mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-04-05T22:00:29.904298+00:00
This commit is contained in:
parent
95ce186fe7
commit
43e0c2e520
55
CVE-2023/CVE-2023-254xx/CVE-2023-25493.json
Normal file
55
CVE-2023/CVE-2023-254xx/CVE-2023-25493.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-25493",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2024-04-05T21:15:07.607",
|
||||
"lastModified": "2024-04-05T21:15:07.607",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nA potential vulnerability was reported in the BIOS update tool driver for some Desktop, Smart Edge, Smart Office, and ThinkStation products that could allow a local user with elevated privileges to execute arbitrary code. \n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.lenovo.com/us/en/product_security/LEN-141775",
|
||||
"source": "psirt@lenovo.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-254xx/CVE-2023-25494.json
Normal file
55
CVE-2023/CVE-2023-254xx/CVE-2023-25494.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-25494",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2024-04-05T21:15:07.813",
|
||||
"lastModified": "2024-04-05T21:15:07.813",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nA potential vulnerability were reported in the BIOS of some Desktop, Smart Edge, and ThinkStation products that could allow a local attacker with elevated privileges to write to NVRAM variables. \n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.lenovo.com/us/en/product_security/LEN-141775",
|
||||
"source": "psirt@lenovo.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-46xx/CVE-2023-4605.json
Normal file
55
CVE-2023/CVE-2023-46xx/CVE-2023-4605.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-4605",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2024-04-05T21:15:08.003",
|
||||
"lastModified": "2024-04-05T21:15:08.003",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nA valid authenticated Lenovo XClarity Administrator (LXCA) user can potentially leverage an unauthenticated API endpoint to retrieve system event information.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-497"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.lenovo.com/us/en/product_security/LEN-136592",
|
||||
"source": "psirt@lenovo.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-59xx/CVE-2023-5912.json
Normal file
55
CVE-2023/CVE-2023-59xx/CVE-2023-5912.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-5912",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2024-04-05T21:15:08.210",
|
||||
"lastModified": "2024-04-05T21:15:08.210",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nA potential memory leakage vulnerability was reported in some Lenovo Notebook products that may allow a local attacker with elevated privileges to write to NVRAM variables. \n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.lenovo.com/us/en/product_security/LEN-155477",
|
||||
"source": "psirt@lenovo.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-2280",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-29T07:15:44.543",
|
||||
"lastModified": "2024-03-29T12:45:02.937",
|
||||
"lastModified": "2024-04-05T21:15:09.660",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3060565%40better-elementor-addons&new=3060565%40better-elementor-addons&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/better-elementor-addons/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
|
55
CVE-2024/CVE-2024-235xx/CVE-2024-23592.json
Normal file
55
CVE-2024/CVE-2024-235xx/CVE-2024-23592.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-23592",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2024-04-05T21:15:08.450",
|
||||
"lastModified": "2024-04-05T21:15:08.450",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An authentication bypass vulnerability was reported in Lenovo devices with Synaptics fingerprint readers that could allow an attacker with physical access to replay fingerprints and bypass Windows Hello authentication."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.4,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-358"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.lenovo.com/us/en/product_security/LEN-155804",
|
||||
"source": "psirt@lenovo.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-23xx/CVE-2024-2312.json
Normal file
47
CVE-2024/CVE-2024-23xx/CVE-2024-2312.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-2312",
|
||||
"sourceIdentifier": "security@ubuntu.com",
|
||||
"published": "2024-04-05T20:15:09.020",
|
||||
"lastModified": "2024-04-05T20:15:09.020",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "GRUB2 does not call the module fini functions on exit, leading to Debian/Ubuntu's peimage GRUB2 module leaving UEFI system table hooks after exit. This lead to a use-after-free condition, and could possibly lead to secure boot bypass."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@ubuntu.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugs.launchpad.net/ubuntu/+source/grub2-unsigned/+bug/2054127",
|
||||
"source": "security@ubuntu.com"
|
||||
},
|
||||
{
|
||||
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2312",
|
||||
"source": "security@ubuntu.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-272xx/CVE-2024-27231.json
Normal file
20
CVE-2024/CVE-2024-272xx/CVE-2024-27231.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-27231",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-04-05T20:15:07.787",
|
||||
"lastModified": "2024-04-05T20:15:07.787",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In tmu_get_tr_stats of tmu.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
|
||||
"source": "dsap-vuln-management@google.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-272xx/CVE-2024-27232.json
Normal file
20
CVE-2024/CVE-2024-272xx/CVE-2024-27232.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-27232",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-04-05T20:15:07.847",
|
||||
"lastModified": "2024-04-05T20:15:07.847",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In asn1_ec_pkey_parse of asn1_common.c, there is a possible OOB read due to a missing null check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
|
||||
"source": "dsap-vuln-management@google.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-279xx/CVE-2024-27908.json
Normal file
55
CVE-2024/CVE-2024-279xx/CVE-2024-27908.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-27908",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2024-04-05T21:15:08.653",
|
||||
