diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7152.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7152.json index 60ae7a84517..a2f372df1dd 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7152.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7152.json @@ -2,9 +2,8 @@ "id": "CVE-2023-7152", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-29T05:15:09.473", - "lastModified": "2024-03-21T02:50:56.913", + "lastModified": "2024-04-04T02:15:06.203", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -134,6 +133,14 @@ "Issue Tracking" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4E2HYWCZB5R4SHY4SZZZSFDMD64N4SOZ/", + "source": "cna@vuldb.com" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEK46QAJOXXDZOWOIE2YACUOCZFWOBCK/", + "source": "cna@vuldb.com" + }, { "url": "https://vuldb.com/?ctiid.249158", "source": "cna@vuldb.com", diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7158.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7158.json index 458da596d1d..f8290b68b4c 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7158.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7158.json @@ -2,9 +2,8 @@ "id": "CVE-2023-7158", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-29T07:15:11.060", - "lastModified": "2024-03-21T02:50:57.260", + "lastModified": "2024-04-04T02:15:06.400", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -154,6 +153,14 @@ "Release Notes" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4E2HYWCZB5R4SHY4SZZZSFDMD64N4SOZ/", + "source": "cna@vuldb.com" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEK46QAJOXXDZOWOIE2YACUOCZFWOBCK/", + "source": "cna@vuldb.com" + }, { "url": "https://vuldb.com/?ctiid.249180", "source": "cna@vuldb.com", diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2008.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2008.json new file mode 100644 index 00000000000..c58f391c47a --- /dev/null +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2008.json @@ -0,0 +1,51 @@ +{ + "id": "CVE-2024-2008", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-04-04T03:15:06.053", + "lastModified": "2024-04-04T03:15:06.053", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Modal Popup Box \u2013 Popup Builder, Show Offers And News in Popup plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.5.2 via deserialization of untrusted input in the awl_modal_popup_box_shortcode function. This makes it possible for authenticated attackers, with contributor-level access and above, to inject a PHP Object. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/modal-popup-box/trunk/include/modal-popup-box-shortcode.php#L19", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3062572%40modal-popup-box&new=3062572%40modal-popup-box&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fca3d106-49df-49fc-a90d-e0cb26bd34b6?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2692.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2692.json new file mode 100644 index 00000000000..a6b959aad34 --- /dev/null +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2692.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-2692", + "sourceIdentifier": "help@fluidattacks.com", + "published": "2024-04-04T02:15:06.527", + "lastModified": "2024-04-04T02:15:06.527", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SiYuan version 3.0.3 allows executing arbitrary commands on the server. This is possible because the application is vulnerable to Server Side XSS.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "help@fluidattacks.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "help@fluidattacks.