diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52364.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52364.json new file mode 100644 index 00000000000..e005276fdaf --- /dev/null +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52364.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2023-52364", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-04-08T10:15:07.537", + "lastModified": "2024-04-08T10:15:07.537", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability of input parameters being not strictly verified in the RSMC module.\nImpact: Successful exploitation of this vulnerability may cause out-of-bounds write." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/", + "source": "psirt@huawei.com" + }, + { + "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52385.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52385.json new file mode 100644 index 00000000000..b9ae51bd4bf --- /dev/null +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52385.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2023-52385", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-04-08T10:15:08.400", + "lastModified": "2024-04-08T10:15:08.400", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds write vulnerability in the RSMC module.\nImpact: Successful exploitation of this vulnerability will affect availability." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/", + "source": "psirt@huawei.com" + }, + { + "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52386.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52386.json new file mode 100644 index 00000000000..d950f607df2 --- /dev/null +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52386.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-52386", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-04-08T10:15:08.487", + "lastModified": "2024-04-08T10:15:08.487", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds write vulnerability in the RSMC module.\nImpact: Successful exploitation of this vulnerability will affect availability." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/", + "source": "psirt@huawei.com" + }, + { + "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0968.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0968.json index e676fd20424..4a998ba1d82 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0968.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0968.json @@ -2,62 +2,14 @@ "id": "CVE-2024-0968", "sourceIdentifier": "security@huntr.dev", "published": "2024-03-02T22:15:50.123", - "lastModified": "2024-03-04T13:58:23.447", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-04-08T11:15:49.610", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "Cross-site Scripting (XSS) - DOM in GitHub repository langchain-ai/chat-langchain prior to 0.0.0." - }, - { - "lang": "es", - "value": "Cross-Site Scripting (XSS): DOM en el repositorio de GitHub langchain-ai/chat-langchain anterior a 0.0.0." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority as the vulnerability is not in distributable software." } ], - "metrics": { - "cvssMetricV30": [ - { - "source": "security@huntr.dev", - "type": "Secondary", - "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L", - "attackVector": "NETWORK", - "attackComplexity": "HIGH", - "privilegesRequired": "LOW", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "LOW", - "baseScore": 4.6, - "baseSeverity": "MEDIUM" - }, - "exploitabilityScore": 1.2, - "impactScore": 3.4 - } - ] - }, - "weaknesses": [ - { - "source": "security@huntr.dev", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-79" - } - ] - } - ], - "references": [ - { - "url": "https://github.com/langchain-ai/chat-langchain/commit/e13db53cba2a48e4e26d103fd51598856f6bdd33", - "source": "security@huntr.dev" - }, - { - "url": "https://huntr.com/bounties/566033b9-df20-4928-b4aa-5cd4c3ca1561", - "source": "security@huntr.dev" - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23189.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23189.json index 9f60ad35e0b..1351e1f9ff7 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23189.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23189.