"lastModified": "2024-04-05T21:15:08.653",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow vulnerability was reported in the HTTPS service of some Lenovo Printers that could result in denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://iknow.lenovo.com.cn/detail/420425",
|
||||
"source": "psirt@lenovo.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-279xx/CVE-2024-27909.json
Normal file
55
CVE-2024/CVE-2024-279xx/CVE-2024-27909.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-27909",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2024-04-05T21:15:08.863",
|
||||
"lastModified": "2024-04-05T21:15:08.863",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A denial of service vulnerability was reported in the HTTPS service of some Lenovo Printers that could result in a system reboot."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://iknow.lenovo.com.cn/detail/420425",
|
||||
"source": "psirt@lenovo.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-279xx/CVE-2024-27910.json
Normal file
55
CVE-2024/CVE-2024-279xx/CVE-2024-27910.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-27910",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2024-04-05T21:15:09.060",
|
||||
"lastModified": "2024-04-05T21:15:09.060",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was reported in some Lenovo Printers that could allow an unauthenticated attacker to reboot the printer without authentication."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://iknow.lenovo.com.cn/detail/420425",
|
||||
"source": "psirt@lenovo.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-279xx/CVE-2024-27911.json
Normal file
55
CVE-2024/CVE-2024-279xx/CVE-2024-27911.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-27911",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2024-04-05T21:15:09.270",
|
||||
"lastModified": "2024-04-05T21:15:09.270",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was reported in some Lenovo Printers that could allow an unauthenticated attacker to obtain the administrator password."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://iknow.lenovo.com.cn/detail/420425",
|
||||
"source": "psirt@lenovo.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-279xx/CVE-2024-27912.json
Normal file
55
CVE-2024/CVE-2024-279xx/CVE-2024-27912.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-27912",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2024-04-05T21:15:09.470",
|
||||
"lastModified": "2024-04-05T21:15:09.470",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A denial of service vulnerability was reported in some Lenovo Printers that could allow an attacker to cause the device to crash by sending crafted LPD packets."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://iknow.lenovo.com.cn/detail/420425",
|
||||
"source": "psirt@lenovo.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-297xx/CVE-2024-29738.json
Normal file
20
CVE-2024/CVE-2024-297xx/CVE-2024-29738.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-29738",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-04-05T20:15:07.907",
|
||||
"lastModified": "2024-04-05T20:15:07.907",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In gov_init, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
|
||||
"source": "dsap-vuln-management@google.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-297xx/CVE-2024-29739.json
Normal file
20
CVE-2024/CVE-2024-297xx/CVE-2024-29739.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-29739",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-04-05T20:15:07.960",
|
||||
"lastModified": "2024-04-05T20:15:07.960",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In tmu_get_temp_lut of tmu.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
|
||||
"source": "dsap-vuln-management@google.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-297xx/CVE-2024-29740.json
Normal file
20
CVE-2024/CVE-2024-297xx/CVE-2024-29740.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-29740",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-04-05T20:15:08.010",
|
||||
"lastModified": "2024-04-05T20:15:08.010",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In tmu_set_table of tmu.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
|
||||
"source": "dsap-vuln-management@google.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-297xx/CVE-2024-29741.json
Normal file
20
CVE-2024/CVE-2024-297xx/CVE-2024-29741.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-29741",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-04-05T20:15:08.060",
|
||||
"lastModified": "2024-04-05T20:15:08.060",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In pblS2mpuResume of s2mpu.c, there is a possible mitigation bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
|
||||
"source": "dsap-vuln-management@google.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-297xx/CVE-2024-29742.json
Normal file
20
CVE-2024/CVE-2024-297xx/CVE-2024-29742.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-29742",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-04-05T20:15:08.107",
|
||||
"lastModified": "2024-04-05T20:15:08.107",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In apply_minlock_constraint of dvfs.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
|
||||
"source": "dsap-vuln-management@google.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-297xx/CVE-2024-29743.json
Normal file
20
CVE-2024/CVE-2024-297xx/CVE-2024-29743.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-29743",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-04-05T20:15:08.153",
|
||||
"lastModified": "2024-04-05T20:15:08.153",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In tmu_set_temp_lut of tmu.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
|
||||
"source": "dsap-vuln-management@google.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-297xx/CVE-2024-29744.json
Normal file
20
CVE-2024/CVE-2024-297xx/CVE-2024-29744.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-29744",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-04-05T20:15:08.207",
|
||||
"lastModified": "2024-04-05T20:15:08.207",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In tmu_get_gov_time_windows, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
|
||||
"source": "dsap-vuln-management@google.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-297xx/CVE-2024-29745.json
Normal file
20
CVE-2024/CVE-2024-297xx/CVE-2024-29745.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-29745",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-04-05T20:15:08.253",