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://fluidattacks.com/advisories/dezco/", + "source": "help@fluidattacks.com" + }, + { + "url": "https://github.com/siyuan-note/siyuan/", + "source": "help@fluidattacks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2803.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2803.json new file mode 100644 index 00000000000..5b3631c06f9 --- /dev/null +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2803.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2024-2803", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-04-04T02:15:06.800", + "lastModified": "2024-04-04T02:15:06.800", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The ElementsKit Elementor addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the countdown widget in all versions up to, and including, 3.0.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3062463%40elementskit-lite&new=3062463%40elementskit-lite&sfp_email=&sfph_mail=#file12", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b1c44ad9-e61e-4f29-9c0b-7c0a89b0c8da?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2830.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2830.json new file mode 100644 index 00000000000..0b01484a7ee --- /dev/null +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2830.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-2830", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-04-04T03:15:06.230", + "lastModified": "2024-04-04T03:15:06.230", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The WordPress Tag and Category Manager \u2013 AI Autotagger plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'st_tag_cloud' shortcode in all versions up to, and including, 3.13.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/simple-tags/trunk/inc/class.client.php#L346", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/simple-tags/trunk/inc/class.client.php#L348", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3060746/simple-tags/trunk/inc/class.client.tagcloud.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0f537479-d5ec-46bb-a04e-2c33a2abc759?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2868.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2868.json new file mode 100644 index 00000000000..8a9026357fd --- /dev/null +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2868.json @@ -0,0 +1,51 @@ +{ + "id": "CVE-2024-2868", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-04-04T02:15:07.010", + "lastModified": "2024-04-04T02:15:07.010", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The ShopLentor \u2013 WooCommerce Builder for Elementor & Gutenberg +12 Modules \u2013 All in One Solution (formerly WooLentor) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the slitems parameter in the WL Special Day Offer Widget in all versions up to, and including, 2.8.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/woolentor-addons/tags/2.8.2/includes/addons/universal_product.php#L2548", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3061864/woolentor-addons/tags/2.8.4/includes/addons/universal_product.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/27b8e0c0-fb0b-4d36-abc4-3e66ec7b5195?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2919.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2919.json new file mode 100644 index 00000000000..37efb4e2ed3 --- /dev/null +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2919.json @@ -0,0 +1,51 @@ +{ + "id": "CVE-2024-2919", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-04-04T03:15:06.413", + "lastModified": "2024-04-04T03:15:06.413", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Gutenberg Blocks by Kadence Blocks \u2013 Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Countdown and CountUp Widget in all versions up to, and including, 3.2.31 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3062911/kadence-blocks/trunk/includes/assets/js/kb-countdown.min.js", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3062911/kadence-blocks/trunk/includes/assets/js/kb-countup.min.js", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b38a69c7-91d4-43be-8650-eb1f0029bd44?