diff --git a/CVE-2023/CVE-2023-254xx/CVE-2023-25493.json b/CVE-2023/CVE-2023-254xx/CVE-2023-25493.json new file mode 100644 index 00000000000..6a96c2d78b7 --- /dev/null +++ b/CVE-2023/CVE-2023-254xx/CVE-2023-25493.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-25493", + "sourceIdentifier": "psirt@lenovo.com", + "published": "2024-04-05T21:15:07.607", + "lastModified": "2024-04-05T21:15:07.607", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\nA potential vulnerability was reported in the BIOS update tool driver for some Desktop, Smart Edge, Smart Office, and ThinkStation products that could allow a local user with elevated privileges to execute arbitrary code. \n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@lenovo.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@lenovo.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://support.lenovo.com/us/en/product_security/LEN-141775", + "source": "psirt@lenovo.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-254xx/CVE-2023-25494.json b/CVE-2023/CVE-2023-254xx/CVE-2023-25494.json new file mode 100644 index 00000000000..d236b7ec179 --- /dev/null +++ b/CVE-2023/CVE-2023-254xx/CVE-2023-25494.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-25494", + "sourceIdentifier": "psirt@lenovo.com", + "published": "2024-04-05T21:15:07.813", + "lastModified": "2024-04-05T21:15:07.813", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\nA potential vulnerability were reported in the BIOS of some Desktop, Smart Edge, and ThinkStation products that could allow a local attacker with elevated privileges to write to NVRAM variables. \n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@lenovo.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@lenovo.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://support.lenovo.com/us/en/product_security/LEN-141775", + "source": "psirt@lenovo.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4605.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4605.json new file mode 100644 index 00000000000..12831d21c9f --- /dev/null +++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4605.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-4605", + "sourceIdentifier": "psirt@lenovo.com", + "published": "2024-04-05T21:15:08.003", + "lastModified": "2024-04-05T21:15:08.003", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\nA valid authenticated Lenovo XClarity Administrator (LXCA) user can potentially leverage an unauthenticated API endpoint to retrieve system event information.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@lenovo.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@lenovo.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-497" + } + ] + } + ], + "references": [ + { + "url": "https://support.lenovo.com/us/en/product_security/LEN-136592", + "source": "psirt@lenovo.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5912.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5912.json new file mode 100644 index 00000000000..9462e1a6b70 --- /dev/null +++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5912.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-5912", + "sourceIdentifier": "psirt@lenovo.com", + "published": "2024-04-05T21:15:08.210", + "lastModified": "2024-04-05T21:15:08.210", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\nA potential memory leakage vulnerability was reported in some Lenovo Notebook products that may allow a local attacker with elevated privileges to write to NVRAM variables. \n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@lenovo.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@lenovo.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://support.lenovo.com/us/en/product_security/LEN-155477", + "source": "psirt@lenovo.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2280.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2280.json index b47a8b847cc..d6f67fe5d1f 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2280.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2280.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2280", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-29T07:15:44.543", - "lastModified": "2024-03-29T12:45:02.937", + "lastModified": "2024-04-05T21:15:09.660", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -39,6 +39,10 @@ ] }, "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3060565%40better-elementor-addons&new=3060565%40better-elementor-addons&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, { "url": "https://wordpress.org/plugins/better-elementor-addons/#developers", "source": "security@wordfence.com" diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23592.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23592.json new file mode 100644 index 00000000000..ae7756e42f1 --- /dev/null +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23592.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-23592", + "sourceIdentifier": "psirt@lenovo.com", + "published": "2024-04-05T21:15:08.450", + "lastModified": "2024-04-05T21:15:08.450", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An authentication bypass vulnerability was reported in Lenovo devices with Synaptics fingerprint readers that could allow an attacker with physical access to replay fingerprints and bypass Windows Hello authentication." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@lenovo.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@lenovo.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-358" + } + ] + } + ], + "references": [ + { + "url": "https://support.lenovo.com/us/en/product_security/LEN-155804", + "source": "psirt@lenovo.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2312.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2312.json new file mode 100644 index 00000000000..154fa2277fe --- /dev/null +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2312.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2024-2312", + "sourceIdentifier": "security@ubuntu.com", + "published": "2024-04-05T20:15:09.020", + "lastModified": "2024-04-05T20:15:09.020", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "GRUB2 does not call the module fini functions on exit, leading to Debian/Ubuntu's peimage GRUB2 module leaving UEFI system table hooks after exit. This lead to a use-after-free condition, and could possibly lead to secure boot bypass." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@ubuntu.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://bugs.launchpad.net/ubuntu/+source/grub2-unsigned/+bug/2054127", + "source": "security@ubuntu.com" + }, + { + "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2312", + "source": "security@ubuntu.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27231.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27231.json new file mode 100644 index 00000000000..c2a569a5e02 --- /dev/null +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27231.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-27231", + "sourceIdentifier": "dsap-vuln-management@google.com", + "published": "2024-04-05T20:15:07.787", + "lastModified": "2024-04-05T20:15:07.787", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In tmu_get_tr_stats of tmu.