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23189", "sourceIdentifier": "security@open-xchange.com", "published": "2024-04-08T09:15:09.413", - "lastModified": "2024-04-08T09:15:09.413", + "lastModified": "2024-04-08T11:15:49.970", "vulnStatus": "Received", "descriptions": [ { @@ -47,9 +47,21 @@ } ], "references": [ + { + "url": "https://documentation.open-xchange.com/appsuite/releases/8.21/", + "source": "security@open-xchange.com" + }, + { + "url": "https://documentation.open-xchange.com/appsuite/releases/8.22/", + "source": "security@open-xchange.com" + }, { "url": "https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2024/oxas-adv-2024-0001.json", "source": "security@open-xchange.com" + }, + { + "url": "https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6268_7.10.6_2024-02-08.pdf", + "source": "security@open-xchange.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23190.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23190.json index 5ba6dcfa624..8f5505ba238 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23190.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23190.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23190", "sourceIdentifier": "security@open-xchange.com", "published": "2024-04-08T09:15:09.637", - "lastModified": "2024-04-08T09:15:09.637", + "lastModified": "2024-04-08T11:15:50.057", "vulnStatus": "Received", "descriptions": [ { @@ -47,9 +47,21 @@ } ], "references": [ + { + "url": "https://documentation.open-xchange.com/appsuite/releases/8.21/", + "source": "security@open-xchange.com" + }, + { + "url": "https://documentation.open-xchange.com/appsuite/releases/8.22/", + "source": "security@open-xchange.com" + }, { "url": "https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2024/oxas-adv-2024-0001.json", "source": "security@open-xchange.com" + }, + { + "url": "https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6268_7.10.6_2024-02-08.pdf", + "source": "security@open-xchange.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23191.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23191.json index ee9d596ac5f..7a52083e397 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23191.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23191.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23191", "sourceIdentifier": "security@open-xchange.com", "published": "2024-04-08T09:15:09.820", - "lastModified": "2024-04-08T09:15:09.820", + "lastModified": "2024-04-08T11:15:50.170", "vulnStatus": "Received", "descriptions": [ { @@ -47,9 +47,21 @@ } ], "references": [ + { + "url": "https://documentation.open-xchange.com/appsuite/releases/8.21/", + "source": "security@open-xchange.com" + }, + { + "url": "https://documentation.open-xchange.com/appsuite/releases/8.22/", + "source": "security@open-xchange.com" + }, { "url": "https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2024/oxas-adv-2024-0001.json", "source": "security@open-xchange.com" + }, + { + "url": "https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6268_7.10.6_2024-02-08.pdf", + "source": "security@open-xchange.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23192.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23192.json index 2bc97159225..facdd348088 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23192.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23192.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23192", "sourceIdentifier": "security@open-xchange.com", "published": "2024-04-08T09:15:09.990", - "lastModified": "2024-04-08T09:15:09.990", + "lastModified": "2024-04-08T11:15:50.237", "vulnStatus": "Received", "descriptions": [ { @@ -47,9 +47,21 @@ } ], "references": [ + { + "url": "https://documentation.open-xchange.com/appsuite/releases/8.21/", + "source": "security@open-xchange.com" + }, + { + "url": "https://documentation.open-xchange.com/appsuite/releases/8.22/", + "source": "security@open-xchange.com" + }, { "url": "https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2024/oxas-adv-2024-0001.json", "source": "security@open-xchange.com" + }, + { + "url": "https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6268_7.10.6_2024-02-08.pdf", + "source": "security@open-xchange.