|
||||
"lastModified": "2024-04-05T20:15:08.253",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "there is a possible Information Disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
|
||||
"source": "dsap-vuln-management@google.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-297xx/CVE-2024-29746.json
Normal file
20
CVE-2024/CVE-2024-297xx/CVE-2024-29746.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-29746",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-04-05T20:15:08.303",
|
||||
"lastModified": "2024-04-05T20:15:08.303",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In lpm_req_handler of lpm.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
|
||||
"source": "dsap-vuln-management@google.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-297xx/CVE-2024-29747.json
Normal file
20
CVE-2024/CVE-2024-297xx/CVE-2024-29747.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-29747",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-04-05T20:15:08.357",
|
||||
"lastModified": "2024-04-05T20:15:08.357",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In _dvfs_get_lv of dvfs.c, there is a possible out of bounds read due to a missing null check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
|
||||
"source": "dsap-vuln-management@google.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-297xx/CVE-2024-29748.json
Normal file
20
CVE-2024/CVE-2024-297xx/CVE-2024-29748.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-29748",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-04-05T20:15:08.407",
|
||||
"lastModified": "2024-04-05T20:15:08.407",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "there is a possible way to bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
|
||||
"source": "dsap-vuln-management@google.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-297xx/CVE-2024-29749.json
Normal file
20
CVE-2024/CVE-2024-297xx/CVE-2024-29749.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-29749",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-04-05T20:15:08.457",
|
||||
"lastModified": "2024-04-05T20:15:08.457",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In tmu_set_tr_thresholds of tmu.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
|
||||
"source": "dsap-vuln-management@google.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-297xx/CVE-2024-29750.json
Normal file
20
CVE-2024/CVE-2024-297xx/CVE-2024-29750.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-29750",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-04-05T20:15:08.507",
|
||||
"lastModified": "2024-04-05T20:15:08.507",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In km_exp_did_inner of kmv.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
|
||||
"source": "dsap-vuln-management@google.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-297xx/CVE-2024-29751.json
Normal file
20
CVE-2024/CVE-2024-297xx/CVE-2024-29751.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-29751",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-04-05T20:15:08.560",
|
||||
"lastModified": "2024-04-05T20:15:08.560",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In asn1_ec_pkey_parse_p384 of asn1_common.c, there is a possible OOB Read due to a missing null check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
|
||||
"source": "dsap-vuln-management@google.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-297xx/CVE-2024-29752.json
Normal file
20
CVE-2024/CVE-2024-297xx/CVE-2024-29752.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-29752",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-04-05T20:15:08.617",
|
||||
"lastModified": "2024-04-05T20:15:08.617",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In tmu_set_tr_num_thresholds of tmu.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
|
||||
"source": "dsap-vuln-management@google.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-297xx/CVE-2024-29753.json
Normal file
20
CVE-2024/CVE-2024-297xx/CVE-2024-29753.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-29753",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-04-05T20:15:08.667",
|
||||
"lastModified": "2024-04-05T20:15:08.667",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In tmu_set_control_temp_step of tmu.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
|
||||
"source": "dsap-vuln-management@google.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-297xx/CVE-2024-29754.json
Normal file
20
CVE-2024/CVE-2024-297xx/CVE-2024-29754.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-29754",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-04-05T20:15:08.717",
|
||||
"lastModified": "2024-04-05T20:15:08.717",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In TMU_IPC_GET_TABLE, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
|
||||
"source": "dsap-vuln-management@google.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-297xx/CVE-2024-29755.json
Normal file
20
CVE-2024/CVE-2024-297xx/CVE-2024-29755.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-29755",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-04-05T20:15:08.763",
|
||||
"lastModified": "2024-04-05T20:15:08.763",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In tmu_get_pi of tmu.c, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
|
||||
"source": "dsap-vuln-management@google.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-297xx/CVE-2024-29756.json
Normal file
20
CVE-2024/CVE-2024-297xx/CVE-2024-29756.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-29756",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-04-05T20:15:08.813",
|
||||
"lastModified": "2024-04-05T20:15:08.813",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In afe_callback of q6afe.c, there is a possible out of bounds write due to a buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
|
||||
"source": "dsap-vuln-management@google.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-297xx/CVE-2024-29757.json
Normal file
20
CVE-2024/CVE-2024-297xx/CVE-2024-29757.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-29757",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-04-05T20:15:08.867",
|
||||
"lastModified": "2024-04-05T20:15:08.867",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "there is a possible permission bypass due to Debug certs being allowlisted. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
|
||||
"source": "dsap-vuln-management@google.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-297xx/CVE-2024-29782.json
