Auto-Update: 2024-04-05T22:00:29.904298+00:00

This commit is contained in:
cad-safe-bot 2024-04-05 22:03:19 +00:00
parent 95ce186fe7
commit 43e0c2e520
43 changed files with 1560 additions and 35 deletions

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-25493",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-04-05T21:15:07.607",
"lastModified": "2024-04-05T21:15:07.607",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "\nA potential vulnerability was reported in the BIOS update tool driver for some Desktop, Smart Edge, Smart Office, and ThinkStation products that could allow a local user with elevated privileges to execute arbitrary code. \n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@lenovo.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://support.lenovo.com/us/en/product_security/LEN-141775",
"source": "psirt@lenovo.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-25494",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-04-05T21:15:07.813",
"lastModified": "2024-04-05T21:15:07.813",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "\nA potential vulnerability were reported in the BIOS of some Desktop, Smart Edge, and ThinkStation products that could allow a local attacker with elevated privileges to write to NVRAM variables. \n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://support.lenovo.com/us/en/product_security/LEN-141775",
"source": "psirt@lenovo.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-4605",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-04-05T21:15:08.003",
"lastModified": "2024-04-05T21:15:08.003",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "\nA valid authenticated Lenovo XClarity Administrator (LXCA) user can potentially leverage an unauthenticated API endpoint to retrieve system event information.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@lenovo.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-497"
}
]
}
],
"references": [
{
"url": "https://support.lenovo.com/us/en/product_security/LEN-136592",
"source": "psirt@lenovo.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-5912",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-04-05T21:15:08.210",
"lastModified": "2024-04-05T21:15:08.210",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "\nA potential memory leakage vulnerability was reported in some Lenovo Notebook products that may allow a local attacker with elevated privileges to write to NVRAM variables. \n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@lenovo.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://support.lenovo.com/us/en/product_security/LEN-155477",
"source": "psirt@lenovo.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-2280", "id": "CVE-2024-2280",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-03-29T07:15:44.543", "published": "2024-03-29T07:15:44.543",
"lastModified": "2024-03-29T12:45:02.937", "lastModified": "2024-04-05T21:15:09.660",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
@ -39,6 +39,10 @@
] ]
}, },
"references": [ "references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3060565%40better-elementor-addons&new=3060565%40better-elementor-addons&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{ {
"url": "https://wordpress.org/plugins/better-elementor-addons/#developers", "url": "https://wordpress.org/plugins/better-elementor-addons/#developers",
"source": "security@wordfence.com" "source": "security@wordfence.com"

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-23592",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-04-05T21:15:08.450",
"lastModified": "2024-04-05T21:15:08.450",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An authentication bypass vulnerability was reported in Lenovo devices with Synaptics fingerprint readers that could allow an attacker with physical access to replay fingerprints and bypass Windows Hello authentication."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@lenovo.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "PHYSICAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.4,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-358"
}
]
}
],
"references": [
{
"url": "https://support.lenovo.com/us/en/product_security/LEN-155804",
"source": "psirt@lenovo.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-2312",
"sourceIdentifier": "security@ubuntu.com",
"published": "2024-04-05T20:15:09.020",
"lastModified": "2024-04-05T20:15:09.020",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "GRUB2 does not call the module fini functions on exit, leading to Debian/Ubuntu's peimage GRUB2 module leaving UEFI system table hooks after exit. This lead to a use-after-free condition, and could possibly lead to secure boot bypass."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@ubuntu.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://bugs.launchpad.net/ubuntu/+source/grub2-unsigned/+bug/2054127",
"source": "security@ubuntu.com"
},
{
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2312",
"source": "security@ubuntu.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-27231",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:07.787",
"lastModified": "2024-04-05T20:15:07.787",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In tmu_get_tr_stats of tmu.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-27232",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:07.847",
"lastModified": "2024-04-05T20:15:07.847",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In asn1_ec_pkey_parse of asn1_common.c, there is a possible OOB read due to a missing null check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-27908",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-04-05T21:15:08.653",
"lastModified": "2024-04-05T21:15:08.653",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow vulnerability was reported in the HTTPS service of some Lenovo Printers that could result in denial of service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@lenovo.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://iknow.lenovo.com.cn/detail/420425",
"source": "psirt@lenovo.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-27909",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-04-05T21:15:08.863",
"lastModified": "2024-04-05T21:15:08.863",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A denial of service vulnerability was reported in the HTTPS service of some Lenovo Printers that could result in a system reboot."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@lenovo.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://iknow.lenovo.com.cn/detail/420425",
"source": "psirt@lenovo.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-27910",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-04-05T21:15:09.060",
"lastModified": "2024-04-05T21:15:09.060",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was reported in some Lenovo Printers that could allow an unauthenticated attacker to reboot the printer without authentication."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://iknow.lenovo.com.cn/detail/420425",
"source": "psirt@lenovo.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-27911",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-04-05T21:15:09.270",
"lastModified": "2024-04-05T21:15:09.270",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was reported in some Lenovo Printers that could allow an unauthenticated attacker to obtain the administrator password."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@lenovo.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://iknow.lenovo.com.cn/detail/420425",
"source": "psirt@lenovo.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-27912",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-04-05T21:15:09.470",
"lastModified": "2024-04-05T21:15:09.470",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A denial of service vulnerability was reported in some Lenovo Printers that could allow an attacker to cause the device to crash by sending crafted LPD packets."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@lenovo.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://iknow.lenovo.com.cn/detail/420425",
"source": "psirt@lenovo.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29738",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:07.907",
"lastModified": "2024-04-05T20:15:07.907",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In gov_init, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29739",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:07.960",
"lastModified": "2024-04-05T20:15:07.960",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In tmu_get_temp_lut of tmu.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29740",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.010",
"lastModified": "2024-04-05T20:15:08.010",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In tmu_set_table of tmu.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29741",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.060",
"lastModified": "2024-04-05T20:15:08.060",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In pblS2mpuResume of s2mpu.c, there is a possible mitigation bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29742",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.107",
"lastModified": "2024-04-05T20:15:08.107",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In apply_minlock_constraint of dvfs.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29743",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.153",
"lastModified": "2024-04-05T20:15:08.153",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In tmu_set_temp_lut of tmu.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29744",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.207",
"lastModified": "2024-04-05T20:15:08.207",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In tmu_get_gov_time_windows, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29745",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.253",
"lastModified": "2024-04-05T20:15:08.253",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "there is a possible Information Disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29746",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.303",
"lastModified": "2024-04-05T20:15:08.303",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In lpm_req_handler of lpm.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29747",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.357",
"lastModified": "2024-04-05T20:15:08.357",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In _dvfs_get_lv of dvfs.c, there is a possible out of bounds read due to a missing null check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29748",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.407",
"lastModified": "2024-04-05T20:15:08.407",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "there is a possible way to bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29749",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.457",
"lastModified": "2024-04-05T20:15:08.457",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In tmu_set_tr_thresholds of tmu.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29750",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.507",
"lastModified": "2024-04-05T20:15:08.507",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In km_exp_did_inner of kmv.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29751",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.560",
"lastModified": "2024-04-05T20:15:08.560",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In asn1_ec_pkey_parse_p384 of asn1_common.c, there is a possible OOB Read due to a missing null check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29752",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.617",
"lastModified": "2024-04-05T20:15:08.617",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In tmu_set_tr_num_thresholds of tmu.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29753",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.667",
"lastModified": "2024-04-05T20:15:08.667",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In tmu_set_control_temp_step of tmu.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29754",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.717",
"lastModified": "2024-04-05T20:15:08.717",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In TMU_IPC_GET_TABLE, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29755",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.763",
"lastModified": "2024-04-05T20:15:08.763",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In tmu_get_pi of tmu.c, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29756",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.813",
"lastModified": "2024-04-05T20:15:08.813",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In afe_callback of q6afe.c, there is a possible out of bounds write due to a buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29757",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.867",
"lastModified": "2024-04-05T20:15:08.867",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "there is a possible permission bypass due to Debug certs being allowlisted. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29782",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.917",
"lastModified": "2024-04-05T20:15:08.917",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In tmu_get_tr_num_thresholds of tmu.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29783",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.967",
"lastModified": "2024-04-05T20:15:08.967",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In tmu_get_tr_thresholds, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-30977",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-05T21:15:09.740",
"lastModified": "2024-04-05T21:15:09.740",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue in Secnet Security Network Intelligent AC Management System v.1.02.040 allows a local attacker to escalate privileges via the password component."