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2024-04-01", + "source": "dsap-vuln-management@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27232.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27232.json new file mode 100644 index 00000000000..4bcf13af212 --- /dev/null +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27232.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-27232", + "sourceIdentifier": "dsap-vuln-management@google.com", + "published": "2024-04-05T20:15:07.847", + "lastModified": "2024-04-05T20:15:07.847", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In asn1_ec_pkey_parse of asn1_common.c, there is a possible OOB read due to a missing null check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2024-04-01", + "source": "dsap-vuln-management@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27908.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27908.json new file mode 100644 index 00000000000..f1133b05bb6 --- /dev/null +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27908.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-27908", + "sourceIdentifier": "psirt@lenovo.com", + "published": "2024-04-05T21:15:08.653", + "lastModified": "2024-04-05T21:15:08.653", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A buffer overflow vulnerability was reported in the HTTPS service of some Lenovo Printers that could result in denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@lenovo.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@lenovo.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://iknow.lenovo.com.cn/detail/420425", + "source": "psirt@lenovo.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27909.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27909.json new file mode 100644 index 00000000000..a9bccf851c7 --- /dev/null +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27909.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-27909", + "sourceIdentifier": "psirt@lenovo.com", + "published": "2024-04-05T21:15:08.863", + "lastModified": "2024-04-05T21:15:08.863", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A denial of service vulnerability was reported in the HTTPS service of some Lenovo Printers that could result in a system reboot." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@lenovo.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@lenovo.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://iknow.lenovo.com.cn/detail/420425", + "source": "psirt@lenovo.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27910.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27910.json new file mode 100644 index 00000000000..692cd140ce5 --- /dev/null +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27910.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-27910", + "sourceIdentifier": "psirt@lenovo.com", + "published": "2024-04-05T21:15:09.060", + "lastModified": "2024-04-05T21:15:09.060", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was reported in some Lenovo Printers that could allow an unauthenticated attacker to reboot the printer without authentication." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@lenovo.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@lenovo.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://iknow.lenovo.com.cn/detail/420425", + "source": "psirt@lenovo.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27911.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27911.json new file mode 100644 index 00000000000..65ecfdf7be9 --- /dev/null +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27911.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-27911", + "sourceIdentifier": "psirt@lenovo.com", + "published": "2024-04-05T21:15:09.270", + "lastModified": "2024-04-05T21:15:09.270", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was reported in some Lenovo Printers that could allow an unauthenticated attacker to obtain the administrator password." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@lenovo.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@lenovo.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://iknow.lenovo.com.cn/detail/420425", + "source": "psirt@lenovo.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27912.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27912.json new file mode 100644 index 00000000000..41e2b0329c1 --- /dev/null +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27912.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-27912", + "sourceIdentifier": "psirt@lenovo.com", + "published": "2024-04-05T21:15:09.470", + "lastModified": "2024-04-05T21:15:09.470", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A denial of service vulnerability was reported in some Lenovo Printers that could allow an attacker to cause the device to crash by sending crafted LPD packets." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@lenovo.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@lenovo.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://iknow.lenovo.com.cn/detail/420425", + "source": "psirt@lenovo.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29738.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29738.json new file mode 100644 index 00000000000..297a3c19c20 --- /dev/null +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29738.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-29738", + "sourceIdentifier": "dsap-vuln-management@google.com", + "published": "2024-04-05T20:15:07.907", + "lastModified": "2024-04-05T20:15:07.907", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In gov_init, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2024-04-01", + "source": "dsap-vuln-management@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29739.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29739.json new file mode 100644 index 00000000000..20b3f756d5c --- /dev/null +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29739.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-29739", + "sourceIdentifier": "dsap-vuln-management@google.com", + "published": "2024-04-05T20:15:07.960", + "lastModified": "2024-04-05T20:15:07.960", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In tmu_get_temp_lut of tmu.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2024-04-01", + "source": "dsap-vuln-management@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29740.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29740.json new file mode 100644 index 00000000000..abc763d29eb --- /dev/null +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29740.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-29740", + "sourceIdentifier": "dsap-vuln-management@google.com", + "published": "2024-04-05T20:15:08.010", + "lastModified": "2024-04-05T20:15:08.010", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In tmu_set_table of tmu.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2024-04-01", + "source": "dsap-vuln-management@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29741.