Normal file
20
CVE-2024/CVE-2024-297xx/CVE-2024-29782.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-29782",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-04-05T20:15:08.917",
|
||||
"lastModified": "2024-04-05T20:15:08.917",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In tmu_get_tr_num_thresholds of tmu.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
|
||||
"source": "dsap-vuln-management@google.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-297xx/CVE-2024-29783.json
Normal file
20
CVE-2024/CVE-2024-297xx/CVE-2024-29783.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-29783",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-04-05T20:15:08.967",
|
||||
"lastModified": "2024-04-05T20:15:08.967",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In tmu_get_tr_thresholds, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-04-01",
|
||||
"source": "dsap-vuln-management@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-309xx/CVE-2024-30977.json
Normal file
24
CVE-2024/CVE-2024-309xx/CVE-2024-30977.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-30977",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-05T21:15:09.740",
|
||||
"lastModified": "2024-04-05T21:15:09.740",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Secnet Security Network Intelligent AC Management System v.1.02.040 allows a local attacker to escalate privileges via the password component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.secnet.cn/newsdetail/388.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/wodi98k/zip_crack/blob/main/SecnetAC.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-33xx/CVE-2024-3353.json
Normal file
92
CVE-2024/CVE-2024-33xx/CVE-2024-3353.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-3353",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-05T20:15:09.193",
|
||||
"lastModified": "2024-04-05T20:15:09.193",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Aplaya Beach Resort Online Reservation System 1.0 and classified as critical. This issue affects some unknown processing of the file admin/mod_reports/index.php. The manipulation of the argument categ/end leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259457 was assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 7.5
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/qqqyc/vlun1/blob/main/Aplaya-Beach-Resort-Online-Reservation-System-06",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259457",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259457",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.310221",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-33xx/CVE-2024-3354.json
Normal file
92
CVE-2024/CVE-2024-33xx/CVE-2024-3354.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-3354",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-05T20:15:09.427",
|
||||
"lastModified": "2024-04-05T20:15:09.427",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Aplaya Beach Resort Online Reservation System 1.0. It has been classified as critical. Affected is an unknown function of the file admin/mod_users/index.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-259458 is the identifier assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 7.5
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/qqqyc/vlun1/blob/main/Aplaya-Beach-Resort-Online-Reservation-System-07",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259458",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259458",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.310222",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-33xx/CVE-2024-3355.json
Normal file
92
CVE-2024/CVE-2024-33xx/CVE-2024-3355.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-3355",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-05T21:15:09.800",
|
||||
"lastModified": "2024-04-05T21:15:09.800",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Aplaya Beach Resort Online Reservation System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file admin/mod_users/controller.php?action=add. The manipulation of the argument name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259459."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 7.5
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/qqqyc/vlun1/blob/main/Aplaya-Beach-Resort-Online-Reservation-System-09",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259459",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259459",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.310224",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-33xx/CVE-2024-3356.json
Normal file
92
CVE-2024/CVE-2024-33xx/CVE-2024-3356.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-3356",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-05T21:15:10.033",
|
||||
"lastModified": "2024-04-05T21:15:10.033",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Aplaya Beach Resort Online Reservation System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file admin/mod_settings/controller.php?action=add. The manipulation of the argument type leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259460."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 7.5
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/qqqyc/vlun1/blob/main/Aplaya-Beach-Resort-Online-Reservation-System-10",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259460",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259460",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.310225",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
50
README.md
50
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-04-05T20:00:38.291477+00:00
|
||||
2024-04-05T22:00:29.904298+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-04-05T19:15:07.267000+00:00
|
||||
2024-04-05T21:15:10.033000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,33 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
244217
|
||||
244257
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `14`
|
||||
Recently added CVEs: `40`
|
||||
|
||||
- [CVE-2023-31028](CVE-2023/CVE-2023-310xx/CVE-2023-31028.json) (`2024-04-05T18:15:08.250`)
|
||||
- [CVE-2024-0072](CVE-2024/CVE-2024-00xx/CVE-2024-0072.json) (`2024-04-05T18:15:08.477`)
|
||||
- [CVE-2024-0076](CVE-2024/CVE-2024-00xx/CVE-2024-0076.json) (`2024-04-05T18:15:08.680`)
|
||||
- [CVE-2024-0080](CVE-2024/CVE-2024-00xx/CVE-2024-0080.json) (`2024-04-05T18:15:08.890`)
|
||||
- [CVE-2024-0081](CVE-2024/CVE-2024-00xx/CVE-2024-0081.json) (`2024-04-05T19:15:07.033`)