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3022.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3022.json new file mode 100644 index 00000000000..4037db1ff63 --- /dev/null +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3022.json @@ -0,0 +1,51 @@ +{ + "id": "CVE-2024-3022", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-04-04T02:15:07.230", + "lastModified": "2024-04-04T02:15:07.230", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The BookingPress plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient filename validation in the 'bookingpress_process_upload' function in all versions up to, and including 1.0.87. This allows an authenticated attacker with administrator-level capabilities or higher to upload arbitrary files on the affected site's server, enabling remote code execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3061435/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress_fileupload_class.php", + "source": "security@wordfence.com" + }, + { + "url": "https://r0ot.notion.site/BookingPress-1-0-84-Authenticated-Administrator-Arbitrary-File-Upload-lead-to-RCE-e2603371c0c14d828144e26f2fdc1d01?pvs=4", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/049ec264-3ed1-4741-937d-8a633ef0a627?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3030.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3030.json new file mode 100644 index 00000000000..305a75f9d7c --- /dev/null +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3030.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2024-3030", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-04-04T02:15:07.437", + "lastModified": "2024-04-04T02:15:07.437", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Announce from the Dashboard plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3061409%40announce-from-the-dashboard&new=3061409%40announce-from-the-dashboard&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b0d1cf3b-5631-49bd-a7aa-86de2ee4b5b9?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3274.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3274.json new file mode 100644 index 00000000000..b014301cff6 --- /dev/null +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3274.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-3274", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-04-04T02:15:07.627", + "lastModified": "2024-04-04T02:15:07.627", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in D-Link DNS-320L, DNS-320LW and DNS-327L up to 20240403 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/info.cgi of the component HTTP GET Request Handler. The manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259285 was assigned to this vulnerability. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/netsecfish/info_cgi", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.259285", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.259285", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.304706", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 2d0becdf72c..d88a2775555 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-04-04T02:00:32.397316+00:00 +2024-04-04T04:00:30.461382+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-04-04T01:15:50.387000+00:00 +2024-04-04T03:15:06.413000+00:00 ``` ### Last Data Feed Release @@ -33,28 +33,30 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -244028 +244037 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `9` -- [CVE-2024-25568](CVE-2024/CVE-2024-255xx/CVE-2024-25568.json) (`2024-04-04T00:15:06.990`) -- [CVE-2024-26258](CVE-2024/CVE-2024-262xx/CVE-2024-26258.json) (`2024-04-04T00:15:07.047`) -- [CVE-2024-29167](CVE-2024/CVE-2024-291xx/CVE-2024-29167.json) (`2024-04-04T00:15:07.103`) -- [CVE-2024-29225](CVE-2024/CVE-2024-292xx/CVE-2024-29225.json) (`2024-04-04T00:15:07.200`) -- [CVE-2024-3272](CVE-2024/CVE-2024-32xx/CVE-2024-3272.json) (`2024-04-04T01:15:50.123`) -- [CVE-2024-3273](CVE-2024/CVE-2024-32xx/CVE-2024-3273.json) (`2024-04-04T01:15:50.387`) +- [CVE-2024-2008](CVE-2024/CVE-2024-20xx/CVE-2024-2008.json) (`2024-04-04T03:15:06.053`) +- [CVE-2024-2692](CVE-2024/CVE-2024-26xx/CVE-2024-2692.json) (`2024-04-04T02:15:06.527`) +- [CVE-2024-2803](CVE-2024/CVE-2024-28xx/CVE-2024-2803.json) (`2024-04-04T02:15:06.800`) +- [CVE-2024-2830](CVE-2024/CVE-2024-28xx/CVE-2024-2830.json) (`2024-04-04T03:15:06.230`) +- [CVE-2024-2868](CVE-2024/CVE-2024-28xx/CVE-2024-2868.json) (`2024-04-04T02:15:07.010`) +- [CVE-2024-2919](CVE-2024/CVE-2024-29xx/CVE-2024-2919.json) (`2024-04-04T03:15:06.413`) +- [CVE-2024-3022](CVE-2024/CVE-2024-30xx/CVE-2024-3022.json) (`2024-04-04T02:15:07.230`) +- [CVE-2024-3030](CVE-2024/CVE-2024-30xx/CVE-2024-3030.json) (`2024-04-04T02:15:07.437`) +- [CVE-2024-3274](CVE-2024/CVE-2024-32xx/CVE-2024-3274.json) (`2024-04-04T02:15:07.627`) ### CVEs modified in the last Commit -Recently modified CVEs: `3` +Recently modified CVEs: `2` -- [CVE-2024-21798](CVE-2024/CVE-2024-217xx/CVE-2024-21798.json) (`2024-04-04T01:15:49.953`) -- [CVE-2024-23910](CVE-2024/CVE-2024-239xx/CVE-2024-23910.json) (`2024-04-04T01:15:50.027`) -- [CVE-2024-25579](CVE-2024/CVE-2024-255xx/CVE-2024-25579.json) (`2024-04-04T01:15:50.083`) +- [CVE-2023-7152](CVE-2023/CVE-2023-71xx/CVE-2023-7152.json) (`2024-04-04T02:15:06.203`) +- [CVE-2023-7158](CVE-2023/CVE-2023-71xx/CVE-2023-7158.json) (`2024-04-04T02:15:06.400`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 992c579d7d8..924813118aa 100644 --- a/_state.csv +++ b/_state.csv @@ -237934,13 +237934,13 @@ CVE-2023-7148,0,0,ad3d7bb45f68a25f28d4a014a05c7f0c0f5eb59b2332f2a36529e951c01cf7 CVE-2023-7149,0,0,5274abe94fd7c0ae8d01100c182a0608460162f3b4c0a04ca7ef11eeebe117a1,2024-03-21T02:50:56.743000 CVE-2023-7150,0,0,0c87a4b3ec2aaf12c4d9e1fdfb4eb06c5a9800465da5abf8eb5f908f0af74c73,2024-03-21T02:50:56.820000 CVE-2023-7151,0,0,bb32bdd519a1a50b8c5ab4a323d30cc39a75571831ac8e58df336f69b7cfff53,2024-01-23T15:40:52.973000 -CVE-2023-7152,0,0,d63315d5b620520be64208de0c636c036bcf933560aed0687debc92391adb734,2024-03-21T02:50:56.913000 +CVE-2023-7152,0,1,4204b249f3a43ad13331bc58a5c2cd30cfaf340276ca2426d50c796310e7d72d,2024-04-04T02:15:06.203000 CVE-2023-7153,0,0,e011618db3076d02be0d1ef8dfe51744f3234f2e36498aa2346c160b31a75578,2024-01-24T21:43:31.700000 CVE-2023-7154,0,0,076d7cbaa09541993347ce9e0a30d4438c72b1ebd3caf4aa248135ca6dfc7806,2024-01-23T15:45:39.513000 CVE-2023-7155,0,0,7e7529ab676d8ddb6b782bd27f8d741a82d11bbbbeda4e53a6c0960a51bfc8c0,2024-03-21T02:50:57.017000 CVE-2023-7156,0,0,7b5a4efd1b3be53f0ffd429f40f9e3f3f28a760427bbfbde808e2a385728dc30,2024-03-21T02:50:57.100000 CVE-2023-7157,0,0,e14f25db01f67df37b8eeb853c155d5497d7d420da1cf903e90c685c473ef4b0,2024-03-21T02:50:57.180000 -CVE-2023-7158,0,0,1084264640b5cfab07218d254e307ca73441eb13a3347a6cbb1e62a4d9b5cfd7,2024-03-21T02:50:57.260000 +CVE-2023-7158,0,1,bf88ece70b3ebdb9d0ed2829f62cd053cff19d2bc94e9f3dcc397e04ebfc456c,2024-04-04T02:15:06.400000 CVE-2023-7159,0,0,7602619793679c82fd6e4078fefba013d97098ffd01706a034b417ac5762a63e,2024-03-21T02:50:57.347000 