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29741.json new file mode 100644 index 00000000000..9b6e8824727 --- /dev/null +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29741.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-29741", + "sourceIdentifier": "dsap-vuln-management@google.com", + "published": "2024-04-05T20:15:08.060", + "lastModified": "2024-04-05T20:15:08.060", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In pblS2mpuResume of s2mpu.c, there is a possible mitigation bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2024-04-01", + "source": "dsap-vuln-management@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29742.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29742.json new file mode 100644 index 00000000000..00db64c4e6c --- /dev/null +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29742.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-29742", + "sourceIdentifier": "dsap-vuln-management@google.com", + "published": "2024-04-05T20:15:08.107", + "lastModified": "2024-04-05T20:15:08.107", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In apply_minlock_constraint of dvfs.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2024-04-01", + "source": "dsap-vuln-management@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29743.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29743.json new file mode 100644 index 00000000000..ae10631492b --- /dev/null +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29743.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-29743", + "sourceIdentifier": "dsap-vuln-management@google.com", + "published": "2024-04-05T20:15:08.153", + "lastModified": "2024-04-05T20:15:08.153", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In tmu_set_temp_lut of tmu.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2024-04-01", + "source": "dsap-vuln-management@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29744.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29744.json new file mode 100644 index 00000000000..d11c1efced0 --- /dev/null +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29744.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-29744", + "sourceIdentifier": "dsap-vuln-management@google.com", + "published": "2024-04-05T20:15:08.207", + "lastModified": "2024-04-05T20:15:08.207", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In tmu_get_gov_time_windows, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2024-04-01", + "source": "dsap-vuln-management@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29745.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29745.json new file mode 100644 index 00000000000..4caec7e5a8d --- /dev/null +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29745.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-29745", + "sourceIdentifier": "dsap-vuln-management@google.com", + "published": "2024-04-05T20:15:08.253", + "lastModified": "2024-04-05T20:15:08.253", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "there is a possible Information Disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2024-04-01", + "source": "dsap-vuln-management@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29746.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29746.json new file mode 100644 index 00000000000..6549abbc0a5 --- /dev/null +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29746.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-29746", + "sourceIdentifier": "dsap-vuln-management@google.com", + "published": "2024-04-05T20:15:08.303", + "lastModified": "2024-04-05T20:15:08.303", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In lpm_req_handler of lpm.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2024-04-01", + "source": "dsap-vuln-management@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29747.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29747.json new file mode 100644 index 00000000000..46c49127b61 --- /dev/null +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29747.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-29747", + "sourceIdentifier": "dsap-vuln-management@google.com", + "published": "2024-04-05T20:15:08.357", + "lastModified": "2024-04-05T20:15:08.357", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In _dvfs_get_lv of dvfs.c, there is a possible out of bounds read due to a missing null check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2024-04-01", + "source": "dsap-vuln-management@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29748.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29748.json new file mode 100644 index 00000000000..656b69621c5 --- /dev/null +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29748.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-29748", + "sourceIdentifier": "dsap-vuln-management@google.com", + "published": "2024-04-05T20:15:08.407", + "lastModified": "2024-04-05T20:15:08.407", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "there is a possible way to bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2024-04-01", + "source": "dsap-vuln-management@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29749.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29749.json new file mode 100644 index 00000000000..7d793bb3fc8 --- /dev/null +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29749.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-29749", + "sourceIdentifier": "dsap-vuln-management@google.com", + "published": "2024-04-05T20:15:08.457", + "lastModified": "2024-04-05T20:15:08.457", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In tmu_set_tr_thresholds of tmu.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2024-04-01", + "source": "dsap-vuln-management@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29750.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29750.json new file mode 100644 index 00000000000..a38023aaca6 --- /dev/null +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29750.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-29750", + "sourceIdentifier": "dsap-vuln-management@google.com", + "published": "2024-04-05T20:15:08.507", + "lastModified": "2024-04-05T20:15:08.507", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In km_exp_did_inner of kmv.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2024-04-01", + "source": "dsap-vuln-management@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29751.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29751.json new file mode 100644 index 00000000000..e46842a53a2 --- /dev/null +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29751.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-29751", + "sourceIdentifier": "dsap-vuln-management@google.com", + "published": "2024-04-05T20:15:08.560", + "lastModified": "2024-04-05T20:15:08.560", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In asn1_ec_pkey_parse_p384 of asn1_common.c, there is a possible OOB Read due to a missing null check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2024-04-01", + "source": "dsap-vuln-management@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29752.