|
||||
- [CVE-2024-22004](CVE-2024/CVE-2024-220xx/CVE-2024-22004.json) (`2024-04-05T18:15:09.100`)
|
||||
- [CVE-2024-28065](CVE-2024/CVE-2024-280xx/CVE-2024-28065.json) (`2024-04-05T18:15:09.307`)
|
||||
- [CVE-2024-31848](CVE-2024/CVE-2024-318xx/CVE-2024-31848.json) (`2024-04-05T18:15:09.360`)
|
||||
- [CVE-2024-31849](CVE-2024/CVE-2024-318xx/CVE-2024-31849.json) (`2024-04-05T18:15:09.563`)
|
||||
- [CVE-2024-31850](CVE-2024/CVE-2024-318xx/CVE-2024-31850.json) (`2024-04-05T18:15:09.753`)
|
||||
- [CVE-2024-31851](CVE-2024/CVE-2024-318xx/CVE-2024-31851.json) (`2024-04-05T18:15:09.953`)
|
||||
- [CVE-2024-3350](CVE-2024/CVE-2024-33xx/CVE-2024-3350.json) (`2024-04-05T18:15:10.143`)
|
||||
- [CVE-2024-3351](CVE-2024/CVE-2024-33xx/CVE-2024-3351.json) (`2024-04-05T18:15:10.397`)
|
||||
- [CVE-2024-3352](CVE-2024/CVE-2024-33xx/CVE-2024-3352.json) (`2024-04-05T19:15:07.267`)
|
||||
- [CVE-2024-29740](CVE-2024/CVE-2024-297xx/CVE-2024-29740.json) (`2024-04-05T20:15:08.010`)
|
||||
- [CVE-2024-29741](CVE-2024/CVE-2024-297xx/CVE-2024-29741.json) (`2024-04-05T20:15:08.060`)
|
||||
- [CVE-2024-29742](CVE-2024/CVE-2024-297xx/CVE-2024-29742.json) (`2024-04-05T20:15:08.107`)
|
||||
- [CVE-2024-29743](CVE-2024/CVE-2024-297xx/CVE-2024-29743.json) (`2024-04-05T20:15:08.153`)
|
||||
- [CVE-2024-29744](CVE-2024/CVE-2024-297xx/CVE-2024-29744.json) (`2024-04-05T20:15:08.207`)
|
||||
- [CVE-2024-29745](CVE-2024/CVE-2024-297xx/CVE-2024-29745.json) (`2024-04-05T20:15:08.253`)
|
||||
- [CVE-2024-29746](CVE-2024/CVE-2024-297xx/CVE-2024-29746.json) (`2024-04-05T20:15:08.303`)
|
||||
- [CVE-2024-29747](CVE-2024/CVE-2024-297xx/CVE-2024-29747.json) (`2024-04-05T20:15:08.357`)
|
||||
- [CVE-2024-29748](CVE-2024/CVE-2024-297xx/CVE-2024-29748.json) (`2024-04-05T20:15:08.407`)
|
||||
- [CVE-2024-29749](CVE-2024/CVE-2024-297xx/CVE-2024-29749.json) (`2024-04-05T20:15:08.457`)
|
||||
- [CVE-2024-29750](CVE-2024/CVE-2024-297xx/CVE-2024-29750.json) (`2024-04-05T20:15:08.507`)
|
||||
- [CVE-2024-29751](CVE-2024/CVE-2024-297xx/CVE-2024-29751.json) (`2024-04-05T20:15:08.560`)
|
||||
- [CVE-2024-29752](CVE-2024/CVE-2024-297xx/CVE-2024-29752.json) (`2024-04-05T20:15:08.617`)
|
||||
- [CVE-2024-29753](CVE-2024/CVE-2024-297xx/CVE-2024-29753.json) (`2024-04-05T20:15:08.667`)
|
||||
- [CVE-2024-29754](CVE-2024/CVE-2024-297xx/CVE-2024-29754.json) (`2024-04-05T20:15:08.717`)
|
||||
- [CVE-2024-29755](CVE-2024/CVE-2024-297xx/CVE-2024-29755.json) (`2024-04-05T20:15:08.763`)
|
||||
- [CVE-2024-29756](CVE-2024/CVE-2024-297xx/CVE-2024-29756.json) (`2024-04-05T20:15:08.813`)
|
||||
- [CVE-2024-29757](CVE-2024/CVE-2024-297xx/CVE-2024-29757.json) (`2024-04-05T20:15:08.867`)
|
||||
- [CVE-2024-29782](CVE-2024/CVE-2024-297xx/CVE-2024-29782.json) (`2024-04-05T20:15:08.917`)
|
||||
- [CVE-2024-29783](CVE-2024/CVE-2024-297xx/CVE-2024-29783.json) (`2024-04-05T20:15:08.967`)
|
||||
- [CVE-2024-30977](CVE-2024/CVE-2024-309xx/CVE-2024-30977.json) (`2024-04-05T21:15:09.740`)
|
||||
- [CVE-2024-3353](CVE-2024/CVE-2024-33xx/CVE-2024-3353.json) (`2024-04-05T20:15:09.193`)
|
||||
- [CVE-2024-3354](CVE-2024/CVE-2024-33xx/CVE-2024-3354.json) (`2024-04-05T20:15:09.427`)
|
||||
- [CVE-2024-3355](CVE-2024/CVE-2024-33xx/CVE-2024-3355.json) (`2024-04-05T21:15:09.800`)
|
||||
- [CVE-2024-3356](CVE-2024/CVE-2024-33xx/CVE-2024-3356.json) (`2024-04-05T21:15:10.033`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2024-2280](CVE-2024/CVE-2024-22xx/CVE-2024-2280.json) (`2024-04-05T21:15:09.660`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
70
_state.csv
70
_state.csv
@ -217890,6 +217890,8 @@ CVE-2023-2549,0,0,de0dc2573c930e18a5fb9048e72d1332322b742e4ff232a0716930e6526bb3
|
||||
CVE-2023-25490,0,0,f318fbcd46bc4823b18f47bad526c08cd8963624a09977c0786081dd6fcce917,2023-04-28T02:59:52.610000
|
||||
CVE-2023-25491,0,0,34d6378e3509978d9dd7ef75b3014124153e767629da8cf8612da8174990a547,2023-05-10T02:24:21.523000
|
||||
CVE-2023-25492,0,0,e00d9ed9f3044ddb0237f43eaefcbac020a94a98b5b77c9d60daae2da2e49ee3,2023-05-10T13:37:50.410000
|
||||
CVE-2023-25493,1,1,c4fd1dc034641a4a38067465c1fb75997e54375118c025c2521f91dd6621bb12,2024-04-05T21:15:07.607000
|
||||
CVE-2023-25494,1,1,8bc176759cb6c2b5ce44b58243669e1776f07b0edff15315c6a3514d54dc2c24,2024-04-05T21:15:07.813000
|
||||
CVE-2023-25495,0,0,19229d319fae03e27301eeb46076cb166d3fe8f0be6fc63a0e7a8f31ef1886b4,2023-05-09T20:36:34.067000
|
||||
CVE-2023-25496,0,0,70395fddaebcaecd1b78a79188bccd6b86e74f3fc1089ffad612863df4a2c469,2023-05-08T18:09:48.533000
|
||||
CVE-2023-25499,0,0,954cb0f22c5b9349fe8417f07854c9d7a350d7ba6f1b9564d124da3110ace637,2023-06-30T16:32:37.847000
|
||||
@ -222170,7 +222172,7 @@ CVE-2023-31024,0,0,4c70d5cc63eef05b3a366d77fb563b368bdfadd04c0926839846a82fcce9a
|
||||
CVE-2023-31025,0,0,0e4aa85ecd2ee651d4a45d9866dd1f24f182e80d38864542ea7d1cbb97a9ec67,2024-01-18T20:48:14.777000
|
||||
CVE-2023-31026,0,0,737def1b37587e41a8de0ad813079c7897dff748850e0628f84397ef07142498,2023-11-13T18:43:03.447000
|
||||
CVE-2023-31027,0,0,8ff82489352cce25dc4352ff2d33db807ef115fc642174d9e503e43f59674260,2023-11-13T19:20:51.220000
|
||||
CVE-2023-31028,1,1,14ff90a0151c643c9b22d6a8fea347f26699f725f3ca6b92becf432a0fd40f67,2024-04-05T18:15:08.250000
|
||||
CVE-2023-31028,0,0,14ff90a0151c643c9b22d6a8fea347f26699f725f3ca6b92becf432a0fd40f67,2024-04-05T18:15:08.250000
|
||||
CVE-2023-31029,0,0,c42ef0bcacfd6c953325b5f2f106d96c7a62f2c02eb1edafc052641664e71d2d,2024-01-18T20:50:53.507000
|
||||
CVE-2023-3103,0,0,c745e45a6f770ad21bf28632452dade4771e22e741237aa8ba70f21edc608054,2024-03-21T02:48:24.477000
|
||||
CVE-2023-31030,0,0,87204db072798651d0e1480ef8ba7d4c1b45df9188d565ea7fc9a3b00ced8522,2024-01-18T20:53:22.643000
|
||||
@ -232242,6 +232244,7 @@ CVE-2023-46046,0,0,4ed80fdf9ffb4927760bdcfcaf30dcb27a70f9913cc6f328c7b035c9b3e9e
|
||||
CVE-2023-46047,0,0,59b95be05d230cdd6ea344491c9416f73c69382afbbc1f9d5028df8892847cc5,2024-03-27T12:29:30.307000
|
||||
CVE-2023-46048,0,0,1153d37f616e36af8c6c0f0252a92a5aec2975042fe828246ac8281ae0e85997,2024-03-27T12:29:30.307000
|
||||
CVE-2023-46049,0,0,1391e07ec280c1eadce601ef51d30475392cab49a2b182b4940fe6688577ac9c,2024-03-27T12:29:30.307000
|
||||
CVE-2023-4605,1,1,1789b5d6f4b524690d52ef553d019a20e05b53a02e162a1329a11efb85aaa2ad,2024-04-05T21:15:08.003000
|
||||
CVE-2023-46050,0,0,6ff5ea8f1dc5991c203b0679fc5f46c04b4a3ef6ae70c787c24e6bec0c9c29e6,2024-01-29T09:15:42.640000
|
||||
CVE-2023-46051,0,0,09157b9d669d02525418ccbaeca2af237e09d871daecbc676d017fbb419d8e01,2024-03-27T12:29:30.307000
|
||||
CVE-2023-46052,0,0,51d6afb3c65fa13b540cd0271f17ee96c41ae8a74855d913ff35f4c966df34b8,2024-03-27T12:29:30.307000