}
],
"metrics": {},
"references": [
{
"url": "http://www.secnet.cn/newsdetail/388.html",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/wodi98k/zip_crack/blob/main/SecnetAC.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-3353",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-05T20:15:09.193",
"lastModified": "2024-04-05T20:15:09.193",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Aplaya Beach Resort Online Reservation System 1.0 and classified as critical. This issue affects some unknown processing of the file admin/mod_reports/index.php. The manipulation of the argument categ/end leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259457 was assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/qqqyc/vlun1/blob/main/Aplaya-Beach-Resort-Online-Reservation-System-06",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.259457",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.259457",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.310221",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-3354",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-05T20:15:09.427",
"lastModified": "2024-04-05T20:15:09.427",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Aplaya Beach Resort Online Reservation System 1.0. It has been classified as critical. Affected is an unknown function of the file admin/mod_users/index.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-259458 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/qqqyc/vlun1/blob/main/Aplaya-Beach-Resort-Online-Reservation-System-07",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.259458",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.259458",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.310222",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-3355",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-05T21:15:09.800",
"lastModified": "2024-04-05T21:15:09.800",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Aplaya Beach Resort Online Reservation System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file admin/mod_users/controller.php?action=add. The manipulation of the argument name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259459."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/qqqyc/vlun1/blob/main/Aplaya-Beach-Resort-Online-Reservation-System-09",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.259459",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.259459",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.310224",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-3356",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-05T21:15:10.033",
"lastModified": "2024-04-05T21:15:10.033",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Aplaya Beach Resort Online Reservation System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file admin/mod_settings/controller.php?action=add. The manipulation of the argument type leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259460."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/qqqyc/vlun1/blob/main/Aplaya-Beach-Resort-Online-Reservation-System-10",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.259460",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.259460",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.310225",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2024-04-05T20:00:38.291477+00:00 2024-04-05T22:00:29.904298+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2024-04-05T19:15:07.267000+00:00 2024-04-05T21:15:10.033000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,33 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
244217 244257
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `14` Recently added CVEs: `40`
- [CVE-2023-31028](CVE-2023/CVE-2023-310xx/CVE-2023-31028.json) (`2024-04-05T18:15:08.250`) - [CVE-2024-29740](CVE-2024/CVE-2024-297xx/CVE-2024-29740.json) (`2024-04-05T20:15:08.010`)
- [CVE-2024-0072](CVE-2024/CVE-2024-00xx/CVE-2024-0072.json) (`2024-04-05T18:15:08.477`) - [CVE-2024-29741](CVE-2024/CVE-2024-297xx/CVE-2024-29741.json) (`2024-04-05T20:15:08.060`)
- [CVE-2024-0076](CVE-2024/CVE-2024-00xx/CVE-2024-0076.json) (`2024-04-05T18:15:08.680`) - [CVE-2024-29742](CVE-2024/CVE-2024-297xx/CVE-2024-29742.json) (`2024-04-05T20:15:08.107`)
- [CVE-2024-0080](CVE-2024/CVE-2024-00xx/CVE-2024-0080.json) (`2024-04-05T18:15:08.890`) - [CVE-2024-29743](CVE-2024/CVE-2024-297xx/CVE-2024-29743.json) (`2024-04-05T20:15:08.153`)
- [CVE-2024-0081](CVE-2024/CVE-2024-00xx/CVE-2024-0081.json) (`2024-04-05T19:15:07.033`) - [CVE-2024-29744](CVE-2024/CVE-2024-297xx/CVE-2024-29744.json) (`2024-04-05T20:15:08.207`)
- [CVE-2024-22004](CVE-2024/CVE-2024-220xx/CVE-2024-22004.json) (`2024-04-05T18:15:09.100`) - [CVE-2024-29745](CVE-2024/CVE-2024-297xx/CVE-2024-29745.json) (`2024-04-05T20:15:08.253`)
- [CVE-2024-28065](CVE-2024/CVE-2024-280xx/CVE-2024-28065.json) (`2024-04-05T18:15:09.307`) - [CVE-2024-29746](CVE-2024/CVE-2024-297xx/CVE-2024-29746.json) (`2024-04-05T20:15:08.303`)
- [CVE-2024-31848](CVE-2024/CVE-2024-318xx/CVE-2024-31848.json) (`2024-04-05T18:15:09.360`) - [CVE-2024-29747](CVE-2024/CVE-2024-297xx/CVE-2024-29747.json) (`2024-04-05T20:15:08.357`)
- [CVE-2024-31849](CVE-2024/CVE-2024-318xx/CVE-2024-31849.json) (`2024-04-05T18:15:09.563`) - [CVE-2024-29748](CVE-2024/CVE-2024-297xx/CVE-2024-29748.json) (`2024-04-05T20:15:08.407`)
- [CVE-2024-31850](CVE-2024/CVE-2024-318xx/CVE-2024-31850.json) (`2024-04-05T18:15:09.753`) - [CVE-2024-29749](CVE-2024/CVE-2024-297xx/CVE-2024-29749.json) (`2024-04-05T20:15:08.457`)
- [CVE-2024-31851](CVE-2024/CVE-2024-318xx/CVE-2024-31851.json) (`2024-04-05T18:15:09.953`) - [CVE-2024-29750](CVE-2024/CVE-2024-297xx/CVE-2024-29750.json) (`2024-04-05T20:15:08.507`)
