-22T12:45:36.130000 -CVE-2024-28560,1,1,71f09d4b510ed852efc3bf9ad75f579a4bfcb9f31e97c96f2bbf400031737ddc,2024-03-22T12:45:36.130000 +CVE-2024-28559,0,0,0614f972b1018fef175a5be020062e1808da1307fa27e18c6ccd6df48da36c98,2024-03-22T12:45:36.130000 +CVE-2024-28560,0,0,71f09d4b510ed852efc3bf9ad75f579a4bfcb9f31e97c96f2bbf400031737ddc,2024-03-22T12:45:36.130000 CVE-2024-28562,0,0,91433a4c4f462713402770533ad7f25e56b67cc00fab70587df3692124b0273d,2024-03-20T13:00:16.367000 CVE-2024-28563,0,0,a656ef0aa8710291541ea7c711ec135274e970f2c247f821eefbeaee78f8b4d1,2024-03-20T13:00:16.367000 CVE-2024-28564,0,0,2abccbe60536fbfc04ad1cc3dd03bdffb43e6097953ebe8e099f5edfe9491595,2024-03-20T13:00:16.367000 @@ -242316,11 +242325,11 @@ CVE-2024-28746,0,0,4e08f19b517756fb15fbaf966494c1aeec3b9803b4e2b615b4d5a557eb48c CVE-2024-28752,0,0,b6856abb589c0fed02798f341901c4f3025e287fced11706e9fa0c89b392cd6a,2024-03-15T12:53:06.423000 CVE-2024-28753,0,0,73ca850c1b6879daba607bc61d7d16457b56173a47004b8bff799b514a526c36,2024-03-11T01:32:39.697000 CVE-2024-28754,0,0,9281349f951cf3fa92b3f484f1e5f3e3b9f20229dcabe6872ba34e9bebaf3b2c,2024-03-11T01:32:39.697000 -CVE-2024-28756,0,1,25c89ab9b64cbd69060fc1b1f68e4f1c76ee574185097dbf9146fc8b2b315bf5,2024-03-22T12:45:36.130000 +CVE-2024-28756,0,0,25c89ab9b64cbd69060fc1b1f68e4f1c76ee574185097dbf9146fc8b2b315bf5,2024-03-22T12:45:36.130000 CVE-2024-28757,0,0,83cb6aefc1d6f4ccc5441198cdfc19ec27b4e109d2bc2864c936baa137f8e197,2024-03-19T03:15:06.893000 CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000 CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e9dc,2024-03-11T12:47:42.653000 -CVE-2024-28824,1,1,29abf61aa992ee5bcede73dcd8363195f5ccb0f240073ed24aaff3a2acefaab4,2024-03-22T12:45:36.130000 +CVE-2024-28824,0,0,29abf61aa992ee5bcede73dcd8363195f5ccb0f240073ed24aaff3a2acefaab4,2024-03-22T12:45:36.130000 CVE-2024-28834,0,0,841718fd8fddff124f231102263dad7d394e02b19e9697b20d411d85f567df2c,2024-03-21T15:24:35.093000 CVE-2024-28835,0,0,807354fa6b4609be92d801df299988ca81259642594a0e94cba8cafe4de90346,2024-03-21T12:58:51.093000 CVE-2024-28847,0,0,77ca7298b6799783b77992e414cebfaaf69a1bd2c05124cbdf6b914d3e0bb310,2024-03-17T22:38:29.433000 @@ -242331,16 +242340,16 @@ CVE-2024-28854,0,0,8cb03aded6b194ffbf5e93b6a999bfbf01ac8f736343c4fc752b0e38a8bc9 CVE-2024-28855,0,0,2384a3330fde47f752f152bfa13a6226cb6b236bb18ff2466f5e886c7d3e893c,2024-03-19T13:26:46 CVE-2024-28859,0,0,2d0407c7b83f2786a493b842ae3fe3ce3f906494adee8b0e0f61c75557fcb17c,2024-03-17T22:38:29.433000 CVE-2024-28862,0,0,b0dc40150b0e5f15633ecb26c2614b37fe6eefbb423911349887989b36d78640,2024-03-17T22:38:29.433000 -CVE-2024-28863,0,1,33cbbf67a6b437203d309628d3d537a6b47c1cb683d591c7900be213668d8e76,2024-03-22T12:45:36.130000 +CVE-2024-28863,0,1,ad7818a88579939a8a2c9b467548624411262308646c7865759640aa6d437826,2024-03-22T12:45:36.130000 CVE-2024-28864,0,0,6556868d08f3b43cf56ee8c0e31629a1275e8137bc2387bf2430488f9854bd36,2024-03-19T13:26:46 CVE-2024-28865,0,0,346bb195552b29118071ab302fbe331daaaa3a5da7b31ab976886613f922d084,2024-03-19T13:26:46 CVE-2024-28868,0,0,4e3489f3c96f97bc271ff7282115c7f5d25e2aa392efe0c1c5842c72ee9986bf,2024-03-21T12:58:51.093000 -CVE-2024-28891,0,1,0aa614d18123b6bc2c76e9c8b5d356a2e7d71bba766bbf9db36fdc818df4c91d,2024-03-22T12:45:36.130000 +CVE-2024-28891,0,0,0aa614d18123b6bc2c76e9c8b5d356a2e7d71bba766bbf9db36fdc818df4c91d,2024-03-22T12:45:36.130000 