|
||||
@ -236960,6 +236963,7 @@ CVE-2023-5908,0,0,65c47ba453ceadbcf64f5715b7c24675de56d7e12038ad7fb9ee73e2511352
|
||||
CVE-2023-5909,0,0,dc86a44abcc0400ca7a10015f5e4783d571f165fe9e2121385946b9f6a57f86f,2023-12-06T19:54:23.713000
|
||||
CVE-2023-5910,0,0,2d579f3a695f73992bfc5e5df66eb7ec068ebff6ca72889065ffb985de8211b9,2024-03-21T02:50:27.900000
|
||||
CVE-2023-5911,0,0,a08c5a2532b3d94976cb97dac13d04ddcffa2796c1f43e33a8e9a1ec70caede1,2024-01-11T19:43:17.143000
|
||||
CVE-2023-5912,1,1,25e847ae044f5c80f39432926f091be7439b4e1af1514344603354b779bae5d8,2024-04-05T21:15:08.210000
|
||||
CVE-2023-5913,0,0,9a413048efa725f6de4b42eaa7115b4d40ac8c223b50c26bded4b0dedf2e4eb5,2023-11-16T17:00:33.503000
|
||||
CVE-2023-5914,0,0,88eb5804a56587080558dade883a2bd1fc83174e7361ced67521be69deb49539,2024-01-24T21:05:40.173000
|
||||
CVE-2023-5915,0,0,93d527fcf9e982f48ec7668c345c809addcf44766c1b5722e97dbf2692eb4791,2023-12-08T18:24:27.517000
|
||||
@ -238077,16 +238081,16 @@ CVE-2024-0068,0,0,29054351872f671ffd0afada76da136d48518b88acaefb639ccc6c169ead07
|
||||
CVE-2024-0069,0,0,fcda9c827a68481a563f617244a09b1d788f56c62c31734c572fbfe1a75ea718,2023-11-28T00:15:07.140000
|
||||
CVE-2024-0070,0,0,f5edfa828dbd64ca40da0463d8d67355f807a2f6d8ea2e049578dd15434f1821,2023-11-28T00:15:07.183000
|
||||
CVE-2024-0071,0,0,704d1f6cb18cc47944843911c815f4098469857e3754cd1f411a2eed163344eb,2024-03-28T02:01:13.303000
|
||||
CVE-2024-0072,1,1,ced01d498a1c155cc128624b03dece7d5d0df8ec9f84c753a8b25dfdcb346a99,2024-04-05T18:15:08.477000
|
||||
CVE-2024-0072,0,0,ced01d498a1c155cc128624b03dece7d5d0df8ec9f84c753a8b25dfdcb346a99,2024-04-05T18:15:08.477000
|
||||
CVE-2024-0073,0,0,176f7449424756846db419300a5389c73905a3871ade74f979d054ede4a4abf3,2024-03-28T02:01:13.303000
|
||||
CVE-2024-0074,0,0,98eb255e160e7fd5beb14045c6567fea8fb46cf3bd51e2fde409175194ef6f56,2024-03-28T02:01:13.303000
|
||||
CVE-2024-0075,0,0,ca1e6c0fdd67ee0dc69f9ce1fc86a720c8737b83b96e94939769a54c0a489d67,2024-03-28T02:01:13.303000
|
||||
CVE-2024-0076,1,1,f198baa2c3a5defb59008c4ee9c70b29e941cee00cca054f8dc7225d73ba0c06,2024-04-05T18:15:08.680000
|
||||
CVE-2024-0076,0,0,f198baa2c3a5defb59008c4ee9c70b29e941cee00cca054f8dc7225d73ba0c06,2024-04-05T18:15:08.680000
|
||||
CVE-2024-0077,0,0,db4dba4f9462dc63edab63d2d916b645f56aeb1e3e4a4a247dac9899f4510f50,2024-03-28T02:01:13.303000
|
||||
CVE-2024-0078,0,0,65ef1b62c09f229e677e8506d114a0ad3f4b855306a2baa770a721ed0ba97b17,2024-03-28T02:01:13.303000
|
||||
CVE-2024-0079,0,0,a48198aa8d1b8e21233ccb1563194a0dce57e3cb1ac8f4c28d49144e25d1a534,2024-03-28T02:01:13.303000
|
||||
CVE-2024-0080,1,1,14676a90fe9c3c46fc6e8f25fa883940c938ed9943e229fef559ca749a74acbf,2024-04-05T18:15:08.890000
|
||||
CVE-2024-0081,1,1,f9dda3f39d21dce4ed138e5eaf31e5ba8c521c35969b9a97b88cde6e50b3f747,2024-04-05T19:15:07.033000
|
||||
CVE-2024-0080,0,0,14676a90fe9c3c46fc6e8f25fa883940c938ed9943e229fef559ca749a74acbf,2024-04-05T18:15:08.890000
|
||||
CVE-2024-0081,0,0,f9dda3f39d21dce4ed138e5eaf31e5ba8c521c35969b9a97b88cde6e50b3f747,2024-04-05T19:15:07.033000
|
||||
CVE-2024-0154,0,0,fee6d0edd38400fe9a2f331d67a355be9bc81701717352554939ef10dafbbf73,2024-03-13T18:15:58.530000
|
||||
CVE-2024-0155,0,0,56d3003aea28bbff1e776f33de697fc847d720d7a8270931f6c22f264f5611eb,2024-03-04T13:58:23.447000
|
||||
CVE-2024-0156,0,0,47a5ee4f12284e0f109441891942aa0eb589b2387e172b6366b6741bcabc51b4,2024-03-04T13:58:23.447000
|
||||
@ -240259,7 +240263,7 @@ CVE-2024-21983,0,0,ded146d4808fc5f83424e373b65cdad37794b676d9611f5162836ce6d86d8
|
||||
CVE-2024-21984,0,0,c4d05388605f2fb7e341aa0197be1de56d0ddb669904fcfa6f2ad451633ba0ba,2024-02-20T19:51:05.510000
|
||||
CVE-2024-21985,0,0,853a82d200092c0582c4290723b53256d943e3aa0955024d181a6e0dc05dbcae,2024-02-05T18:32:52.040000
|
||||
CVE-2024-21987,0,0,a312d19cf1876839a82cf4ab8a29efb39c100512ae446943b26071c9bd69f220,2024-02-16T21:39:50.223000
|
||||
CVE-2024-22004,1,1,39b50e3d304b75133a881ab201d85a8afd781e191f0cefa753b9dae08496ded0,2024-04-05T18:15:09.100000
|
||||
CVE-2024-22004,0,0,39b50e3d304b75133a881ab201d85a8afd781e191f0cefa753b9dae08496ded0,2024-04-05T18:15:09.100000
|
||||
CVE-2024-22005,0,0,313b9bc6d7138eced2900a2388d6d58fcc17e9d91231c0517d2cb0e3e82b9d0d,2024-03-15T20:15:07.527000
|
||||
CVE-2024-22006,0,0,4c7c420bbb6e62588c7a1f4eb632b3e6efe7a61ff08393b9055a3796f498bb2e,2024-03-15T20:15:07.573000
|
||||
CVE-2024-22007,0,0,f3721164b170a5b70f98ee09d80eb5a4c23e7d5319c9436b464d0aee9f606b8d,2024-03-12T12:40:13.500000
|
||||
@ -240651,7 +240655,7 @@ CVE-2024-22779,0,0,eda1283002ca0a5ba4b71e37cd224cf29419640cfe8456a3a65e695acd500
|
||||
CVE-2024-2278,0,0,207e2f51738b382e656f75c22347fd5450b8d4ce530caf11838743da2ac45b4a,2024-04-01T12:49:00.877000
|
||||
CVE-2024-22780,0,0,7f3239e2db375f765f90f52543bdbcccb2a20757a7cd068a76d9a55c97657017,2024-04-02T18:12:16.283000
|
||||
CVE-2024-22795,0,0,74ecb133836626bb2368eab49a74768ea23b2ee0b898200b84b5a979cafed20f,2024-02-15T17:53:54.680000
|
||||
CVE-2024-2280,0,0,fd486a918bfa181dee3017086f846fc18f635e98f420bd04919fa2b258fed4a3,2024-03-29T12:45:02.937000
|
||||
CVE-2024-2280,0,1,b064f3feb8722910a4651d8fcd5aa5f1892c8cb4f5e0e1796b328260936ab591,2024-04-05T21:15:09.660000
|
||||
CVE-2024-2281,0,0,aff3b1a84ac8ae6dd4eed23fef99c5bf8af119f63a34e536936e20de957b3991,2024-03-21T02:52:31.867000
|
||||
CVE-2024-22817,0,0,eb15e92e9d0667f5c190034654618b8eeeb0dfc84cfb608c765282f0f5a04fcf,2024-01-23T14:23:18.990000
|
||||
CVE-2024-22818,0,0,cb135bb8e203bf8edbad428e88de582fd5c2ab18516529aab641b2e535a51f86,2024-01-23T14:23:46.073000
|
||||
@ -240739,6 +240743,7 @@ CVE-2024-23116,0,0,c69470152165ed3c6f07842580a9d276db25fe5e384880b4a7931b780caf1
|
||||
CVE-2024-23117,0,0,879d7d05d3f28235be6d3551861450f70c4e2f56b92f39afe7f23938cb7730c9,2024-04-02T12:50:42.233000
|
||||
CVE-2024-23118,0,0,2a710ffc24b98413c0e2df0c0c64682e3878440889d1038072b49d9104f7509a,2024-04-02T12:50:42.233000
|
||||
CVE-2024-23119,0,0,dc7a02dfe6c2319112aa9c9c7ba24d29c0a54406c32b5bc7828bc06ecc1e505b,2024-04-02T12:50:42.233000
|
||||
CVE-2024-2312,1,1,c3d1e59adcf036422d8e502f2fa8633e5bdb76072612a435659e8367a1f966b4,2024-04-05T20:15:09.020000
|
||||
CVE-2024-23120,0,0,1fdd5384a3247451b572eec50acc63b80f4302d338e02a15db81dbcc92866844,2024-03-01T16:15:45.920000
|
||||
CVE-2024-23121,0,0,ae89a79fcf6c313d61197ac6f338d68b00711a8ed1e7b84e5d9691d517b9b085,2024-03-13T03:15:06.320000
|
||||
CVE-2024-23122,0,0,53a6a7f808f40f9f8ccc6c9426a05387fb59e2867d6b512f9c97f02c17acdf90,2024-03-13T03:15:06.390000
|
||||
@ -240964,6 +240969,7 @@ CVE-2024-23550,0,0,233aa541fdda788f0e4e95c8a9a0a8f5d7fa7689dcd559af0cf5e5843a531
