Auto-Update: 2024-04-05T22:00:29.904298+00:00

This commit is contained in:
cad-safe-bot 2024-04-05 22:03:19 +00:00
parent 95ce186fe7
commit 43e0c2e520
43 changed files with 1560 additions and 35 deletions

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-25493",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-04-05T21:15:07.607",
"lastModified": "2024-04-05T21:15:07.607",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "\nA potential vulnerability was reported in the BIOS update tool driver for some Desktop, Smart Edge, Smart Office, and ThinkStation products that could allow a local user with elevated privileges to execute arbitrary code. \n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@lenovo.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://support.lenovo.com/us/en/product_security/LEN-141775",
"source": "psirt@lenovo.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-25494",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-04-05T21:15:07.813",
"lastModified": "2024-04-05T21:15:07.813",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "\nA potential vulnerability were reported in the BIOS of some Desktop, Smart Edge, and ThinkStation products that could allow a local attacker with elevated privileges to write to NVRAM variables. \n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://support.lenovo.com/us/en/product_security/LEN-141775",
"source": "psirt@lenovo.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-4605",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-04-05T21:15:08.003",
"lastModified": "2024-04-05T21:15:08.003",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "\nA valid authenticated Lenovo XClarity Administrator (LXCA) user can potentially leverage an unauthenticated API endpoint to retrieve system event information.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@lenovo.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-497"
}
]
}
],
"references": [
{
"url": "https://support.lenovo.com/us/en/product_security/LEN-136592",
"source": "psirt@lenovo.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-5912",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-04-05T21:15:08.210",
"lastModified": "2024-04-05T21:15:08.210",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "\nA potential memory leakage vulnerability was reported in some Lenovo Notebook products that may allow a local attacker with elevated privileges to write to NVRAM variables. \n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@lenovo.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://support.lenovo.com/us/en/product_security/LEN-155477",
"source": "psirt@lenovo.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-2280",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-29T07:15:44.543",
"lastModified": "2024-03-29T12:45:02.937",
"lastModified": "2024-04-05T21:15:09.660",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3060565%40better-elementor-addons&new=3060565%40better-elementor-addons&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/better-elementor-addons/#developers",
"source": "security@wordfence.com"

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-23592",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-04-05T21:15:08.450",
"lastModified": "2024-04-05T21:15:08.450",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An authentication bypass vulnerability was reported in Lenovo devices with Synaptics fingerprint readers that could allow an attacker with physical access to replay fingerprints and bypass Windows Hello authentication."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@lenovo.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "PHYSICAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.4,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-358"
}
]
}
],
"references": [
{
"url": "https://support.lenovo.com/us/en/product_security/LEN-155804",
"source": "psirt@lenovo.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-2312",
"sourceIdentifier": "security@ubuntu.com",
"published": "2024-04-05T20:15:09.020",
"lastModified": "2024-04-05T20:15:09.020",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "GRUB2 does not call the module fini functions on exit, leading to Debian/Ubuntu's peimage GRUB2 module leaving UEFI system table hooks after exit. This lead to a use-after-free condition, and could possibly lead to secure boot bypass."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@ubuntu.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://bugs.launchpad.net/ubuntu/+source/grub2-unsigned/+bug/2054127",
"source": "security@ubuntu.com"
},
{
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2312",
"source": "security@ubuntu.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-27231",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:07.787",
"lastModified": "2024-04-05T20:15:07.787",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In tmu_get_tr_stats of tmu.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-27232",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:07.847",
"lastModified": "2024-04-05T20:15:07.847",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In asn1_ec_pkey_parse of asn1_common.c, there is a possible OOB read due to a missing null check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-27908",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-04-05T21:15:08.653",
"lastModified": "2024-04-05T21:15:08.653",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow vulnerability was reported in the HTTPS service of some Lenovo Printers that could result in denial of service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@lenovo.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://iknow.lenovo.com.cn/detail/420425",
"source": "psirt@lenovo.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-27909",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-04-05T21:15:08.863",
"lastModified": "2024-04-05T21:15:08.863",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A denial of service vulnerability was reported in the HTTPS service of some Lenovo Printers that could result in a system reboot."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@lenovo.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://iknow.lenovo.com.cn/detail/420425",
"source": "psirt@lenovo.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-27910",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-04-05T21:15:09.060",
"lastModified": "2024-04-05T21:15:09.060",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was reported in some Lenovo Printers that could allow an unauthenticated attacker to reboot the printer without authentication."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://iknow.lenovo.com.cn/detail/420425",
"source": "psirt@lenovo.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-27911",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-04-05T21:15:09.270",
"lastModified": "2024-04-05T21:15:09.270",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was reported in some Lenovo Printers that could allow an unauthenticated attacker to obtain the administrator password."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@lenovo.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://iknow.lenovo.com.cn/detail/420425",
"source": "psirt@lenovo.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-27912",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-04-05T21:15:09.470",
"lastModified": "2024-04-05T21:15:09.470",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A denial of service vulnerability was reported in some Lenovo Printers that could allow an attacker to cause the device to crash by sending crafted LPD packets."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@lenovo.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://iknow.lenovo.com.cn/detail/420425",
"source": "psirt@lenovo.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29738",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:07.907",
"lastModified": "2024-04-05T20:15:07.907",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In gov_init, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29739",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:07.960",
"lastModified": "2024-04-05T20:15:07.960",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In tmu_get_temp_lut of tmu.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29740",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.010",
"lastModified": "2024-04-05T20:15:08.010",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In tmu_set_table of tmu.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29741",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.060",
"lastModified": "2024-04-05T20:15:08.060",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In pblS2mpuResume of s2mpu.c, there is a possible mitigation bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29742",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.107",
"lastModified": "2024-04-05T20:15:08.107",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In apply_minlock_constraint of dvfs.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29743",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.153",
"lastModified": "2024-04-05T20:15:08.153",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In tmu_set_temp_lut of tmu.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29744",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.207",
"lastModified": "2024-04-05T20:15:08.207",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In tmu_get_gov_time_windows, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29745",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.253",
"lastModified": "2024-04-05T20:15:08.253",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "there is a possible Information Disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29746",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.303",
"lastModified": "2024-04-05T20:15:08.303",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In lpm_req_handler of lpm.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29747",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.357",
"lastModified": "2024-04-05T20:15:08.357",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In _dvfs_get_lv of dvfs.c, there is a possible out of bounds read due to a missing null check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29748",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.407",
"lastModified": "2024-04-05T20:15:08.407",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "there is a possible way to bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29749",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.457",
"lastModified": "2024-04-05T20:15:08.457",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In tmu_set_tr_thresholds of tmu.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29750",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.507",
"lastModified": "2024-04-05T20:15:08.507",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In km_exp_did_inner of kmv.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29751",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.560",
"lastModified": "2024-04-05T20:15:08.560",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In asn1_ec_pkey_parse_p384 of asn1_common.c, there is a possible OOB Read due to a missing null check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29752",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.617",
"lastModified": "2024-04-05T20:15:08.617",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In tmu_set_tr_num_thresholds of tmu.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29753",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.667",
"lastModified": "2024-04-05T20:15:08.667",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In tmu_set_control_temp_step of tmu.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29754",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.717",
"lastModified": "2024-04-05T20:15:08.717",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In TMU_IPC_GET_TABLE, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29755",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.763",
"lastModified": "2024-04-05T20:15:08.763",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In tmu_get_pi of tmu.c, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29756",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.813",
"lastModified": "2024-04-05T20:15:08.813",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In afe_callback of q6afe.c, there is a possible out of bounds write due to a buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29757",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.867",
"lastModified": "2024-04-05T20:15:08.867",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "there is a possible permission bypass due to Debug certs being allowlisted. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29782",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.917",
"lastModified": "2024-04-05T20:15:08.917",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In tmu_get_tr_num_thresholds of tmu.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29783",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-04-05T20:15:08.967",
"lastModified": "2024-04-05T20:15:08.967",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In tmu_get_tr_thresholds, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-30977",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-05T21:15:09.740",
"lastModified": "2024-04-05T21:15:09.740",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue in Secnet Security Network Intelligent AC Management System v.1.02.040 allows a local attacker to escalate privileges via the password component."