CVE-2024-28916,0,0,3588de3801d3f24953276fa6b57f2d684fb38fc8b3ed3ad7d8613e127e6022b7,2024-03-21T12:58:51.093000 CVE-2024-29018,0,0,996b521b7d9365d8d41596984cc4ea0a166d70f0fc41d183b4857a8a3632cdd4,2024-03-21T12:58:51.093000 CVE-2024-29026,0,0,ae12b0436e3ecdf28001034b69d1ac66de23f0f8b6b646a25aa4e89d5c652db8,2024-03-21T12:58:51.093000 CVE-2024-29027,0,0,0443c0a5c3d136c6828a405e5e82a90c05a4f9edd7fbc1d30ba3bd5c5a4c0f72,2024-03-20T13:00:16.367000 -CVE-2024-29031,0,1,9302b2ee09da537335f863dd7585d2a39e8c57343a4b7674706de55ef03c5756,2024-03-22T12:45:36.130000 +CVE-2024-29031,0,1,7f58d37a0fe973dfcea39547446f82cfc81d56a030b41fe804de053f1e911236,2024-03-22T12:45:36.130000 CVE-2024-29032,0,0,fb02d2202c95545e773ec7caf494a1bc4414b85dfda56ba00a602bc4c558e262,2024-03-21T12:58:51.093000 CVE-2024-29033,0,0,3da47380cd3a71a38fcec215b864d4658478d80ec3a2925a5a05224fec9ea170,2024-03-21T12:58:51.093000 CVE-2024-29036,0,0,9e006ee4d248b12879916fd5a38e3fbf7a89f45ed6265666710ccd15d4bd0aa4,2024-03-21T12:58:51.093000 @@ -242401,10 +242410,10 @@ CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2 CVE-2024-29180,0,0,e32bebc90fbd05fe3a3edfae9506df906c8ca56e295fcb3cc3f3f384d12528c8,2024-03-21T19:47:03.943000 CVE-2024-29243,0,0,80b3eab65af2d9fbeb7b6048e074697688a19de63e1138c377d0b826523dd7db,2024-03-21T15:24:35.093000 CVE-2024-29244,0,0,ab4dadc4ff7b45a2c285edb922de956bae0828f007627c62339f15145e95a7b7,2024-03-21T15:24:35.093000 -CVE-2024-29271,0,1,6f2450ad40da134880ee25cc3905c90e5aca742e98271b4936d34e81b7571ba5,2024-03-22T12:45:36.130000 -CVE-2024-29272,0,1,cc2132c68a21d2c864bd46d162e26f16bcbc3c4f3450d911f3e7e7abf1272743,2024-03-22T12:45:36.130000 -CVE-2024-29273,0,1,efd93b25e3a199ba372faf3ed5bc7bb194eb27d8a5a462039a805935551533fb,2024-03-22T12:45:36.130000 -CVE-2024-29275,0,1,0d6abe0c929754cf7b3c9410c26c7278906e57851d3ac4bbf99eb4c136fd6c4d,2024-03-22T12:45:36.130000 +CVE-2024-29271,0,1,86d82853285296d2653b2954b1f865b89755729787a00c9a08bf8b4da2a10347,2024-03-22T12:45:36.130000 +CVE-2024-29272,0,1,bb3421cdf283ecf2f8722dd79d31aa3f3d26bad518191ad6f8ea2a70c28d47bf,2024-03-22T12:45:36.130000 +CVE-2024-29273,0,1,5734858efc895a99d71a292d9b9fd87dc375f872fc9b4f17b1a24399e248cfbf,2024-03-22T12:45:36.130000 +CVE-2024-29275,0,1,402f5150501d1ad43199a2c93810407cb4bc9ca968149bb7f55410637d08465b,2024-03-22T12:45:36.130000 CVE-2024-29374,0,0,f8a146770d52182e0c10b15b21ebc5da7e22091690385e976078b28de6736be7,2024-03-21T19:47:03.943000 CVE-2024-29419,0,0,1f113c646466febbefbd1317ecc5036f9bdf6e219db156971cfdda70e05f32f0,2024-03-20T17:18:21.343000 CVE-2024-29469,0,0,acf93e04574e9669a29498319a75720c9b5a03ff4de2c06070b1f52ac9f365b7,2024-03-21T12:58:51.093000 @@ -242431,3 +242440,5 @@ CVE-2024-29878,0,0,59bd69937e12e8238cdc5eae96014d85a453bedc37861446ca2ffcb7373dd CVE-2024-29879,0,0,f281e5565c18f62981e30c243c39ad05583d9bbab1631a620c93b3c78846e1db,2024-03-21T15:24:35.093000 CVE-2024-29880,0,0,e4ba47a3336aba44b26bc2b767c682c9997cfe6f0e16a9457e7fe50a3abeaa1c,2024-03-21T15:24:35.093000 CVE-2024-29916,0,0,dd300e18b662f862d3dd0881eace85d81be3f3aaeb79c908bcef100a80a89dd1,2024-03-21T19:47:03.943000 +CVE-2024-29943,1,1,f1a3f9a1a8cb25eef7944b2e7d8c3b117c9e9d782b9389c7f010905bdf8e0c5e,2024-03-22T13:15:07.440000 +CVE-2024-29944,1,1,70f186332bf1dd550ce01104b7836ab76d9f3f38057d50541514d05fb298d9f8,2024-03-22T13:15:07.503000