|
||||
CVE-2024-23553,0,0,51ea2d50cc1ff4dbab518de2a29e9ef6a91bd6b91073c23eb1a7f0cb7c8f1090,2024-02-10T00:59:00.423000
|
||||
CVE-2024-2357,0,0,2af3f167a5f07c033333870e1f5044e9ac66d1548287fd20eff05541e2132cfb,2024-03-23T03:15:12.690000
|
||||
CVE-2024-23591,0,0,f4c08614f6a162f49ecc99f020c088036b0b565e06b57796e1304b45ae78e59d,2024-02-20T22:15:08.353000
|
||||
CVE-2024-23592,1,1,39d2d9698b72dd80a10f4895bb9f4034620fd48dadd9d49928de48e02e0737b6,2024-04-05T21:15:08.450000
|
||||
CVE-2024-23603,0,0,2b536971fe4d260603348583e5e85d59f5debd4cec090f729c87a6dbde3a5ce7,2024-02-14T18:04:45.380000
|
||||
CVE-2024-23604,0,0,760bd2ccdc3dff1dab3cc8af2bcb4408e0ff89553b2b7d9d0cb5ed9c08f6a616,2024-03-18T12:38:25.490000
|
||||
CVE-2024-23605,0,0,559f2b18ab2042f99709ab0e3fa4fcace7fdbe41b3b5e10d7fdaf53ba9d4932f,2024-02-26T18:15:07.673000
|
||||
@ -242749,6 +242755,8 @@ CVE-2024-27228,0,0,ac326317e51dc7851c1f82ec4a32af90f437c21efaddc59cfa9f583daaf12
|
||||
CVE-2024-27229,0,0,c7e091ed6183d6b89e7927dfbd5d373593399a0d36acccae457f369c6df990d4,2024-03-12T12:40:13.500000
|
||||
CVE-2024-2723,0,0,908fdbaf6e8c15702fd48248931088912662f0d496e4e3ec99b68fc8fea5b6a5,2024-03-22T15:34:43.663000
|
||||
CVE-2024-27230,0,0,c7763bc0ef3ba362ff27028ad0a4ee6dc51f834ec1d74bc7b4e735a7089dbf69,2024-03-12T12:40:13.500000
|
||||
CVE-2024-27231,1,1,bcd79f5ef412a612365a45df392eca28617aedac86808c2ace183801bc127ea3,2024-04-05T20:15:07.787000
|
||||
CVE-2024-27232,1,1,aa76cd88588a9318ac1d12fd089d24219641f057d7862ca5a3fc10fcca094f74,2024-04-05T20:15:07.847000
|
||||
CVE-2024-27233,0,0,7b8043ee4b07bedf143f62926829193f3e94b62f5f4f2482d3d5d7a8d5b8b166,2024-03-12T12:40:13.500000
|
||||
CVE-2024-27234,0,0,4cea6228708eed4dcd9db0ccc5b3a95a294cbf001825e99826ed97307af63bd5,2024-03-12T12:40:13.500000
|
||||
CVE-2024-27235,0,0,286299f74e536cbf38771d33b6488ac94632f33ebda885a5c2222182d4672636,2024-03-15T20:15:09.253000
|
||||
@ -242944,7 +242952,12 @@ CVE-2024-27902,0,0,7aa835c5c3cccf2434107e43a6dd21c3ee48d8e6664a62d49734964bcc016
|
||||
CVE-2024-27905,0,0,3e20ed1ee55859457fccacd02ccfd33b203e184f29107e3c93e267df9f8d58a8,2024-03-21T02:52:20.520000
|
||||
CVE-2024-27906,0,0,e279155c32f0030358ce7d189e782f3e54d78a6a202b13937f95f2706818bee5,2024-02-29T13:49:29.390000
|
||||
CVE-2024-27907,0,0,aac379adb09823074865cdaa760b5a9ed07a3326e17caf800106b9008671180a,2024-03-12T12:40:13.500000
|
||||
CVE-2024-27908,1,1,13430cd25a020cec36a3d9eb7892deebe7c57c18794858e5e30a7b03ed2ef7d0,2024-04-05T21:15:08.653000
|
||||
CVE-2024-27909,1,1,f71a0faf3349bbee739bf4f7b9d84c61c8b3abd54e5d8aeec12772a14caba6a7,2024-04-05T21:15:08.863000
|
||||
CVE-2024-2791,0,0,66683d264867ecc734a7367e9e44b59a4386424cad2664c8596d1137b64a85af,2024-04-02T12:50:42.233000
|
||||
CVE-2024-27910,1,1,e04ba00cb20a75b366e4b285c9340e26c71ffecc887e7a42702c708bf6bd6297,2024-04-05T21:15:09.060000
|
||||
CVE-2024-27911,1,1,9c6a14a4b572a0262639eb21fea5be2328fef66aaf35340436ffaafe0b166a38,2024-04-05T21:15:09.270000
|
||||
CVE-2024-27912,1,1,23753376cb9b4f3097e13ae423c40dacdd041301a2343c17f8db85068be6f16a,2024-04-05T21:15:09.470000
|
||||
CVE-2024-27913,0,0,4ab4f3916b8428dbf6a53f81f4240223329f17f5e9f63a6de1fd6dc690b5ff6a,2024-02-28T14:06:45.783000
|
||||
CVE-2024-27914,0,0,3ae5902175f2437b477eff7baac5113b2dce4706fa0de04eef5292541a3ddd19,2024-03-18T19:40:00.173000
|
||||
CVE-2024-27915,0,0,d4924e50464aaf41d040242348770ffaf78a24dc54a27fd2fcc5b39d7ef4bc89,2024-03-06T21:42:48.053000
|
||||
@ -243028,7 +243041,7 @@ CVE-2024-2805,0,0,fa896267355e8bee60ef45369bdd61a50def95efdfa5e824724b711a08ae74
|
||||
CVE-2024-28053,0,0,c90f3b62964e2e2422d9b5798f17f1825dc5ae41ec90f71b2b9fe7b9e8ea4a14,2024-03-15T12:53:06.423000
|
||||
CVE-2024-28054,0,0,b289eaa8f221cef12d20f4d7c4d850be722c706b733d8c81d770795eac46dd81,2024-03-23T03:15:11.510000
|
||||
CVE-2024-2806,0,0,31a1a52b37b2e720eae0233b1b19dee00c5a6dd1df73e31128b38dde57d091e7,2024-03-26T03:11:41.880000
|
||||
CVE-2024-28065,1,1,860e1bfe6126cf5c07cb1eddc7c9671f368193a1540ce3473fdd211437faae95,2024-04-05T18:15:09.307000
|
||||
CVE-2024-28065,0,0,860e1bfe6126cf5c07cb1eddc7c9671f368193a1540ce3473fdd211437faae95,2024-04-05T18:15:09.307000
|
||||
CVE-2024-28069,0,0,99a57a9955c5ed5463e7c560b95e0a17dfa2789ec3c024f2825003d476d4b80d,2024-03-17T22:38:29.433000
|
||||
CVE-2024-2807,0,0,47b8a7021ebbb15acc350203dd3081726f7b96c650b8d998414fd135c1027f2f,2024-03-26T03:12:50.837000
|
||||
CVE-2024-28070,0,0,c8eeec88fa6e3b91036a4eadc63dd921f090ad52309176e7af22a570b911aeac,2024-03-17T22:38:29.433000
|
||||
@ -243571,6 +243584,26 @@ CVE-2024-2971,0,0,898bc718d43d0c390c6d16657d6a8f74b1bed4195ca2be9f6e03b60807e375
|
||||
CVE-2024-29732,0,0,f91e9a53bb8c78b9eaa9a43eb2f41d18e7980ac57e838dd405b45ee97833017f,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29734,0,0,8d99461dc9b8889d99315bde49edbce5536e3a20b88b53095157d8f0afc148b5,2024-04-03T12:38:04.840000
|
||||
CVE-2024-29735,0,0,286fbba4f7cb1bbd32eae740efb468430068245735dc6c522579c415dcd44e18,2024-03-27T12:29:41.530000
|
||||
CVE-2024-29738,1,1,53b2d0752f1fa17cbf1102b20c675a747e42a9143c4e8ad54f06907623028bd7,2024-04-05T20:15:07.907000
|
||||
CVE-2024-29739,1,1,f6f76b014c8e7321becb37fb9261442b276e1502923a529880b197bef6586c39,2024-04-05T20:15:07.960000
|
||||
CVE-2024-29740,1,1,43488df738e02d492bd5dd531a0145b90b4c70bfe6f3b08cc9198223b59d6549,2024-04-05T20:15:08.010000
|
||||
CVE-2024-29741,1,1,5287e10912b70bb061f53de5b83b003317f0455c1e6e8382ca56aea272ded637,2024-04-05T20:15:08.060000
|
||||
CVE-2024-29742,1,1,f2bc3ea7d601e3d2f89366bc3bf789f7dff9d33d7b969d0681ff0702c8c803ee,2024-04-05T20:15:08.107000
|
||||
CVE-2024-29743,1,1,c449523fdbfed70e93eb5db09bb0072175dcc5ddecf792b0802f1d6b3e48b44c,2024-04-05T20:15:08.153000
|
||||
CVE-2024-29744,1,1,648f768a13bd9fd094226fb33743af4a7accff23b8393394010a398a2bf9faf7,2024-04-05T20:15:08.207000
|
||||
CVE-2024-29745,1,1,e092cc506e47b323e83d6e1a0c73e84be04120dd76e1bfdd92d89427a91e8853,2024-04-05T20:15:08.253000
|
||||
CVE-2024-29746,1,1,f387564f14fa535ea564257d7225ec27fec8b4e39ff6f86e757de7acb23d8e1e,2024-04-05T20:15:08.303000
|
||||
CVE-2024-29747,1,1,0548417396958cc0ffb5d57a429a647040bc882fc6a141dfeabf96110c8e560c,2024-04-05T20:15:08.357000
|
||||
CVE-2024-29748,1,1,03916cd98e44232b3742e5725eea00e4711368caf808cb591f5073c1c8562982,2024-04-05T20:15:08.407000
|
||||
CVE-2024-29749,1,1,013121f5f2cf9fc7d35fb3733cc7a973426593dc74f4252d96fe96b1177b73b1,2024-04-05T20:15:08.457000
|
||||
CVE-2024-29750,1,1,1d1c2c89d3a1e4369128e0b96b6eea44ed888a0866ddcc895f3f878c4d78c9f8,2024-04-05T20:15:08.507000
|
||||
CVE-2024-29751,1,1,8771fda4f10da37042d80e537d9a6c45d11e384af07f52c7e0558da9a6e89d31,2024-04-05T20:15:08.560000