- [CVE-2024-3350](CVE-2024/CVE-2024-33xx/CVE-2024-3350.json) (`2024-04-05T18:15:10.143`) - [CVE-2024-29751](CVE-2024/CVE-2024-297xx/CVE-2024-29751.json) (`2024-04-05T20:15:08.560`)
- [CVE-2024-3351](CVE-2024/CVE-2024-33xx/CVE-2024-3351.json) (`2024-04-05T18:15:10.397`) - [CVE-2024-29752](CVE-2024/CVE-2024-297xx/CVE-2024-29752.json) (`2024-04-05T20:15:08.617`)
- [CVE-2024-3352](CVE-2024/CVE-2024-33xx/CVE-2024-3352.json) (`2024-04-05T19:15:07.267`) - [CVE-2024-29753](CVE-2024/CVE-2024-297xx/CVE-2024-29753.json) (`2024-04-05T20:15:08.667`)
- [CVE-2024-29754](CVE-2024/CVE-2024-297xx/CVE-2024-29754.json) (`2024-04-05T20:15:08.717`)
- [CVE-2024-29755](CVE-2024/CVE-2024-297xx/CVE-2024-29755.json) (`2024-04-05T20:15:08.763`)
- [CVE-2024-29756](CVE-2024/CVE-2024-297xx/CVE-2024-29756.json) (`2024-04-05T20:15:08.813`)
- [CVE-2024-29757](CVE-2024/CVE-2024-297xx/CVE-2024-29757.json) (`2024-04-05T20:15:08.867`)
- [CVE-2024-29782](CVE-2024/CVE-2024-297xx/CVE-2024-29782.json) (`2024-04-05T20:15:08.917`)
- [CVE-2024-29783](CVE-2024/CVE-2024-297xx/CVE-2024-29783.json) (`2024-04-05T20:15:08.967`)
- [CVE-2024-30977](CVE-2024/CVE-2024-309xx/CVE-2024-30977.json) (`2024-04-05T21:15:09.740`)
- [CVE-2024-3353](CVE-2024/CVE-2024-33xx/CVE-2024-3353.json) (`2024-04-05T20:15:09.193`)
- [CVE-2024-3354](CVE-2024/CVE-2024-33xx/CVE-2024-3354.json) (`2024-04-05T20:15:09.427`)
- [CVE-2024-3355](CVE-2024/CVE-2024-33xx/CVE-2024-3355.json) (`2024-04-05T21:15:09.800`)
- [CVE-2024-3356](CVE-2024/CVE-2024-33xx/CVE-2024-3356.json) (`2024-04-05T21:15:10.033`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `0` Recently modified CVEs: `1`
- [CVE-2024-2280](CVE-2024/CVE-2024-22xx/CVE-2024-2280.json) (`2024-04-05T21:15:09.660`)
## Download and Usage ## Download and Usage

View File

@ -217890,6 +217890,8 @@ CVE-2023-2549,0,0,de0dc2573c930e18a5fb9048e72d1332322b742e4ff232a0716930e6526bb3
CVE-2023-25490,0,0,f318fbcd46bc4823b18f47bad526c08cd8963624a09977c0786081dd6fcce917,2023-04-28T02:59:52.610000 CVE-2023-25490,0,0,f318fbcd46bc4823b18f47bad526c08cd8963624a09977c0786081dd6fcce917,2023-04-28T02:59:52.610000
CVE-2023-25491,0,0,34d6378e3509978d9dd7ef75b3014124153e767629da8cf8612da8174990a547,2023-05-10T02:24:21.523000 CVE-2023-25491,0,0,34d6378e3509978d9dd7ef75b3014124153e767629da8cf8612da8174990a547,2023-05-10T02:24:21.523000
CVE-2023-25492,0,0,e00d9ed9f3044ddb0237f43eaefcbac020a94a98b5b77c9d60daae2da2e49ee3,2023-05-10T13:37:50.410000 CVE-2023-25492,0,0,e00d9ed9f3044ddb0237f43eaefcbac020a94a98b5b77c9d60daae2da2e49ee3,2023-05-10T13:37:50.410000
CVE-2023-25493,1,1,c4fd1dc034641a4a38067465c1fb75997e54375118c025c2521f91dd6621bb12,2024-04-05T21:15:07.607000
CVE-2023-25494,1,1,8bc176759cb6c2b5ce44b58243669e1776f07b0edff15315c6a3514d54dc2c24,2024-04-05T21:15:07.813000
CVE-2023-25495,0,0,19229d319fae03e27301eeb46076cb166d3fe8f0be6fc63a0e7a8f31ef1886b4,2023-05-09T20:36:34.067000 CVE-2023-25495,0,0,19229d319fae03e27301eeb46076cb166d3fe8f0be6fc63a0e7a8f31ef1886b4,2023-05-09T20:36:34.067000
CVE-2023-25496,0,0,70395fddaebcaecd1b78a79188bccd6b86e74f3fc1089ffad612863df4a2c469,2023-05-08T18:09:48.533000 CVE-2023-25496,0,0,70395fddaebcaecd1b78a79188bccd6b86e74f3fc1089ffad612863df4a2c469,2023-05-08T18:09:48.533000
CVE-2023-25499,0,0,954cb0f22c5b9349fe8417f07854c9d7a350d7ba6f1b9564d124da3110ace637,2023-06-30T16:32:37.847000 CVE-2023-25499,0,0,954cb0f22c5b9349fe8417f07854c9d7a350d7ba6f1b9564d124da3110ace637,2023-06-30T16:32:37.847000
@ -222170,7 +222172,7 @@ CVE-2023-31024,0,0,4c70d5cc63eef05b3a366d77fb563b368bdfadd04c0926839846a82fcce9a
CVE-2023-31025,0,0,0e4aa85ecd2ee651d4a45d9866dd1f24f182e80d38864542ea7d1cbb97a9ec67,2024-01-18T20:48:14.777000 CVE-2023-31025,0,0,0e4aa85ecd2ee651d4a45d9866dd1f24f182e80d38864542ea7d1cbb97a9ec67,2024-01-18T20:48:14.777000
CVE-2023-31026,0,0,737def1b37587e41a8de0ad813079c7897dff748850e0628f84397ef07142498,2023-11-13T18:43:03.447000 CVE-2023-31026,0,0,737def1b37587e41a8de0ad813079c7897dff748850e0628f84397ef07142498,2023-11-13T18:43:03.447000
CVE-2023-31027,0,0,8ff82489352cce25dc4352ff2d33db807ef115fc642174d9e503e43f59674260,2023-11-13T19:20:51.220000 CVE-2023-31027,0,0,8ff82489352cce25dc4352ff2d33db807ef115fc642174d9e503e43f59674260,2023-11-13T19:20:51.220000
CVE-2023-31028,1,1,14ff90a0151c643c9b22d6a8fea347f26699f725f3ca6b92becf432a0fd40f67,2024-04-05T18:15:08.250000 CVE-2023-31028,0,0,14ff90a0151c643c9b22d6a8fea347f26699f725f3ca6b92becf432a0fd40f67,2024-04-05T18:15:08.250000
CVE-2023-31029,0,0,c42ef0bcacfd6c953325b5f2f106d96c7a62f2c02eb1edafc052641664e71d2d,2024-01-18T20:50:53.507000 CVE-2023-31029,0,0,c42ef0bcacfd6c953325b5f2f106d96c7a62f2c02eb1edafc052641664e71d2d,2024-01-18T20:50:53.507000
CVE-2023-3103,0,0,c745e45a6f770ad21bf28632452dade4771e22e741237aa8ba70f21edc608054,2024-03-21T02:48:24.477000 CVE-2023-3103,0,0,c745e45a6f770ad21bf28632452dade4771e22e741237aa8ba70f21edc608054,2024-03-21T02:48:24.477000
CVE-2023-31030,0,0,87204db072798651d0e1480ef8ba7d4c1b45df9188d565ea7fc9a3b00ced8522,2024-01-18T20:53:22.643000 CVE-2023-31030,0,0,87204db072798651d0e1480ef8ba7d4c1b45df9188d565ea7fc9a3b00ced8522,2024-01-18T20:53:22.643000
@ -232242,6 +232244,7 @@ CVE-2023-46046,0,0,4ed80fdf9ffb4927760bdcfcaf30dcb27a70f9913cc6f328c7b035c9b3e9e
CVE-2023-46047,0,0,59b95be05d230cdd6ea344491c9416f73c69382afbbc1f9d5028df8892847cc5,2024-03-27T12:29:30.307000 CVE-2023-46047,0,0,59b95be05d230cdd6ea344491c9416f73c69382afbbc1f9d5028df8892847cc5,2024-03-27T12:29:30.307000
CVE-2023-46048,0,0,1153d37f616e36af8c6c0f0252a92a5aec2975042fe828246ac8281ae0e85997,2024-03-27T12:29:30.307000 CVE-2023-46048,0,0,1153d37f616e36af8c6c0f0252a92a5aec2975042fe828246ac8281ae0e85997,2024-03-27T12:29:30.307000
CVE-2023-46049,0,0,1391e07ec280c1eadce601ef51d30475392cab49a2b182b4940fe6688577ac9c,2024-03-27T12:29:30.307000 CVE-2023-46049,0,0,1391e07ec280c1eadce601ef51d30475392cab49a2b182b4940fe6688577ac9c,2024-03-27T12:29:30.307000