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29752.json new file mode 100644 index 00000000000..1f03aa39c75 --- /dev/null +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29752.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-29752", + "sourceIdentifier": "dsap-vuln-management@google.com", + "published": "2024-04-05T20:15:08.617", + "lastModified": "2024-04-05T20:15:08.617", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In tmu_set_tr_num_thresholds of tmu.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2024-04-01", + "source": "dsap-vuln-management@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29753.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29753.json new file mode 100644 index 00000000000..e23ba44bed8 --- /dev/null +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29753.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-29753", + "sourceIdentifier": "dsap-vuln-management@google.com", + "published": "2024-04-05T20:15:08.667", + "lastModified": "2024-04-05T20:15:08.667", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In tmu_set_control_temp_step of tmu.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2024-04-01", + "source": "dsap-vuln-management@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29754.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29754.json new file mode 100644 index 00000000000..43458920452 --- /dev/null +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29754.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-29754", + "sourceIdentifier": "dsap-vuln-management@google.com", + "published": "2024-04-05T20:15:08.717", + "lastModified": "2024-04-05T20:15:08.717", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In TMU_IPC_GET_TABLE, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2024-04-01", + "source": "dsap-vuln-management@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29755.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29755.json new file mode 100644 index 00000000000..281306c407f --- /dev/null +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29755.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-29755", + "sourceIdentifier": "dsap-vuln-management@google.com", + "published": "2024-04-05T20:15:08.763", + "lastModified": "2024-04-05T20:15:08.763", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In tmu_get_pi of tmu.c, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2024-04-01", + "source": "dsap-vuln-management@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29756.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29756.json new file mode 100644 index 00000000000..b95d8ebd0ff --- /dev/null +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29756.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-29756", + "sourceIdentifier": "dsap-vuln-management@google.com", + "published": "2024-04-05T20:15:08.813", + "lastModified": "2024-04-05T20:15:08.813", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In afe_callback of q6afe.c, there is a possible out of bounds write due to a buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2024-04-01", + "source": "dsap-vuln-management@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29757.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29757.json new file mode 100644 index 00000000000..e923ec8db94 --- /dev/null +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29757.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-29757", + "sourceIdentifier": "dsap-vuln-management@google.com", + "published": "2024-04-05T20:15:08.867", + "lastModified": "2024-04-05T20:15:08.867", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "there is a possible permission bypass due to Debug certs being allowlisted. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2024-04-01", + "source": "dsap-vuln-management@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29782.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29782.json new file mode 100644 index 00000000000..7ecc9e05aa6 --- /dev/null +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29782.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-29782", + "sourceIdentifier": "dsap-vuln-management@google.com", + "published": "2024-04-05T20:15:08.917", + "lastModified": "2024-04-05T20:15:08.917", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In tmu_get_tr_num_thresholds of tmu.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2024-04-01", + "source": "dsap-vuln-management@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29783.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29783.json new file mode 100644 index 00000000000..4203a9579fd --- /dev/null +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29783.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-29783", + "sourceIdentifier": "dsap-vuln-management@google.com", + "published": "2024-04-05T20:15:08.967", + "lastModified": "2024-04-05T20:15:08.967", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In tmu_get_tr_thresholds, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2024-04-01", + "source": "dsap-vuln-management@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30977.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30977.json new file mode 100644 index 00000000000..bdc9961ff3a --- /dev/null +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30977.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-30977", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-04-05T21:15:09.740", + "lastModified": "2024-04-05T21:15:09.740", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue in Secnet Security Network Intelligent AC Management System v.1.02.040 allows a local attacker to escalate privileges via the password component." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://www.secnet.cn/newsdetail/388.html", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/wodi98k/zip_crack/blob/main/SecnetAC.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3353.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3353.json new file mode 100644 index 00000000000..9e215e3bf59 --- /dev/null +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3353.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-3353", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-04-05T20:15:09.193", + "lastModified": "2024-04-05T20:15:09.193", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Aplaya Beach Resort Online Reservation System 1.0 and classified as critical. This issue affects some unknown processing of the file admin/mod_reports/index.php. The manipulation of the argument categ/end leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259457 was assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/qqqyc/vlun1/blob/main/Aplaya-Beach-Resort-Online-Reservation-System-06", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.259457", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.259457", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.310221", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3354.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3354.json new file mode 100644 index 00000000000..b980d8d15a4 --- /dev/null +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3354.