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26811.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26811.json new file mode 100644 index 00000000000..ec61c05359e --- /dev/null +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26811.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-26811", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-04-08T10:15:08.540", + "lastModified": "2024-04-08T10:15:08.540", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: validate payload size in ipc response\n\nIf installing malicious ksmbd-tools, ksmbd.mountd can return invalid ipc\nresponse to ksmbd kernel server. ksmbd should validate payload size of\nipc response from ksmbd.mountd to avoid memory overrun or\nslab-out-of-bounds. This patch validate 3 ipc response that has payload." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/a677ebd8ca2f2632ccdecbad7b87641274e15aac", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27895.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27895.json new file mode 100644 index 00000000000..e2ff78cfb1c --- /dev/null +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27895.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-27895", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-04-08T10:15:08.597", + "lastModified": "2024-04-08T10:15:08.597", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability of permission control in the window module. Successful exploitation of this vulnerability may affect confidentiality." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/", + "source": "psirt@huawei.com" + }, + { + "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27896.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27896.json new file mode 100644 index 00000000000..37b97dbd1ff --- /dev/null +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27896.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2024-27896", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-04-08T10:15:08.640", + "lastModified": "2024-04-08T10:15:08.640", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Input verification vulnerability in the log module.\nImpact: Successful exploitation of this vulnerability can affect integrity." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/", + "source": "psirt@huawei.com" + }, + { + "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27897.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27897.json new file mode 100644 index 00000000000..1331afd180a --- /dev/null +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27897.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2024-27897", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-04-08T10:15:08.713", + "lastModified": "2024-04-08T10:15:08.713", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Input verification vulnerability in the call module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/", + "source": "psirt@huawei.com" + }, + { + "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3438.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3438.json new file mode 100644 index 00000000000..9003c61d9a6 --- /dev/null +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3438.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-3438", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-04-08T11:15:50.310", + "lastModified": "2024-04-08T11:15:50.310", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Prison Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /Admin/login.php. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259691." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/fubxx/CVE/blob/main/PrisonManagementSystemSQL1.