CVE-2023-4605,1,1,1789b5d6f4b524690d52ef553d019a20e05b53a02e162a1329a11efb85aaa2ad,2024-04-05T21:15:08.003000
CVE-2023-46050,0,0,6ff5ea8f1dc5991c203b0679fc5f46c04b4a3ef6ae70c787c24e6bec0c9c29e6,2024-01-29T09:15:42.640000 CVE-2023-46050,0,0,6ff5ea8f1dc5991c203b0679fc5f46c04b4a3ef6ae70c787c24e6bec0c9c29e6,2024-01-29T09:15:42.640000
CVE-2023-46051,0,0,09157b9d669d02525418ccbaeca2af237e09d871daecbc676d017fbb419d8e01,2024-03-27T12:29:30.307000 CVE-2023-46051,0,0,09157b9d669d02525418ccbaeca2af237e09d871daecbc676d017fbb419d8e01,2024-03-27T12:29:30.307000
CVE-2023-46052,0,0,51d6afb3c65fa13b540cd0271f17ee96c41ae8a74855d913ff35f4c966df34b8,2024-03-27T12:29:30.307000 CVE-2023-46052,0,0,51d6afb3c65fa13b540cd0271f17ee96c41ae8a74855d913ff35f4c966df34b8,2024-03-27T12:29:30.307000
@ -236960,6 +236963,7 @@ CVE-2023-5908,0,0,65c47ba453ceadbcf64f5715b7c24675de56d7e12038ad7fb9ee73e2511352
CVE-2023-5909,0,0,dc86a44abcc0400ca7a10015f5e4783d571f165fe9e2121385946b9f6a57f86f,2023-12-06T19:54:23.713000 CVE-2023-5909,0,0,dc86a44abcc0400ca7a10015f5e4783d571f165fe9e2121385946b9f6a57f86f,2023-12-06T19:54:23.713000
CVE-2023-5910,0,0,2d579f3a695f73992bfc5e5df66eb7ec068ebff6ca72889065ffb985de8211b9,2024-03-21T02:50:27.900000 CVE-2023-5910,0,0,2d579f3a695f73992bfc5e5df66eb7ec068ebff6ca72889065ffb985de8211b9,2024-03-21T02:50:27.900000
CVE-2023-5911,0,0,a08c5a2532b3d94976cb97dac13d04ddcffa2796c1f43e33a8e9a1ec70caede1,2024-01-11T19:43:17.143000 CVE-2023-5911,0,0,a08c5a2532b3d94976cb97dac13d04ddcffa2796c1f43e33a8e9a1ec70caede1,2024-01-11T19:43:17.143000
CVE-2023-5912,1,1,25e847ae044f5c80f39432926f091be7439b4e1af1514344603354b779bae5d8,2024-04-05T21:15:08.210000
CVE-2023-5913,0,0,9a413048efa725f6de4b42eaa7115b4d40ac8c223b50c26bded4b0dedf2e4eb5,2023-11-16T17:00:33.503000 CVE-2023-5913,0,0,9a413048efa725f6de4b42eaa7115b4d40ac8c223b50c26bded4b0dedf2e4eb5,2023-11-16T17:00:33.503000
CVE-2023-5914,0,0,88eb5804a56587080558dade883a2bd1fc83174e7361ced67521be69deb49539,2024-01-24T21:05:40.173000 CVE-2023-5914,0,0,88eb5804a56587080558dade883a2bd1fc83174e7361ced67521be69deb49539,2024-01-24T21:05:40.173000
CVE-2023-5915,0,0,93d527fcf9e982f48ec7668c345c809addcf44766c1b5722e97dbf2692eb4791,2023-12-08T18:24:27.517000 CVE-2023-5915,0,0,93d527fcf9e982f48ec7668c345c809addcf44766c1b5722e97dbf2692eb4791,2023-12-08T18:24:27.517000
@ -238077,16 +238081,16 @@ CVE-2024-0068,0,0,29054351872f671ffd0afada76da136d48518b88acaefb639ccc6c169ead07
CVE-2024-0069,0,0,fcda9c827a68481a563f617244a09b1d788f56c62c31734c572fbfe1a75ea718,2023-11-28T00:15:07.140000 CVE-2024-0069,0,0,fcda9c827a68481a563f617244a09b1d788f56c62c31734c572fbfe1a75ea718,2023-11-28T00:15:07.140000
CVE-2024-0070,0,0,f5edfa828dbd64ca40da0463d8d67355f807a2f6d8ea2e049578dd15434f1821,2023-11-28T00:15:07.183000 CVE-2024-0070,0,0,f5edfa828dbd64ca40da0463d8d67355f807a2f6d8ea2e049578dd15434f1821,2023-11-28T00:15:07.183000
CVE-2024-0071,0,0,704d1f6cb18cc47944843911c815f4098469857e3754cd1f411a2eed163344eb,2024-03-28T02:01:13.303000 CVE-2024-0071,0,0,704d1f6cb18cc47944843911c815f4098469857e3754cd1f411a2eed163344eb,2024-03-28T02:01:13.303000
CVE-2024-0072,1,1,ced01d498a1c155cc128624b03dece7d5d0df8ec9f84c753a8b25dfdcb346a99,2024-04-05T18:15:08.477000 CVE-2024-0072,0,0,ced01d498a1c155cc128624b03dece7d5d0df8ec9f84c753a8b25dfdcb346a99,2024-04-05T18:15:08.477000
CVE-2024-0073,0,0,176f7449424756846db419300a5389c73905a3871ade74f979d054ede4a4abf3,2024-03-28T02:01:13.303000 CVE-2024-0073,0,0,176f7449424756846db419300a5389c73905a3871ade74f979d054ede4a4abf3,2024-03-28T02:01:13.303000
CVE-2024-0074,0,0,98eb255e160e7fd5beb14045c6567fea8fb46cf3bd51e2fde409175194ef6f56,2024-03-28T02:01:13.303000 CVE-2024-0074,0,0,98eb255e160e7fd5beb14045c6567fea8fb46cf3bd51e2fde409175194ef6f56,2024-03-28T02:01:13.303000
CVE-2024-0075,0,0,ca1e6c0fdd67ee0dc69f9ce1fc86a720c8737b83b96e94939769a54c0a489d67,2024-03-28T02:01:13.303000 CVE-2024-0075,0,0,ca1e6c0fdd67ee0dc69f9ce1fc86a720c8737b83b96e94939769a54c0a489d67,2024-03-28T02:01:13.303000
CVE-2024-0076,1,1,f198baa2c3a5defb59008c4ee9c70b29e941cee00cca054f8dc7225d73ba0c06,2024-04-05T18:15:08.680000 CVE-2024-0076,0,0,f198baa2c3a5defb59008c4ee9c70b29e941cee00cca054f8dc7225d73ba0c06,2024-04-05T18:15:08.680000
CVE-2024-0077,0,0,db4dba4f9462dc63edab63d2d916b645f56aeb1e3e4a4a247dac9899f4510f50,2024-03-28T02:01:13.303000 CVE-2024-0077,0,0,db4dba4f9462dc63edab63d2d916b645f56aeb1e3e4a4a247dac9899f4510f50,2024-03-28T02:01:13.303000
CVE-2024-0078,0,0,65ef1b62c09f229e677e8506d114a0ad3f4b855306a2baa770a721ed0ba97b17,2024-03-28T02:01:13.303000 CVE-2024-0078,0,0,65ef1b62c09f229e677e8506d114a0ad3f4b855306a2baa770a721ed0ba97b17,2024-03-28T02:01:13.303000
CVE-2024-0079,0,0,a48198aa8d1b8e21233ccb1563194a0dce57e3cb1ac8f4c28d49144e25d1a534,2024-03-28T02:01:13.303000 CVE-2024-0079,0,0,a48198aa8d1b8e21233ccb1563194a0dce57e3cb1ac8f4c28d49144e25d1a534,2024-03-28T02:01:13.303000
CVE-2024-0080,1,1,14676a90fe9c3c46fc6e8f25fa883940c938ed9943e229fef559ca749a74acbf,2024-04-05T18:15:08.890000 CVE-2024-0080,0,0,14676a90fe9c3c46fc6e8f25fa883940c938ed9943e229fef559ca749a74acbf,2024-04-05T18:15:08.890000
CVE-2024-0081,1,1,f9dda3f39d21dce4ed138e5eaf31e5ba8c521c35969b9a97b88cde6e50b3f747,2024-04-05T19:15:07.033000 CVE-2024-0081,0,0,f9dda3f39d21dce4ed138e5eaf31e5ba8c521c35969b9a97b88cde6e50b3f747,2024-04-05T19:15:07.033000
CVE-2024-0154,0,0,fee6d0edd38400fe9a2f331d67a355be9bc81701717352554939ef10dafbbf73,2024-03-13T18:15:58.530000 CVE-2024-0154,0,0,fee6d0edd38400fe9a2f331d67a355be9bc81701717352554939ef10dafbbf73,2024-03-13T18:15:58.530000
CVE-2024-0155,0,0,56d3003aea28bbff1e776f33de697fc847d720d7a8270931f6c22f264f5611eb,2024-03-04T13:58:23.447000 CVE-2024-0155,0,0,56d3003aea28bbff1e776f33de697fc847d720d7a8270931f6c22f264f5611eb,2024-03-04T13:58:23.447000
