diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25646.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25646.json new file mode 100644 index 00000000000..2f9272a66be --- /dev/null +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25646.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-25646", + "sourceIdentifier": "cna@sap.com", + "published": "2024-04-09T01:15:48.343", + "lastModified": "2024-04-09T01:15:48.343", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Due to improper validation,\u00a0SAP BusinessObject Business Intelligence Launch Pad allows an authenticated attacker to access operating system information using crafted document. On successful exploitation there could be a considerable impact on confidentiality of the application.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3421384", + "source": "cna@sap.com" + }, + { + "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27898.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27898.json new file mode 100644 index 00000000000..9fe60d3fc0b --- /dev/null +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27898.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-27898", + "sourceIdentifier": "cna@sap.com", + "published": "2024-04-09T01:15:48.583", + "lastModified": "2024-04-09T01:15:48.583", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SAP NetWeaver application, due to insufficient input validation, allows an attacker to send a crafted request from a vulnerable web application targeting internal systems behind firewalls that are normally inaccessible to an attacker from the external network, resulting in a\u00a0Server-Side Request Forgery vulnerability. Thus, having a low impact on confidentiality.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3425188", + "source": "cna@sap.com" + }, + { + "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27899.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27899.json new file mode 100644 index 00000000000..2c76cb41b3e --- /dev/null +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27899.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-27899", + "sourceIdentifier": "cna@sap.com", + "published": "2024-04-09T01:15:48.777", + "lastModified": "2024-04-09T01:15:48.777", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Self-Registration\u00a0and Modify your own profile in User Admin Application of NetWeaver AS Java does not enforce proper security requirements for the content of the newly defined security answer. This can be leveraged by an attacker to cause profound impact on confidentiality and low impact on both integrity and availability.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.3 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-640" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3434839", + "source": "cna@sap.com" + }, + { + "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27901.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27901.json new file mode 100644 index 00000000000..718d0e5433b --- /dev/null +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27901.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-27901", + "sourceIdentifier": "cna@sap.com", + "published": "2024-04-09T01:15:48.993", + "lastModified": "2024-04-09T01:15:48.993", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SAP Asset Accounting could allow a high privileged attacker to exploit insufficient validation of path information provided by the users and pass it through to the file API's. Thus, causing a considerable impact on confidentiality, integrity and availability of the application.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-35" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3438234", + "source": "cna@sap.com" + }, + { + "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27983.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27983.json new file mode 100644 index 00000000000..6c9b91561b2 --- /dev/null +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27983.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2024-27983", + "sourceIdentifier": "support@hackerone.com", + "published": "2024-04-09T01:15:49.197", + "lastModified": "2024-04-09T01:15:49.197", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An attacker can make the Node.js HTTP/2 server completely unavailable by sending a small amount of HTTP/2 frames packets with a few HTTP/2 frames inside. It is possible to leave some data in nghttp2 memory after reset when headers with HTTP/2 CONTINUATION frame are sent to the server and then a TCP connection is abruptly closed by the client triggering the Http2Session destructor while header frames are still being processed (and stored in memory) causing a race condition." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "support@hackerone.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "references": [ + { + "url": "https://hackerone.com/reports/2319584", + "source": "support@hackerone.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28167.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28167.json new file mode 100644 index 00000000000..36c1e0a82a2 --- /dev/null +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28167.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-28167", + "sourceIdentifier": "cna@sap.com", + "published": "2024-04-09T01:15:49.380", + "lastModified": "2024-04-09T01:15:49.380", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SAP Group Reporting Data Collection\u00a0does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. On successful exploitation, specific data can be changed via the Enter Package Data app although the user does not have sufficient authorization causing high impact on Integrity of the appliction.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3442378", + "source": "cna@sap.com" + }, + { + "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2975.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2975.json new file mode 100644 index 00000000000..f544973a294 --- /dev/null +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2975.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2024-2975", + "sourceIdentifier": "security@octopus.com", + "published": "2024-04-09T01:15:49.583", + "lastModified": "2024-04-09T01:15:49.583", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A race condition was identified through which privilege escalation was possible in certain configurations." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@octopus.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://advisories.octopus.com/post/2024/sa2024-01/", + "source": "security@octopus.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30214.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30214.json new file mode 100644 index 00000000000..07ca0352abc --- /dev/null +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30214.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-30214", + "sourceIdentifier": "cna@sap.com", + "published": "2024-04-09T01:15:49.750", + "lastModified": "2024-04-09T01:15:49.750", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The application allows a high privilege attacker to append a malicious GET query parameter to Service invocations, which are reflected in the server response. Under certain circumstances, if the parameter contains a JavaScript, the script could be processed on client side.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3421453", + "source": "cna@sap.com" + }, + { + "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30215.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30215.json new file mode 100644 index 00000000000..b41c000fbc6 --- /dev/null +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30215.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-30215", + "sourceIdentifier": "cna@sap.com", + "published": "2024-04-09T01:15:49.953", + "lastModified": "2024-04-09T01:15:49.953", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Resource Settings page allows a high privilege attacker to load exploitable payload to be stored and reflected whenever a User visits the page. In a successful attack, some information could be obtained and/or modified. However,\u00a0the attacker does not have control over what information is obtained, or the amount or kind of loss is limited.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3421453", + "source": "cna@sap.com" + }, + { + "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30216.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30216.json new file mode 100644 index 00000000000..80e12a6c48c --- /dev/null +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30216.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-30216", + "sourceIdentifier": "cna@sap.com", + "published": "2024-04-09T01:15:50.140", + "lastModified": "2024-04-09T01:15:50.140", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cash Management in SAP S/4 HANA does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. By\u00a0exploiting this vulnerability, attacker can add notes in the review request with 'completed' status affecting the integrity of the application.\u00a0Confidentiality and Availability are not impacted.