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.259691", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.259691", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.312203", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index e018a7b2557..72307b165d8 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-04-08T10:00:52.575822+00:00 +2024-04-08T12:00:38.793944+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-04-08T09:15:10.373000+00:00 +2024-04-08T11:15:50.310000+00:00 ``` ### Last Data Feed Release @@ -33,45 +33,32 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -244422 +244430 ``` ### CVEs added in the last Commit -Recently added CVEs: `28` +Recently added CVEs: `8` -- [CVE-2023-52538](CVE-2023/CVE-2023-525xx/CVE-2023-52538.json) (`2024-04-08T09:15:08.453`) -- [CVE-2023-52539](CVE-2023/CVE-2023-525xx/CVE-2023-52539.json) (`2024-04-08T09:15:08.500`) -- [CVE-2023-52540](CVE-2023/CVE-2023-525xx/CVE-2023-52540.json) (`2024-04-08T09:15:08.550`) -- [CVE-2023-52541](CVE-2023/CVE-2023-525xx/CVE-2023-52541.json) (`2024-04-08T09:15:08.600`) -- [CVE-2023-52542](CVE-2023/CVE-2023-525xx/CVE-2023-52542.json) (`2024-04-08T09:15:08.647`) -- [CVE-2023-52543](CVE-2023/CVE-2023-525xx/CVE-2023-52543.json) (`2024-04-08T09:15:08.697`) -- [CVE-2023-52544](CVE-2023/CVE-2023-525xx/CVE-2023-52544.json) (`2024-04-08T09:15:08.790`) -- [CVE-2023-52545](CVE-2023/CVE-2023-525xx/CVE-2023-52545.json) (`2024-04-08T09:15:08.873`) -- [CVE-2023-52546](CVE-2023/CVE-2023-525xx/CVE-2023-52546.json) (`2024-04-08T09:15:08.920`) -- [CVE-2023-52549](CVE-2023/CVE-2023-525xx/CVE-2023-52549.json) (`2024-04-08T09:15:08.970`) -- [CVE-2023-52550](CVE-2023/CVE-2023-525xx/CVE-2023-52550.json) (`2024-04-08T09:15:09.053`) -- [CVE-2023-52551](CVE-2023/CVE-2023-525xx/CVE-2023-52551.json) (`2024-04-08T09:15:09.130`) -- [CVE-2023-52552](CVE-2023/CVE-2023-525xx/CVE-2023-52552.json) (`2024-04-08T09:15:09.200`) -- [CVE-2023-52553](CVE-2023/CVE-2023-525xx/CVE-2023-52553.json) (`2024-04-08T09:15:09.287`) -- [CVE-2023-52554](CVE-2023/CVE-2023-525xx/CVE-2023-52554.json) (`2024-04-08T09:15:09.363`) -- [CVE-2024-23189](CVE-2024/CVE-2024-231xx/CVE-2024-23189.json) (`2024-04-08T09:15:09.413`) -- [CVE-2024-23190](CVE-2024/CVE-2024-231xx/CVE-2024-23190.json) (`2024-04-08T09:15:09.637`) -- [CVE-2024-23191](CVE-2024/CVE-2024-231xx/CVE-2024-23191.json) (`2024-04-08T09:15:09.820`) -- [CVE-2024-23192](CVE-2024/CVE-2024-231xx/CVE-2024-23192.json) (`2024-04-08T09:15:09.990`) -- [CVE-2024-30667](CVE-2024/CVE-2024-306xx/CVE-2024-30667.json) (`2024-04-08T08:15:11.390`) -- [CVE-2024-30672](CVE-2024/CVE-2024-306xx/CVE-2024-30672.json) (`2024-04-08T08:15:11.517`) -- [CVE-2024-30674](CVE-2024/CVE-2024-306xx/CVE-2024-30674.json) (`2024-04-08T08:15:11.570`) -- [CVE-2024-30675](CVE-2024/CVE-2024-306xx/CVE-2024-30675.json) (`2024-04-08T08:15:11.627`) -- [CVE-2024-31357](CVE-2024/CVE-2024-313xx/CVE-2024-31357.json) (`2024-04-08T09:15:10.180`) -- [CVE-2024-31375](CVE-2024/CVE-2024-313xx/CVE-2024-31375.json) (`2024-04-08T09:15:10.373`) +- [CVE-2023-52364](CVE-2023/CVE-2023-523xx/CVE-2023-52364.json) (`2024-04-08T10:15:07.537`) +- [CVE-2023-52385](CVE-2023/CVE-2023-523xx/CVE-2023-52385.json) (`2024-04-08T10:15:08.400`) +- [CVE-2023-52386](CVE-2023/CVE-2023-523xx/CVE-2023-52386.json) (`2024-04-08T10:15:08.487`) +- [CVE-2024-26811](CVE-2024/CVE-2024-268xx/CVE-2024-26811.json) (`2024-04-08T10:15:08.540`) +- [CVE-2024-27895](CVE-2024/CVE-2024-278xx/CVE-2024-27895.json) (`2024-04-08T10:15:08.597`) +- [CVE-2024-27896](CVE-2024/CVE-2024-278xx/CVE-2024-27896.json) (`2024-04-08T10:15:08.640`) +- [CVE-2024-27897](CVE-2024/CVE-2024-278xx/CVE-2024-27897.json) (`2024-04-08T10:15:08.713`) +- [CVE-2024-3438](CVE-2024/CVE-2024-34xx/CVE-2024-3438.json) (`2024-04-08T11:15:50.310`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `5` -- [CVE-2023-27524](CVE-2023/CVE-2023-275xx/CVE-2023-27524.json) (`2024-04-08T09:15:07.973`) +- [CVE-2024-0968](CVE-2024/CVE-2024-09xx/CVE-2024-0968.json) (`2024-04-08T11:15:49.610`) +- [CVE-2024-23189](CVE-2024/CVE-2024-231xx/CVE-2024-23189.json) (`2024-04-08T11:15:49.970`) +- [CVE-2024-23190](CVE-2024/CVE-2024-231xx/CVE-2024-23190.json) (`2024-04-08T11:15:50.057`) +- [CVE-2024-23191](CVE-2024/CVE-2024-231xx/CVE-2024-23191.json) (`2024-04-08T11:15:50.170`) +- [CVE-2024-23192](CVE-2024/CVE-2024-231xx/CVE-2024-23192.json) (`2024-04-08T11:15:50.237`) ## Download and Usage diff --git a/_state.csv b/_state.csv index fd0dc5e80f7..729343bfe30 100644 --- a/_state.csv +++ b/_state.csv @@ -219430,7 +219430,7 @@ CVE-2023-27520,0,0,b0287cbdaf9dd7a8fe578065618f7dbaf0bedab31286d3434275fafbd6a99 