CVE-2024-0156,0,0,47a5ee4f12284e0f109441891942aa0eb589b2387e172b6366b6741bcabc51b4,2024-03-04T13:58:23.447000 CVE-2024-0156,0,0,47a5ee4f12284e0f109441891942aa0eb589b2387e172b6366b6741bcabc51b4,2024-03-04T13:58:23.447000
@ -240259,7 +240263,7 @@ CVE-2024-21983,0,0,ded146d4808fc5f83424e373b65cdad37794b676d9611f5162836ce6d86d8
CVE-2024-21984,0,0,c4d05388605f2fb7e341aa0197be1de56d0ddb669904fcfa6f2ad451633ba0ba,2024-02-20T19:51:05.510000 CVE-2024-21984,0,0,c4d05388605f2fb7e341aa0197be1de56d0ddb669904fcfa6f2ad451633ba0ba,2024-02-20T19:51:05.510000
CVE-2024-21985,0,0,853a82d200092c0582c4290723b53256d943e3aa0955024d181a6e0dc05dbcae,2024-02-05T18:32:52.040000 CVE-2024-21985,0,0,853a82d200092c0582c4290723b53256d943e3aa0955024d181a6e0dc05dbcae,2024-02-05T18:32:52.040000
CVE-2024-21987,0,0,a312d19cf1876839a82cf4ab8a29efb39c100512ae446943b26071c9bd69f220,2024-02-16T21:39:50.223000 CVE-2024-21987,0,0,a312d19cf1876839a82cf4ab8a29efb39c100512ae446943b26071c9bd69f220,2024-02-16T21:39:50.223000
CVE-2024-22004,1,1,39b50e3d304b75133a881ab201d85a8afd781e191f0cefa753b9dae08496ded0,2024-04-05T18:15:09.100000 CVE-2024-22004,0,0,39b50e3d304b75133a881ab201d85a8afd781e191f0cefa753b9dae08496ded0,2024-04-05T18:15:09.100000
CVE-2024-22005,0,0,313b9bc6d7138eced2900a2388d6d58fcc17e9d91231c0517d2cb0e3e82b9d0d,2024-03-15T20:15:07.527000 CVE-2024-22005,0,0,313b9bc6d7138eced2900a2388d6d58fcc17e9d91231c0517d2cb0e3e82b9d0d,2024-03-15T20:15:07.527000
CVE-2024-22006,0,0,4c7c420bbb6e62588c7a1f4eb632b3e6efe7a61ff08393b9055a3796f498bb2e,2024-03-15T20:15:07.573000 CVE-2024-22006,0,0,4c7c420bbb6e62588c7a1f4eb632b3e6efe7a61ff08393b9055a3796f498bb2e,2024-03-15T20:15:07.573000
CVE-2024-22007,0,0,f3721164b170a5b70f98ee09d80eb5a4c23e7d5319c9436b464d0aee9f606b8d,2024-03-12T12:40:13.500000 CVE-2024-22007,0,0,f3721164b170a5b70f98ee09d80eb5a4c23e7d5319c9436b464d0aee9f606b8d,2024-03-12T12:40:13.500000
@ -240651,7 +240655,7 @@ CVE-2024-22779,0,0,eda1283002ca0a5ba4b71e37cd224cf29419640cfe8456a3a65e695acd500
CVE-2024-2278,0,0,207e2f51738b382e656f75c22347fd5450b8d4ce530caf11838743da2ac45b4a,2024-04-01T12:49:00.877000 CVE-2024-2278,0,0,207e2f51738b382e656f75c22347fd5450b8d4ce530caf11838743da2ac45b4a,2024-04-01T12:49:00.877000
CVE-2024-22780,0,0,7f3239e2db375f765f90f52543bdbcccb2a20757a7cd068a76d9a55c97657017,2024-04-02T18:12:16.283000 CVE-2024-22780,0,0,7f3239e2db375f765f90f52543bdbcccb2a20757a7cd068a76d9a55c97657017,2024-04-02T18:12:16.283000
CVE-2024-22795,0,0,74ecb133836626bb2368eab49a74768ea23b2ee0b898200b84b5a979cafed20f,2024-02-15T17:53:54.680000 CVE-2024-22795,0,0,74ecb133836626bb2368eab49a74768ea23b2ee0b898200b84b5a979cafed20f,2024-02-15T17:53:54.680000
CVE-2024-2280,0,0,fd486a918bfa181dee3017086f846fc18f635e98f420bd04919fa2b258fed4a3,2024-03-29T12:45:02.937000 CVE-2024-2280,0,1,b064f3feb8722910a4651d8fcd5aa5f1892c8cb4f5e0e1796b328260936ab591,2024-04-05T21:15:09.660000
CVE-2024-2281,0,0,aff3b1a84ac8ae6dd4eed23fef99c5bf8af119f63a34e536936e20de957b3991,2024-03-21T02:52:31.867000 CVE-2024-2281,0,0,aff3b1a84ac8ae6dd4eed23fef99c5bf8af119f63a34e536936e20de957b3991,2024-03-21T02:52:31.867000
CVE-2024-22817,0,0,eb15e92e9d0667f5c190034654618b8eeeb0dfc84cfb608c765282f0f5a04fcf,2024-01-23T14:23:18.990000 CVE-2024-22817,0,0,eb15e92e9d0667f5c190034654618b8eeeb0dfc84cfb608c765282f0f5a04fcf,2024-01-23T14:23:18.990000
CVE-2024-22818,0,0,cb135bb8e203bf8edbad428e88de582fd5c2ab18516529aab641b2e535a51f86,2024-01-23T14:23:46.073000 CVE-2024-22818,0,0,cb135bb8e203bf8edbad428e88de582fd5c2ab18516529aab641b2e535a51f86,2024-01-23T14:23:46.073000
@ -240739,6 +240743,7 @@ CVE-2024-23116,0,0,c69470152165ed3c6f07842580a9d276db25fe5e384880b4a7931b780caf1
CVE-2024-23117,0,0,879d7d05d3f28235be6d3551861450f70c4e2f56b92f39afe7f23938cb7730c9,2024-04-02T12:50:42.233000 CVE-2024-23117,0,0,879d7d05d3f28235be6d3551861450f70c4e2f56b92f39afe7f23938cb7730c9,2024-04-02T12:50:42.233000
CVE-2024-23118,0,0,2a710ffc24b98413c0e2df0c0c64682e3878440889d1038072b49d9104f7509a,2024-04-02T12:50:42.233000 CVE-2024-23118,0,0,2a710ffc24b98413c0e2df0c0c64682e3878440889d1038072b49d9104f7509a,2024-04-02T12:50:42.233000
CVE-2024-23119,0,0,dc7a02dfe6c2319112aa9c9c7ba24d29c0a54406c32b5bc7828bc06ecc1e505b,2024-04-02T12:50:42.233000 CVE-2024-23119,0,0,dc7a02dfe6c2319112aa9c9c7ba24d29c0a54406c32b5bc7828bc06ecc1e505b,2024-04-02T12:50:42.233000
CVE-2024-2312,1,1,c3d1e59adcf036422d8e502f2fa8633e5bdb76072612a435659e8367a1f966b4,2024-04-05T20:15:09.020000
CVE-2024-23120,0,0,1fdd5384a3247451b572eec50acc63b80f4302d338e02a15db81dbcc92866844,2024-03-01T16:15:45.920000 CVE-2024-23120,0,0,1fdd5384a3247451b572eec50acc63b80f4302d338e02a15db81dbcc92866844,2024-03-01T16:15:45.920000
CVE-2024-23121,0,0,ae89a79fcf6c313d61197ac6f338d68b00711a8ed1e7b84e5d9691d517b9b085,2024-03-13T03:15:06.320000 CVE-2024-23121,0,0,ae89a79fcf6c313d61197ac6f338d68b00711a8ed1e7b84e5d9691d517b9b085,2024-03-13T03:15:06.320000
CVE-2024-23122,0,0,53a6a7f808f40f9f8ccc6c9426a05387fb59e2867d6b512f9c97f02c17acdf90,2024-03-13T03:15:06.390000 CVE-2024-23122,0,0,53a6a7f808f40f9f8ccc6c9426a05387fb59e2867d6b512f9c97f02c17acdf90,2024-03-13T03:15:06.390000
@ -240964,6 +240969,7 @@ CVE-2024-23550,0,0,233aa541fdda788f0e4e95c8a9a0a8f5d7fa7689dcd559af0cf5e5843a531
CVE-2024-23553,0,0,51ea2d50cc1ff4dbab518de2a29e9ef6a91bd6b91073c23eb1a7f0cb7c8f1090,2024-02-10T00:59:00.423000 CVE-2024-23553,0,0,51ea2d50cc1ff4dbab518de2a29e9ef6a91bd6b91073c23eb1a7f0cb7c8f1090,2024-02-10T00:59:00.423000
CVE-2024-2357,0,0,2af3f167a5f07c033333870e1f5044e9ac66d1548287fd20eff05541e2132cfb,2024-03-23T03:15:12.690000 CVE-2024-2357,0,0,2af3f167a5f07c033333870e1f5044e9ac66d1548287fd20eff05541e2132cfb,2024-03-23T03:15:12.690000
CVE-2024-23591,0,0,f4c08614f6a162f49ecc99f020c088036b0b565e06b57796e1304b45ae78e59d,2024-02-20T22:15:08.353000 CVE-2024-23591,0,0,f4c08614f6a162f49ecc99f020c088036b0b565e06b57796e1304b45ae78e59d,2024-02-20T22:15:08.353000