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-3354", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-04-05T20:15:09.427", + "lastModified": "2024-04-05T20:15:09.427", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Aplaya Beach Resort Online Reservation System 1.0. It has been classified as critical. Affected is an unknown function of the file admin/mod_users/index.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-259458 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/qqqyc/vlun1/blob/main/Aplaya-Beach-Resort-Online-Reservation-System-07", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.259458", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.259458", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.310222", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3355.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3355.json new file mode 100644 index 00000000000..4b1055338f4 --- /dev/null +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3355.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-3355", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-04-05T21:15:09.800", + "lastModified": "2024-04-05T21:15:09.800", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Aplaya Beach Resort Online Reservation System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file admin/mod_users/controller.php?action=add. The manipulation of the argument name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259459." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/qqqyc/vlun1/blob/main/Aplaya-Beach-Resort-Online-Reservation-System-09", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.259459", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.259459", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.310224", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3356.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3356.json new file mode 100644 index 00000000000..d3f9aeb1234 --- /dev/null +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3356.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-3356", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-04-05T21:15:10.033", + "lastModified": "2024-04-05T21:15:10.033", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Aplaya Beach Resort Online Reservation System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file admin/mod_settings/controller.php?action=add. The manipulation of the argument type leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259460." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/qqqyc/vlun1/blob/main/Aplaya-Beach-Resort-Online-Reservation-System-10", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.259460", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.259460", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.310225", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 5611e8be7f9..9e7cf944585 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-04-05T20:00:38.291477+00:00 +2024-04-05T22:00:29.904298+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-04-05T19:15:07.267000+00:00 +2024-04-05T21:15:10.033000+00:00 ``` ### Last Data Feed Release @@ -33,33 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -244217 +244257 ``` ### CVEs added in the last Commit -Recently added CVEs: `14` +Recently added CVEs: `40` -- [CVE-2023-31028](CVE-2023/CVE-2023-310xx/CVE-2023-31028.json) (`2024-04-05T18:15:08.250`) -- [CVE-2024-0072](CVE-2024/CVE-2024-00xx/CVE-2024-0072.json) (`2024-04-05T18:15:08.477`) -- [CVE-2024-0076](CVE-2024/CVE-2024-00xx/CVE-2024-0076.json) (`2024-04-05T18:15:08.680`) -- [CVE-2024-0080](CVE-2024/CVE-2024-00xx/CVE-2024-0080.json) (`2024-04-05T18:15:08.890`) -- [CVE-2024-0081](CVE-2024/CVE-2024-00xx/CVE-2024-0081.json) (`2024-04-05T19:15:07.033`) -- [CVE-2024-22004](CVE-2024/CVE-2024-220xx/CVE-2024-22004.json) (`2024-04-05T18:15:09.100`) -- [CVE-2024-28065](CVE-2024/CVE-2024-280xx/CVE-2024-28065.json) (`2024-04-05T18:15:09.307`) -- [CVE-2024-31848](CVE-2024/CVE-2024-318xx/CVE-2024-31848.json) (`2024-04-05T18:15:09.360`) -- [CVE-2024-31849](CVE-2024/CVE-2024-318xx/CVE-2024-31849.json) (`2024-04-05T18:15:09.563`) -- [CVE-2024-31850](CVE-2024/CVE-2024-318xx/CVE-2024-31850.json) (`2024-04-05T18:15:09.753`) -- [CVE-2024-31851](CVE-2024/CVE-2024-318xx/CVE-2024-31851.json) (`2024-04-05T18:15:09.953`) -- [CVE-2024-3350](CVE-2024/CVE-2024-33xx/CVE-2024-3350.json) (`2024-04-05T18:15:10.143`) -- [CVE-2024-3351](CVE-2024/CVE-2024-33xx/CVE-2024-3351.json) (`2024-04-05T18:15:10.397`) -- [CVE-2024-3352](CVE-2024/CVE-2024-33xx/CVE-2024-3352.json) (`2024-04-05T19:15:07.267`) +- [CVE-2024-29740](CVE-2024/CVE-2024-297xx/CVE-2024-29740.json) (`2024-04-05T20:15:08.010`) +- [CVE-2024-29741](CVE-2024/CVE-2024-297xx/CVE-2024-29741.json) (`2024-04-05T20:15:08.060`) +- [CVE-2024-29742](CVE-2024/CVE-2024-297xx/CVE-2024-29742.json) (`2024-04-05T20:15:08.107`) +- [CVE-2024-29743](CVE-2024/CVE-2024-297xx/CVE-2024-29743.json) (`2024-04-05T20:15:08.153`) +- [CVE-2024-29744](CVE-2024/CVE-2024-297xx/CVE-2024-29744.json) (`2024-04-05T20:15:08.207`) +- [CVE-2024-29745](CVE-2024/CVE-2024-297xx/CVE-2024-29745.json) (`2024-04-05T20:15:08.253`) +- [CVE-2024-29746](CVE-2024/CVE-2024-297xx/CVE-2024-29746.json) (`2024-04-05T20:15:08.303`) +- [CVE-2024-29747](CVE-2024/CVE-2024-297xx/CVE-2024-29747.json) (`2024-04-05T20:15:08.357`) +- [CVE-2024-29748](CVE-2024/CVE-2024-297xx/CVE-2024-29748.json) (`2024-04-05T20:15:08.407`) +- [CVE-2024-29749](CVE-2024/CVE-2024-297xx/CVE-2024-29749.json) (`2024-04-05T20:15:08.457`) +- [CVE-2024-29750](CVE-2024/CVE-2024-297xx/CVE-2024-29750.json) (`2024-04-05T20:15:08.507`) +- [CVE-2024-29751](CVE-2024/CVE-2024-297xx/CVE-2024-29751.json) (`2024-04-05T20:15:08.560`) +- [CVE-2024-29752](CVE-2024/CVE-2024-297xx/CVE-2024-29752.json) (`2024-04-05T20:15:08.617`) +- [CVE-2024-29753](CVE-2024/CVE-2024-297xx/CVE-2024-29753.json) (`2024-04-05T20:15:08.667`) +- [CVE-2024-29754](CVE-2024/CVE-2024-297xx/CVE-2024-29754.json) (`2024-04-05T20:15:08.717`) +- [CVE-2024-29755](CVE-2024/CVE-2024-297xx/CVE-2024-29755.json) (`2024-04-05T20:15:08.763`) +- [CVE-2024-29756](CVE-2024/CVE-2024-297xx/CVE-2024-29756.json) (`2024-04-05T20:15:08.813`) +- [CVE-2024-29757](CVE-2024/CVE-2024-297xx/CVE-2024-29757.json) (`2024-04-05T20:15:08.867`) +- [CVE-2024-29782](CVE-2024/CVE-2024-297xx/CVE-2024-29782.json) (`2024-04-05T20:15:08.917`) +- [CVE-2024-29783](CVE-2024/CVE-2024-297xx/CVE-2024-29783.json) (`2024-04-05T20:15:08.967`) +- [CVE-2024-30977](CVE-2024/CVE-2024-309xx/CVE-2024-30977.json) (`2024-04-05T21:15:09.740`) +- [CVE-2024-3353](CVE-2024/CVE-2024-33xx/CVE-2024-3353.json) (`2024-04-05T20:15:09.193`) +- [CVE-2024-3354](CVE-2024/CVE-2024-33xx/CVE-2024-3354.json) (`2024-04-05T20:15:09.427`) +- [CVE-2024-3355](CVE-2024/CVE-2024-33xx/CVE-2024-3355.json) (`2024-04-05T21:15:09.800`) +- [CVE-2024-3356](CVE-2024/CVE-2024-33xx/CVE-2024-3356.json) (`2024-04-05T21:15:10.033`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `1` +- [CVE-2024-2280](CVE-2024/CVE-2024-22xx/CVE-2024-2280.json) (`2024-04-05T21:15:09.660`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 