}
],
"metrics": {},
"references": [
{
"url": "http://www.secnet.cn/newsdetail/388.html",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/wodi98k/zip_crack/blob/main/SecnetAC.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-3353",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-05T20:15:09.193",
"lastModified": "2024-04-05T20:15:09.193",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Aplaya Beach Resort Online Reservation System 1.0 and classified as critical. This issue affects some unknown processing of the file admin/mod_reports/index.php. The manipulation of the argument categ/end leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259457 was assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/qqqyc/vlun1/blob/main/Aplaya-Beach-Resort-Online-Reservation-System-06",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.259457",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.259457",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.310221",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-3354",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-05T20:15:09.427",
"lastModified": "2024-04-05T20:15:09.427",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Aplaya Beach Resort Online Reservation System 1.0. It has been classified as critical. Affected is an unknown function of the file admin/mod_users/index.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-259458 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/qqqyc/vlun1/blob/main/Aplaya-Beach-Resort-Online-Reservation-System-07",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.259458",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.259458",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.310222",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-3355",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-05T21:15:09.800",
"lastModified": "2024-04-05T21:15:09.800",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Aplaya Beach Resort Online Reservation System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file admin/mod_users/controller.php?action=add. The manipulation of the argument name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259459."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/qqqyc/vlun1/blob/main/Aplaya-Beach-Resort-Online-Reservation-System-09",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.259459",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.259459",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.310224",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-3356",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-05T21:15:10.033",
"lastModified": "2024-04-05T21:15:10.033",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Aplaya Beach Resort Online Reservation System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file admin/mod_settings/controller.php?action=add. The manipulation of the argument type leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259460."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/qqqyc/vlun1/blob/main/Aplaya-Beach-Resort-Online-Reservation-System-10",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.259460",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.259460",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.310225",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-04-05T20:00:38.291477+00:00
2024-04-05T22:00:29.904298+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-04-05T19:15:07.267000+00:00
2024-04-05T21:15:10.033000+00:00
```
### Last Data Feed Release
@ -33,33 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
244217
244257
```
### CVEs added in the last Commit
Recently added CVEs: `14`
Recently added CVEs: `40`
- [CVE-2023-31028](CVE-2023/CVE-2023-310xx/CVE-2023-31028.json) (`2024-04-05T18:15:08.250`)
- [CVE-2024-0072](CVE-2024/CVE-2024-00xx/CVE-2024-0072.json) (`2024-04-05T18:15:08.477`)
- [CVE-2024-0076](CVE-2024/CVE-2024-00xx/CVE-2024-0076.json) (`2024-04-05T18:15:08.680`)
- [CVE-2024-0080](CVE-2024/CVE-2024-00xx/CVE-2024-0080.json) (`2024-04-05T18:15:08.890`)