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3427178", + "source": "cna@sap.com" + }, + { + "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30217.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30217.json new file mode 100644 index 00000000000..674ebb88a51 --- /dev/null +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30217.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-30217", + "sourceIdentifier": "cna@sap.com", + "published": "2024-04-09T01:15:50.353", + "lastModified": "2024-04-09T01:15:50.353", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cash Management in SAP S/4 HANA does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. By exploiting this vulnerability, an attacker can approve or reject a bank account application affecting the integrity of the application. Confidentiality and Availability are not impacted.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3430173", + "source": "cna@sap.com" + }, + { + "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30218.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30218.json new file mode 100644 index 00000000000..e304bd9c934 --- /dev/null +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30218.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-30218", + "sourceIdentifier": "cna@sap.com", + "published": "2024-04-09T01:15:50.570", + "lastModified": "2024-04-09T01:15:50.570", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The ABAP Application Server of SAP NetWeaver as well as ABAP Platform\u00a0allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service. This leads to a considerable impact on availability.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3359778", + "source": "cna@sap.com" + }, + { + "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 9036a16de64..b6c4ab7d33b 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-04-08T23:55:30.992103+00:00 +2024-04-09T02:00:30.495496+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-04-08T23:15:08.023000+00:00 +2024-04-09T01:15:50.570000+00:00 ``` ### Last Data Feed Release @@ -27,59 +27,37 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-04-08T00:00:20.246444+00:00 +2024-04-09T00:00:20.239596+00:00 ``` ### Total Number of included CVEs ```plain -244490 +244502 ``` ### CVEs added in the last Commit -Recently added CVEs: `9` +Recently added CVEs: `12` -- [CVE-2024-0082](CVE-2024/CVE-2024-00xx/CVE-2024-0082.json) (`2024-04-08T22:15:07.993`) -- [CVE-2024-0083](CVE-2024/CVE-2024-00xx/CVE-2024-0083.json) (`2024-04-08T22:15:08.203`) -- [CVE-2024-22949](CVE-2024/CVE-2024-229xx/CVE-2024-22949.json) (`2024-04-08T23:15:07.647`) -- [CVE-2024-23079](CVE-2024/CVE-2024-230xx/CVE-2024-23079.json) (`2024-04-08T23:15:07.703`) -- [CVE-2024-23081](CVE-2024/CVE-2024-230xx/CVE-2024-23081.json) (`2024-04-08T23:15:07.757`) -- [CVE-2024-23084](CVE-2024/CVE-2024-230xx/CVE-2024-23084.json) (`2024-04-08T23:15:07.803`) -- [CVE-2024-23584](CVE-2024/CVE-2024-235xx/CVE-2024-23584.json) (`2024-04-08T23:15:07.850`) -- [CVE-2024-27632](CVE-2024/CVE-2024-276xx/CVE-2024-27632.json) (`2024-04-08T22:15:08.413`) -- [CVE-2024-31047](CVE-2024/CVE-2024-310xx/CVE-2024-31047.json) (`2024-04-08T23:15:08.023`) +- [CVE-2024-25646](CVE-2024/CVE-2024-256xx/CVE-2024-25646.json) (`2024-04-09T01:15:48.343`) +- [CVE-2024-27898](CVE-2024/CVE-2024-278xx/CVE-2024-27898.json) (`2024-04-09T01:15:48.583`) +- [CVE-2024-27899](CVE-2024/CVE-2024-278xx/CVE-2024-27899.json) (`2024-04-09T01:15:48.777`) +- [CVE-2024-27901](CVE-2024/CVE-2024-279xx/CVE-2024-27901.json) (`2024-04-09T01:15:48.993`) +- [CVE-2024-27983](CVE-2024/CVE-2024-279xx/CVE-2024-27983.json) (`2024-04-09T01:15:49.197`) +- [CVE-2024-28167](CVE-2024/CVE-2024-281xx/CVE-2024-28167.json) (`2024-04-09T01:15:49.380`) +- [CVE-2024-2975](CVE-2024/CVE-2024-29xx/CVE-2024-2975.json) (`2024-04-09T01:15:49.583`) +- [CVE-2024-30214](CVE-2024/CVE-2024-302xx/CVE-2024-30214.json) (`2024-04-09T01:15:49.750`) +- [CVE-2024-30215](CVE-2024/CVE-2024-302xx/CVE-2024-30215.json) (`2024-04-09T01:15:49.953`) +- [CVE-2024-30216](CVE-2024/CVE-2024-302xx/CVE-2024-30216.json) (`2024-04-09T01:15:50.140`) +- [CVE-2024-30217](CVE-2024/CVE-2024-302xx/CVE-2024-30217.json) (`2024-04-09T01:15:50.353`) +- [CVE-2024-30218](CVE-2024/CVE-2024-302xx/CVE-2024-30218.json) (`2024-04-09T01:15:50.570`) ### CVEs modified in the last Commit -Recently modified CVEs: `29` +Recently modified CVEs: `0` -- [CVE-2023-40551](CVE-2023/CVE-2023-405xx/CVE-2023-40551.json) (`2024-04-08T22:50:42.587`) -- [CVE-2023-42892](CVE-2023/CVE-2023-428xx/CVE-2023-42892.json) (`2024-04-08T22:43:44.103`) -- [CVE-2023-42893](CVE-2023/CVE-2023-428xx/CVE-2023-42893.json) (`2024-04-08T22:45:24.987`) -- [CVE-2023-42896](CVE-2023/CVE-2023-428xx/CVE-2023-42896.json) (`2024-04-08T22:45:48.987`) -- [CVE-2023-42913](CVE-2023/CVE-2023-429xx/CVE-2023-42913.json) (`2024-04-08T22:46:44.747`) -- [CVE-2023-42930](CVE-2023/CVE-2023-429xx/CVE-2023-42930.json) (`2024-04-08T22:46:51.907`) -- [CVE-2023-42931](CVE-2023/CVE-2023-429xx/CVE-2023-42931.json) (`2024-04-08T22:47:13.533`) -- [CVE-2023-42936](CVE-2023/CVE-2023-429xx/CVE-2023-42936.json) (`2024-04-08T22:47:26.453`) -- [CVE-2023-42947](CVE-2023/CVE-2023-429xx/CVE-2023-42947.json) (`2024-04-08T22:47:21.010`) -- [CVE-2023-42950](CVE-2023/CVE-2023-429xx/CVE-2023-42950.json) (`2024-04-08T22:48:38.313`) -- [CVE-2023-42956](CVE-2023/CVE-2023-429xx/CVE-2023-42956.json) (`2024-04-08T22:47:31.973`) -- [CVE-2023-42962](CVE-2023/CVE-2023-429xx/CVE-2023-42962.json) (`2024-04-08T22:47:42.510`) -- [CVE-2023-50313](CVE-2023/CVE-2023-503xx/CVE-2023-50313.json) (`2024-04-08T22:48:41.757`) -- [CVE-2024-21894](CVE-2024/CVE-2024-218xx/CVE-2024-21894.json) (`2024-04-08T22:53:09.773`) -- [CVE-2024-22023](CVE-2024/CVE-2024-220xx/CVE-2024-22023.json) (`2024-04-08T22:51:43.003`) -- [CVE-2024-22052](CVE-2024/CVE-2024-220xx/CVE-2024-22052.json) (`2024-04-08T22:52:44.573`) -- [CVE-2024-22053](CVE-2024/CVE-2024-220xx/CVE-2024-22053.json) (`2024-04-08T22:53:03.443`) -- [CVE-2024-2879](CVE-2024/CVE-2024-28xx/CVE-2024-2879.json) (`2024-04-08T22:49:41.533`) -- [CVE-2024-29745](CVE-2024/CVE-2024-297xx/CVE-2024-29745.json) (`2024-04-08T22:53:32.127`) -- [CVE-2024-29748](CVE-2024/CVE-2024-297xx/CVE-2024-29748.json) (`2024-04-08T22:52:33.780`) -- [CVE-2024-30620](CVE-2024/CVE-2024-306xx/CVE-2024-30620.json) (`2024-04-08T22:48:50.340`) -- [CVE-2024-30621](CVE-2024/CVE-2024-306xx/CVE-2024-30621.json) (`2024-04-08T22:48:53.950`) -- [CVE-2024-31135](CVE-2024/CVE-2024-311xx/CVE-2024-31135.json) (`2024-04-08T22:39:48.067`) -- [CVE-2024-31137](CVE-2024/CVE-2024-311xx/CVE-2024-31137.json) (`2024-04-08T22:41:02.117`) -- [CVE-2024-31138](CVE-2024/CVE-2024-311xx/CVE-2024-31138.json) (`2024-04-08T22:41:43.087`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 85755626fdf..0ad23eb3340 100644 --- a/_state.csv +++ b/_state.csv @@ -147512,7 +147512,7 @@ CVE-2020-12690,0,0,932f4d7352f90088a9f578504c44be8847a8bb9135ca27abbf0e6e9d6a59e CVE-2020-12691,0,0,8e936d1c5cdffd146bc278c066d9a70e4266ee85ac8cfee1fdbe044ecb53c204,2023-11-07T03:15:43.400000 CVE-2020-12692,0,0,68377434c9925280af48ed2235b3dc41c869c6a9f459c87d28fb05843aec4e7f,2022-04-27T14:49:33.780000 CVE-2020-12693,0,0,96537bdd992b256867c7de87efad9d3b709514936eac906d253364893935ad16,2023-11-07T03:15:43.473000 -CVE-2020-12695,0,1,27ffbee5e8b267c5d2856bd4c9cb8539ea3cd4cfbba836b70a20ba11c7e1cbd9,2024-04-08T22:50:14.587000 +CVE-2020-12695,0,0,27ffbee5e8b267c5d2856bd4c9cb8539ea3cd4cfbba836b70a20ba11c7e1cbd9,2024-04-08T22:50:14.587000 CVE-2020-12696,0,0,bb4ea2f1e1708b0e3cc6a5ab6bd21378414f1c6b5ffe75eea16235249dbe1939,2020-05-11T19:54:27.610000 CVE-2020-12697,0,0,a04ceec1a5a5d9cfbca6c82b567d18470df3de295c50bb73c0dacef793186720,2020-05-14T17:51:41.210000 CVE-2020-12698,0,0,1ebabd06d333214adb866f1670bd59dc5c75c554562d6021bcac5548ce495d8b,2021-07-21T11:39:23.747000 @@ -163082,7 +163082,7 @@ CVE-2020-8280,0,0,8d5f0a3c05bd32b92e1a858a83594675a405cccfedeb61c86c6b0f4a117866 CVE-2020-8281,0,0,7b0fbce8746c448976b5242155b86de40c6c79f6aef5f735ac25b73023022b1a,2021-01-11T17:39:01.227000 CVE-2020-8282,0,0,8222c1643818edd8f6af8739cd00802cafdf09f4420f884c84232b750c7a9ce4,2020-12-16T15:41:49.850000 CVE-2020-8283,0,0,27005cdc68403e5c13995e8fdafcca44a2c6dc4c7d8c8e52cb9054d9aec06275,2020-12-17T18:45:00.930000 -CVE-2020-8284,0,1,8f463048503fbc3cbce375860cc388cb8411db5e169b891f858300da68e7f56c,2024-04-08T22:50:54.947000 +CVE-2020-8284,0,0,8f463048503fbc3cbce375860cc388cb8411db5e169b891f858300da68e7f56c,2024-04-08T22:50:54.947000 CVE-2020-8285,0,0,c3522f16bed2fee4b17164c0cd5d5a93552cd535d4c4756a633db3011ffa406c,2024-03-27T15:47:57.647000 CVE-2020-8286,0,0,a02fcb8742fe23470beab7341e4d5bc8102e3b0e9656dfa9fa789b059c0b5ddf,2024-03-27T15:47:53.600000 CVE-2020-8287,0,0,51b26482339c04c71bda7d277ce4f0314f019302250bc19c704cb13bd4f6cda8,2023-11-07T03:26:19.870000 @@ -210410,7 +210410,7 @@ CVE-2022-4703,0,0,a54efefe8f1bf43e81ffe6f0534eb7c7fef19c4eb56abbe0b1a9751740bf34 CVE-2022-47034,0,0,5ac67aa163553be867a866364afa18b92dc4bc7f840a7a175875590efa8c950d,2023-02-22T20:14:11.913000 CVE-2022-47035,0,0,6de38aa6dd343d75bbc639415c58256731fecf518f1c4aca9134799b3f4e37ab,2023-02-07T21:48:39.107000 CVE-2022-47036,0,0,53d34e8273024b8eeecffd8025a771d55583aff98ad4183453458594b15cc520,2024-03-18T12:38:25.490000 -CVE-2022-47037,0,1,0d6bd5f96c570b765eb198268550695e105531699ad7c34fd3538d2384d09934,2024-04-08T22:38:15.457000 +CVE-2022-47037,0,0,0d6bd5f96c570b765eb198268550695e105531699ad7c34fd3538d2384d09934,2024-04-08T22:38:15.457000 CVE-2022-4704,0,0,289f00bc2c7bddd2e8580a0d5456fb999a00d90d29455463d675c0eb0cf82dc4,2023-11-07T03:58:38.160000 CVE-2022-47040,0,0,139162540c4b4f6403c0b78cf9d63ce91541a6ef58b5946a43c02d0acb4b26c4,2023-02-06T16:23:30.867000 CVE-2022-47042,0,0,bc5b023d3951c7f331334ddd5fd77dc6d9e09c482ec9699d1fff190864e73066,2023-02-01T15:55:27.787000 @@ -228761,7 +228761,7 @@ CVE-2023-40385,0,0,d87186e65fbe11c963d9f2ac49a37bea6de8f4a87feb525e072522d577fee CVE-2023-40386,0,0,98b5b9164e51a67fec2b119151c92fd2d9bb1d8d51de82443b681e79ce2c9a34,2023-10-12T01:59:56.563000 CVE-2023-40388,0,0,0669c38434b1494ed261fd2860ebba321deabd42233fd11611759d0565888e20,2023-10-12T01:59:05.793000 CVE-2023-4039,0,0,0accd3adc8756cc7a927b7c908e91237d32e08c68f471a1067012290c829eea2,2024-02-19T23:15:07.680000 -CVE-2023-40390,0,1,dcc08f1579a2804bdfa75d3a1e4b64bbe4a6a3affb5757b1219cc9eb8124a134,2024-04-08T22:42:58.650000 +CVE-2023-40390,0,0,dcc08f1579a2804bdfa75d3a1e4b64bbe4a6a3affb5757b1219cc9eb8124a134,2024-04-08T22:42:58.650000 CVE-2023-40391,0,0,674710606efc5e20f3b4d034fd6151d2f994f0410f8a773be4faafb0e10f357d,2023-11-07T04:20:12.943000 CVE-2023-40392,0,0,84bd7104c6189c2c6e9b4ab3e6ad9d972f95c392c1e5bd1a44d7d7f201861784,2023-12-22T15:18:01.370000 CVE-2023-40393,0,0,4bc719fe5b2c101665c569bf2c331dc4a53294b75d2f5d545fba8e39b8e680a7,2024-01-17T18:30:39.897000 @@ -228869,7 +228869,7 @@ CVE-2023-40548,0,0,d740a2b8a13e8813735dd2afef30cd8df83a004b64be9266b3a33c9494c9c CVE-2023-40549,0,0,f3e5db151ee531b27b6ccdd941e8af2105e35d0f53958595d6c0bc80cce5e542,2024-02-05T21:33:24.707000 CVE-2023-4055,0,0,a76fc1fa0e45973f400a49513a2db89a2627bd4fbf5c01947ac1c4f676cd8aeb,2023-08-09T21:15:11.820000 CVE-2023-40550,0,0,9f289352f5b3ef8fe58f1e2bc083f0230602eb136dcc409311dd01025296c62a,2024-02-05T21:38:37.280000 -CVE-2023-40551,0,1,7e23f8c15d6d96ebab3b02e1cbac027592cfe60840a84e1ef36066ee55339baa,2024-04-08T22:50:42.587000 +CVE-2023-40551,0,0,7e23f8c15d6d96ebab3b02e1cbac027592cfe60840a84e1ef36066ee55339baa,2024-04-08T22:50:42.587000 CVE-2023-40552,0,0,c2622408aa36bd78f5e5430d30ee7193e6af4e034508bc1f26ac2385010c374f,2023-09-08T21:27:56.877000 CVE-2023-40553,0,0,f75c02cf1e791ac55e3a969e16572991fc3e66a0701028da1fb8fc02a85ffa08,2023-09-08T21:22:31.697000 CVE-2023-40554,0,0,a92d3a47fe3c14157d269f90a7243f921fd8d94afe574f04f0e5826a46692480,2023-09-08T21:22:23.213000 @@ -230388,10 +230388,10 @@ CVE-2023-42889,0,0,42361d7a844de9570556985cb5c26fe399cae2c49e9ac17e150405bc9bd14 CVE-2023-4289,0,0,f449244f705f291b0d7ddbc329d46d68ae72f3f405646fb1709b45473269b907,2023-11-07T04:22:25.410000 CVE-2023-42890,0,0,eacabcc2a4af39632e6d4228761680fb329094370499894080f37a6035d56207,2024-02-02T03:11:18.417000 CVE-2023-42891,0,0,7846fe25f210e0b0608521c50c1b1f15957f2513ef89a3c83e589c7bed8db2b2,2023-12-13T17:46:10.560000 -CVE-2023-42892,0,1,d656999f27fd959b2d8aad578b89fba3bd151847b52057bf20ddc66a5929d7ae,2024-04-08T22:43:44.103000 -CVE-2023-42893,0,1,3b5c902b52b645d9aede0f9fe80c044f3f2e5d4cab56f3f386485fbba15922ae,2024-04-08T22:45:24.987000 +CVE-2023-42892,0,0,d656999f27fd959b2d8aad578b89fba3bd151847b52057bf20ddc66a5929d7ae,2024-04-08T22:43:44.103000 +CVE-2023-42893,0,0,3b5c902b52b645d9aede0f9fe80c044f3f2e5d4cab56f3f386485fbba15922ae,2024-04-08T22:45:24.987000 CVE-2023-42894,0,0,675f93d1b0d4296c714bb851c1c8cebe1d109e20fbe5c2802462dd05c7607dcc,2024-02-02T03:11:25.083000 -CVE-2023-42896,0,1,90349bc552afff68a55bebf13df422103ebf33a47922db40606280b46ab44421,2024-04-08T22:45:48.987000 +CVE-2023-42896,0,0,90349bc552afff68a55bebf13df422103ebf33a47922db40606280b46ab44421,2024-04-08T22:45:48.987000 CVE-2023-42897,0,0,b9f50f6e7bf2b37ee8bcc879a04d31e42b1e46ab101c921014af1dae5762efc0,2023-12-13T20:57:23.147000 CVE-2023-42898,0,0,dcd63d2da25631e7b1de0a508c17683086fe149cd68524397b9248e14b5c0a13,2023-12-13T23:15:29.030000 CVE-2023-42899,0,0,a3799d4a021bbd53e7e95b764e09f7a56ae66d67b39322f34aee128999f61553,2023-12-14T14:07:42.957000 @@ -230410,7 +230410,7 @@ CVE-2023-4291,0,0,820c0ef5909fcefa01c2a721d589920b63994852e7a069d42cd163e7b56171 CVE-2023-42910,0,0,71a54e7b7fb5706098fa51027de526083f12c7f45c9c197df68e4ac606502e93,2023-12-13T19:14:00.170000 CVE-2023-42911,0,0,867b92b373d754d783128b4f56f24fc6b647c44603b483046d9505c18745d73b,2023-12-13T19:12:48.780000 CVE-2023-42912,0,0,c098e394dc0a67e07f9df04c549c33226f6d9ce3b3c9000a8422b2e740c1e1ce,2023-12-13T19:20:21.287000 -CVE-2023-42913,0,1,fca9e6b4a7bebf8cd0dd440c67f0319697b048295dd7ed33ccca693aa95bb9ee,2024-04-08T22:46:44.747000 +CVE-2023-42913,0,0,fca9e6b4a7bebf8cd0dd440c67f0319697b048295dd7ed33ccca693aa95bb9ee,2024-04-08T22:46:44.747000 