CVE-2023-27521,0,0,cd4e941a2dc2e4b28fba893f6379be5367922bb161d143ae086c39b3323ed1b6,2023-05-30T15:40:34.467000 CVE-2023-27522,0,0,440b8255e93ad9b696601a7c1d82de7776453290d3a4ec3baab0187435cb328f,2023-09-08T22:15:10.817000 CVE-2023-27523,0,0,b4709427eb8886c4a66e3966cd4a5c86b32cce199e03d6b8520d2217292e4ac8,2023-09-11T13:46:08.797000 -CVE-2023-27524,0,1,82c33fda5e8c6c69b6c502db339c4074417aea4f3e45fff00f414bf377303234,2024-04-08T09:15:07.973000 +CVE-2023-27524,0,0,82c33fda5e8c6c69b6c502db339c4074417aea4f3e45fff00f414bf377303234,2024-04-08T09:15:07.973000 CVE-2023-27525,0,0,42dd5bad99b5fe07645c58f7807ee5e7f52e33d663fb11c0505f264ebf072855,2023-04-27T19:54:20.913000 CVE-2023-27526,0,0,92802037bba63e2dbbec8b80401fa85f70c2f66060c4175da27cadd3c192bcd7,2023-09-11T13:46:43.207000 CVE-2023-27527,0,0,ccf339a9cd32d7428d8e675d2b1aadd4213959efc1b4bc3309564e02036e84af,2023-05-16T20:33:27.193000 @@ -236144,12 +236144,13 @@ CVE-2023-52355,0,0,30175535bfde6e66be6dce4a86bb0177b08047eb9e1fb2db9c326dc5f9189 CVE-2023-52356,0,0,f4861a9c0008839a2b5ec1f2513aaa75cc90ea85b18808e65d7bc888af5c1638,2024-03-11T13:15:52.753000 CVE-2023-52357,0,0,b1d8671149392ba36552d2d7975d95dd19f0db4f65b14e0cfedba761dce5c034,2024-02-20T19:50:53.960000 CVE-2023-52358,0,0,0b53d52db0f0a147bc8902c908a4bfab00aea8420e8b8fd20902eb5f941687f3,2024-02-20T19:50:53.960000 -CVE-2023-52359,1,1,c2749039dbb77aba6b43ba2f74fcf89daf858609cc6baf17d3156d0de28fc221,2024-04-08T09:15:08.293000 +CVE-2023-52359,0,0,c2749039dbb77aba6b43ba2f74fcf89daf858609cc6baf17d3156d0de28fc221,2024-04-08T09:15:08.293000 CVE-2023-5236,0,0,dca46a86e45346118bf2a7ab84eba7b576d6badd3032b0dee15268882dfcf4cc,2024-01-25T14:15:26.617000 CVE-2023-52360,0,0,16f43bf2db9c63fb8376705b1a20af48d2b2021bde521edc5f39f8d7f94a65fb,2024-02-20T19:50:53.960000 CVE-2023-52361,0,0,f95d1120b54a6eb0306a1dc7be9e5568d245925f94dbdbc3e05f3937b3a644e8,2024-02-20T19:50:53.960000 CVE-2023-52362,0,0,e0dbe318e8b6ea413fa843c12e1cc3e4282278448cb3e7d5c3abfce9b8092dbc,2024-02-20T19:50:53.960000 CVE-2023-52363,0,0,c1dcca60bab229666e09c45cc7bfff29bdd3e5c32ff3551407c4d455c18c8e60,2024-02-20T19:50:53.960000 +CVE-2023-52364,1,1,f74ae5718bde2fc622aee2394f7d7d707f3462687e5e5dc6d77a620bca01ed94,2024-04-08T10:15:07.537000 CVE-2023-52365,0,0,04f5738027bcccfa061f7a9142086a77386fc2ff6337615b00f39e148b6f5377,2024-02-20T19:50:53.960000 CVE-2023-52366,0,0,20fb8e4fefe4720a53164f57c0f59b13495b47bb9338886bcd384b6b25cb588c,2024-02-20T19:50:53.960000 CVE-2023-52367,0,0,f8a2cfa35a0db131b51dba6961563742d79875ff1e6cc49950ce4506f374f819,2024-02-20T19:50:53.960000 @@ -236170,8 +236171,10 @@ CVE-2023-5238,0,0,a261b85ed6b7b17d61d99dc1a4da76845d0517dc6639c69481ed60057b6935 CVE-2023-52380,0,0,d58f8abe62c6a33934f8c0dca186b52f3ce877c05545d71e6b6419ff9d811f02,2024-02-20T19:50:53.960000 CVE-2023-52381,0,0,472b65e10275d2947c6588b1ef901c2b36df20ae38152db3173d8780f82018ab,2024-02-20T19:50:53.960000 CVE-2023-52382,0,0,f973ee9d583d8e697e8b4f7637a6e5190862ca7e889e9b6c9293a012c3392d53,2024-04-07T09:15:08.317000 +CVE-2023-52385,1,1,02e15273176a4688a56c9b7f37a464ad32f916a78153b1dea147e4dff3e10d43,2024-04-08T10:15:08.400000 +CVE-2023-52386,1,1,78002e1eca70158dc06571852fc010bc49beb1783d93548e68f999f07caf4c43,2024-04-08T10:15:08.487000 CVE-2023-52387,0,0,5d67110ecd6bd3e11c6d9a0b6111500c254e06ec210161b97966bed3e04d85cb,2024-02-20T19:50:53.960000 -CVE-2023-52388,1,1,6f1417fbdf15265aa4b8fbf834e2fdc5c4093bb858d931e4495fe2a827e4081e,2024-04-08T09:15:08.353000 +CVE-2023-52388,0,0,6f1417fbdf15265aa4b8fbf834e2fdc5c4093bb858d931e4495fe2a827e4081e,2024-04-08T09:15:08.353000 CVE-2023-52389,0,0,0fee7704e079ab3b4f714b445118b41a4b2e46d55413f0fbef2c2dadc64f3a04,2024-02-08T16:43:22.473000 CVE-2023-5239,0,0,7c3185e021110163a371df48ac7e58ad34571a8f388d20b4e340a0c44f625d88,2023-12-01T19:22:45.963000 CVE-2023-52392,0,0,463e99189c393fc5915c39f8fef43cb5670898714de554b171e3d65cc6bc1b76,2024-02-14T18:15:46.937000 @@ -236303,24 +236306,24 @@ CVE-2023-52533,0,0,0f385dbfacf083c3b8cc242b66b63fdf83eac7a84a450f5709b697d6c468a CVE-2023-52534,0,0,a52b0bf095d1a736eff27e53de97b83572b0ad6c6c62b6d1962c40a32c4bfe5e,2024-04-08T03:15:08.877000 CVE-2023-52535,0,0,ced7b78502a11f9a7528cdee1acfd89dde734b97ae9a12a204a967e0f1c44e0c,2024-04-08T03:15:08.923000 