- [CVE-2024-0081](CVE-2024/CVE-2024-00xx/CVE-2024-0081.json) (`2024-04-05T19:15:07.033`)
- [CVE-2024-22004](CVE-2024/CVE-2024-220xx/CVE-2024-22004.json) (`2024-04-05T18:15:09.100`)
- [CVE-2024-28065](CVE-2024/CVE-2024-280xx/CVE-2024-28065.json) (`2024-04-05T18:15:09.307`)
- [CVE-2024-31848](CVE-2024/CVE-2024-318xx/CVE-2024-31848.json) (`2024-04-05T18:15:09.360`)
- [CVE-2024-31849](CVE-2024/CVE-2024-318xx/CVE-2024-31849.json) (`2024-04-05T18:15:09.563`)
- [CVE-2024-31850](CVE-2024/CVE-2024-318xx/CVE-2024-31850.json) (`2024-04-05T18:15:09.753`)
- [CVE-2024-31851](CVE-2024/CVE-2024-318xx/CVE-2024-31851.json) (`2024-04-05T18:15:09.953`)
- [CVE-2024-3350](CVE-2024/CVE-2024-33xx/CVE-2024-3350.json) (`2024-04-05T18:15:10.143`)
- [CVE-2024-3351](CVE-2024/CVE-2024-33xx/CVE-2024-3351.json) (`2024-04-05T18:15:10.397`)
- [CVE-2024-3352](CVE-2024/CVE-2024-33xx/CVE-2024-3352.json) (`2024-04-05T19:15:07.267`)
- [CVE-2024-29740](CVE-2024/CVE-2024-297xx/CVE-2024-29740.json) (`2024-04-05T20:15:08.010`)
- [CVE-2024-29741](CVE-2024/CVE-2024-297xx/CVE-2024-29741.json) (`2024-04-05T20:15:08.060`)
- [CVE-2024-29742](CVE-2024/CVE-2024-297xx/CVE-2024-29742.json) (`2024-04-05T20:15:08.107`)
- [CVE-2024-29743](CVE-2024/CVE-2024-297xx/CVE-2024-29743.json) (`2024-04-05T20:15:08.153`)
- [CVE-2024-29744](CVE-2024/CVE-2024-297xx/CVE-2024-29744.json) (`2024-04-05T20:15:08.207`)
- [CVE-2024-29745](CVE-2024/CVE-2024-297xx/CVE-2024-29745.json) (`2024-04-05T20:15:08.253`)
- [CVE-2024-29746](CVE-2024/CVE-2024-297xx/CVE-2024-29746.json) (`2024-04-05T20:15:08.303`)
- [CVE-2024-29747](CVE-2024/CVE-2024-297xx/CVE-2024-29747.json) (`2024-04-05T20:15:08.357`)
- [CVE-2024-29748](CVE-2024/CVE-2024-297xx/CVE-2024-29748.json) (`2024-04-05T20:15:08.407`)
- [CVE-2024-29749](CVE-2024/CVE-2024-297xx/CVE-2024-29749.json) (`2024-04-05T20:15:08.457`)
- [CVE-2024-29750](CVE-2024/CVE-2024-297xx/CVE-2024-29750.json) (`2024-04-05T20:15:08.507`)
- [CVE-2024-29751](CVE-2024/CVE-2024-297xx/CVE-2024-29751.json) (`2024-04-05T20:15:08.560`)
- [CVE-2024-29752](CVE-2024/CVE-2024-297xx/CVE-2024-29752.json) (`2024-04-05T20:15:08.617`)
- [CVE-2024-29753](CVE-2024/CVE-2024-297xx/CVE-2024-29753.json) (`2024-04-05T20:15:08.667`)
- [CVE-2024-29754](CVE-2024/CVE-2024-297xx/CVE-2024-29754.json) (`2024-04-05T20:15:08.717`)
- [CVE-2024-29755](CVE-2024/CVE-2024-297xx/CVE-2024-29755.json) (`2024-04-05T20:15:08.763`)
- [CVE-2024-29756](CVE-2024/CVE-2024-297xx/CVE-2024-29756.json) (`2024-04-05T20:15:08.813`)
- [CVE-2024-29757](CVE-2024/CVE-2024-297xx/CVE-2024-29757.json) (`2024-04-05T20:15:08.867`)
- [CVE-2024-29782](CVE-2024/CVE-2024-297xx/CVE-2024-29782.json) (`2024-04-05T20:15:08.917`)
- [CVE-2024-29783](CVE-2024/CVE-2024-297xx/CVE-2024-29783.json) (`2024-04-05T20:15:08.967`)
- [CVE-2024-30977](CVE-2024/CVE-2024-309xx/CVE-2024-30977.json) (`2024-04-05T21:15:09.740`)
- [CVE-2024-3353](CVE-2024/CVE-2024-33xx/CVE-2024-3353.json) (`2024-04-05T20:15:09.193`)
- [CVE-2024-3354](CVE-2024/CVE-2024-33xx/CVE-2024-3354.json) (`2024-04-05T20:15:09.427`)
- [CVE-2024-3355](CVE-2024/CVE-2024-33xx/CVE-2024-3355.json) (`2024-04-05T21:15:09.800`)
- [CVE-2024-3356](CVE-2024/CVE-2024-33xx/CVE-2024-3356.json) (`2024-04-05T21:15:10.033`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `1`
- [CVE-2024-2280](CVE-2024/CVE-2024-22xx/CVE-2024-2280.json) (`2024-04-05T21:15:09.660`)
## Download and Usage

View File

@ -217890,6 +217890,8 @@ CVE-2023-2549,0,0,de0dc2573c930e18a5fb9048e72d1332322b742e4ff232a0716930e6526bb3
CVE-2023-25490,0,0,f318fbcd46bc4823b18f47bad526c08cd8963624a09977c0786081dd6fcce917,2023-04-28T02:59:52.610000
CVE-2023-25491,0,0,34d6378e3509978d9dd7ef75b3014124153e767629da8cf8612da8174990a547,2023-05-10T02:24:21.523000
CVE-2023-25492,0,0,e00d9ed9f3044ddb0237f43eaefcbac020a94a98b5b77c9d60daae2da2e49ee3,2023-05-10T13:37:50.410000
CVE-2023-25493,1,1,c4fd1dc034641a4a38067465c1fb75997e54375118c025c2521f91dd6621bb12,2024-04-05T21:15:07.607000
CVE-2023-25494,1,1,8bc176759cb6c2b5ce44b58243669e1776f07b0edff15315c6a3514d54dc2c24,2024-04-05T21:15:07.813000
CVE-2023-25495,0,0,19229d319fae03e27301eeb46076cb166d3fe8f0be6fc63a0e7a8f31ef1886b4,2023-05-09T20:36:34.067000