CVE-2023-42914,0,0,d136deea7639edb129a4f43389dd9bd60f947fe20e61b8abbaafea8d30a38f33,2023-12-14T14:54:10.347000 CVE-2023-42915,0,0,1be85ce6fa0cfc0bf8e379977bec0d27fb6c9ccbc4c64c6fe4121e3a8a02c76e,2024-02-14T03:15:13.210000 CVE-2023-42916,0,0,1069f61a27a7fa77970bbb0175ce8643cfc992d30189fcf5adedb4c6bed028c3,2024-01-26T17:15:10.007000 @@ -230426,13 +230426,13 @@ CVE-2023-42927,0,0,c9a9ed650bc0549f85d7705bd9d3466edcaeed91950814aa06162a7b15f57 CVE-2023-42928,0,0,4d575fc7bee0ddbdac6cb470d5d7d4a1a9c0adf90a31f047e6f305ee0485dd5a,2024-02-22T19:07:27.197000 CVE-2023-42929,0,0,eb3f00ec709ba2f7760fb72343fbc272118a213ac02cb710d8fda7bd7caee235,2024-01-12T14:42:35.277000 CVE-2023-4293,0,0,8c3d33cc7fec3d9fd4477f1dbb51347bcd3c3988430a3515a2e389b8d5e05eab,2023-11-07T04:22:25.750000 -CVE-2023-42930,0,1,00ba480d92534d8bf16eb0b9b509da978474e6eeba0de572b854069e83b9fb08,2024-04-08T22:46:51.907000 -CVE-2023-42931,0,1,cc135f3a406bba6acce03c3ed1d75052b880c12d21ae369126b45d24a980e70c,2024-04-08T22:47:13.533000 +CVE-2023-42930,0,0,00ba480d92534d8bf16eb0b9b509da978474e6eeba0de572b854069e83b9fb08,2024-04-08T22:46:51.907000 +CVE-2023-42931,0,0,cc135f3a406bba6acce03c3ed1d75052b880c12d21ae369126b45d24a980e70c,2024-04-08T22:47:13.533000 CVE-2023-42932,0,0,d72ebc99606ff88b5196fb92ba085a234d9bb36deaf43aae627023bac3f8f5fa,2023-12-13T21:15:31.733000 CVE-2023-42933,0,0,4515d35610e674bb40f9ac6898c27078c01d4ce90705902554e59c696decfa5a,2024-01-12T14:42:31.583000 CVE-2023-42934,0,0,9bbd832bbd99920d5b4e7783d7815e5b4e4bfb6335bc1932425966a175c8c3cb,2024-01-16T23:52:48.783000 CVE-2023-42935,0,0,606ee85ca40462fb734cd978403d80127f0d12edae5212a236ef5fd51294018c,2024-01-29T18:38:29.587000 -CVE-2023-42936,0,1,c8b134e22a8c4a8345a7b4db2f9af72d76f27c183f9956a66c5482843e8260b5,2024-04-08T22:47:26.453000 +CVE-2023-42936,0,0,c8b134e22a8c4a8345a7b4db2f9af72d76f27c183f9956a66c5482843e8260b5,2024-04-08T22:47:26.453000 CVE-2023-42937,0,0,c2539e1b6a362c132317285010348324c513a5269588c97c8989267a27c3c96b,2024-01-29T18:33:19.387000 CVE-2023-42938,0,0,5131d8f087536d0606d5c40f40ef895ada5b56a263e5aa85faf17635383e1f67,2024-03-14T20:15:07.040000 CVE-2023-42939,0,0,4b0304a240b255af54a2d16f83934322490b0bc4310fde824596ed206eb1503c,2024-02-22T19:07:27.197000 @@ -230442,16 +230442,16 @@ CVE-2023-42941,0,0,be8c2f55cce80031919c17cdf6118cd30bd6c8016a8d2c844474b450e95b7 CVE-2023-42942,0,0,07ba94131ee2af175813b684a3418fba2b1cb10f8bf4794024c3c777fccf87a6,2024-02-22T19:07:27.197000 CVE-2023-42945,0,0,8965ecb696fbb6d1dfc191b5b241cb2dbad9c4594ab7548615100be2688c334d,2024-02-22T19:07:27.197000 CVE-2023-42946,0,0,6e687d6a54184ed98b48ec9994a691a9f653d38c2a6ab147b69be8a3c35af011,2024-02-22T19:07:27.197000 -CVE-2023-42947,0,1,8ed3ffbfb2c476e513c40129d12606cb9e4b3f19c299a40cb654f0978040bc2f,2024-04-08T22:47:21.010000 +CVE-2023-42947,0,0,8ed3ffbfb2c476e513c40129d12606cb9e4b3f19c299a40cb654f0978040bc2f,2024-04-08T22:47:21.010000 CVE-2023-4295,0,0,ec56fb9406b5889c47288aaf0ca0b50df9da68e8409e0f183bd2d96adf912d6b,2023-12-28T17:14:36.030000 -CVE-2023-42950,0,1,69fdb2f7278376195a309d6861cd9efe0fcd83287a3286201b3fafe8d544b4a5,2024-04-08T22:48:38.313000 +CVE-2023-42950,0,0,69fdb2f7278376195a309d6861cd9efe0fcd83287a3286201b3fafe8d544b4a5,2024-04-08T22:48:38.313000 CVE-2023-42951,0,0,f47d9d53b96327a99c3cf9d9b6178395ac7e4f6ffb9fc1067e40ded2ecc60fdb,2024-02-22T19:07:27.197000 CVE-2023-42952,0,0,f7dadd56b6a68a714e4e042690efb1e01d718cc903255fad9804058d56088666,2024-02-22T19:07:27.197000 CVE-2023-42953,0,0,0ea855ba33bbd4297f25ae9925400ebda739241895a723a394f07f9bd3e18595,2024-02-22T19:07:27.197000 CVE-2023-42954,0,0,4ff84847c56efbc3f637425a9807eb7b381f4c2cedb6bf16f12c3ca640d4fba3,2024-03-22T12:45:36.130000 -CVE-2023-42956,0,1,b6cb15aaacf9cd1c49dfc87b9d9e85d92de1e1949bdbc37d4a6ff7c3bf01b24a,2024-04-08T22:47:31.973000 +CVE-2023-42956,0,0,b6cb15aaacf9cd1c49dfc87b9d9e85d92de1e1949bdbc37d4a6ff7c3bf01b24a,2024-04-08T22:47:31.973000 CVE-2023-4296,0,0,e4697418375e16ece070d7b80c1fefdaf488931fca9a321d519649e0d7ae4f3c,2023-11-07T04:22:26.050000 -CVE-2023-42962,0,1,44095971da853f64edd0a62395835f1f770cc82d53ee4c8cc6c9470bceeed50c,2024-04-08T22:47:42.510000 +CVE-2023-42962,0,0,44095971da853f64edd0a62395835f1f770cc82d53ee4c8cc6c9470bceeed50c,2024-04-08T22:47:42.510000 CVE-2023-4297,0,0,2c1c4e8e16b8093dbd67367ad04a33c7dee7987a75a3f105a73f15afb0fc121e,2023-11-30T05:15:24.520000 CVE-2023-42974,0,0,f146a4f93cbfe69b799e2f0b8a1594194e9694ff38b91b063e3f51d0eca3fccb,2024-03-28T20:53:20.813000 CVE-2023-4298,0,0,8d44cb3045014d8716e0dbcd1489dfd2b845690c0f9918da8a0ecf5aeaadb4f7,2023-11-07T04:22:26.147000 @@ -235058,7 +235058,7 @@ CVE-2023-50308,0,0,4c428dc4aa8f2a5b0595b4c0d28f670c006a7eb1ab0b493ed318005adf398 