CVE-2024-23592,1,1,39d2d9698b72dd80a10f4895bb9f4034620fd48dadd9d49928de48e02e0737b6,2024-04-05T21:15:08.450000
CVE-2024-23603,0,0,2b536971fe4d260603348583e5e85d59f5debd4cec090f729c87a6dbde3a5ce7,2024-02-14T18:04:45.380000 CVE-2024-23603,0,0,2b536971fe4d260603348583e5e85d59f5debd4cec090f729c87a6dbde3a5ce7,2024-02-14T18:04:45.380000
CVE-2024-23604,0,0,760bd2ccdc3dff1dab3cc8af2bcb4408e0ff89553b2b7d9d0cb5ed9c08f6a616,2024-03-18T12:38:25.490000 CVE-2024-23604,0,0,760bd2ccdc3dff1dab3cc8af2bcb4408e0ff89553b2b7d9d0cb5ed9c08f6a616,2024-03-18T12:38:25.490000
CVE-2024-23605,0,0,559f2b18ab2042f99709ab0e3fa4fcace7fdbe41b3b5e10d7fdaf53ba9d4932f,2024-02-26T18:15:07.673000 CVE-2024-23605,0,0,559f2b18ab2042f99709ab0e3fa4fcace7fdbe41b3b5e10d7fdaf53ba9d4932f,2024-02-26T18:15:07.673000
@ -242749,6 +242755,8 @@ CVE-2024-27228,0,0,ac326317e51dc7851c1f82ec4a32af90f437c21efaddc59cfa9f583daaf12
CVE-2024-27229,0,0,c7e091ed6183d6b89e7927dfbd5d373593399a0d36acccae457f369c6df990d4,2024-03-12T12:40:13.500000 CVE-2024-27229,0,0,c7e091ed6183d6b89e7927dfbd5d373593399a0d36acccae457f369c6df990d4,2024-03-12T12:40:13.500000
CVE-2024-2723,0,0,908fdbaf6e8c15702fd48248931088912662f0d496e4e3ec99b68fc8fea5b6a5,2024-03-22T15:34:43.663000 CVE-2024-2723,0,0,908fdbaf6e8c15702fd48248931088912662f0d496e4e3ec99b68fc8fea5b6a5,2024-03-22T15:34:43.663000
CVE-2024-27230,0,0,c7763bc0ef3ba362ff27028ad0a4ee6dc51f834ec1d74bc7b4e735a7089dbf69,2024-03-12T12:40:13.500000 CVE-2024-27230,0,0,c7763bc0ef3ba362ff27028ad0a4ee6dc51f834ec1d74bc7b4e735a7089dbf69,2024-03-12T12:40:13.500000
CVE-2024-27231,1,1,bcd79f5ef412a612365a45df392eca28617aedac86808c2ace183801bc127ea3,2024-04-05T20:15:07.787000
CVE-2024-27232,1,1,aa76cd88588a9318ac1d12fd089d24219641f057d7862ca5a3fc10fcca094f74,2024-04-05T20:15:07.847000
CVE-2024-27233,0,0,7b8043ee4b07bedf143f62926829193f3e94b62f5f4f2482d3d5d7a8d5b8b166,2024-03-12T12:40:13.500000 CVE-2024-27233,0,0,7b8043ee4b07bedf143f62926829193f3e94b62f5f4f2482d3d5d7a8d5b8b166,2024-03-12T12:40:13.500000
CVE-2024-27234,0,0,4cea6228708eed4dcd9db0ccc5b3a95a294cbf001825e99826ed97307af63bd5,2024-03-12T12:40:13.500000 CVE-2024-27234,0,0,4cea6228708eed4dcd9db0ccc5b3a95a294cbf001825e99826ed97307af63bd5,2024-03-12T12:40:13.500000
CVE-2024-27235,0,0,286299f74e536cbf38771d33b6488ac94632f33ebda885a5c2222182d4672636,2024-03-15T20:15:09.253000 CVE-2024-27235,0,0,286299f74e536cbf38771d33b6488ac94632f33ebda885a5c2222182d4672636,2024-03-15T20:15:09.253000
@ -242944,7 +242952,12 @@ CVE-2024-27902,0,0,7aa835c5c3cccf2434107e43a6dd21c3ee48d8e6664a62d49734964bcc016
CVE-2024-27905,0,0,3e20ed1ee55859457fccacd02ccfd33b203e184f29107e3c93e267df9f8d58a8,2024-03-21T02:52:20.520000 CVE-2024-27905,0,0,3e20ed1ee55859457fccacd02ccfd33b203e184f29107e3c93e267df9f8d58a8,2024-03-21T02:52:20.520000
CVE-2024-27906,0,0,e279155c32f0030358ce7d189e782f3e54d78a6a202b13937f95f2706818bee5,2024-02-29T13:49:29.390000 CVE-2024-27906,0,0,e279155c32f0030358ce7d189e782f3e54d78a6a202b13937f95f2706818bee5,2024-02-29T13:49:29.390000
CVE-2024-27907,0,0,aac379adb09823074865cdaa760b5a9ed07a3326e17caf800106b9008671180a,2024-03-12T12:40:13.500000 CVE-2024-27907,0,0,aac379adb09823074865cdaa760b5a9ed07a3326e17caf800106b9008671180a,2024-03-12T12:40:13.500000
CVE-2024-27908,1,1,13430cd25a020cec36a3d9eb7892deebe7c57c18794858e5e30a7b03ed2ef7d0,2024-04-05T21:15:08.653000
CVE-2024-27909,1,1,f71a0faf3349bbee739bf4f7b9d84c61c8b3abd54e5d8aeec12772a14caba6a7,2024-04-05T21:15:08.863000
CVE-2024-2791,0,0,66683d264867ecc734a7367e9e44b59a4386424cad2664c8596d1137b64a85af,2024-04-02T12:50:42.233000 CVE-2024-2791,0,0,66683d264867ecc734a7367e9e44b59a4386424cad2664c8596d1137b64a85af,2024-04-02T12:50:42.233000
CVE-2024-27910,1,1,e04ba00cb20a75b366e4b285c9340e26c71ffecc887e7a42702c708bf6bd6297,2024-04-05T21:15:09.060000
CVE-2024-27911,1,1,9c6a14a4b572a0262639eb21fea5be2328fef66aaf35340436ffaafe0b166a38,2024-04-05T21:15:09.270000
CVE-2024-27912,1,1,23753376cb9b4f3097e13ae423c40dacdd041301a2343c17f8db85068be6f16a,2024-04-05T21:15:09.470000
CVE-2024-27913,0,0,4ab4f3916b8428dbf6a53f81f4240223329f17f5e9f63a6de1fd6dc690b5ff6a,2024-02-28T14:06:45.783000 CVE-2024-27913,0,0,4ab4f3916b8428dbf6a53f81f4240223329f17f5e9f63a6de1fd6dc690b5ff6a,2024-02-28T14:06:45.783000
CVE-2024-27914,0,0,3ae5902175f2437b477eff7baac5113b2dce4706fa0de04eef5292541a3ddd19,2024-03-18T19:40:00.173000 CVE-2024-27914,0,0,3ae5902175f2437b477eff7baac5113b2dce4706fa0de04eef5292541a3ddd19,2024-03-18T19:40:00.173000
CVE-2024-27915,0,0,d4924e50464aaf41d040242348770ffaf78a24dc54a27fd2fcc5b39d7ef4bc89,2024-03-06T21:42:48.053000 CVE-2024-27915,0,0,d4924e50464aaf41d040242348770ffaf78a24dc54a27fd2fcc5b39d7ef4bc89,2024-03-06T21:42:48.053000
@ -243028,7 +243041,7 @@ CVE-2024-2805,0,0,fa896267355e8bee60ef45369bdd61a50def95efdfa5e824724b711a08ae74
CVE-2024-28053,0,0,c90f3b62964e2e2422d9b5798f17f1825dc5ae41ec90f71b2b9fe7b9e8ea4a14,2024-03-15T12:53:06.423000 CVE-2024-28053,0,0,c90f3b62964e2e2422d9b5798f17f1825dc5ae41ec90f71b2b9fe7b9e8ea4a14,2024-03-15T12:53:06.423000
CVE-2024-28054,0,0,b289eaa8f221cef12d20f4d7c4d850be722c706b733d8c81d770795eac46dd81,2024-03-23T03:15:11.510000 CVE-2024-28054,0,0,b289eaa8f221cef12d20f4d7c4d850be722c706b733d8c81d770795eac46dd81,2024-03-23T03:15:11.510000
CVE-2024-2806,0,0,31a1a52b37b2e720eae0233b1b19dee00c5a6dd1df73e31128b38dde57d091e7,2024-03-26T03:11:41.880000 CVE-2024-2806,0,0,31a1a52b37b2e720eae0233b1b19dee00c5a6dd1df73e31128b38dde57d091e7,2024-03-26T03:11:41.880000
CVE-2024-28065,1,1,860e1bfe6126cf5c07cb1eddc7c9671f368193a1540ce3473fdd211437faae95,2024-04-05T18:15:09.307000 CVE-2024-28065,0,0,860e1bfe6126cf5c07cb1eddc7c9671f368193a1540ce3473fdd211437faae95,2024-04-05T18:15:09.307000
CVE-2024-28069,0,0,99a57a9955c5ed5463e7c560b95e0a17dfa2789ec3c024f2825003d476d4b80d,2024-03-17T22:38:29.433000 CVE-2024-28069,0,0,99a57a9955c5ed5463e7c560b95e0a17dfa2789ec3c024f2825003d476d4b80d,2024-03-17T22:38:29.433000