CVE-2023-25496,0,0,70395fddaebcaecd1b78a79188bccd6b86e74f3fc1089ffad612863df4a2c469,2023-05-08T18:09:48.533000
CVE-2023-25499,0,0,954cb0f22c5b9349fe8417f07854c9d7a350d7ba6f1b9564d124da3110ace637,2023-06-30T16:32:37.847000
@ -222170,7 +222172,7 @@ CVE-2023-31024,0,0,4c70d5cc63eef05b3a366d77fb563b368bdfadd04c0926839846a82fcce9a
CVE-2023-31025,0,0,0e4aa85ecd2ee651d4a45d9866dd1f24f182e80d38864542ea7d1cbb97a9ec67,2024-01-18T20:48:14.777000
CVE-2023-31026,0,0,737def1b37587e41a8de0ad813079c7897dff748850e0628f84397ef07142498,2023-11-13T18:43:03.447000
CVE-2023-31027,0,0,8ff82489352cce25dc4352ff2d33db807ef115fc642174d9e503e43f59674260,2023-11-13T19:20:51.220000
CVE-2023-31028,1,1,14ff90a0151c643c9b22d6a8fea347f26699f725f3ca6b92becf432a0fd40f67,2024-04-05T18:15:08.250000
CVE-2023-31028,0,0,14ff90a0151c643c9b22d6a8fea347f26699f725f3ca6b92becf432a0fd40f67,2024-04-05T18:15:08.250000
CVE-2023-31029,0,0,c42ef0bcacfd6c953325b5f2f106d96c7a62f2c02eb1edafc052641664e71d2d,2024-01-18T20:50:53.507000
CVE-2023-3103,0,0,c745e45a6f770ad21bf28632452dade4771e22e741237aa8ba70f21edc608054,2024-03-21T02:48:24.477000
CVE-2023-31030,0,0,87204db072798651d0e1480ef8ba7d4c1b45df9188d565ea7fc9a3b00ced8522,2024-01-18T20:53:22.643000
@ -232242,6 +232244,7 @@ CVE-2023-46046,0,0,4ed80fdf9ffb4927760bdcfcaf30dcb27a70f9913cc6f328c7b035c9b3e9e
CVE-2023-46047,0,0,59b95be05d230cdd6ea344491c9416f73c69382afbbc1f9d5028df8892847cc5,2024-03-27T12:29:30.307000
CVE-2023-46048,0,0,1153d37f616e36af8c6c0f0252a92a5aec2975042fe828246ac8281ae0e85997,2024-03-27T12:29:30.307000
CVE-2023-46049,0,0,1391e07ec280c1eadce601ef51d30475392cab49a2b182b4940fe6688577ac9c,2024-03-27T12:29:30.307000
CVE-2023-4605,1,1,1789b5d6f4b524690d52ef553d019a20e05b53a02e162a1329a11efb85aaa2ad,2024-04-05T21:15:08.003000
CVE-2023-46050,0,0,6ff5ea8f1dc5991c203b0679fc5f46c04b4a3ef6ae70c787c24e6bec0c9c29e6,2024-01-29T09:15:42.640000
CVE-2023-46051,0,0,09157b9d669d02525418ccbaeca2af237e09d871daecbc676d017fbb419d8e01,2024-03-27T12:29:30.307000
CVE-2023-46052,0,0,51d6afb3c65fa13b540cd0271f17ee96c41ae8a74855d913ff35f4c966df34b8,2024-03-27T12:29:30.307000
@ -236960,6 +236963,7 @@ CVE-2023-5908,0,0,65c47ba453ceadbcf64f5715b7c24675de56d7e12038ad7fb9ee73e2511352
CVE-2023-5909,0,0,dc86a44abcc0400ca7a10015f5e4783d571f165fe9e2121385946b9f6a57f86f,2023-12-06T19:54:23.713000
CVE-2023-5910,0,0,2d579f3a695f73992bfc5e5df66eb7ec068ebff6ca72889065ffb985de8211b9,2024-03-21T02:50:27.900000
CVE-2023-5911,0,0,a08c5a2532b3d94976cb97dac13d04ddcffa2796c1f43e33a8e9a1ec70caede1,2024-01-11T19:43:17.143000
CVE-2023-5912,1,1,25e847ae044f5c80f39432926f091be7439b4e1af1514344603354b779bae5d8,2024-04-05T21:15:08.210000
CVE-2023-5913,0,0,9a413048efa725f6de4b42eaa7115b4d40ac8c223b50c26bded4b0dedf2e4eb5,2023-11-16T17:00:33.503000
CVE-2023-5914,0,0,88eb5804a56587080558dade883a2bd1fc83174e7361ced67521be69deb49539,2024-01-24T21:05:40.173000
CVE-2023-5915,0,0,93d527fcf9e982f48ec7668c345c809addcf44766c1b5722e97dbf2692eb4791,2023-12-08T18:24:27.517000
@ -238077,16 +238081,16 @@ CVE-2024-0068,0,0,29054351872f671ffd0afada76da136d48518b88acaefb639ccc6c169ead07
CVE-2024-0069,0,0,fcda9c827a68481a563f617244a09b1d788f56c62c31734c572fbfe1a75ea718,2023-11-28T00:15:07.140000
CVE-2024-0070,0,0,f5edfa828dbd64ca40da0463d8d67355f807a2f6d8ea2e049578dd15434f1821,2023-11-28T00:15:07.183000
CVE-2024-0071,0,0,704d1f6cb18cc47944843911c815f4098469857e3754cd1f411a2eed163344eb,2024-03-28T02:01:13.303000
CVE-2024-0072,1,1,ced01d498a1c155cc128624b03dece7d5d0df8ec9f84c753a8b25dfdcb346a99,2024-04-05T18:15:08.477000
CVE-2024-0072,0,0,ced01d498a1c155cc128624b03dece7d5d0df8ec9f84c753a8b25dfdcb346a99,2024-04-05T18:15:08.477000
CVE-2024-0073,0,0,176f7449424756846db419300a5389c73905a3871ade74f979d054ede4a4abf3,2024-03-28T02:01:13.303000
CVE-2024-0074,0,0,98eb255e160e7fd5beb14045c6567fea8fb46cf3bd51e2fde409175194ef6f56,2024-03-28T02:01:13.303000
CVE-2024-0075,0,0,ca1e6c0fdd67ee0dc69f9ce1fc86a720c8737b83b96e94939769a54c0a489d67,2024-03-28T02:01:13.303000
CVE-2024-0076,1,1,f198baa2c3a5defb59008c4ee9c70b29e941cee00cca054f8dc7225d73ba0c06,2024-04-05T18:15:08.680000