CVE-2023-7160,0,0,0068dd63e1ae41a9eeb4dd1afabef9df497b4968c8d56ef188f9ba12bb4adcbb,2024-03-21T02:50:57.423000 CVE-2023-7161,0,0,081d75b436b1110fb1f86020897a7d713350804dbf28510a4511fb651652e216,2024-03-21T02:50:57.503000 @@ -239507,6 +239507,7 @@ CVE-2024-20054,0,0,8d3193313cee82666cc7a9a9fc4d8e0bcc3af481a0ce555748460cf02c097 CVE-2024-20055,0,0,109d1d9940c1dca8530dc03191274127f8901d271f37fd1cdce803ed70deff34,2024-04-01T12:49:00.877000 CVE-2024-2006,0,0,52d776ed20a145230028cfc4b5ce5b374d35ec688b7308ce8a79b923b7ac4a29,2024-03-13T18:15:58.530000 CVE-2024-2007,0,0,f47e32ba52cda7faacb8492f7684b94da5833a1e1d397bb70c366c91108ebbd0,2024-03-21T12:58:51.093000 +CVE-2024-2008,1,1,b9e72dd151c3b6dc237474f44ba3e9dbcc4f38757a56d2566149be6176d2d10f,2024-04-04T03:15:06.053000 CVE-2024-2009,0,0,e2a4086afb53fd84b50e105846813eee57282aed3cce0568cc523b8132740b52,2024-03-21T02:52:26.207000 CVE-2024-2014,0,0,8d7628b414bbcdd7a6ef27a23ad1e3ec91eb3e6ee0b62ef9489eb400579feaac,2024-03-21T12:58:51.093000 CVE-2024-2015,0,0,1c17f5977ed6cdad57e2e0374ea748a50939f7f3d42f37be55afd7aacf9e1e0c,2024-03-21T12:58:51.093000 @@ -240166,7 +240167,7 @@ CVE-2024-2179,0,0,ae7ec0d777d4f092532ca994d6b0860fc5ecc6f92bb84e39b0499b0a5cdf3b CVE-2024-21794,0,0,5140601c591fc7e01c922f6b4426d49907b4278c42a623419c59c4c96fa7afa6,2024-02-07T17:15:44.653000 CVE-2024-21795,0,0,3f97d15b4fad76f44a86834312294b67e000044b0ba6ac0faa07d011642d4d38,2024-04-02T15:15:52.517000 CVE-2024-21796,0,0,ad6ea83e4ba68ed8909637d1ef7b65d12f04c56232c1b05d9173891b89591836,2024-01-30T22:14:16.247000 -CVE-2024-21798,0,1,227cee2b08d95673cdf00007b2e5f0a1a8d34bbf3b115cc9a3e417f90fdb9db1,2024-04-04T01:15:49.953000 +CVE-2024-21798,0,0,227cee2b08d95673cdf00007b2e5f0a1a8d34bbf3b115cc9a3e417f90fdb9db1,2024-04-04T01:15:49.953000 CVE-2024-2180,0,0,f29f310f994bdc1547d14907db3ea5b567d0e701ee0c912abfad5bc40b39a210,2024-03-15T12:53:06.423000 CVE-2024-21802,0,0,2a0324ca9760c4b3be107883f84a1ed806e6bad72b3badb393d00982ae57c159,2024-02-26T18:15:07.290000 CVE-2024-21803,0,0,412e1fe487e1aa8e1b208c7f0baf850a3bb5b2cd1ac7cabb6ce669e7a4281bbb,2024-02-08T01:57:53.770000 @@ -241163,7 +241164,7 @@ CVE-2024-23903,0,0,ecb97aacb6f19585aea8671a201e2d7c3813e0b8271429153f27911a6bbb0 CVE-2024-23904,0,0,678d9b9e94528dc2befb7afc9e4f3790d1499e848c388388aaa93c118b2a19d3,2024-01-29T19:26:29.770000 CVE-2024-23905,0,0,2d8ebad5c05b335845d8a0c6b27832798a9c27087f41f1dd4daf5a7e2afef75a,2024-01-29T19:26:11.517000 CVE-2024-2391,0,0,5eb10c991275accc4f0c04c536ff0ab64c132e711d4ba9c8aec48c31334f05e4,2024-03-21T02:52:33.807000 -CVE-2024-23910,0,1,e6adc416dd7b19484faa305c4e8491b3ff3f8809d94d53eb510d517290865995,2024-04-04T01:15:50.027000 +CVE-2024-23910,0,0,e6adc416dd7b19484faa305c4e8491b3ff3f8809d94d53eb510d517290865995,2024-04-04T01:15:50.027000 CVE-2024-23917,0,0,43acd2786eef775b4e5af3da03e8f628e79a58b917087bea0e9c91638665592f,2024-02-09T01:05:22.180000 CVE-2024-2392,0,0,42336a48d6bafcd50dc6522fe24a4d56dee45c4fa6295037e9d4d2226834e64c,2024-03-22T12:45:36.130000 CVE-2024-2393,0,0,8cedba0180a7b00def73b6261f8c72d770c30f1bb7624197b9fba956f17cd30c,2024-03-21T02:52:33.897000 @@ -241864,11 +241865,11 @@ CVE-2024-25554,0,0,a87c08d7479e0670c1de7ac680e974b7c966b7f12d7b309312798a5acd199 CVE-2024-25559,0,0,621d2089e4066088e4f2e7151d4c52b797349073e2e5f4d074059dc172fb61d6,2024-02-15T06:23:39.303000 CVE-2024-2556,0,0,7dda608d4c973332c242425a23922df86f3028261d216807853df92150e28261,2024-03-21T02:52:37.803000 CVE-2024-25567,0,0,bbb8c64eb3dcee3e8e89951734f837d0c3bea66c11459a30529f4c9133593805,2024-03-22T12:45:36.130000 -CVE-2024-25568,1,1,65656181592ea9bc19c9c46396613fc484931712e79b712d3a779df06bba53fe,2024-04-04T00:15:06.990000 +CVE-2024-25568,0,0,65656181592ea9bc19c9c46396613fc484931712e79b712d3a779df06bba53fe,2024-04-04T00:15:06.990000 CVE-2024-2557,0,0,bd3cbcd6fdd2bc53d05ad0a21dcf76dc9100645c8cd39cc3bfd0cd796821c2ef,2024-03-21T02:52:37.887000 CVE-2024-25574,0,0,4bc8d3cd97ad31d3dfd232c462a09dc1924d30756dc7bfcb27690950ff1edfb2,2024-04-02T12:50:42.233000 CVE-2024-25578,0,0,ff68f9ee0e3394b3fa83fe8766f2e044325a5fd043b437de063c0cd80654c610,2024-03-01T14:04:26.010000 -CVE-2024-25579,0,1,838cd17118b030eacfba49a0ada30a1ba4831f0bedbfd768ff2707f55789078e,2024-04-04T01:15:50.083000 +CVE-2024-25579,0,0,838cd17118b030eacfba49a0ada30a1ba4831f0bedbfd768ff2707f55789078e,2024-04-04T01:15:50.083000 CVE-2024-2558,0,0,9b2e64cc1dfa18aa6ab6ed26c2435de053f445557e20541392c5e86001c65488,2024-03-21T02:52:37.973000 CVE-2024-25580,0,0,aa78600da8abcfd02ed93a87510a3e3684060f93f36da496d331a2464d925d23,2024-03-27T12:29:30.307000 CVE-2024-2559,0,0,e913f295acbf3f21c20619071c5c76f626d7ca39e71d862a4c6e578c87ef0b76,2024-03-21T02:52:38.050000 @@ -242236,7 +242237,7 @@ CVE-2024-2622,0,0,2faba3761f6560c88eea9c3b0fa6fc4529a548f032a256e1b05f67335e6c11 CVE-2024-26246,0,0,6c174a39b8e16966075834fa377a33ef3e5c5829eb1a43647414103e1222a0e5,2024-03-19T17:05:45.193000 CVE-2024-26247,0,0,ed304d3168190e2757b85fd85fc0b38856926e8e4ca6b0df56c71d50554fa5bc,2024-03-26T03:18:26.197000 CVE-2024-2625,0,0,176202763572967bdd2403d6220b5ef3a0eeae1c4e7f0e46612d30bfb12e4570,2024-04-01T15:32:17.010000 -CVE-2024-26258,1,1,766e8ee3881910a81a928091bc16ea7cd82e7c62393de16666cf602140b8ed16,2024-04-04T00:15:07.047000 +CVE-2024-26258,0,0,766e8ee3881910a81a928091bc16ea7cd82e7c62393de16666cf602140b8ed16,2024-04-04T00:15:07.047000 CVE-2024-2626,0,0,0f82bfcd678adfe2206a7b49362dbece30aa00242a9c52e3ba26851c15f6dba3,2024-04-01T15:22:37.883000 CVE-2024-26260,0,0,e265a50d624e832bed578eaaf671225475ee52a0a641253d8d3fa4cc960d0968,2024-02-15T06:23:39.303000 CVE-2024-26261,0,0,0e54368aae0104b528b2c2b10aa27bd070162dbc45df6e809e95785e5efd10d2,2024-02-15T06:23:39.303000 @@ -242565,6 +242566,7 @@ CVE-2024-2687,0,0,8743e8c4178f9b4c342f85388b698da988fcd5df7a9f830356accbc2c7d603 CVE-2024-2688,0,0,2813e3d77c2b2d83f751b34ba79d9b337f290aff8a39ca0bf2b5affbb2644102,2024-03-25T01:51:01.223000 CVE-2024-2689,0,0,658993c0403fad94345d3cb8155974fc89f004b988ac6221fcb671e6effc6535,2024-04-03T22:15:07.290000 CVE-2024-2690,0,0,b9f1b9556b2658a97b0aa5fed823e2a3f219863f8b3c3eeec7a6e11e4b693950,2024-03-21T02:52:42.713000 +CVE-2024-2692,1,1,4dff168fae971f35ea778b7b59e72228b39afed9926b88e181ded3a6fd213068,2024-04-04T02:15:06.527000 CVE-2024-2702,0,0,865ffb7613b5d4b81a5327fb07c7988ee6b4cd29868791960db416ef49370f10,2024-03-20T13:00:16.367000 CVE-2024-2703,0,0,07081de6587d09870ff55039e594f5ce8e9c97e5814ee473417e88613bb5eb37,2024-03-21T02:52:42.793000 CVE-2024-2704,0,0,e286b904999417c65c8b69a6059186f449beb8789fde8f7550b2c51d635749f0,2024-03-21T02:52:42.870000 @@ -242911,6 +242913,7 @@ CVE-2024-28015,0,0,c36a569e47a8cc25a559aa19a480d47088d8456072eb6e8c9e0575d3988b3 CVE-2024-28016,0,0,fe85c1f239b1cebe9726ce271c3f5722bfdbb4bcff9b0aba329f58c6fcbf12b8,2024-04-02T06:15:15.603000 CVE-2024-2802,0,0,3b7ed9aefbc68681b0633b6ab16c0b3db6db844ee4c655f6c7e6863ac6e1f543,2024-03-26T15:15:49.677000 CVE-2024-28029,0,0,9e465d515603ce2b4056e1d4099525822960990d4afbdcda109cb1a09fe772c2,2024-03-25T16:06:44.403000 +CVE-2024-2803,1,1,ecd366c5a12c458fcf323ff3df753bc025edf8ad4c718558932b72f23ea65c91,2024-04-04T02:15:06.800000 CVE-2024-28033,0,0,d380f707343e80ca8a48383d7130e8455ae81fc182e0d67c36374f1eb571652f,2024-03-26T12:55:05.010000 CVE-2024-28034,0,0,59f37b2f71aecfc048b35bdfeca5cf2bf5792e3fd57d1b0f3eaa95911ebef442,2024-03-26T12:55:05.010000 CVE-2024-28039,0,0,9ef35c96ff38e007b2fd4f37c3f1f5b6d35461c4eaa69f2b36faccd438b26411,2024-03-18T12:38:25.490000 @@ -243056,6 +243059,7 @@ CVE-2024-28283,0,0,39f85b2f17c0fe895d0bdb32702da6d7a9c62274d2c91228b15f8ef37a4f9 CVE-2024-28286,0,0,0c649cd6694a1837fe5561b872f74550eafab1ff52e9c04655d5ad406a1d7e85,2024-03-21T12:58:51.093000 CVE-2024-28287,0,0,8355e78e2bcacfd30beedd02a16b8cbb7fa125f666660317b865986783b6c2d0,2024-04-02T18:12:16.283000 CVE-2024-28288,0,0,bbf61567f9663b711efc4f198529fd360d88d5a87ddc912234861f379f96afdd,2024-04-01T01:12:59.077000 +CVE-2024-2830,1,1,96e6c0abaf03aac88aa8c316493da97b9ccd76a5da8769ff2fa398d63b5238f7,2024-04-04T03:15:06.230000 CVE-2024-28303,0,0,1e1fe6d5ea3f2a6f114bc62ec7183db4733d3d529e4e5786c421b928ce2f2bf1,2024-03-20T13:00:16.367000 CVE-2024-28318,0,0,4464c0d64b943a4f9205011ad1109527e8aa088cb5ff5456cd49e911c2d1f722,2024-03-15T16:26:49.320000 CVE-2024-28319,0,0,e376890f5ff8761a0926623e9576a5238806c37f36258b3aec951592cbe60412,2024-03-15T16:26:49.320000 @@ -243173,6 +243177,7 @@ CVE-2024-28676,0,0,801d735d88a2c38558c90696937a503a364bdc5ac079aab35f708a8cac6bb CVE-2024-28677,0,0,beda9fb5e19c8e32c2bb233bf7e04303e98e61bb2557b7038cbec5829242cafe,2024-03-13T18:15:58.530000 CVE-2024-28678,0,0,e9f2e307c9c14d85cdf0d7276dece168215df066834aac177e5e011a7af00ff3,2024-03-13T18:15:58.530000 CVE-2024-28679,0,0,0c6e84e914fdaa4e663110efa631e88c6cae34e7955c7cdafa51b2651294cb69,2024-03-13T18:15:58.530000 +CVE-2024-2868,1,1,a0aac9acdb0ba19371b4cc3ab0db1f3d8b7c6da9590f62af8a8d7e745b381fb3,2024-04-04T02:15:07.010000 CVE-2024-28680,0,0,f0cb3475dd2248a613f045cb0e92e770aee1d1d2137270856a92a44b18528f47,2024-03-13T18:15:58.530000 CVE-2024-28681,0,0,ed8a4fd064b6b3346412990e6226cbe04bee8a6bd2aaad4671fdcd0478ce5ec1,2024-03-13T18:15:58.530000 CVE-2024-28682,0,0,2c53ed716809a76ded005fd10ac6d93891dbf2dd9f02238c66f1445af60cb8e7,2024-03-13T18:15:58.530000 @@ -243328,7 +243333,7 @@ CVE-2024-29151,0,0,ef852a662e1eaee7e15d971ee7451f2c3e954b3d808a30cb9a36bbe68bb24 CVE-2024-29154,0,0,dab131c9ff393e828252009730d8617a5e1a4fb5cfb7f2db054056bc6f27c2ba,2024-03-18T12:38:25.490000 CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2326,2024-03-18T12:38:25.490000 CVE-2024-2916,0,0,6871ce1ac12c0adda9a1495db174447a7645b0f8622337f63e4d979317d65207,2024-03-27T12:29:30.307000 -CVE-2024-29167,1,1,9137b4e6c505da150c1135337d6649a6081f1aeb2e87f468a9c85674ffbc5bde,2024-04-04T00:15:07.103000 +CVE-2024-29167,0,0,9137b4e6c505da150c1135337d6649a6081f1aeb2e87f468a9c85674ffbc5bde,2024-04-04T00:15:07.103000 CVE-2024-2917,0,0,cc7c53d7d6aa23ee02922950dbfd98ec950f87014b4781a546614dff66bfbad3,2024-03-27T12:29:30.307000 CVE-2024-29179,0,0,f19d4d0a9f8b6dc85e6e021ab22950c73dd30b1b16e940f3cfc8d8b6deab42d4,2024-03-26T12:55:05.010000 CVE-2024-29180,0,0,e32bebc90fbd05fe3a3edfae9506df906c8ca56e295fcb3cc3f3f384d12528c8,2024-03-21T19:47:03.943000 @@ -243338,6 +243343,7 @@ CVE-2024-29186,0,0,4d22f13bcc9a989b4457971fb422d0f63596eb5c598cc015a08c44b1e3975 CVE-2024-29187,0,0,b20c442660011aa9a00d748e283e3cff30d410ce48e3d079b901e0f36dcc61f4,2024-03-25T01:51:01.223000 CVE-2024-29188,0,0,a88946c34860ffe9844c033cf176d3b0a07d4a26b7808112b8bd0f05131d96e8,2024-03-25T01:51:01.223000 CVE-2024-29189,0,0,6878e9b35a058677d2a3fa4fc5bfa3461c367e63050b0e9c52331e170e2ec716,2024-03-26T12:55:05.010000 +CVE-2024-2919,1,1,6b30411f4300618aef7f8a07053fa275b657e104a3d0434bb2d54c9d4bca3417,2024-04-04T03:15:06.413000 CVE-2024-29190,0,0,06fd81282a65c29bad2a807438b949724256368bd8f788b06f116f9ca54b17a0,2024-03-25T01:51:01.223000 CVE-2024-29194,0,0,61bcf80dc8c33623e289063809985cd69cc66b52cb236ef7d952a2c24a0c4127,2024-03-25T01:51:01.223000 CVE-2024-29195,0,0,12b6fcead703f320c2faaa3dbf933701901e834c51cbd479cd70a3447afc3114,2024-03-26T12:55:05.010000 @@ -243350,7 +243356,7 @@ CVE-2024-29202,0,0,710d7ee4855d6fe6e591666dc35bf54bd7c26416e7ed34ce9d7c18b13c56e CVE-2024-29203,0,0,85853d1d6c0b7cff8ded9ca779662219e1e7d461c7c9aed96ad32295a032c6f6,2024-03-26T17:09:53.043000 CVE-2024-2921,0,0,a7048ceb487f73059844764517da213b04f370019c5cc0c6fe2153431d1dd6cb,2024-03-26T17:09:53.043000 CVE-2024-29216,0,0,59c06798795d05e391cdd301154441d31362295e800c3b46a2b7bd83a3e2dbc0,2024-03-25T13:47:14.087000 -CVE-2024-29225,1,1,4fb529425e69e4b0cbfa2f9f09303ddc74d023065b1b17522e775f73a75a9e71,2024-04-04T00:15:07.200000 +CVE-2024-29225,0,0,4fb529425e69e4b0cbfa2f9f09303ddc74d023065b1b17522e775f73a75a9e71,2024-04-04T00:15:07.200000 CVE-2024-29227,0,0,eecaff6ef866c6c9ce7329c8719d8151618914bed20188bbeb2cfe204e821322,2024-03-28T12:42:56.150000 CVE-2024-29228,0,0,0396b2f19bb32ec6c2e65f58d8f3992a3d27b02bc4a6c851b5d5b4cfa0460540,2024-03-28T12:42:56.150000 CVE-2024-29229,0,0,6dd1964f03a465c5b1d78ea2599ed81e5df193b0ca5daa792343c5fca8270ef3,2024-03-28T12:42:56.150000 @@ -243638,6 +243644,7 @@ CVE-2024-30202,0,0,8f653afa9be834d6068a82d15d250296f87495118f4f1c30c90cbc157fddc CVE-2024-30203,0,0,a1d664e0e9a71620a1b21449b8bc268488489a282580bac90b40062a439c83a7,2024-03-25T16:43:06.137000 CVE-2024-30204,0,0,bf1cbd8aaa2b36eb1f7808443cd1dc94c2d123df04230a458090af1180122865,2024-03-25T16:43:06.137000 CVE-2024-30205,0,0,d8d475f93d08b2037de38fb56b8f07beb7b6f1c5b446fee65bfc13f5246e2c4e,2024-03-25T16:43:06.137000 +CVE-2024-3022,1,1,a37d5d560b38f78b564bad8226b6553a4f0987dbeb8270e279a97f23bbbe3d67,2024-04-04T02:15:07.230000 CVE-2024-30221,0,0,23f871339b04b26b03b1ae0b592c573034cab277a7f5f76554e69b2658f3686d,2024-03-28T12:42:56.150000 CVE-2024-30222,0,0,3f187efc44dcd846c225c38744c60f6e219f2e75a834b7bcc385a175d490ff30,2024-03-28T12:42:56.150000 CVE-2024-30223,0,0,f5cdd58c36ca3d81f7cad6e0467c6024652dcf4e8a185fac81b8d0d0618da80d,2024-03-28T12:42:56.150000 @@ -243668,6 +243675,7 @@ CVE-2024-30246,0,0,491c8e2c4543911d193547ad3a12e1f3a35c8b83c234dd293b662e1fad025 CVE-2024-30247,0,0,17cc965a0b029d9272a0f5015c16eff346ab6d0b38ece20a3e3095775d548462,2024-04-01T01:12:59.077000 CVE-2024-30248,0,0,25c63ea78319bc00f7f00382fd630bb3eaff4535f4e416eeeceadc0cb646cca2,2024-04-02T18:12:16.283000 CVE-2024-30265,0,0,54782d17edd9c907dd6f078e703eac63fd4cdc0b69fbaa76d7a645277b98f464,2024-04-03T23:15:13.423000 +CVE-2024-3030,1,1,e54b15ec9f6821950f57943cadaa258b3c87135be2e9982368f75c2ce52126fd,2024-04-04T02:15:07.437000 CVE-2024-30322,0,0,64e521cd60b942f55f264dd1b34a0063ca35d4db4eef121c1f7bc208aac4f7ab,2024-04-03T17:24:18.150000 CVE-2024-30323,0,0,e32fdd05c5f30f68cf1412b7e36fda0cb57a7690cef1889aa844a8506beb3ac4,2024-04-03T17:24:18.150000 CVE-2024-30324,0,0,527c6e011dbcb72aeaa94e91760184a03f584736345d9e33e4037380190847ac,2024-04-03T17:24:18.150000 @@ -244025,5 +244033,6 @@ CVE-2024-3257,0,0,b08a6413edbe423942780a6fe023bc538f97dad558ddbc91a724f215cfc85e CVE-2024-3258,0,0,16d450bc3554c2a319117adc94d8a7dcb1f68b8821fc173e15562a1ba48b306c,2024-04-03T17:24:18.150000 CVE-2024-3259,0,0,59128ca045cd2f7fbe88d58e11ffcce19ef1d2f5d6abea61087e98d65d4fd821,2024-04-03T17:24:18.150000 CVE-2024-3270,0,0,ee7ab86f7bf43358544c245654b91101b254fc6f7c652d1821c4b3bc289b1731,2024-04-03T23:15:13.650000 -CVE-2024-3272,1,1,ec957dadeec43e12f55685313ce87fc6f1845369f9e4bed1d35809970a1013da,2024-04-04T01:15:50.123000 -CVE-2024-3273,1,1,08118f9907decf7bfcc2bfa04d870d8a923a71212110e86a411bc35b45b8e9b9,2024-04-04T01:15:50.387000 +CVE-2024-3272,0,0,ec957dadeec43e12f55685313ce87fc6f1845369f9e4bed1d35809970a1013da,2024-04-04T01:15:50.123000 +CVE-2024-3273,0,0,08118f9907decf7bfcc2bfa04d870d8a923a71212110e86a411bc35b45b8e9b9,2024-04-04T01:15:50.387000 +CVE-2024-3274,1,1,58afdb0d09379d55aa4fd9c97b270d39b7e879773b86e2e5f85b0563bcd1125f,2024-04-04T02:15:07.627000