CVE-2023-52536,0,0,bdc5741ba259fc8e108e677ba5495642bcf17540db143292965a22154151a560,2024-04-08T03:15:08.970000 -CVE-2023-52537,1,1,3ca855bae62027ae2342a133d6406b13e2fb52013e1783ac8935a85cfb7d24c8,2024-04-08T09:15:08.403000 -CVE-2023-52538,1,1,b9c97721d6631305f0e9865af73cda042c669c0842f6691cab6f5f2f46718cdf,2024-04-08T09:15:08.453000 -CVE-2023-52539,1,1,9d97ae9a5fe185fa431071402c675c238d998cf41c5bf6a71808291d12aa882a,2024-04-08T09:15:08.500000 +CVE-2023-52537,0,0,3ca855bae62027ae2342a133d6406b13e2fb52013e1783ac8935a85cfb7d24c8,2024-04-08T09:15:08.403000 +CVE-2023-52538,0,0,b9c97721d6631305f0e9865af73cda042c669c0842f6691cab6f5f2f46718cdf,2024-04-08T09:15:08.453000 +CVE-2023-52539,0,0,9d97ae9a5fe185fa431071402c675c238d998cf41c5bf6a71808291d12aa882a,2024-04-08T09:15:08.500000 CVE-2023-5254,0,0,23fcb4cf61de331a0ddc2cfc316ab59ec36cd385b139e789e07fd241718404d4,2023-11-07T04:23:40.643000 -CVE-2023-52540,1,1,09be2d9ea4409b318bbf364cf73b656d7b838e95af5d4e7122a285d4830f4cab,2024-04-08T09:15:08.550000 -CVE-2023-52541,1,1,7f8ff5ef29481d3f3c9de38a8b8ef310ba2ce8977ec2e68813f6f6b7f3a706c1,2024-04-08T09:15:08.600000 -CVE-2023-52542,1,1,6d4e9a810f4d39b41c65d8379d6bfaeaeab545d3da208ba0e5308be7f6c5a4cb,2024-04-08T09:15:08.647000 -CVE-2023-52543,1,1,07c7f2f84f7f345b3b1b35d723c30c20896362f10083370c3e474e7bbeff3f55,2024-04-08T09:15:08.697000 -CVE-2023-52544,1,1,f5de4fc44ff1ad91516d0bf4b8c86afd3caca7cb276dea6d147a431db11d950a,2024-04-08T09:15:08.790000 -CVE-2023-52545,1,1,fe944f3226d7337090da5980b628647847b54cd4bf410ac9b6b3fa6bd83fd8b4,2024-04-08T09:15:08.873000 -CVE-2023-52546,1,1,68dcab8495789710c30bb66318f6d8dc7bc43c5367d2b7640ded316dea8205de,2024-04-08T09:15:08.920000 -CVE-2023-52549,1,1,c2745d872d451ae5c37245a1677907dbaea2200e0a0e3f8192797c3dac8b5c8a,2024-04-08T09:15:08.970000 +CVE-2023-52540,0,0,09be2d9ea4409b318bbf364cf73b656d7b838e95af5d4e7122a285d4830f4cab,2024-04-08T09:15:08.550000 +CVE-2023-52541,0,0,7f8ff5ef29481d3f3c9de38a8b8ef310ba2ce8977ec2e68813f6f6b7f3a706c1,2024-04-08T09:15:08.600000 +CVE-2023-52542,0,0,6d4e9a810f4d39b41c65d8379d6bfaeaeab545d3da208ba0e5308be7f6c5a4cb,2024-04-08T09:15:08.647000 +CVE-2023-52543,0,0,07c7f2f84f7f345b3b1b35d723c30c20896362f10083370c3e474e7bbeff3f55,2024-04-08T09:15:08.697000 +CVE-2023-52544,0,0,f5de4fc44ff1ad91516d0bf4b8c86afd3caca7cb276dea6d147a431db11d950a,2024-04-08T09:15:08.790000 +CVE-2023-52545,0,0,fe944f3226d7337090da5980b628647847b54cd4bf410ac9b6b3fa6bd83fd8b4,2024-04-08T09:15:08.873000 +CVE-2023-52546,0,0,68dcab8495789710c30bb66318f6d8dc7bc43c5367d2b7640ded316dea8205de,2024-04-08T09:15:08.920000 +CVE-2023-52549,0,0,c2745d872d451ae5c37245a1677907dbaea2200e0a0e3f8192797c3dac8b5c8a,2024-04-08T09:15:08.970000 CVE-2023-5255,0,0,7b00041b943da6551d182c3ce2fdbb603d656d59887e0f5b6c6238fdb452d7ad,2023-10-05T16:48:26.820000 -CVE-2023-52550,1,1,40091b88ad65882a7510d85a3e0a3ea17ac12c62073279fdb1ec01fbee4a8415,2024-04-08T09:15:09.053000 -CVE-2023-52551,1,1,5866abcefa3ebff49af32df4a5439723b77193d43ff24dc77c385442c53856e6,2024-04-08T09:15:09.130000 -CVE-2023-52552,1,1,0c88f552d54b86beb3906196740ef09755ce90264281b3c1be5097f012c6c56c,2024-04-08T09:15:09.200000 -CVE-2023-52553,1,1,e84dca6340b15cc3657bfde67ee80ea642482874e494650a5d571cb5b9818ecb,2024-04-08T09:15:09.287000 -CVE-2023-52554,1,1,5610bb864ba0fe05055152e47a7524c3e83454a880562adcc4b80225745c7fc0,2024-04-08T09:15:09.363000 +CVE-2023-52550,0,0,40091b88ad65882a7510d85a3e0a3ea17ac12c62073279fdb1ec01fbee4a8415,2024-04-08T09:15:09.053000 +CVE-2023-52551,0,0,5866abcefa3ebff49af32df4a5439723b77193d43ff24dc77c385442c53856e6,2024-04-08T09:15:09.130000 +CVE-2023-52552,0,0,0c88f552d54b86beb3906196740ef09755ce90264281b3c1be5097f012c6c56c,2024-04-08T09:15:09.200000 +CVE-2023-52553,0,0,e84dca6340b15cc3657bfde67ee80ea642482874e494650a5d571cb5b9818ecb,2024-04-08T09:15:09.287000 +CVE-2023-52554,0,0,5610bb864ba0fe05055152e47a7524c3e83454a880562adcc4b80225745c7fc0,2024-04-08T09:15:09.363000 CVE-2023-52555,0,0,8f5cfbf90effe8bc93de944c28e6bb6b874d3c040b62d40f838597c454689cfc,2024-03-01T14:04:26.010000 CVE-2023-52556,0,0,e7c05b1e3d57e679e4f7e49ec40d63df2f365efa55dcc4497d7451616902d44e,2024-03-01T22:22:25.913000 