CVE-2024-0076,0,0,f198baa2c3a5defb59008c4ee9c70b29e941cee00cca054f8dc7225d73ba0c06,2024-04-05T18:15:08.680000
CVE-2024-0077,0,0,db4dba4f9462dc63edab63d2d916b645f56aeb1e3e4a4a247dac9899f4510f50,2024-03-28T02:01:13.303000
CVE-2024-0078,0,0,65ef1b62c09f229e677e8506d114a0ad3f4b855306a2baa770a721ed0ba97b17,2024-03-28T02:01:13.303000
CVE-2024-0079,0,0,a48198aa8d1b8e21233ccb1563194a0dce57e3cb1ac8f4c28d49144e25d1a534,2024-03-28T02:01:13.303000
CVE-2024-0080,1,1,14676a90fe9c3c46fc6e8f25fa883940c938ed9943e229fef559ca749a74acbf,2024-04-05T18:15:08.890000
CVE-2024-0081,1,1,f9dda3f39d21dce4ed138e5eaf31e5ba8c521c35969b9a97b88cde6e50b3f747,2024-04-05T19:15:07.033000
CVE-2024-0080,0,0,14676a90fe9c3c46fc6e8f25fa883940c938ed9943e229fef559ca749a74acbf,2024-04-05T18:15:08.890000
CVE-2024-0081,0,0,f9dda3f39d21dce4ed138e5eaf31e5ba8c521c35969b9a97b88cde6e50b3f747,2024-04-05T19:15:07.033000
CVE-2024-0154,0,0,fee6d0edd38400fe9a2f331d67a355be9bc81701717352554939ef10dafbbf73,2024-03-13T18:15:58.530000
CVE-2024-0155,0,0,56d3003aea28bbff1e776f33de697fc847d720d7a8270931f6c22f264f5611eb,2024-03-04T13:58:23.447000
CVE-2024-0156,0,0,47a5ee4f12284e0f109441891942aa0eb589b2387e172b6366b6741bcabc51b4,2024-03-04T13:58:23.447000
@ -240259,7 +240263,7 @@ CVE-2024-21983,0,0,ded146d4808fc5f83424e373b65cdad37794b676d9611f5162836ce6d86d8
CVE-2024-21984,0,0,c4d05388605f2fb7e341aa0197be1de56d0ddb669904fcfa6f2ad451633ba0ba,2024-02-20T19:51:05.510000
CVE-2024-21985,0,0,853a82d200092c0582c4290723b53256d943e3aa0955024d181a6e0dc05dbcae,2024-02-05T18:32:52.040000
CVE-2024-21987,0,0,a312d19cf1876839a82cf4ab8a29efb39c100512ae446943b26071c9bd69f220,2024-02-16T21:39:50.223000
CVE-2024-22004,1,1,39b50e3d304b75133a881ab201d85a8afd781e191f0cefa753b9dae08496ded0,2024-04-05T18:15:09.100000
CVE-2024-22004,0,0,39b50e3d304b75133a881ab201d85a8afd781e191f0cefa753b9dae08496ded0,2024-04-05T18:15:09.100000
CVE-2024-22005,0,0,313b9bc6d7138eced2900a2388d6d58fcc17e9d91231c0517d2cb0e3e82b9d0d,2024-03-15T20:15:07.527000
CVE-2024-22006,0,0,4c7c420bbb6e62588c7a1f4eb632b3e6efe7a61ff08393b9055a3796f498bb2e,2024-03-15T20:15:07.573000
CVE-2024-22007,0,0,f3721164b170a5b70f98ee09d80eb5a4c23e7d5319c9436b464d0aee9f606b8d,2024-03-12T12:40:13.500000
@ -240651,7 +240655,7 @@ CVE-2024-22779,0,0,eda1283002ca0a5ba4b71e37cd224cf29419640cfe8456a3a65e695acd500
CVE-2024-2278,0,0,207e2f51738b382e656f75c22347fd5450b8d4ce530caf11838743da2ac45b4a,2024-04-01T12:49:00.877000
CVE-2024-22780,0,0,7f3239e2db375f765f90f52543bdbcccb2a20757a7cd068a76d9a55c97657017,2024-04-02T18:12:16.283000
CVE-2024-22795,0,0,74ecb133836626bb2368eab49a74768ea23b2ee0b898200b84b5a979cafed20f,2024-02-15T17:53:54.680000
CVE-2024-2280,0,0,fd486a918bfa181dee3017086f846fc18f635e98f420bd04919fa2b258fed4a3,2024-03-29T12:45:02.937000
CVE-2024-2280,0,1,b064f3feb8722910a4651d8fcd5aa5f1892c8cb4f5e0e1796b328260936ab591,2024-04-05T21:15:09.660000
CVE-2024-2281,0,0,aff3b1a84ac8ae6dd4eed23fef99c5bf8af119f63a34e536936e20de957b3991,2024-03-21T02:52:31.867000
CVE-2024-22817,0,0,eb15e92e9d0667f5c190034654618b8eeeb0dfc84cfb608c765282f0f5a04fcf,2024-01-23T14:23:18.990000
CVE-2024-22818,0,0,cb135bb8e203bf8edbad428e88de582fd5c2ab18516529aab641b2e535a51f86,2024-01-23T14:23:46.073000
@ -240739,6 +240743,7 @@ CVE-2024-23116,0,0,c69470152165ed3c6f07842580a9d276db25fe5e384880b4a7931b780caf1
CVE-2024-23117,0,0,879d7d05d3f28235be6d3551861450f70c4e2f56b92f39afe7f23938cb7730c9,2024-04-02T12:50:42.233000
CVE-2024-23118,0,0,2a710ffc24b98413c0e2df0c0c64682e3878440889d1038072b49d9104f7509a,2024-04-02T12:50:42.233000
CVE-2024-23119,0,0,dc7a02dfe6c2319112aa9c9c7ba24d29c0a54406c32b5bc7828bc06ecc1e505b,2024-04-02T12:50:42.233000
CVE-2024-2312,1,1,c3d1e59adcf036422d8e502f2fa8633e5bdb76072612a435659e8367a1f966b4,2024-04-05T20:15:09.020000
CVE-2024-23120,0,0,1fdd5384a3247451b572eec50acc63b80f4302d338e02a15db81dbcc92866844,2024-03-01T16:15:45.920000
CVE-2024-23121,0,0,ae89a79fcf6c313d61197ac6f338d68b00711a8ed1e7b84e5d9691d517b9b085,2024-03-13T03:15:06.320000
CVE-2024-23122,0,0,53a6a7f808f40f9f8ccc6c9426a05387fb59e2867d6b512f9c97f02c17acdf90,2024-03-13T03:15:06.390000
@ -240964,6 +240969,7 @@ CVE-2024-23550,0,0,233aa541fdda788f0e4e95c8a9a0a8f5d7fa7689dcd559af0cf5e5843a531