CVE-2024-2807,0,0,47b8a7021ebbb15acc350203dd3081726f7b96c650b8d998414fd135c1027f2f,2024-03-26T03:12:50.837000 CVE-2024-2807,0,0,47b8a7021ebbb15acc350203dd3081726f7b96c650b8d998414fd135c1027f2f,2024-03-26T03:12:50.837000
CVE-2024-28070,0,0,c8eeec88fa6e3b91036a4eadc63dd921f090ad52309176e7af22a570b911aeac,2024-03-17T22:38:29.433000 CVE-2024-28070,0,0,c8eeec88fa6e3b91036a4eadc63dd921f090ad52309176e7af22a570b911aeac,2024-03-17T22:38:29.433000
@ -243571,6 +243584,26 @@ CVE-2024-2971,0,0,898bc718d43d0c390c6d16657d6a8f74b1bed4195ca2be9f6e03b60807e375
CVE-2024-29732,0,0,f91e9a53bb8c78b9eaa9a43eb2f41d18e7980ac57e838dd405b45ee97833017f,2024-03-21T12:58:51.093000 CVE-2024-29732,0,0,f91e9a53bb8c78b9eaa9a43eb2f41d18e7980ac57e838dd405b45ee97833017f,2024-03-21T12:58:51.093000
CVE-2024-29734,0,0,8d99461dc9b8889d99315bde49edbce5536e3a20b88b53095157d8f0afc148b5,2024-04-03T12:38:04.840000 CVE-2024-29734,0,0,8d99461dc9b8889d99315bde49edbce5536e3a20b88b53095157d8f0afc148b5,2024-04-03T12:38:04.840000
CVE-2024-29735,0,0,286fbba4f7cb1bbd32eae740efb468430068245735dc6c522579c415dcd44e18,2024-03-27T12:29:41.530000 CVE-2024-29735,0,0,286fbba4f7cb1bbd32eae740efb468430068245735dc6c522579c415dcd44e18,2024-03-27T12:29:41.530000
CVE-2024-29738,1,1,53b2d0752f1fa17cbf1102b20c675a747e42a9143c4e8ad54f06907623028bd7,2024-04-05T20:15:07.907000
CVE-2024-29739,1,1,f6f76b014c8e7321becb37fb9261442b276e1502923a529880b197bef6586c39,2024-04-05T20:15:07.960000
CVE-2024-29740,1,1,43488df738e02d492bd5dd531a0145b90b4c70bfe6f3b08cc9198223b59d6549,2024-04-05T20:15:08.010000
CVE-2024-29741,1,1,5287e10912b70bb061f53de5b83b003317f0455c1e6e8382ca56aea272ded637,2024-04-05T20:15:08.060000
CVE-2024-29742,1,1,f2bc3ea7d601e3d2f89366bc3bf789f7dff9d33d7b969d0681ff0702c8c803ee,2024-04-05T20:15:08.107000
CVE-2024-29743,1,1,c449523fdbfed70e93eb5db09bb0072175dcc5ddecf792b0802f1d6b3e48b44c,2024-04-05T20:15:08.153000
CVE-2024-29744,1,1,648f768a13bd9fd094226fb33743af4a7accff23b8393394010a398a2bf9faf7,2024-04-05T20:15:08.207000
CVE-2024-29745,1,1,e092cc506e47b323e83d6e1a0c73e84be04120dd76e1bfdd92d89427a91e8853,2024-04-05T20:15:08.253000
CVE-2024-29746,1,1,f387564f14fa535ea564257d7225ec27fec8b4e39ff6f86e757de7acb23d8e1e,2024-04-05T20:15:08.303000
CVE-2024-29747,1,1,0548417396958cc0ffb5d57a429a647040bc882fc6a141dfeabf96110c8e560c,2024-04-05T20:15:08.357000
CVE-2024-29748,1,1,03916cd98e44232b3742e5725eea00e4711368caf808cb591f5073c1c8562982,2024-04-05T20:15:08.407000
CVE-2024-29749,1,1,013121f5f2cf9fc7d35fb3733cc7a973426593dc74f4252d96fe96b1177b73b1,2024-04-05T20:15:08.457000
CVE-2024-29750,1,1,1d1c2c89d3a1e4369128e0b96b6eea44ed888a0866ddcc895f3f878c4d78c9f8,2024-04-05T20:15:08.507000
CVE-2024-29751,1,1,8771fda4f10da37042d80e537d9a6c45d11e384af07f52c7e0558da9a6e89d31,2024-04-05T20:15:08.560000
CVE-2024-29752,1,1,9bb1264a7f3abf8bc8cc11bcb3b404de453811c8f47b2b67485281322418de83,2024-04-05T20:15:08.617000
CVE-2024-29753,1,1,69b25c72eb47bc58949e79282078836bd7c63f9ca03173a7b1f25c6b375f736c,2024-04-05T20:15:08.667000
CVE-2024-29754,1,1,3330597cda792c70bad3d77acc0df99aee3e4b80d762a0d8f00a0d1b5e10416a,2024-04-05T20:15:08.717000
CVE-2024-29755,1,1,0542351e0061a50a9107f36e57184a81dd6bfb9e97ee77479c1db76ff1889e27,2024-04-05T20:15:08.763000
CVE-2024-29756,1,1,749dbbd462fe1fa47d77fe81e60dfe24216329f4c2124a953263acc2be642c5a,2024-04-05T20:15:08.813000
CVE-2024-29757,1,1,79e005a457e349ef64aef88e4f323dfd1e7a2f73de6f21d9146bee268e7344f5,2024-04-05T20:15:08.867000
CVE-2024-29758,0,0,2cc069bb64959189ea2de8b6128cab94be340a0f3b77c16c655ed6409fd474e5,2024-03-27T15:49:41.437000 CVE-2024-29758,0,0,2cc069bb64959189ea2de8b6128cab94be340a0f3b77c16c655ed6409fd474e5,2024-03-27T15:49:41.437000
CVE-2024-29759,0,0,a2cea2831b83d81a81fe40f33f0e6624fd1f01962aee666a65cf0c1c54a01596,2024-03-27T15:49:41.437000 CVE-2024-29759,0,0,a2cea2831b83d81a81fe40f33f0e6624fd1f01962aee666a65cf0c1c54a01596,2024-03-27T15:49:41.437000
CVE-2024-2976,0,0,2123cf6aff7575dd905f7ca455eb68cec1429cb1b518d5a38771dfe467e09b89,2024-03-27T15:49:41.437000 CVE-2024-2976,0,0,2123cf6aff7575dd905f7ca455eb68cec1429cb1b518d5a38771dfe467e09b89,2024-03-27T15:49:41.437000
@ -243594,6 +243627,8 @@ CVE-2024-29775,0,0,4a09499ff17702a2e8ef2c1074beadb2ac9279eca85d85bf4c2322207b72a
CVE-2024-29776,0,0,67fe7261841358aada487500133b48b2c1e7affe235fb97f4d75fa453ac843e5,2024-03-27T15:49:41.437000 CVE-2024-29776,0,0,67fe7261841358aada487500133b48b2c1e7affe235fb97f4d75fa453ac843e5,2024-03-27T15:49:41.437000
CVE-2024-29777,0,0,54aa494ecd6d70eaf7fdbabe1fe6006b3d5e55e70d9a8bd4bbd26e15abfe4f5c,2024-03-27T15:49:41.437000 CVE-2024-29777,0,0,54aa494ecd6d70eaf7fdbabe1fe6006b3d5e55e70d9a8bd4bbd26e15abfe4f5c,2024-03-27T15:49:41.437000
CVE-2024-2978,0,0,239b3780201c9c06871f182d1cc7d09e3b7ac32e86ff81be518391e2ac3ab780,2024-03-27T15:49:41.437000 CVE-2024-2978,0,0,239b3780201c9c06871f182d1cc7d09e3b7ac32e86ff81be518391e2ac3ab780,2024-03-27T15:49:41.437000
CVE-2024-29782,1,1,4757795794599219f11e3b9dcfc93727859ed3d7673ea6da97cfa8b2927cc3f3,2024-04-05T20:15:08.917000
CVE-2024-29783,1,1,a47c72a77347622456de3323d44cf2da097a0e63e2d91fffe6bcde5cf5e0a324,2024-04-05T20:15:08.967000
CVE-2024-29788,0,0,8cc2af0c2b669256f5779a8a4a350af2b3525bc2e92357d3051a10e492c80e6c,2024-03-27T15:49:41.437000 CVE-2024-29788,0,0,8cc2af0c2b669256f5779a8a4a350af2b3525bc2e92357d3051a10e492c80e6c,2024-03-27T15:49:41.437000
CVE-2024-29789,0,0,28405d77cf9c690089caf44c730ea92c38ee335fb6ea974e0cc4c214ee7b123f,2024-03-27T15:49:41.437000 CVE-2024-29789,0,0,28405d77cf9c690089caf44c730ea92c38ee335fb6ea974e0cc4c214ee7b123f,2024-03-27T15:49:41.437000
CVE-2024-2979,0,0,715f71b18713bceae85abac6b9387266910c959da8c84fe20b231ced845adef9,2024-03-27T15:49:41.437000 CVE-2024-2979,0,0,715f71b18713bceae85abac6b9387266910c959da8c84fe20b231ced845adef9,2024-03-27T15:49:41.437000