CVE-2023-52557,0,0,c282bf345ddc73e929b1a7a965eaa5b2031c2f67652b4aa521591c710bcb1406,2024-03-01T22:22:25.913000 @@ -238811,7 +238814,7 @@ CVE-2024-0964,0,0,90d5cdff72ec0b95b7756d60546d44dc2b3f1c468fecca13fee1ae43706097 CVE-2024-0965,0,0,ad5735d2fc09000ae78ab95159fac82253605fd75dbe5ffc15496b8449b45b7f,2024-02-15T02:00:27.450000 CVE-2024-0966,0,0,274bd7e52ee52f523350182ad0500129962448c4a023a517d13b0f7ce42361ac,2024-03-21T12:58:51.093000 CVE-2024-0967,0,0,9fd29428758cc7103c27ff768899ac1f1027dfb29b99d14d825027787d9c2bb4,2024-03-01T15:23:36.177000 -CVE-2024-0968,0,0,17167b90ee86caa2a2b54f8a85e9b92551dc58d86c5c39997c6d856f32585ff0,2024-03-04T13:58:23.447000 +CVE-2024-0968,0,1,c1945b692689ad2f744c5e2d1d9cf9272687841f9bcfad2dcb0e3ca7e46c8c2d,2024-04-08T11:15:49.610000 CVE-2024-0969,0,0,b70a3e678841d5c3e905a1a4d78ee61bc51fd818aa668b1889827f06c393559b,2024-02-13T19:44:42.503000 CVE-2024-0971,0,0,10711fc5fd019982dab0af4d04cad68f7d925a8d90883facb336aae2462a64e3,2024-03-04T22:58:00.967000 CVE-2024-0973,0,0,87a64eeb8545d2aed4850999f1a0515438bc623727357d945a5399ed140bee41,2024-03-18T19:40:00.173000 @@ -240841,11 +240844,11 @@ CVE-2024-23180,0,0,e1d7dd545ba9f64a187a87150c5e0980c64760319d7ec16ab7d59d98e268c CVE-2024-23181,0,0,1670ba0f025ea5af6bb232b7859412796f7e598981dee961828ca2057439dfe0,2024-01-29T22:55:15.377000 CVE-2024-23182,0,0,f1264713bd57ef4128de6f3045f4c61bebd1bad343f929e4484b785773092265,2024-01-29T22:55:36.183000 CVE-2024-23183,0,0,93cf9ba468f15615134365f0103ab70e70069d42361d31f584c40ec201d8a9a2,2024-01-29T22:55:48.787000 -CVE-2024-23189,1,1,ed02a56fb781ae74d3601ebad8b499866f54772fe42234145543c6b18bf34b9a,2024-04-08T09:15:09.413000 +CVE-2024-23189,0,1,da79aed255eb958c8b679307356af4d814431237a504dcb3fc535c0f5f84337e,2024-04-08T11:15:49.970000 CVE-2024-2319,0,0,7c418d002244d51b00ca2fafa0c8e14c5cc40641054fa1d4dc85ce7d77674499,2024-03-08T21:19:43.127000 -CVE-2024-23190,1,1,fb7227386093be50e9fc488a705043233eab318517d4a2e8399b7b0d8007b6c3,2024-04-08T09:15:09.637000 -CVE-2024-23191,1,1,5b07fef16e5e6cfccfa300b507e477c08c8d7f2e9ba9a131983e9a63448b1177,2024-04-08T09:15:09.820000 -CVE-2024-23192,1,1,852f166d3e6e97749af45d55857a7d64b6cf11bfa601104c468b813c679abb34,2024-04-08T09:15:09.990000 +CVE-2024-23190,0,1,afbb963ad9fe4fac8b022a35b7a17497efd9d5022fac661ebd77fbb75c925f63,2024-04-08T11:15:50.057000 +CVE-2024-23191,0,1,3ad58d726f7f3b0bfad1a4a1c3308b956f1fb4c78cecb7218e2fe05ab37cad0a,2024-04-08T11:15:50.170000 +CVE-2024-23192,0,1,28bf2ddf2116b21ed635c179d82221f3ad6bc0e795ca2f8ca72064f1349c6f78,2024-04-08T11:15:50.237000 CVE-2024-23196,0,0,916695e8de6ad88a7eb739e09a11651ad9458fb3044e054e85a4e9fe2ce054c9,2024-02-10T04:06:14.577000 CVE-2024-23201,0,0,0f8fb4c7d86a834d8d9bd84c59d7ac097591ba1ab57e91c147b21ce025d3951c,2024-03-13T23:15:45.840000 CVE-2024-23203,0,0,a7d3b9c842d401a26cd60b5363d9fd931ec7b6ace08dfe359efc5de9e4d5324f,2024-03-13T22:15:09.117000 @@ -242725,6 +242728,7 @@ CVE-2024-26808,0,0,4f31bc304a07232a3baf91061957b820ea1892642e797b2566eb9414b09af CVE-2024-26809,0,0,9fe73261a4fc78e6c4eacdd5a51592c430457963a39614d59847053f3066f6fb,2024-04-04T12:48:22.650000 CVE-2024-2681,0,0,211b9a75c4368c46da39324b5885baab82086ddd4b191379e2bc3298587cc094,2024-03-21T02:52:42.143000 CVE-2024-26810,0,0,38efc0e271ddc68cf77956d8ead6e6522daf46934f85727df3e802d5a57313d4,2024-04-05T12:40:52.763000 +CVE-2024-26811,1,1,b9de2de58ac15b8947eed2163a67025f5f96ade29fbc96da827f11e91215f1f6,2024-04-08T10:15:08.540000 CVE-2024-26812,0,0,9d7026ebf11b448528088f214f842f936958cf9c929eb812614762d5a59c6f36,2024-04-05T12:40:52.763000 CVE-2024-26813,0,0,af4f2b053ee61ea2d2b7978accbda1976a2018d4986bdf351689365b94c98f84,2024-04-05T12:40:52.763000 CVE-2024-26814,0,0,faf3dfecf29bf595a382a75d07263a7b936c1f72070d1b90b4961ca213525430,2024-04-05T12:40:52.763000 @@ -243020,6 +243024,9 @@ CVE-2024-2780,0,0,bdcceeee0c00953c03148d72ca9c4da28e2649db6e5c4d572065a841b8ee9a CVE-2024-2781,0,0,7440c381afc245ac61500f5670c7b774787526dc48ee470e168c2fa8882d9975,2024-03-27T12:29:30.307000 CVE-2024-27889,0,0,fafa75eb559da0736cbe5f975005d2c6007c4614a71da5e60cbad40c6f594a2b,2024-03-05T13:41:01.900000 CVE-2024-27894,0,0,249999fc9487c1b63574e09bae3fbcbcdf7b20ef335df69d9151a0f5ea4d74a1,2024-03-13T12:33:51.697000 +CVE-2024-27895,1,1,5daf363f074347bfd62fd61244722c66e7de5f3a119db5cedc32396e8795d7c1,2024-04-08T10:15:08.597000 +CVE-2024-27896,1,1,0050d20c336f7ca300ea9f50770d88100dd2ef39463f2e2ad04eb4871b898f31,2024-04-08T10:15:08.640000 +CVE-2024-27897,1,1,abe0df73b99ced44ddcb5b123a15e53b232cc8f14fe48b06ed86ac209f3c2444,2024-04-08T10:15:08.713000 CVE-2024-27900,0,0,00f9885d5a06fec36b56a14fdc3be21ddc255c1561a408e91e09aee1b7ac8b37,2024-03-12T12:40:13.500000 CVE-2024-27902,0,0,7aa835c5c3cccf2434107e43a6dd21c3ee48d8e6664a62d49734964bcc016141,2024-03-12T12:40:13.500000 CVE-2024-27905,0,0,3e20ed1ee55859457fccacd02ccfd33b203e184f29107e3c93e267df9f8d58a8,2024-03-21T02:52:20.520000 @@ -244142,10 +244149,10 @@ CVE-2024-30662,0,0,35c3434415314c61cb393aa3b842dd98f797f4eed263740a71c7e45746175 CVE-2024-30663,0,0,737663de3656dcf37b52b3bbcf60fbb2b0b510d0af9d12f0fffaa895488340f4,2024-04-08T07:15:09.570000 CVE-2024-30665,0,0,0ce28e7f2034c94fbe58aeb864f7ce5c1e19365ca3d6a6e46d7a8e04ee9eef54,2024-04-08T07:15:09.643000 CVE-2024-30666,0,0,a0617822df55b25994d3d75b00ccb3d7c40630d60ff0257f08992a61a7940225,2024-04-08T07:15:09.713000 -CVE-2024-30667,1,1,50177ddcb7f1ec7238ad75beae2d8729c197129ae47ec636363ee3f1eb9fdad6,2024-04-08T08:15:11.390000 -CVE-2024-30672,1,1,33c19bf80d514d33fe8b410f469abee115690675dd0fd1d570679e25510cce06,2024-04-08T08:15:11.517000 -CVE-2024-30674,1,1,3db9001c5b359b22957b82a74212ff2ab9f9794f2bdaa5a03dcf7d82335c60a7,2024-04-08T08:15:11.570000 -CVE-2024-30675,1,1,8d09639e17cbe463a74ebf8dffb9625cb8f029bf277e20158b1992cb577afd64,2024-04-08T08:15:11.627000 +CVE-2024-30667,0,0,50177ddcb7f1ec7238ad75beae2d8729c197129ae47ec636363ee3f1eb9fdad6,2024-04-08T08:15:11.390000 +CVE-2024-30672,0,0,33c19bf80d514d33fe8b410f469abee115690675dd0fd1d570679e25510cce06,2024-04-08T08:15:11.517000 +CVE-2024-30674,0,0,3db9001c5b359b22957b82a74212ff2ab9f9794f2bdaa5a03dcf7d82335c60a7,2024-04-08T08:15:11.570000 +CVE-2024-30675,0,0,8d09639e17cbe463a74ebf8dffb9625cb8f029bf277e20158b1992cb577afd64,2024-04-08T08:15:11.627000 CVE-2024-3077,0,0,df42d4a62ceb1c6a6275b9b1d36ac8da42c0ae3505d0e07beac8238605b5504b,2024-03-29T12:45:02.937000 CVE-2024-3078,0,0,cde724dd3faba12829b2b6702d06fc6a91a021819aa4d3333d39ab34ce48e248,2024-03-29T13:28:22.880000 CVE-2024-30806,0,0,3c4bbd71defb52c4de24f9ad1626459edef6b60997b976e6d74aead4ee0b3b0f,2024-04-02T20:31:58.463000 @@ -244288,9 +244295,9 @@ CVE-2024-31346,0,0,bbcfa6a9022c6186c14f1f03f04a58f8387646566ec46a96da09b6d707e9b CVE-2024-31348,0,0,ad7275da15911b4135ef07a24b64619101703c47460bd4b1d6378f7132e025ce,2024-04-07T18:15:13.040000 CVE-2024-31349,0,0,9af1c1c7529d33bc6d7573e351321f4ec0e59398b9452646768e750db7e7de9c,2024-04-07T18:15:13.240000 CVE-2024-3135,0,0,91954ab6e8bf3cb2f93a640035369c46334c6e185515d1b835de2161b0fd8f69,2024-04-02T12:50:42.233000 -CVE-2024-31357,1,1,d8687ef1d3b9157d8b494253a564dbb0949824bda74b9c0420ece8d693fd5337,2024-04-08T09:15:10.180000 +CVE-2024-31357,0,0,d8687ef1d3b9157d8b494253a564dbb0949824bda74b9c0420ece8d693fd5337,2024-04-08T09:15:10.180000 CVE-2024-3137,0,0,85619be4f983f97db1d6302bec8264dd546f884b93dfcad5f6be85034ffe5dcb,2024-04-02T12:50:42.233000 -CVE-2024-31375,1,1,8877a1452797cb235944df2ef137537d3a45645dde925df0d52b17bd46737ff5,2024-04-08T09:15:10.373000 +CVE-2024-31375,0,0,8877a1452797cb235944df2ef137537d3a45645dde925df0d52b17bd46737ff5,2024-04-08T09:15:10.373000 CVE-2024-3138,0,0,b2250a42d544b358de2555f1c668a77223939f10414766861d02ac21eac35bc6,2024-04-02T12:50:42.233000 CVE-2024-31380,0,0,d044c4c41af2f67b9e10a84372a0da5aeb36e8aa53f4901f4d0660af26a33358,2024-04-05T14:15:10.487000 CVE-2024-3139,0,0,ea53ec9a6dc1c2a719d7c48bab67da65c2ac8a1d444e99171b341666ca5377cf,2024-04-02T12:50:42.233000 @@ -244421,3 +244428,4 @@ CVE-2024-3433,0,0,e6c96594247e80e8be1694812c6fba75951b2792d106a43b6f2003a446a0dc CVE-2024-3434,0,0,ca234f20211bb517f953b7f67ae3f10ab7d87d9990b0f4b049d3a839cf31dc12,2024-04-08T00:15:08.060000 CVE-2024-3436,0,0,e0e5ca3dd8c714d9a5e39a78035c324e727b4b3c8f911bb9e4a1189c878cbe35,2024-04-08T00:15:08.300000 CVE-2024-3437,0,0,123eb2c99d4357ae11fb4721846c8d14f1c5c5df0aa6b588d74123cc924c8ceb,2024-04-08T00:15:08.537000 +CVE-2024-3438,1,1,6aa2babb713a9ff09398356e50b2cda9faed0e388dee6285a645928c2aca71c0,2024-04-08T11:15:50.310000