CVE-2024-23553,0,0,51ea2d50cc1ff4dbab518de2a29e9ef6a91bd6b91073c23eb1a7f0cb7c8f1090,2024-02-10T00:59:00.423000
CVE-2024-2357,0,0,2af3f167a5f07c033333870e1f5044e9ac66d1548287fd20eff05541e2132cfb,2024-03-23T03:15:12.690000
CVE-2024-23591,0,0,f4c08614f6a162f49ecc99f020c088036b0b565e06b57796e1304b45ae78e59d,2024-02-20T22:15:08.353000
CVE-2024-23592,1,1,39d2d9698b72dd80a10f4895bb9f4034620fd48dadd9d49928de48e02e0737b6,2024-04-05T21:15:08.450000
CVE-2024-23603,0,0,2b536971fe4d260603348583e5e85d59f5debd4cec090f729c87a6dbde3a5ce7,2024-02-14T18:04:45.380000
CVE-2024-23604,0,0,760bd2ccdc3dff1dab3cc8af2bcb4408e0ff89553b2b7d9d0cb5ed9c08f6a616,2024-03-18T12:38:25.490000
CVE-2024-23605,0,0,559f2b18ab2042f99709ab0e3fa4fcace7fdbe41b3b5e10d7fdaf53ba9d4932f,2024-02-26T18:15:07.673000
@ -242749,6 +242755,8 @@ CVE-2024-27228,0,0,ac326317e51dc7851c1f82ec4a32af90f437c21efaddc59cfa9f583daaf12
CVE-2024-27229,0,0,c7e091ed6183d6b89e7927dfbd5d373593399a0d36acccae457f369c6df990d4,2024-03-12T12:40:13.500000
CVE-2024-2723,0,0,908fdbaf6e8c15702fd48248931088912662f0d496e4e3ec99b68fc8fea5b6a5,2024-03-22T15:34:43.663000
CVE-2024-27230,0,0,c7763bc0ef3ba362ff27028ad0a4ee6dc51f834ec1d74bc7b4e735a7089dbf69,2024-03-12T12:40:13.500000
CVE-2024-27231,1,1,bcd79f5ef412a612365a45df392eca28617aedac86808c2ace183801bc127ea3,2024-04-05T20:15:07.787000
CVE-2024-27232,1,1,aa76cd88588a9318ac1d12fd089d24219641f057d7862ca5a3fc10fcca094f74,2024-04-05T20:15:07.847000
CVE-2024-27233,0,0,7b8043ee4b07bedf143f62926829193f3e94b62f5f4f2482d3d5d7a8d5b8b166,2024-03-12T12:40:13.500000
CVE-2024-27234,0,0,4cea6228708eed4dcd9db0ccc5b3a95a294cbf001825e99826ed97307af63bd5,2024-03-12T12:40:13.500000
CVE-2024-27235,0,0,286299f74e536cbf38771d33b6488ac94632f33ebda885a5c2222182d4672636,2024-03-15T20:15:09.253000
@ -242944,7 +242952,12 @@ CVE-2024-27902,0,0,7aa835c5c3cccf2434107e43a6dd21c3ee48d8e6664a62d49734964bcc016
CVE-2024-27905,0,0,3e20ed1ee55859457fccacd02ccfd33b203e184f29107e3c93e267df9f8d58a8,2024-03-21T02:52:20.520000
CVE-2024-27906,0,0,e279155c32f0030358ce7d189e782f3e54d78a6a202b13937f95f2706818bee5,2024-02-29T13:49:29.390000
CVE-2024-27907,0,0,aac379adb09823074865cdaa760b5a9ed07a3326e17caf800106b9008671180a,2024-03-12T12:40:13.500000
CVE-2024-27908,1,1,13430cd25a020cec36a3d9eb7892deebe7c57c18794858e5e30a7b03ed2ef7d0,2024-04-05T21:15:08.653000
CVE-2024-27909,1,1,f71a0faf3349bbee739bf4f7b9d84c61c8b3abd54e5d8aeec12772a14caba6a7,2024-04-05T21:15:08.863000
CVE-2024-2791,0,0,66683d264867ecc734a7367e9e44b59a4386424cad2664c8596d1137b64a85af,2024-04-02T12:50:42.233000
CVE-2024-27910,1,1,e04ba00cb20a75b366e4b285c9340e26c71ffecc887e7a42702c708bf6bd6297,2024-04-05T21:15:09.060000
CVE-2024-27911,1,1,9c6a14a4b572a0262639eb21fea5be2328fef66aaf35340436ffaafe0b166a38,2024-04-05T21:15:09.270000
CVE-2024-27912,1,1,23753376cb9b4f3097e13ae423c40dacdd041301a2343c17f8db85068be6f16a,2024-04-05T21:15:09.470000
CVE-2024-27913,0,0,4ab4f3916b8428dbf6a53f81f4240223329f17f5e9f63a6de1fd6dc690b5ff6a,2024-02-28T14:06:45.783000
CVE-2024-27914,0,0,3ae5902175f2437b477eff7baac5113b2dce4706fa0de04eef5292541a3ddd19,2024-03-18T19:40:00.173000
CVE-2024-27915,0,0,d4924e50464aaf41d040242348770ffaf78a24dc54a27fd2fcc5b39d7ef4bc89,2024-03-06T21:42:48.053000
@ -243028,7 +243041,7 @@ CVE-2024-2805,0,0,fa896267355e8bee60ef45369bdd61a50def95efdfa5e824724b711a08ae74
CVE-2024-28053,0,0,c90f3b62964e2e2422d9b5798f17f1825dc5ae41ec90f71b2b9fe7b9e8ea4a14,2024-03-15T12:53:06.423000
CVE-2024-28054,0,0,b289eaa8f221cef12d20f4d7c4d850be722c706b733d8c81d770795eac46dd81,2024-03-23T03:15:11.510000
CVE-2024-2806,0,0,31a1a52b37b2e720eae0233b1b19dee00c5a6dd1df73e31128b38dde57d091e7,2024-03-26T03:11:41.880000
CVE-2024-28065,1,1,860e1bfe6126cf5c07cb1eddc7c9671f368193a1540ce3473fdd211437faae95,2024-04-05T18:15:09.307000
CVE-2024-28065,0,0,860e1bfe6126cf5c07cb1eddc7c9671f368193a1540ce3473fdd211437faae95,2024-04-05T18:15:09.307000
CVE-2024-28069,0,0,99a57a9955c5ed5463e7c560b95e0a17dfa2789ec3c024f2825003d476d4b80d,2024-03-17T22:38:29.433000
CVE-2024-2807,0,0,47b8a7021ebbb15acc350203dd3081726f7b96c650b8d998414fd135c1027f2f,2024-03-26T03:12:50.837000