|
||||
CVE-2024-29752,1,1,9bb1264a7f3abf8bc8cc11bcb3b404de453811c8f47b2b67485281322418de83,2024-04-05T20:15:08.617000
|
||||
CVE-2024-29753,1,1,69b25c72eb47bc58949e79282078836bd7c63f9ca03173a7b1f25c6b375f736c,2024-04-05T20:15:08.667000
|
||||
CVE-2024-29754,1,1,3330597cda792c70bad3d77acc0df99aee3e4b80d762a0d8f00a0d1b5e10416a,2024-04-05T20:15:08.717000
|
||||
CVE-2024-29755,1,1,0542351e0061a50a9107f36e57184a81dd6bfb9e97ee77479c1db76ff1889e27,2024-04-05T20:15:08.763000
|
||||
CVE-2024-29756,1,1,749dbbd462fe1fa47d77fe81e60dfe24216329f4c2124a953263acc2be642c5a,2024-04-05T20:15:08.813000
|
||||
CVE-2024-29757,1,1,79e005a457e349ef64aef88e4f323dfd1e7a2f73de6f21d9146bee268e7344f5,2024-04-05T20:15:08.867000
|
||||
CVE-2024-29758,0,0,2cc069bb64959189ea2de8b6128cab94be340a0f3b77c16c655ed6409fd474e5,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29759,0,0,a2cea2831b83d81a81fe40f33f0e6624fd1f01962aee666a65cf0c1c54a01596,2024-03-27T15:49:41.437000
|
||||
CVE-2024-2976,0,0,2123cf6aff7575dd905f7ca455eb68cec1429cb1b518d5a38771dfe467e09b89,2024-03-27T15:49:41.437000
|
||||
@ -243594,6 +243627,8 @@ CVE-2024-29775,0,0,4a09499ff17702a2e8ef2c1074beadb2ac9279eca85d85bf4c2322207b72a
|
||||
CVE-2024-29776,0,0,67fe7261841358aada487500133b48b2c1e7affe235fb97f4d75fa453ac843e5,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29777,0,0,54aa494ecd6d70eaf7fdbabe1fe6006b3d5e55e70d9a8bd4bbd26e15abfe4f5c,2024-03-27T15:49:41.437000
|
||||
CVE-2024-2978,0,0,239b3780201c9c06871f182d1cc7d09e3b7ac32e86ff81be518391e2ac3ab780,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29782,1,1,4757795794599219f11e3b9dcfc93727859ed3d7673ea6da97cfa8b2927cc3f3,2024-04-05T20:15:08.917000
|
||||
CVE-2024-29783,1,1,a47c72a77347622456de3323d44cf2da097a0e63e2d91fffe6bcde5cf5e0a324,2024-04-05T20:15:08.967000
|
||||
CVE-2024-29788,0,0,8cc2af0c2b669256f5779a8a4a350af2b3525bc2e92357d3051a10e492c80e6c,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29789,0,0,28405d77cf9c690089caf44c730ea92c38ee335fb6ea974e0cc4c214ee7b123f,2024-03-27T15:49:41.437000
|
||||
CVE-2024-2979,0,0,715f71b18713bceae85abac6b9387266910c959da8c84fe20b231ced845adef9,2024-03-27T15:49:41.437000
|
||||
@ -244052,6 +244087,7 @@ CVE-2024-3091,0,0,4af5b5d1eaeb5dcee2b11f765f7e4e07712d76dbe9222ddb5cfc716c8e60d0
|
||||
CVE-2024-3094,0,0,502febf68b0d02803300ecc80fd5edf81a987966a53e4a71d6dd7ef4cc670f65,2024-04-03T06:15:07.873000
|
||||
CVE-2024-30946,0,0,0dff329aaece035fc82f00595012379643bd5a0edb89ee3a7369d6609e13a4d1,2024-04-02T18:12:16.283000
|
||||
CVE-2024-30965,0,0,0e44dd5d951a25ac3e8873a32678a3145da47d1060cb5312576a9c0471b643ad,2024-04-02T18:12:16.283000
|
||||
CVE-2024-30977,1,1,b1949f04d8948d41c2cd9e7b71c53660f199c163260b0aa366f3eb12f779344b,2024-04-05T21:15:09.740000
|
||||
CVE-2024-30998,0,0,179abd0db8095df44a7d1fc224d4f504797395ef6ca242b590dce2e234dbd0de,2024-04-03T12:38:04.840000
|
||||
CVE-2024-31002,0,0,96e076f675a43d72347dc0c980a987d7f8bd37cac2f635917b77c618d7fb5159,2024-04-02T12:50:42.233000
|
||||
CVE-2024-31003,0,0,3f0adfc7393f75768ba5f0ff119d336a00244f196f86b1dcc7f91a86901fc5be,2024-04-02T12:50:42.233000
|
||||
@ -244163,10 +244199,10 @@ CVE-2024-3178,0,0,e1b2edc538f836ffb506a17d476e0f961db2588242ddd1b2358ad3487cd818
|
||||
CVE-2024-3179,0,0,5abb24f6a5051585dee8d043e9230e5c2a9202caf7e3c5044373b856d11a8a98,2024-04-04T12:48:41.700000
|
||||
CVE-2024-3180,0,0,9228ee57f9267d6ec4565f77da6e32f8aedba868cc578e14d8f50b94e65bca34,2024-04-04T12:48:41.700000
|
||||
CVE-2024-3181,0,0,19462f0bae052150ee3deea6a2833d73153169ade51a21a9a0ee903c88e94c7c,2024-04-04T12:48:41.700000
|
||||
CVE-2024-31848,1,1,6965f04cc86efd819ec97fa65a940af868313d4b9414d4c137bc5206ad729602,2024-04-05T18:15:09.360000
|
||||
CVE-2024-31849,1,1,ba19687c183971580d9b8978873bbf6d8219ba5de3f65dc5058b582de0f38692,2024-04-05T18:15:09.563000
|
||||
CVE-2024-31850,1,1,4982070fceb832e31d5e30fb03a84954ccaa75a897ce5879a6b4f81a150e310c,2024-04-05T18:15:09.753000
|
||||
CVE-2024-31851,1,1,ab4658af068ad1058f367d60d6c046977f3ab3864a10d3fc49f99432a80d6938,2024-04-05T18:15:09.953000
|
||||
CVE-2024-31848,0,0,6965f04cc86efd819ec97fa65a940af868313d4b9414d4c137bc5206ad729602,2024-04-05T18:15:09.360000
|
||||
CVE-2024-31849,0,0,ba19687c183971580d9b8978873bbf6d8219ba5de3f65dc5058b582de0f38692,2024-04-05T18:15:09.563000
|
||||
CVE-2024-31850,0,0,4982070fceb832e31d5e30fb03a84954ccaa75a897ce5879a6b4f81a150e310c,2024-04-05T18:15:09.753000
|
||||
CVE-2024-31851,0,0,ab4658af068ad1058f367d60d6c046977f3ab3864a10d3fc49f99432a80d6938,2024-04-05T18:15:09.953000
|
||||
CVE-2024-31852,0,0,0ee0023d5b34c1dac5fa2039f744500c40b254d8784a31e411708a273dd8e7b9,2024-04-05T15:15:08.270000
|
||||
CVE-2024-3202,0,0,c740eb561a7c1440cb5a8dd5eb2f94f0cce226529c05056c2f841e5a9fe9ca73,2024-04-03T12:38:04.840000
|
||||
CVE-2024-3203,0,0,697bde31fba6d3c5a0e2d11da403a2e3b16828faac086b66cd78b0527d17b9c5,2024-04-03T12:38:04.840000
|
||||
@ -244213,6 +244249,10 @@ CVE-2024-3346,0,0,e733bb268a198adf409c7154c320339626faf14f0ab7cbb2e1a6fe41aa30dc
|
||||
CVE-2024-3347,0,0,3f3371ab8a7023688ea09ce35cacd066084e70ff611e61e0e93ccb906eb0776b,2024-04-05T16:15:08.203000
|
||||
CVE-2024-3348,0,0,ee0797eecf851d4736420692f400d34e1db5fa62c0fc42b1cf997f4ff1c45678,2024-04-05T17:15:07.743000
|
||||
CVE-2024-3349,0,0,9c956c66a349da9acf3b4b885f45dc030fdb4622c5431408cddee04d792878f4,2024-04-05T17:15:07.983000
|
||||
CVE-2024-3350,1,1,1245c18fa2606c835df9e5f7ef90bf8cbb70eb388db2793142ebd787d4487c95,2024-04-05T18:15:10.143000
|
||||
CVE-2024-3351,1,1,546bddb83a148a28dca9db8b4add8343ebd293928450a664cd061216a5e23106,2024-04-05T18:15:10.397000
|
||||
CVE-2024-3352,1,1,4dd7c36b0d461d1a96127863060425c62796418ace25937f0dc89f3f629c483d,2024-04-05T19:15:07.267000
|
||||
CVE-2024-3350,0,0,1245c18fa2606c835df9e5f7ef90bf8cbb70eb388db2793142ebd787d4487c95,2024-04-05T18:15:10.143000
|
||||
CVE-2024-3351,0,0,546bddb83a148a28dca9db8b4add8343ebd293928450a664cd061216a5e23106,2024-04-05T18:15:10.397000
|
||||
CVE-2024-3352,0,0,4dd7c36b0d461d1a96127863060425c62796418ace25937f0dc89f3f629c483d,2024-04-05T19:15:07.267000
|
||||
CVE-2024-3353,1,1,5a3b6b4aec1f9e7a8bfd3fbf5eaa7f7ebebf90d58ded80d30cc316fd35f8b004,2024-04-05T20:15:09.193000
|
||||
CVE-2024-3354,1,1,d035bebbbe4ba20bd3a170fae23b0047b357c9ccbebf4d91c0e7d2d35e44b1f2,2024-04-05T20:15:09.427000
|
||||
CVE-2024-3355,1,1,ca68600fd0628cb5ae79a1a70be90a2c45f3bd0e143e4bf60e7a607aceefa438,2024-04-05T21:15:09.800000
|
||||
CVE-2024-3356,1,1,ba2a4323d3ef545405bc3e57d4d8fd5b2db7ed6b3db10c68e5aaa772d5c08f2c,2024-04-05T21:15:10.033000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user