4d787544801..89af472aa61 100644 --- a/_state.csv +++ b/_state.csv @@ -217890,6 +217890,8 @@ CVE-2023-2549,0,0,de0dc2573c930e18a5fb9048e72d1332322b742e4ff232a0716930e6526bb3 CVE-2023-25490,0,0,f318fbcd46bc4823b18f47bad526c08cd8963624a09977c0786081dd6fcce917,2023-04-28T02:59:52.610000 CVE-2023-25491,0,0,34d6378e3509978d9dd7ef75b3014124153e767629da8cf8612da8174990a547,2023-05-10T02:24:21.523000 CVE-2023-25492,0,0,e00d9ed9f3044ddb0237f43eaefcbac020a94a98b5b77c9d60daae2da2e49ee3,2023-05-10T13:37:50.410000 +CVE-2023-25493,1,1,c4fd1dc034641a4a38067465c1fb75997e54375118c025c2521f91dd6621bb12,2024-04-05T21:15:07.607000 +CVE-2023-25494,1,1,8bc176759cb6c2b5ce44b58243669e1776f07b0edff15315c6a3514d54dc2c24,2024-04-05T21:15:07.813000 CVE-2023-25495,0,0,19229d319fae03e27301eeb46076cb166d3fe8f0be6fc63a0e7a8f31ef1886b4,2023-05-09T20:36:34.067000 CVE-2023-25496,0,0,70395fddaebcaecd1b78a79188bccd6b86e74f3fc1089ffad612863df4a2c469,2023-05-08T18:09:48.533000 CVE-2023-25499,0,0,954cb0f22c5b9349fe8417f07854c9d7a350d7ba6f1b9564d124da3110ace637,2023-06-30T16:32:37.847000 @@ -222170,7 +222172,7 @@ CVE-2023-31024,0,0,4c70d5cc63eef05b3a366d77fb563b368bdfadd04c0926839846a82fcce9a CVE-2023-31025,0,0,0e4aa85ecd2ee651d4a45d9866dd1f24f182e80d38864542ea7d1cbb97a9ec67,2024-01-18T20:48:14.777000 CVE-2023-31026,0,0,737def1b37587e41a8de0ad813079c7897dff748850e0628f84397ef07142498,2023-11-13T18:43:03.447000 CVE-2023-31027,0,0,8ff82489352cce25dc4352ff2d33db807ef115fc642174d9e503e43f59674260,2023-11-13T19:20:51.220000 -CVE-2023-31028,1,1,14ff90a0151c643c9b22d6a8fea347f26699f725f3ca6b92becf432a0fd40f67,2024-04-05T18:15:08.250000 +CVE-2023-31028,0,0,14ff90a0151c643c9b22d6a8fea347f26699f725f3ca6b92becf432a0fd40f67,2024-04-05T18:15:08.250000 CVE-2023-31029,0,0,c42ef0bcacfd6c953325b5f2f106d96c7a62f2c02eb1edafc052641664e71d2d,2024-01-18T20:50:53.507000 CVE-2023-3103,0,0,c745e45a6f770ad21bf28632452dade4771e22e741237aa8ba70f21edc608054,2024-03-21T02:48:24.477000 CVE-2023-31030,0,0,87204db072798651d0e1480ef8ba7d4c1b45df9188d565ea7fc9a3b00ced8522,2024-01-18T20:53:22.643000 @@ -232242,6 +232244,7 @@ CVE-2023-46046,0,0,4ed80fdf9ffb4927760bdcfcaf30dcb27a70f9913cc6f328c7b035c9b3e9e CVE-2023-46047,0,0,59b95be05d230cdd6ea344491c9416f73c69382afbbc1f9d5028df8892847cc5,2024-03-27T12:29:30.307000 CVE-2023-46048,0,0,1153d37f616e36af8c6c0f0252a92a5aec2975042fe828246ac8281ae0e85997,2024-03-27T12:29:30.307000 CVE-2023-46049,0,0,1391e07ec280c1eadce601ef51d30475392cab49a2b182b4940fe6688577ac9c,2024-03-27T12:29:30.307000 +CVE-2023-4605,1,1,1789b5d6f4b524690d52ef553d019a20e05b53a02e162a1329a11efb85aaa2ad,2024-04-05T21:15:08.003000 CVE-2023-46050,0,0,6ff5ea8f1dc5991c203b0679fc5f46c04b4a3ef6ae70c787c24e6bec0c9c29e6,2024-01-29T09:15:42.640000 CVE-2023-46051,0,0,09157b9d669d02525418ccbaeca2af237e09d871daecbc676d017fbb419d8e01,2024-03-27T12:29:30.307000 CVE-2023-46052,0,0,51d6afb3c65fa13b540cd0271f17ee96c41ae8a74855d913ff35f4c966df34b8,2024-03-27T12:29:30.307000 @@ -236960,6 +236963,7 @@ CVE-2023-5908,0,0,65c47ba453ceadbcf64f5715b7c24675de56d7e12038ad7fb9ee73e2511352 CVE-2023-5909,0,0,dc86a44abcc0400ca7a10015f5e4783d571f165fe9e2121385946b9f6a57f86f,2023-12-06T19:54:23.713000 CVE-2023-5910,0,0,2d579f3a695f73992bfc5e5df66eb7ec068ebff6ca72889065ffb985de8211b9,2024-03-21T02:50:27.900000 CVE-2023-5911,0,0,a08c5a2532b3d94976cb97dac13d04ddcffa2796c1f43e33a8e9a1ec70caede1,2024-01-11T19:43:17.143000 +CVE-2023-5912,1,1,25e847ae044f5c80f39432926f091be7439b4e1af1514344603354b779bae5d8,2024-04-05T21:15:08.210000 CVE-2023-5913,0,0,9a413048efa725f6de4b42eaa7115b4d40ac8c223b50c26bded4b0dedf2e4eb5,2023-11-16T17:00:33.503000 CVE-2023-5914,0,0,88eb5804a56587080558dade883a2bd1fc83174e7361ced67521be69deb49539,2024-01-24T21:05:40.173000 CVE-2023-5915,0,0,93d527fcf9e982f48ec7668c345c809addcf44766c1b5722e97dbf2692eb4791,2023-12-08T18:24:27.517000 @@ -238077,16 +238081,16 @@ CVE-2024-0068,0,0,29054351872f671ffd0afada76da136d48518b88acaefb639ccc6c169ead07 CVE-2024-0069,0,0,fcda9c827a68481a563f617244a09b1d788f56c62c31734c572fbfe1a75ea718,2023-11-28T00:15:07.140000 CVE-2024-0070,0,0,f5edfa828dbd64ca40da0463d8d67355f807a2f6d8ea2e049578dd15434f1821,2023-11-28T00:15:07.183000 CVE-2024-0071,0,0,704d1f6cb18cc47944843911c815f4098469857e3754cd1f411a2eed163344eb,2024-03-28T02:01:13.303000 -CVE-2024-0072,1,1,ced01d498a1c155cc128624b03dece7d5d0df8ec9f84c753a8b25dfdcb346a99,2024-04-05T18:15:08.477000 +CVE-2024-0072,0,0,ced01d498a1c155cc128624b03dece7d5d0df8ec9f84c753a8b25dfdcb346a99,2024-04-05T18:15:08.477000 CVE-2024-0073,0,0,176f7449424756846db419300a5389c73905a3871ade74f979d054ede4a4abf3,2024-03-28T02:01:13.303000 CVE-2024-0074,0,0,98eb255e160e7fd5beb14045c6567fea8fb46cf3bd51e2fde409175194ef6f56,2024-03-28T02:01:13.303000 CVE-2024-0075,0,0,ca1e6c0fdd67ee0dc69f9ce1fc86a720c8737b83b96e94939769a54c0a489d67,2024-03-28T02:01:13.303000 -CVE-2024-0076,1,1,f198baa2c3a5defb59008c4ee9c70b29e941cee00cca054f8dc7225d73ba0c06,2024-04-05T18:15:08.680000 +CVE-2024-0076,0,0,f198baa2c3a5defb59008c4ee9c70b29e941cee00cca054f8dc7225d73ba0c06,2024-04-05T18:15:08.680000 CVE-2024-0077,0,0,db4dba4f9462dc63edab63d2d916b645f56aeb1e3e4a4a247dac9899f4510f50,2024-03-28T02:01:13.303000 CVE-2024-0078,0,0,65ef1b62c09f229e677e8506d114a0ad3f4b855306a2baa770a721ed0ba97b17,2024-03-28T02:01:13.303000 CVE-2024-0079,0,0,a48198aa8d1b8e21233ccb1563194a0dce57e3cb1ac8f4c28d49144e25d1a534,2024-03-28T02:01:13.303000 -CVE-2024-0080,1,1,14676a90fe9c3c46fc6e8f25fa883940c938ed9943e229fef559ca749a74acbf,2024-04-05T18:15:08.890000 -CVE-2024-0081,1,1,f9dda3f39d21dce4ed138e5eaf31e5ba8c521c35969b9a97b88cde6e50b3f747,2024-04-05T19:15:07.033000 +CVE-2024-0080,0,0,14676a90fe9c3c46fc6e8f25fa883940c938ed9943e229fef559ca749a74acbf,2024-04-05T18:15:08.890000 +CVE-2024-0081,0,0,f9dda3f39d21dce4ed138e5eaf31e5ba8c521c35969b9a97b88cde6e50b3f747,2024-04-05T19:15:07.033000 CVE-2024-0154,0,0,fee6d0edd38400fe9a2f331d67a355be9bc81701717352554939ef10dafbbf73,2024-03-13T18:15:58.530000 CVE-2024-0155,0,0,56d3003aea28bbff1e776f33de697fc847d720d7a8270931f6c22f264f5611eb,2024-03-04T13:58:23.447000 CVE-2024-0156,0,0,47a5ee4f12284e0f109441891942aa0eb589b2387e172b6366b6741bcabc51b4,2024-03-04T13:58:23.447000 @@ -240259,7 +240263,7 @@ CVE-2024-21983,0,0,ded146d4808fc5f83424e373b65cdad37794b676d9611f5162836ce6d86d8 CVE-2024-21984,0,0,c4d05388605f2fb7e341aa0197be1de56d0ddb669904fcfa6f2ad451633ba0ba,2024-02-20T19:51:05.510000 CVE-2024-21985,0,0,853a82d200092c0582c4290723b53256d943e3aa0955024d181a6e0dc05dbcae,2024-02-05T18:32:52.040000 CVE-2024-21987,0,0,a312d19cf1876839a82cf4ab8a29efb39c100512ae446943b26071c9bd69f220,2024-02-16T21:39:50.223000 -CVE-2024-22004,1,1,39b50e3d304b75133a881ab201d85a8afd781e191f0cefa753b9dae08496ded0,2024-04-05T18:15:09.100000 +CVE-2024-22004,0,0,39b50e3d304b75133a881ab201d85a8afd781e191f0cefa753b9dae08496ded0,2024-04-05T18:15:09.100000 CVE-2024-22005,0,0,313b9bc6d7138eced2900a2388d6d58fcc17e9d91231c0517d2cb0e3e82b9d0d,2024-03-15T20:15:07.527000 CVE-2024-22006,0,0,4c7c420bbb6e62588c7a1f4eb632b3e6efe7a61ff08393b9055a3796f498bb2e,2024-03-15T20:15:07.573000 CVE-2024-22007,0,0,f3721164b170a5b70f98ee09d80eb5a4c23e7d5319c9436b464d0aee9f606b8d,2024-03-12T12:40:13.500000 @@ -240651,7 +240655,7 @@ CVE-2024-22779,0,0,eda1283002ca0a5ba4b71e37cd224cf29419640cfe8456a3a65e695acd500 CVE-2024-2278,0,0,207e2f51738b382e656f75c22347fd5450b8d4ce530caf11838743da2ac45b4a,2024-04-01T12:49:00.877000 CVE-2024-22780,0,0,7f3239e2db375f765f90f52543bdbcccb2a20757a7cd068a76d9a55c97657017,2024-04-02T18:12:16.283000 CVE-2024-22795,0,0,74ecb133836626bb2368eab49a74768ea23b2ee0b898200b84b5a979cafed20f,2024-02-15T17:53:54.680000 -CVE-2024-2280,0,0,fd486a918bfa181dee3017086f846fc18f635e98f420bd04919fa2b258fed4a3,2024-03-29T12:45:02.937000 +CVE-2024-2280,0,1,b064f3feb8722910a4651d8fcd5aa5f1892c8cb4f5e0e1796b328260936ab591,2024-04-05T21:15:09.660000 CVE-2024-2281,0,0,aff3b1a84ac8ae6dd4eed23fef99c5bf8af119f63a34e536936e20de957b3991,2024-03-21T02:52:31.867000 CVE-2024-22817,0,0,eb15e92e9d0667f5c190034654618b8eeeb0dfc84cfb608c765282f0f5a04fcf,2024-01-23T14:23:18.990000 CVE-2024-22818,0,0,cb135bb8e203bf8edbad428e88de582fd5c2ab18516529aab641b2e535a51f86,2024-01-23T14:23:46.073000 @@ -240739,6 +240743,7 @@ CVE-2024-23116,0,0,c69470152165ed3c6f07842580a9d276db25fe5e384880b4a7931b780caf1 CVE-2024-23117,0,0,879d7d05d3f28235be6d3551861450f70c4e2f56b92f39afe7f23938cb7730c9,2024-04-02T12:50:42.233000 CVE-2024-23118,0,0,2a710ffc24b98413c0e2df0c0c64682e3878440889d1038072b49d9104f7509a,2024-04-02T12:50:42.233000 CVE-2024-23119,0,0,dc7a02dfe6c2319112aa9c9c7ba24d29c0a54406c32b5bc7828bc06ecc1e505b,2024-04-02T12:50:42.233000 +CVE-2024-2312,1,1,c3d1e59adcf036422d8e502f2fa8633e5bdb76072612a435659e8367a1f966b4,2024-04-05T20:15:09.020000 CVE-2024-23120,0,0,1fdd5384a3247451b572eec50acc63b80f4302d338e02a15db81dbcc92866844,2024-03-01T16:15:45.920000 CVE-2024-23121,0,0,ae89a79fcf6c313d61197ac6f338d68b00711a8ed1e7b84e5d9691d517b9b085,2024-03-13T03:15:06.320000 CVE-2024-23122,0,0,53a6a7f808f40f9f8ccc6c9426a05387fb59e2867d6b512f9c97f02c17acdf90,2024-03-13T03:15:06.390000 @@ -240964,6 +240969,7 @@ CVE-2024-23550,0,0,233aa541fdda788f0e4e95c8a9a0a8f5d7fa7689dcd559af0cf5e5843a531 CVE-2024-23553,0,0,51ea2d50cc1ff4dbab518de2a29e9ef6a91bd6b91073c23eb1a7f0cb7c8f1090,2024-02-10T00:59:00.423000 CVE-2024-2357,0,0,2af3f167a5f07c033333870e1f5044e9ac66d1548287fd20eff05541e2132cfb,2024-03-23T03:15:12.690000 CVE-2024-23591,0,0,f4c08614f6a162f49ecc99f020c088036b0b565e06b57796e1304b45ae78e59d,2024-02-20T22:15:08.353000 +CVE-2024-23592,1,1,39d2d9698b72dd80a10f4895bb9f4034620fd48dadd9d49928de48e02e0737b6,2024-04-05T21:15:08.450000 CVE-2024-23603,0,0,2b536971fe4d260603348583e5e85d59f5debd4cec090f729c87a6dbde3a5ce7,2024-02-14T18:04:45.380000 CVE-2024-23604,0,0,760bd2ccdc3dff1dab3cc8af2bcb4408e0ff89553b2b7d9d0cb5ed9c08f6a616,2024-03-18T12:38:25.490000 CVE-2024-23605,0,0,559f2b18ab2042f99709ab0e3fa4fcace7fdbe41b3b5e10d7fdaf53ba9d4932f,2024-02-26T18:15:07.673000 @@ -242749,6 +242755,8 @@ CVE-2024-27228,0,0,ac326317e51dc7851c1f82ec4a32af90f437c21efaddc59cfa9f583daaf12 CVE-2024-27229,0,0,c7e091ed6183d6b89e7927dfbd5d373593399a0d36acccae457f369c6df990d4,2024-03-12T12:40:13.500000 CVE-2024-2723,0,0,908fdbaf6e8c15702fd48248931088912662f0d496e4e3ec99b68fc8fea5b6a5,2024-03-22T15:34:43.663000 CVE-2024-27230,0,0,c7763bc0ef3ba362ff27028ad0a4ee6dc51f834ec1d74bc7b4e735a7089dbf69,2024-03-12T12:40:13.500000 +CVE-2024-27231,1,1,bcd79f5ef412a612365a45df392eca28617aedac86808c2ace183801bc127ea3,2024-04-05T20:15:07.787000 +CVE-2024-27232,1,1,aa76cd88588a9318ac1d12fd089d24219641f057d7862ca5a3fc10fcca094f74,2024-04-05T20:15:07.847000 CVE-2024-27233,0,0,7b8043ee4b07bedf143f62926829193f3e94b62f5f4f2482d3d5d7a8d5b8b166,2024-03-12T12:40:13.500000 CVE-2024-27234,0,0,4cea6228708eed4dcd9db0ccc5b3a95a294cbf001825e99826ed97307af63bd5,2024-03-12T12:40:13.500000 CVE-2024-27235,0,0,286299f74e536cbf38771d33b6488ac94632f33ebda885a5c2222182d4672636,2024-03-15T20:15:09.253000 @@ -242944,7 +242952,12 @@ CVE-2024-27902,0,0,7aa835c5c3cccf2434107e43a6dd21c3ee48d8e6664a62d49734964bcc016 CVE-2024-27905,0,0,3e20ed1ee55859457fccacd02ccfd33b203e184f29107e3c93e267df9f8d58a8,2024-03-21T02:52:20.520000 CVE-2024-27906,0,0,e279155c32f0030358ce7d189e782f3e54d78a6a202b13937f95f2706818bee5,2024-02-29T13:49:29.390000 CVE-2024-27907,0,0,aac379adb09823074865cdaa760b5a9ed07a3326e17caf800106b9008671180a,2024-03-12T12:40:13.500000 +CVE-2024-27908,1,1,13430cd25a020cec36a3d9eb7892deebe7c57c18794858e5e30a7b03ed2ef7d0,2024-04-05T21:15:08.653000 +CVE-2024-27909,1,1,f71a0faf3349bbee739bf4f7b9d84c61c8b3abd54e5d8aeec12772a14caba6a7,2024-04-05T21:15:08.863000 CVE-2024-2791,0,0,66683d264867ecc734a7367e9e44b59a4386424cad2664c8596d1137b64a85af,2024-04-02T12:50:42.233000 +CVE-2024-27910,1,1,e04ba00cb20a75b366e4b285c9340e26c71ffecc887e7a42702c708bf6bd6297,2024-04-05T21:15:09.060000 +CVE-2024-27911,1,1,9c6a14a4b572a0262639eb21fea5be2328fef66aaf35340436ffaafe0b166a38,2024-04-05T21:15:09.270000 +CVE-2024-27912,1,1,23753376cb9b4f3097e13ae423c40dacdd041301a2343c17f8db85068be6f16a,2024-04-05T21:15:09.470000 CVE-2024-27913,0,0,4ab4f3916b8428dbf6a53f81f4240223329f17f5e9f63a6de1fd6dc690b5ff6a,2024-02-28T14:06:45.783000 CVE-2024-27914,0,0,3ae5902175f2437b477eff7baac5113b2dce4706fa0de04eef5292541a3ddd19,2024-03-18T19:40:00.173000 CVE-2024-27915,0,0,d4924e50464aaf41d040242348770ffaf78a24dc54a27fd2fcc5b39d7ef4bc89,2024-03-06T21:42:48.053000 @@ -243028,7 +243041,7 @@ CVE-2024-2805,0,0,fa896267355e8bee60ef45369bdd61a50def95efdfa5e824724b711a08ae74 CVE-2024-28053,0,0,c90f3b62964e2e2422d9b5798f17f1825dc5ae41ec90f71b2b9fe7b9e8ea4a14,2024-03-15T12:53:06.423000 CVE-2024-28054,0,0,b289eaa8f221cef12d20f4d7c4d850be722c706b733d8c81d770795eac46dd81,2024-03-23T03:15:11.510000 CVE-2024-2806,0,0,31a1a52b37b2e720eae0233b1b19dee00c5a6dd1df73e31128b38dde57d091e7,2024-03-26T03:11:41.880000 -CVE-2024-28065,1,1,860e1bfe6126cf5c07cb1eddc7c9671f368193a1540ce3473fdd211437faae95,2024-04-05T18:15:09.307000 +CVE-2024-28065,0,0,860e1bfe6126cf5c07cb1eddc7c9671f368193a1540ce3473fdd211437faae95,2024-04-05T18:15:09.307000 CVE-2024-28069,0,0,99a57a9955c5ed5463e7c560b95e0a17dfa2789ec3c024f2825003d476d4b80d,2024-03-17T22:38:29.433000 CVE-2024-2807,0,0,47b8a7021ebbb15acc350203dd3081726f7b96c650b8d998414fd135c1027f2f,2024-03-26T03:12:50.837000 CVE-2024-28070,0,0,c8eeec88fa6e3b91036a4eadc63dd921f090ad52309176e7af22a570b911aeac,2024-03-17T22:38:29.433000 @@ -243571,6 +243584,26 @@ CVE-2024-2971,0,0,898bc718d43d0c390c6d16657d6a8f74b1bed4195ca2be9f6e03b60807e375 CVE-2024-29732,0,0,f91e9a53bb8c78b9eaa9a43eb2f41d18e7980ac57e838dd405b45ee97833017f,2024-03-21T12:58:51.093000 CVE-2024-29734,0,0,8d99461dc9b8889d99315bde49edbce5536e3a20b88b53095157d8f0afc148b5,2024-04-03T12:38:04.840000 CVE-2024-29735,0,0,286fbba4f7cb1bbd32eae740efb468430068245735dc6c522579c415dcd44e18,2024-03-27T12:29:41.530000 +CVE-2024-29738,1,1,53b2d0752f1fa17cbf1102b20c675a747e42a9143c4e8ad54f06907623028bd7,2024-04-05T20:15:07.907000 +CVE-2024-29739,1,1,f6f76b014c8e7321becb37fb9261442b276e1502923a529880b197bef6586c39,2024-04-05T20:15:07.960000 +CVE-2024-29740,1,1,43488df738e02d492bd5dd531a0145b90b4c70bfe6f3b08cc9198223b59d6549,2024-04-05T20:15:08.010000 +CVE-2024-29741,1,1,5287e10912b70bb061f53de5b83b003317f0455c1e6e8382ca56aea272ded637,2024-04-05T20:15:08.060000 +CVE-2024-29742,1,1,f2bc3ea7d601e3d2f89366bc3bf789f7dff9d33d7b969d0681ff0702c8c803ee,2024-04-05T20:15:08.107000 +CVE-2024-29743,1,1,c449523fdbfed70e93eb5db09bb0072175dcc5ddecf792b0802f1d6b3e48b44c,2024-04-05T20:15:08.153000 +CVE-2024-29744,1,1,648f768a13bd9fd094226fb33743af4a7accff23b8393394010a398a2bf9faf7,2024-04-05T20:15:08.207000 +CVE-2024-29745,1,1,e092cc506e47b323e83d6e1a0c73e84be04120dd76e1bfdd92d89427a91e8853,2024-04-05T20:15:08.253000 +CVE-2024-29746,1,1,f387564f14fa535ea564257d7225ec27fec8b4e39ff6f86e757de7acb23d8e1e,2024-04-05T20:15:08.303000 +CVE-2024-29747,1,1,0548417396958cc0ffb5d57a429a647040bc882fc6a141dfeabf96110c8e560c,2024-04-05T20:15:08.357000 +CVE-2024-29748,1,1,03916cd98e44232b3742e5725eea00e4711368caf808cb591f5073c1c8562982,2024-04-05T20:15:08.407000 +CVE-2024-29749,1,1,013121f5f2cf9fc7d35fb3733cc7a973426593dc74f4252d96fe96b1177b73b1,2024-04-05T20:15:08.457000 +CVE-2024-29750,1,1,1d1c2c89d3a1e4369128e0b96b6eea44ed888a0866ddcc895f3f878c4d78c9f8,2024-04-05T20:15:08.507000 +CVE-2024-29751,1,1,8771fda4f10da37042d80e537d9a6c45d11e384af07f52c7e0558da9a6e89d31,2024-04-05T20:15:08.560000 +CVE-2024-29752,1,1,9bb1264a7f3abf8bc8cc11bcb3b404de453811c8f47b2b67485281322418de83,2024-04-05T20:15:08.617000 +CVE-2024-29753,1,1,69b25c72eb47bc58949e79282078836bd7c63f9ca03173a7b1f25c6b375f736c,2024-04-05T20:15:08.667000 +CVE-2024-29754,1,1,3330597cda792c70bad3d77acc0df99aee3e4b80d762a0d8f00a0d1b5e10416a,2024-04-05T20:15:08.717000 +CVE-2024-29755,1,1,0542351e0061a50a9107f36e57184a81dd6bfb9e97ee77479c1db76ff1889e27,2024-04-05T20:15:08.763000 +CVE-2024-29756,1,1,749dbbd462fe1fa47d77fe81e60dfe24216329f4c2124a953263acc2be642c5a,2024-04-05T20:15:08.813000 +CVE-2024-29757,1,1,79e005a457e349ef64aef88e4f323dfd1e7a2f73de6f21d9146bee268e7344f5,2024-04-05T20:15:08.867000 CVE-2024-29758,0,0,2cc069bb64959189ea2de8b6128cab94be340a0f3b77c16c655ed6409fd474e5,2024-03-27T15:49:41.437000 CVE-2024-29759,0,0,a2cea2831b83d81a81fe40f33f0e6624fd1f01962aee666a65cf0c1c54a01596,2024-03-27T15:49:41.437000 CVE-2024-2976,0,0,2123cf6aff7575dd905f7ca455eb68cec1429cb1b518d5a38771dfe467e09b89,2024-03-27T15:49:41.437000 @@ -243594,6 +243627,8 @@ CVE-2024-29775,0,0,4a09499ff17702a2e8ef2c1074beadb2ac9279eca85d85bf4c2322207b72a CVE-2024-29776,0,0,67fe7261841358aada487500133b48b2c1e7affe235fb97f4d75fa453ac843e5,2024-03-27T15:49:41.437000 CVE-2024-29777,0,0,54aa494ecd6d70eaf7fdbabe1fe6006b3d5e55e70d9a8bd4bbd26e15abfe4f5c,2024-03-27T15:49:41.437000 CVE-2024-2978,0,0,239b3780201c9c06871f182d1cc7d09e3b7ac32e86ff81be518391e2ac3ab780,2024-03-27T15:49:41.437000 +CVE-2024-29782,1,1,4757795794599219f11e3b9dcfc93727859ed3d7673ea6da97cfa8b2927cc3f3,2024-04-05T20:15:08.917000 +CVE-2024-29783,1,1,a47c72a77347622456de3323d44cf2da097a0e63e2d91fffe6bcde5cf5e0a324,2024-04-05T20:15:08.967000 CVE-2024-29788,0,0,8cc2af0c2b669256f5779a8a4a350af2b3525bc2e92357d3051a10e492c80e6c,2024-03-27T15:49:41.437000 CVE-2024-29789,0,0,28405d77cf9c690089caf44c730ea92c38ee335fb6ea974e0cc4c214ee7b123f,2024-03-27T15:49:41.437000 CVE-2024-2979,0,0,715f71b18713bceae85abac6b9387266910c959da8c84fe20b231ced845adef9,2024-03-27T15:49:41.437000 @@ -244052,6 +244087,7 @@ CVE-2024-3091,0,0,4af5b5d1eaeb5dcee2b11f765f7e4e07712d76dbe9222ddb5cfc716c8e60d0 CVE-2024-3094,0,0,502febf68b0d02803300ecc80fd5edf81a987966a53e4a71d6dd7ef4cc670f65,2024-04-03T06:15:07.873000 CVE-2024-30946,0,0,0dff329aaece035fc82f00595012379643bd5a0edb89ee3a7369d6609e13a4d1,2024-04-02T18:12:16.283000 CVE-2024-30965,0,0,0e44dd5d951a25ac3e8873a32678a3145da47d1060cb5312576a9c0471b643ad,2024-04-02T18:12:16.283000 +CVE-2024-30977,1,1,b1949f04d8948d41c2cd9e7b71c53660f199c163260b0aa366f3eb12f779344b,2024-04-05T21:15:09.740000 CVE-2024-30998,0,0,179abd0db8095df44a7d1fc224d4f504797395ef6ca242b590dce2e234dbd0de,2024-04-03T12:38:04.840000 CVE-2024-31002,0,0,96e076f675a43d72347dc0c980a987d7f8bd37cac2f635917b77c618d7fb5159,2024-04-02T12:50:42.233000 CVE-2024-31003,0,0,3f0adfc7393f75768ba5f0ff119d336a00244f196f86b1dcc7f91a86901fc5be,2024-04-02T12:50:42.233000 @@ -244163,10 +244199,10 @@ CVE-2024-3178,0,0,e1b2edc538f836ffb506a17d476e0f961db2588242ddd1b2358ad3487cd818 CVE-2024-3179,0,0,5abb24f6a5051585dee8d043e9230e5c2a9202caf7e3c5044373b856d11a8a98,2024-04-04T12:48:41.700000 CVE-2024-3180,0,0,9228ee57f9267d6ec4565f77da6e32f8aedba868cc578e14d8f50b94e65bca34,2024-04-04T12:48:41.700000 CVE-2024-3181,0,0,19462f0bae052150ee3deea6a2833d73153169ade51a21a9a0ee903c88e94c7c,2024-04-04T12:48:41.700000 -CVE-2024-31848,1,1,6965f04cc86efd819ec97fa65a940af868313d4b9414d4c137bc5206ad729602,2024-04-05T18:15:09.360000 -CVE-2024-31849,1,1,ba19687c183971580d9b8978873bbf6d8219ba5de3f65dc5058b582de0f38692,2024-04-05T18:15:09.563000 -CVE-2024-31850,1,1,4982070fceb832e31d5e30fb03a84954ccaa75a897ce5879a6b4f81a150e310c,2024-04-05T18:15:09.753000 -CVE-2024-31851,1,1,ab4658af068ad1058f367d60d6c046977f3ab3864a10d3fc49f99432a80d6938,2024-04-05T18:15:09.953000 +CVE-2024-31848,0,0,6965f04cc86efd819ec97fa65a940af868313d4b9414d4c137bc5206ad729602,2024-04-05T18:15:09.360000 +CVE-2024-31849,0,0,ba19687c183971580d9b8978873bbf6d8219ba5de3f65dc5058b582de0f38692,2024-04-05T18:15:09.563000 +CVE-2024-31850,0,0,4982070fceb832e31d5e30fb03a84954ccaa75a897ce5879a6b4f81a150e310c,2024-04-05T18:15:09.753000 +CVE-2024-31851,0,0,ab4658af068ad1058f367d60d6c046977f3ab3864a10d3fc49f99432a80d6938,2024-04-05T18:15:09.953000 CVE-2024-31852,0,0,0ee0023d5b34c1dac5fa2039f744500c40b254d8784a31e411708a273dd8e7b9,2024-04-05T15:15:08.270000 CVE-2024-3202,0,0,c740eb561a7c1440cb5a8dd5eb2f94f0cce226529c05056c2f841e5a9fe9ca73,2024-04-03T12:38:04.840000 CVE-2024-3203,0,0,697bde31fba6d3c5a0e2d11da403a2e3b16828faac086b66cd78b0527d17b9c5,2024-04-03T12:38:04.840000 @@ -244213,6 +244249,10 @@ CVE-2024-3346,0,0,e733bb268a198adf409c7154c320339626faf14f0ab7cbb2e1a6fe41aa30dc CVE-2024-3347,0,0,3f3371ab8a7023688ea09ce35cacd066084e70ff611e61e0e93ccb906eb0776b,2024-04-05T16:15:08.203000 CVE-2024-3348,0,0,ee0797eecf851d4736420692f400d34e1db5fa62c0fc42b1cf997f4ff1c45678,2024-04-05T17:15:07.743000 CVE-2024-3349,0,0,9c956c66a349da9acf3b4b885f45dc030fdb4622c5431408cddee04d792878f4,2024-04-05T17:15:07.983000 -CVE-2024-3350,1,1,1245c18fa2606c835df9e5f7ef90bf8cbb70eb388db2793142ebd787d4487c95,2024-04-05T18:15:10.143000 -CVE-2024-3351,1,1,546bddb83a148a28dca9db8b4add8343ebd293928450a664cd061216a5e23106,2024-04-05T18:15:10.397000 -CVE-2024-3352,1,1,4dd7c36b0d461d1a96127863060425c62796418ace25937f0dc89f3f629c483d,2024-04-05T19:15:07.267000 +CVE-2024-3350,0,0,1245c18fa2606c835df9e5f7ef90bf8cbb70eb388db2793142ebd787d4487c95,2024-04-05T18:15:10.143000 +CVE-2024-3351,0,0,546bddb83a148a28dca9db8b4add8343ebd293928450a664cd061216a5e23106,2024-04-05T18:15:10.397000 +CVE-2024-3352,0,0,4dd7c36b0d461d1a96127863060425c62796418ace25937f0dc89f3f629c483d,2024-04-05T19:15:07.267000 +CVE-2024-3353,1,1,5a3b6b4aec1f9e7a8bfd3fbf5eaa7f7ebebf90d58ded80d30cc316fd35f8b004,2024-04-05T20:15:09.193000 +CVE-2024-3354,1,1,d035bebbbe4ba20bd3a170fae23b0047b357c9ccbebf4d91c0e7d2d35e44b1f2,2024-04-05T20:15:09.427000 +CVE-2024-3355,1,1,ca68600fd0628cb5ae79a1a70be90a2c45f3bd0e143e4bf60e7a607aceefa438,2024-04-05T21:15:09.800000 +CVE-2024-3356,1,1,ba2a4323d3ef545405bc3e57d4d8fd5b2db7ed6b3db10c68e5aaa772d5c08f2c,2024-04-05T21:15:10.033000