CVE-2024-28070,0,0,c8eeec88fa6e3b91036a4eadc63dd921f090ad52309176e7af22a570b911aeac,2024-03-17T22:38:29.433000
@ -243571,6 +243584,26 @@ CVE-2024-2971,0,0,898bc718d43d0c390c6d16657d6a8f74b1bed4195ca2be9f6e03b60807e375
CVE-2024-29732,0,0,f91e9a53bb8c78b9eaa9a43eb2f41d18e7980ac57e838dd405b45ee97833017f,2024-03-21T12:58:51.093000
CVE-2024-29734,0,0,8d99461dc9b8889d99315bde49edbce5536e3a20b88b53095157d8f0afc148b5,2024-04-03T12:38:04.840000
CVE-2024-29735,0,0,286fbba4f7cb1bbd32eae740efb468430068245735dc6c522579c415dcd44e18,2024-03-27T12:29:41.530000
CVE-2024-29738,1,1,53b2d0752f1fa17cbf1102b20c675a747e42a9143c4e8ad54f06907623028bd7,2024-04-05T20:15:07.907000
CVE-2024-29739,1,1,f6f76b014c8e7321becb37fb9261442b276e1502923a529880b197bef6586c39,2024-04-05T20:15:07.960000
CVE-2024-29740,1,1,43488df738e02d492bd5dd531a0145b90b4c70bfe6f3b08cc9198223b59d6549,2024-04-05T20:15:08.010000
CVE-2024-29741,1,1,5287e10912b70bb061f53de5b83b003317f0455c1e6e8382ca56aea272ded637,2024-04-05T20:15:08.060000
CVE-2024-29742,1,1,f2bc3ea7d601e3d2f89366bc3bf789f7dff9d33d7b969d0681ff0702c8c803ee,2024-04-05T20:15:08.107000
CVE-2024-29743,1,1,c449523fdbfed70e93eb5db09bb0072175dcc5ddecf792b0802f1d6b3e48b44c,2024-04-05T20:15:08.153000
CVE-2024-29744,1,1,648f768a13bd9fd094226fb33743af4a7accff23b8393394010a398a2bf9faf7,2024-04-05T20:15:08.207000
CVE-2024-29745,1,1,e092cc506e47b323e83d6e1a0c73e84be04120dd76e1bfdd92d89427a91e8853,2024-04-05T20:15:08.253000
CVE-2024-29746,1,1,f387564f14fa535ea564257d7225ec27fec8b4e39ff6f86e757de7acb23d8e1e,2024-04-05T20:15:08.303000
CVE-2024-29747,1,1,0548417396958cc0ffb5d57a429a647040bc882fc6a141dfeabf96110c8e560c,2024-04-05T20:15:08.357000
CVE-2024-29748,1,1,03916cd98e44232b3742e5725eea00e4711368caf808cb591f5073c1c8562982,2024-04-05T20:15:08.407000
CVE-2024-29749,1,1,013121f5f2cf9fc7d35fb3733cc7a973426593dc74f4252d96fe96b1177b73b1,2024-04-05T20:15:08.457000
CVE-2024-29750,1,1,1d1c2c89d3a1e4369128e0b96b6eea44ed888a0866ddcc895f3f878c4d78c9f8,2024-04-05T20:15:08.507000
CVE-2024-29751,1,1,8771fda4f10da37042d80e537d9a6c45d11e384af07f52c7e0558da9a6e89d31,2024-04-05T20:15:08.560000
CVE-2024-29752,1,1,9bb1264a7f3abf8bc8cc11bcb3b404de453811c8f47b2b67485281322418de83,2024-04-05T20:15:08.617000
CVE-2024-29753,1,1,69b25c72eb47bc58949e79282078836bd7c63f9ca03173a7b1f25c6b375f736c,2024-04-05T20:15:08.667000
CVE-2024-29754,1,1,3330597cda792c70bad3d77acc0df99aee3e4b80d762a0d8f00a0d1b5e10416a,2024-04-05T20:15:08.717000
CVE-2024-29755,1,1,0542351e0061a50a9107f36e57184a81dd6bfb9e97ee77479c1db76ff1889e27,2024-04-05T20:15:08.763000
CVE-2024-29756,1,1,749dbbd462fe1fa47d77fe81e60dfe24216329f4c2124a953263acc2be642c5a,2024-04-05T20:15:08.813000
CVE-2024-29757,1,1,79e005a457e349ef64aef88e4f323dfd1e7a2f73de6f21d9146bee268e7344f5,2024-04-05T20:15:08.867000
CVE-2024-29758,0,0,2cc069bb64959189ea2de8b6128cab94be340a0f3b77c16c655ed6409fd474e5,2024-03-27T15:49:41.437000
CVE-2024-29759,0,0,a2cea2831b83d81a81fe40f33f0e6624fd1f01962aee666a65cf0c1c54a01596,2024-03-27T15:49:41.437000
CVE-2024-2976,0,0,2123cf6aff7575dd905f7ca455eb68cec1429cb1b518d5a38771dfe467e09b89,2024-03-27T15:49:41.437000
@ -243594,6 +243627,8 @@ CVE-2024-29775,0,0,4a09499ff17702a2e8ef2c1074beadb2ac9279eca85d85bf4c2322207b72a
CVE-2024-29776,0,0,67fe7261841358aada487500133b48b2c1e7affe235fb97f4d75fa453ac843e5,2024-03-27T15:49:41.437000
CVE-2024-29777,0,0,54aa494ecd6d70eaf7fdbabe1fe6006b3d5e55e70d9a8bd4bbd26e15abfe4f5c,2024-03-27T15:49:41.437000
CVE-2024-2978,0,0,239b3780201c9c06871f182d1cc7d09e3b7ac32e86ff81be518391e2ac3ab780,2024-03-27T15:49:41.437000
CVE-2024-29782,1,1,4757795794599219f11e3b9dcfc93727859ed3d7673ea6da97cfa8b2927cc3f3,2024-04-05T20:15:08.917000
CVE-2024-29783,1,1,a47c72a77347622456de3323d44cf2da097a0e63e2d91fffe6bcde5cf5e0a324,2024-04-05T20:15:08.967000
CVE-2024-29788,0,0,8cc2af0c2b669256f5779a8a4a350af2b3525bc2e92357d3051a10e492c80e6c,2024-03-27T15:49:41.437000
CVE-2024-29789,0,0,28405d77cf9c690089caf44c730ea92c38ee335fb6ea974e0cc4c214ee7b123f,2024-03-27T15:49:41.437000
CVE-2024-2979,0,0,715f71b18713bceae85abac6b9387266910c959da8c84fe20b231ced845adef9,2024-03-27T15:49:41.437000