@ -244052,6 +244087,7 @@ CVE-2024-3091,0,0,4af5b5d1eaeb5dcee2b11f765f7e4e07712d76dbe9222ddb5cfc716c8e60d0
CVE-2024-3094,0,0,502febf68b0d02803300ecc80fd5edf81a987966a53e4a71d6dd7ef4cc670f65,2024-04-03T06:15:07.873000 CVE-2024-3094,0,0,502febf68b0d02803300ecc80fd5edf81a987966a53e4a71d6dd7ef4cc670f65,2024-04-03T06:15:07.873000
CVE-2024-30946,0,0,0dff329aaece035fc82f00595012379643bd5a0edb89ee3a7369d6609e13a4d1,2024-04-02T18:12:16.283000 CVE-2024-30946,0,0,0dff329aaece035fc82f00595012379643bd5a0edb89ee3a7369d6609e13a4d1,2024-04-02T18:12:16.283000
CVE-2024-30965,0,0,0e44dd5d951a25ac3e8873a32678a3145da47d1060cb5312576a9c0471b643ad,2024-04-02T18:12:16.283000 CVE-2024-30965,0,0,0e44dd5d951a25ac3e8873a32678a3145da47d1060cb5312576a9c0471b643ad,2024-04-02T18:12:16.283000
CVE-2024-30977,1,1,b1949f04d8948d41c2cd9e7b71c53660f199c163260b0aa366f3eb12f779344b,2024-04-05T21:15:09.740000
CVE-2024-30998,0,0,179abd0db8095df44a7d1fc224d4f504797395ef6ca242b590dce2e234dbd0de,2024-04-03T12:38:04.840000 CVE-2024-30998,0,0,179abd0db8095df44a7d1fc224d4f504797395ef6ca242b590dce2e234dbd0de,2024-04-03T12:38:04.840000
CVE-2024-31002,0,0,96e076f675a43d72347dc0c980a987d7f8bd37cac2f635917b77c618d7fb5159,2024-04-02T12:50:42.233000 CVE-2024-31002,0,0,96e076f675a43d72347dc0c980a987d7f8bd37cac2f635917b77c618d7fb5159,2024-04-02T12:50:42.233000
CVE-2024-31003,0,0,3f0adfc7393f75768ba5f0ff119d336a00244f196f86b1dcc7f91a86901fc5be,2024-04-02T12:50:42.233000 CVE-2024-31003,0,0,3f0adfc7393f75768ba5f0ff119d336a00244f196f86b1dcc7f91a86901fc5be,2024-04-02T12:50:42.233000
@ -244163,10 +244199,10 @@ CVE-2024-3178,0,0,e1b2edc538f836ffb506a17d476e0f961db2588242ddd1b2358ad3487cd818
CVE-2024-3179,0,0,5abb24f6a5051585dee8d043e9230e5c2a9202caf7e3c5044373b856d11a8a98,2024-04-04T12:48:41.700000 CVE-2024-3179,0,0,5abb24f6a5051585dee8d043e9230e5c2a9202caf7e3c5044373b856d11a8a98,2024-04-04T12:48:41.700000
CVE-2024-3180,0,0,9228ee57f9267d6ec4565f77da6e32f8aedba868cc578e14d8f50b94e65bca34,2024-04-04T12:48:41.700000 CVE-2024-3180,0,0,9228ee57f9267d6ec4565f77da6e32f8aedba868cc578e14d8f50b94e65bca34,2024-04-04T12:48:41.700000
CVE-2024-3181,0,0,19462f0bae052150ee3deea6a2833d73153169ade51a21a9a0ee903c88e94c7c,2024-04-04T12:48:41.700000 CVE-2024-3181,0,0,19462f0bae052150ee3deea6a2833d73153169ade51a21a9a0ee903c88e94c7c,2024-04-04T12:48:41.700000
CVE-2024-31848,1,1,6965f04cc86efd819ec97fa65a940af868313d4b9414d4c137bc5206ad729602,2024-04-05T18:15:09.360000 CVE-2024-31848,0,0,6965f04cc86efd819ec97fa65a940af868313d4b9414d4c137bc5206ad729602,2024-04-05T18:15:09.360000
CVE-2024-31849,1,1,ba19687c183971580d9b8978873bbf6d8219ba5de3f65dc5058b582de0f38692,2024-04-05T18:15:09.563000 CVE-2024-31849,0,0,ba19687c183971580d9b8978873bbf6d8219ba5de3f65dc5058b582de0f38692,2024-04-05T18:15:09.563000
CVE-2024-31850,1,1,4982070fceb832e31d5e30fb03a84954ccaa75a897ce5879a6b4f81a150e310c,2024-04-05T18:15:09.753000 CVE-2024-31850,0,0,4982070fceb832e31d5e30fb03a84954ccaa75a897ce5879a6b4f81a150e310c,2024-04-05T18:15:09.753000
CVE-2024-31851,1,1,ab4658af068ad1058f367d60d6c046977f3ab3864a10d3fc49f99432a80d6938,2024-04-05T18:15:09.953000 CVE-2024-31851,0,0,ab4658af068ad1058f367d60d6c046977f3ab3864a10d3fc49f99432a80d6938,2024-04-05T18:15:09.953000
CVE-2024-31852,0,0,0ee0023d5b34c1dac5fa2039f744500c40b254d8784a31e411708a273dd8e7b9,2024-04-05T15:15:08.270000 CVE-2024-31852,0,0,0ee0023d5b34c1dac5fa2039f744500c40b254d8784a31e411708a273dd8e7b9,2024-04-05T15:15:08.270000
CVE-2024-3202,0,0,c740eb561a7c1440cb5a8dd5eb2f94f0cce226529c05056c2f841e5a9fe9ca73,2024-04-03T12:38:04.840000 CVE-2024-3202,0,0,c740eb561a7c1440cb5a8dd5eb2f94f0cce226529c05056c2f841e5a9fe9ca73,2024-04-03T12:38:04.840000
CVE-2024-3203,0,0,697bde31fba6d3c5a0e2d11da403a2e3b16828faac086b66cd78b0527d17b9c5,2024-04-03T12:38:04.840000 CVE-2024-3203,0,0,697bde31fba6d3c5a0e2d11da403a2e3b16828faac086b66cd78b0527d17b9c5,2024-04-03T12:38:04.840000
@ -244213,6 +244249,10 @@ CVE-2024-3346,0,0,e733bb268a198adf409c7154c320339626faf14f0ab7cbb2e1a6fe41aa30dc
CVE-2024-3347,0,0,3f3371ab8a7023688ea09ce35cacd066084e70ff611e61e0e93ccb906eb0776b,2024-04-05T16:15:08.203000 CVE-2024-3347,0,0,3f3371ab8a7023688ea09ce35cacd066084e70ff611e61e0e93ccb906eb0776b,2024-04-05T16:15:08.203000
CVE-2024-3348,0,0,ee0797eecf851d4736420692f400d34e1db5fa62c0fc42b1cf997f4ff1c45678,2024-04-05T17:15:07.743000 CVE-2024-3348,0,0,ee0797eecf851d4736420692f400d34e1db5fa62c0fc42b1cf997f4ff1c45678,2024-04-05T17:15:07.743000
CVE-2024-3349,0,0,9c956c66a349da9acf3b4b885f45dc030fdb4622c5431408cddee04d792878f4,2024-04-05T17:15:07.983000 CVE-2024-3349,0,0,9c956c66a349da9acf3b4b885f45dc030fdb4622c5431408cddee04d792878f4,2024-04-05T17:15:07.983000
CVE-2024-3350,1,1,1245c18fa2606c835df9e5f7ef90bf8cbb70eb388db2793142ebd787d4487c95,2024-04-05T18:15:10.143000 CVE-2024-3350,0,0,1245c18fa2606c835df9e5f7ef90bf8cbb70eb388db2793142ebd787d4487c95,2024-04-05T18:15:10.143000
CVE-2024-3351,1,1,546bddb83a148a28dca9db8b4add8343ebd293928450a664cd061216a5e23106,2024-04-05T18:15:10.397000 CVE-2024-3351,0,0,546bddb83a148a28dca9db8b4add8343ebd293928450a664cd061216a5e23106,2024-04-05T18:15:10.397000
CVE-2024-3352,1,1,4dd7c36b0d461d1a96127863060425c62796418ace25937f0dc89f3f629c483d,2024-04-05T19:15:07.267000 CVE-2024-3352,0,0,4dd7c36b0d461d1a96127863060425c62796418ace25937f0dc89f3f629c483d,2024-04-05T19:15:07.267000
CVE-2024-3353,1,1,5a3b6b4aec1f9e7a8bfd3fbf5eaa7f7ebebf90d58ded80d30cc316fd35f8b004,2024-04-05T20:15:09.193000
CVE-2024-3354,1,1,d035bebbbe4ba20bd3a170fae23b0047b357c9ccbebf4d91c0e7d2d35e44b1f2,2024-04-05T20:15:09.427000
CVE-2024-3355,1,1,ca68600fd0628cb5ae79a1a70be90a2c45f3bd0e143e4bf60e7a607aceefa438,2024-04-05T21:15:09.800000
CVE-2024-3356,1,1,ba2a4323d3ef545405bc3e57d4d8fd5b2db7ed6b3db10c68e5aaa772d5c08f2c,2024-04-05T21:15:10.033000

Can't render this file because it is too large.