@ -244052,6 +244087,7 @@ CVE-2024-3091,0,0,4af5b5d1eaeb5dcee2b11f765f7e4e07712d76dbe9222ddb5cfc716c8e60d0
CVE-2024-3094,0,0,502febf68b0d02803300ecc80fd5edf81a987966a53e4a71d6dd7ef4cc670f65,2024-04-03T06:15:07.873000
CVE-2024-30946,0,0,0dff329aaece035fc82f00595012379643bd5a0edb89ee3a7369d6609e13a4d1,2024-04-02T18:12:16.283000
CVE-2024-30965,0,0,0e44dd5d951a25ac3e8873a32678a3145da47d1060cb5312576a9c0471b643ad,2024-04-02T18:12:16.283000
CVE-2024-30977,1,1,b1949f04d8948d41c2cd9e7b71c53660f199c163260b0aa366f3eb12f779344b,2024-04-05T21:15:09.740000
CVE-2024-30998,0,0,179abd0db8095df44a7d1fc224d4f504797395ef6ca242b590dce2e234dbd0de,2024-04-03T12:38:04.840000
CVE-2024-31002,0,0,96e076f675a43d72347dc0c980a987d7f8bd37cac2f635917b77c618d7fb5159,2024-04-02T12:50:42.233000
CVE-2024-31003,0,0,3f0adfc7393f75768ba5f0ff119d336a00244f196f86b1dcc7f91a86901fc5be,2024-04-02T12:50:42.233000
@ -244163,10 +244199,10 @@ CVE-2024-3178,0,0,e1b2edc538f836ffb506a17d476e0f961db2588242ddd1b2358ad3487cd818
CVE-2024-3179,0,0,5abb24f6a5051585dee8d043e9230e5c2a9202caf7e3c5044373b856d11a8a98,2024-04-04T12:48:41.700000
CVE-2024-3180,0,0,9228ee57f9267d6ec4565f77da6e32f8aedba868cc578e14d8f50b94e65bca34,2024-04-04T12:48:41.700000
CVE-2024-3181,0,0,19462f0bae052150ee3deea6a2833d73153169ade51a21a9a0ee903c88e94c7c,2024-04-04T12:48:41.700000
CVE-2024-31848,1,1,6965f04cc86efd819ec97fa65a940af868313d4b9414d4c137bc5206ad729602,2024-04-05T18:15:09.360000
CVE-2024-31849,1,1,ba19687c183971580d9b8978873bbf6d8219ba5de3f65dc5058b582de0f38692,2024-04-05T18:15:09.563000
CVE-2024-31850,1,1,4982070fceb832e31d5e30fb03a84954ccaa75a897ce5879a6b4f81a150e310c,2024-04-05T18:15:09.753000
CVE-2024-31851,1,1,ab4658af068ad1058f367d60d6c046977f3ab3864a10d3fc49f99432a80d6938,2024-04-05T18:15:09.953000
CVE-2024-31848,0,0,6965f04cc86efd819ec97fa65a940af868313d4b9414d4c137bc5206ad729602,2024-04-05T18:15:09.360000
CVE-2024-31849,0,0,ba19687c183971580d9b8978873bbf6d8219ba5de3f65dc5058b582de0f38692,2024-04-05T18:15:09.563000
CVE-2024-31850,0,0,4982070fceb832e31d5e30fb03a84954ccaa75a897ce5879a6b4f81a150e310c,2024-04-05T18:15:09.753000
CVE-2024-31851,0,0,ab4658af068ad1058f367d60d6c046977f3ab3864a10d3fc49f99432a80d6938,2024-04-05T18:15:09.953000
CVE-2024-31852,0,0,0ee0023d5b34c1dac5fa2039f744500c40b254d8784a31e411708a273dd8e7b9,2024-04-05T15:15:08.270000
CVE-2024-3202,0,0,c740eb561a7c1440cb5a8dd5eb2f94f0cce226529c05056c2f841e5a9fe9ca73,2024-04-03T12:38:04.840000
CVE-2024-3203,0,0,697bde31fba6d3c5a0e2d11da403a2e3b16828faac086b66cd78b0527d17b9c5,2024-04-03T12:38:04.840000
@ -244213,6 +244249,10 @@ CVE-2024-3346,0,0,e733bb268a198adf409c7154c320339626faf14f0ab7cbb2e1a6fe41aa30dc
CVE-2024-3347,0,0,3f3371ab8a7023688ea09ce35cacd066084e70ff611e61e0e93ccb906eb0776b,2024-04-05T16:15:08.203000
CVE-2024-3348,0,0,ee0797eecf851d4736420692f400d34e1db5fa62c0fc42b1cf997f4ff1c45678,2024-04-05T17:15:07.743000
CVE-2024-3349,0,0,9c956c66a349da9acf3b4b885f45dc030fdb4622c5431408cddee04d792878f4,2024-04-05T17:15:07.983000
CVE-2024-3350,1,1,1245c18fa2606c835df9e5f7ef90bf8cbb70eb388db2793142ebd787d4487c95,2024-04-05T18:15:10.143000
CVE-2024-3351,1,1,546bddb83a148a28dca9db8b4add8343ebd293928450a664cd061216a5e23106,2024-04-05T18:15:10.397000
CVE-2024-3352,1,1,4dd7c36b0d461d1a96127863060425c62796418ace25937f0dc89f3f629c483d,2024-04-05T19:15:07.267000
CVE-2024-3350,0,0,1245c18fa2606c835df9e5f7ef90bf8cbb70eb388db2793142ebd787d4487c95,2024-04-05T18:15:10.143000
CVE-2024-3351,0,0,546bddb83a148a28dca9db8b4add8343ebd293928450a664cd061216a5e23106,2024-04-05T18:15:10.397000
CVE-2024-3352,0,0,4dd7c36b0d461d1a96127863060425c62796418ace25937f0dc89f3f629c483d,2024-04-05T19:15:07.267000
CVE-2024-3353,1,1,5a3b6b4aec1f9e7a8bfd3fbf5eaa7f7ebebf90d58ded80d30cc316fd35f8b004,2024-04-05T20:15:09.193000
CVE-2024-3354,1,1,d035bebbbe4ba20bd3a170fae23b0047b357c9ccbebf4d91c0e7d2d35e44b1f2,2024-04-05T20:15:09.427000
CVE-2024-3355,1,1,ca68600fd0628cb5ae79a1a70be90a2c45f3bd0e143e4bf60e7a607aceefa438,2024-04-05T21:15:09.800000
CVE-2024-3356,1,1,ba2a4323d3ef545405bc3e57d4d8fd5b2db7ed6b3db10c68e5aaa772d5c08f2c,2024-04-05T21:15:10.033000

Can't render this file because it is too large.