CVE-2023-5031,0,0,79cd5d09927dfcf847955b250bcbbd2a9a8e20582d6018a897df3d7fe6670a8a,2024-03-21T02:50:08.083000 CVE-2023-50311,0,0,fdb48a0a2b26345ab9b530ecccf392cc33fb00ee77f863d560b06ecbc8d12bd6,2024-04-02T17:55:47.107000 CVE-2023-50312,0,0,6148af5f69534aed77dae184fe2b672b68a4148611b3e761eddeb346c4e8ac63,2024-03-01T14:04:26.010000 -CVE-2023-50313,0,1,1e42ef8d73b8a8de0cdb4cb5b79d41f2d2be7c1030ef82f855207f9a58a45845,2024-04-08T22:48:41.757000 +CVE-2023-50313,0,0,1e42ef8d73b8a8de0cdb4cb5b79d41f2d2be7c1030ef82f855207f9a58a45845,2024-04-08T22:48:41.757000 CVE-2023-5032,0,0,5645c09e42964a85ef14012bf6f8dc670f8f03482c9dc44d9ee40fd39c2128f3,2024-03-21T02:50:08.167000 CVE-2023-50324,0,0,cc0221acaafa968ac132d85e25d9b8e598f80dbac724406dbac7c798123ec049,2024-03-01T14:04:26.010000 CVE-2023-50326,0,0,1e0d0de6f14a74874e8f72cd7a0d4b5fddea211baaeba38b2981a5eecdd22e64,2024-02-02T16:14:50.620000 @@ -238142,8 +238142,8 @@ CVE-2024-0078,0,0,65ef1b62c09f229e677e8506d114a0ad3f4b855306a2baa770a721ed0ba97b CVE-2024-0079,0,0,a48198aa8d1b8e21233ccb1563194a0dce57e3cb1ac8f4c28d49144e25d1a534,2024-03-28T02:01:13.303000 CVE-2024-0080,0,0,6c0d206dd91620b9eed7dc804b37cabf92e6b94b99ac768289c8d5abe0e718c9,2024-04-08T18:49:25.863000 CVE-2024-0081,0,0,7224cfd553042ae01e2abfd02f661fee4ab9e15edf612773f3a2b6523001079f,2024-04-08T18:49:25.863000 -CVE-2024-0082,1,1,ae991367e08225121157180c24a5fdbb166425d7192b60b9395f4a4f24a46bf6,2024-04-08T22:15:07.993000 -CVE-2024-0083,1,1,53d00967f7407453d60abb433b5aefae44d594b137a7afac7fbffae58a630f23,2024-04-08T22:15:08.203000 +CVE-2024-0082,0,0,ae991367e08225121157180c24a5fdbb166425d7192b60b9395f4a4f24a46bf6,2024-04-08T22:15:07.993000 +CVE-2024-0083,0,0,53d00967f7407453d60abb433b5aefae44d594b137a7afac7fbffae58a630f23,2024-04-08T22:15:08.203000 CVE-2024-0154,0,0,fee6d0edd38400fe9a2f331d67a355be9bc81701717352554939ef10dafbbf73,2024-03-13T18:15:58.530000 CVE-2024-0155,0,0,56d3003aea28bbff1e776f33de697fc847d720d7a8270931f6c22f264f5611eb,2024-03-04T13:58:23.447000 CVE-2024-0156,0,0,47a5ee4f12284e0f109441891942aa0eb589b2387e172b6366b6741bcabc51b4,2024-03-04T13:58:23.447000 @@ -240302,7 +240302,7 @@ CVE-2024-21890,0,0,d0d6d1a152080740d6ba84ad392a919d70445665b25a7f6969e602652f189 CVE-2024-21891,0,0,e424ef0f7a416dd53e40d650cdce75de43c958a1f5dba4ec358496f75617d5f2,2024-03-15T11:15:08.753000 CVE-2024-21892,0,0,20e5acefe40d87bdcf0ddd06c773a67f885e875636f69c9336b01748da654b1a,2024-03-22T19:15:08.477000 CVE-2024-21893,0,0,8e30826f2f638f6b28dccfb70150ad8a33cc616c290d8b76095e5ee871803b64,2024-02-01T02:00:01.187000 -CVE-2024-21894,0,1,78e81b5d057018993badd2be6cc56fe1fecba9799406c1904ab0b415aa943275,2024-04-08T22:53:09.773000 +CVE-2024-21894,0,0,78e81b5d057018993badd2be6cc56fe1fecba9799406c1904ab0b415aa943275,2024-04-08T22:53:09.773000 CVE-2024-21896,0,0,19b337275b4c80290e30856ac5f19a33170bf79b2972a381de5433010e95582d,2024-03-29T13:15:14 CVE-2024-21899,0,0,688bbc85b9f5d15251f75737cd336d68aa458da265ba78cb33907c6eacd4fe61,2024-03-13T14:25:02.043000 CVE-2024-21900,0,0,e9e3bacd169a2499fbcf9944a7d36b5aa443f74334f0445e246d0d286dadb841,2024-03-13T14:24:02.157000 @@ -240344,7 +240344,7 @@ CVE-2024-22019,0,0,f2437e68c6ddb8f7177f54a0e9f52e5ca8426b13996c7a8a6cfcbbb0d671c CVE-2024-2202,0,0,830996a3e5b6be902d6f2e65d3759482285591493d041fcbf74113f66926d781,2024-03-25T01:51:01.223000 CVE-2024-22021,0,0,ba38d4b86a2c5af951f989c7a28594b6207f0b19739ba3d580be6e4d49001bfb,2024-02-29T01:44:04.690000 CVE-2024-22022,0,0,925c0d46bbd39b5d0f2644b5e26e0cd82488a20b7de7cccfa4639e9bb8f60d9e,2024-02-15T18:45:30.887000 -CVE-2024-22023,0,1,7e8e0e905a60ffd4a97223bf6516f7cf037ccc58c54cec4a4d059a3dd8a4e247,2024-04-08T22:51:43.003000 +CVE-2024-22023,0,0,7e8e0e905a60ffd4a97223bf6516f7cf037ccc58c54cec4a4d059a3dd8a4e247,2024-04-08T22:51:43.003000 CVE-2024-22024,0,0,980d44adebdc63cfe4985efd7aa2ee2044d33423093fc7c9f165c43f20a43115,2024-02-13T15:15:32.193000 CVE-2024-22025,0,0,61459addde8d883e2fba52001930c3fdd5c1e72e223ae9ae0e9157b1bc2b1032,2024-03-27T03:15:11.187000 CVE-2024-22027,0,0,0822e6ca4a0197c830c667319442a46ae27f8152642de8d7f05f1858eada021b,2024-01-18T20:02:46.993000 @@ -240363,8 +240363,8 @@ CVE-2024-22048,0,0,ccec92a3265daf717c2bbbed7f0a34c57c44b3241b68cc37edd5bca0fad67 CVE-2024-22049,0,0,9b7359ed630e382551d4570c9533818edaca377c6778b42eef7546c62195794e,2024-01-23T19:15:08.283000 CVE-2024-22050,0,0,6cc1f5932c87c1ee4d5f0c22a81597d6852da9226b500ed6c316fab1f5f2b61b,2024-01-10T15:10:36.697000 CVE-2024-22051,0,0,351db93d6ca76e0dc0a7975efc553f9724406030c8337d111a27ec7033241658,2024-01-11T17:07:05.660000 -CVE-2024-22052,0,1,0227f99d44e89893938b4544ca95dcc1c41e798d05744c94fdce48542d951019,2024-04-08T22:52:44.573000 -CVE-2024-22053,0,1,8caa4e40ec88ec96bdfc5af942e0f8feb54eb37f45d5fc1c8cea6c8e5bc74f38,2024-04-08T22:53:03.443000 +CVE-2024-22052,0,0,0227f99d44e89893938b4544ca95dcc1c41e798d05744c94fdce48542d951019,2024-04-08T22:52:44.573000 +CVE-2024-22053,0,0,8caa4e40ec88ec96bdfc5af942e0f8feb54eb37f45d5fc1c8cea6c8e5bc74f38,2024-04-08T22:53:03.443000 CVE-2024-22054,0,0,ea7f90611fdd0de53fc019330b39d133a7eda202c929c51b6ca495fd39ad0bf5,2024-03-04T02:15:16.820000 CVE-2024-2206,0,0,d5a4112d81b12c296cee2d4a4427b7935f710f4d11684daab2b2fb84c48f6bc9,2024-03-27T12:29:30.307000 CVE-2024-22075,0,0,e134c94ca50cfff14da7c6327f518dbd409e37e86810fc1b2a583012e3bdb9ef,2024-01-10T15:06:42.563000 @@ -240776,7 +240776,7 @@ CVE-2024-22938,0,0,d14c96ecc84394e0c226b15d653363af8f866fc8a362ffe8912d5673a5fc1 CVE-2024-22939,0,0,98ae5450b25ceaff1169d7851ac12cb3d1f8ed4212f5c71a0110eb042c52a6d7,2024-02-29T13:49:29.390000 CVE-2024-2294,0,0,7adaa24a33704366500d65a38c52ba5d5887ad22bed1bd0562d7b36efb6d901e,2024-03-17T22:38:29.433000 CVE-2024-22942,0,0,27e1b96b16010d66938a1930cd0293d602396f85521af099c802bf269035b527,2024-01-18T15:15:47.273000 -CVE-2024-22949,1,1,9f50a76ffcc828af29dfdda45bb6ef0b8b7a02fa40b7a257176056a4d5139f2a,2024-04-08T23:15:07.647000 +CVE-2024-22949,0,0,9f50a76ffcc828af29dfdda45bb6ef0b8b7a02fa40b7a257176056a4d5139f2a,2024-04-08T23:15:07.647000 CVE-2024-22955,0,0,4ae6e1e162ac27be2c1563f300454f76989ec1b9814e0f4be1652f56a6f11be5,2024-01-25T14:54:48.427000 CVE-2024-22956,0,0,2da6b272cb072bcb92b74c4c5c3faca0048e5b46583e9ffdd9571398ebecd789,2024-01-25T14:55:01.053000 CVE-2024-22957,0,0,045bad9ba8bb739147d8dcd83b4e5a0ded4b848e11c744629a53c265926b4f4e,2024-01-25T14:59:59.737000 @@ -240802,11 +240802,11 @@ CVE-2024-23060,0,0,293f3db63669f513fdf6243d872feab4a40014b3abd2eff3b8edca7a0ed1b CVE-2024-23061,0,0,d40b225d92d8f0f0d47201622b24e50bc3550ed3e56a2682a133a8aeae5027e3,2024-01-18T15:18:14.357000 CVE-2024-2307,0,0,4b089dd0281a455952ab30b1c14e2b1725f875efc3e98fe223b3d9160259d255,2024-03-20T13:00:16.367000 CVE-2024-23078,0,0,6ccdfef45001c815b1c8a321f5fdb93824801b7a858b705656dc577c4b59c206,2024-04-08T20:15:08.500000 -CVE-2024-23079,1,1,0dcc3d3975c6d390e57d0a9e44bbb6bb70a660da60e8f2c822dce166e4beb639,2024-04-08T23:15:07.703000 +CVE-2024-23079,0,0,0dcc3d3975c6d390e57d0a9e44bbb6bb70a660da60e8f2c822dce166e4beb639,2024-04-08T23:15:07.703000 CVE-2024-2308,0,0,e35ab419c5c511708eb8574821633f88a1168237ea61ded1d7aa5b331f06479a,2024-03-17T22:38:29.433000 -CVE-2024-23081,1,1,f13f502b7e2e1db8066ddc5074d5b80e3cc891b8e742f30ea256fa56155c64d6,2024-04-08T23:15:07.757000 +CVE-2024-23081,0,0,f13f502b7e2e1db8066ddc5074d5b80e3cc891b8e742f30ea256fa56155c64d6,2024-04-08T23:15:07.757000 CVE-2024-23082,0,0,0a9e38aa01f043532a8be7b3040bd9f24c4cb812cc5c2c38c18325d962369a71,2024-04-08T18:48:40.217000 -CVE-2024-23084,1,1,cc3fe5e43e6cc3d4fe9878fcdf7855182620a14f9f8ea54d74f3c390c55eec58,2024-04-08T23:15:07.803000 +CVE-2024-23084,0,0,cc3fe5e43e6cc3d4fe9878fcdf7855182620a14f9f8ea54d74f3c390c55eec58,2024-04-08T23:15:07.803000 CVE-2024-23085,0,0,c8b0d35c4a557d6e919fb6d1242860cc216cbb10b6bb40b4d8c08dbe656610b0,2024-04-08T20:15:08.567000 CVE-2024-23086,0,0,65368b69d6d0eef07e38824732b878b0b1f0c0abb48bc5df2794ee9fdf0b94d1,2024-04-08T20:15:08.620000 CVE-2024-23094,0,0,8b7fd2c37601b9f636934db44ed8e567ef20eff4d921df465afdbb6ef925a041,2024-02-22T19:07:27.197000 @@ -241049,7 +241049,7 @@ CVE-2024-2355,0,0,3245d70a394465f76ff5f05fc26b95bf0c5d50d1856adb39bb340583679667 CVE-2024-23550,0,0,233aa541fdda788f0e4e95c8a9a0a8f5d7fa7689dcd559af0cf5e5843a531076,2024-02-13T00:57:33.613000 CVE-2024-23553,0,0,51ea2d50cc1ff4dbab518de2a29e9ef6a91bd6b91073c23eb1a7f0cb7c8f1090,2024-02-10T00:59:00.423000 CVE-2024-2357,0,0,2af3f167a5f07c033333870e1f5044e9ac66d1548287fd20eff05541e2132cfb,2024-03-23T03:15:12.690000 -CVE-2024-23584,1,1,7c11631f47a9cd8d18bc29523d2c089eb4e039bce017c0ddd915e33188a191fd,2024-04-08T23:15:07.850000 +CVE-2024-23584,0,0,7c11631f47a9cd8d18bc29523d2c089eb4e039bce017c0ddd915e33188a191fd,2024-04-08T23:15:07.850000 CVE-2024-23591,0,0,f4c08614f6a162f49ecc99f020c088036b0b565e06b57796e1304b45ae78e59d,2024-02-20T22:15:08.353000 CVE-2024-23592,0,0,8410729adf8ea2140a95009744b2dfc023c8f0c5b5843d18404a4118ed1b693b,2024-04-08T18:49:25.863000 CVE-2024-23603,0,0,2b536971fe4d260603348583e5e85d59f5debd4cec090f729c87a6dbde3a5ce7,2024-02-14T18:04:45.380000 @@ -242058,6 +242058,7 @@ CVE-2024-25642,0,0,bf91eeb1502dedca60fe6c035b93d7dfc5a440bc6932322c6ae4d128b4c7c CVE-2024-25643,0,0,08f3e6c0d454841d4e4dc84aae81812246ffbd96bb71cc2e9e4566cd4077e910,2024-02-13T14:01:07.747000 CVE-2024-25644,0,0,cad748db94c87605f745ac8efbb54ef36e9bf866e1bcdbdf96bff9a05dfcf738,2024-03-12T12:40:13.500000 CVE-2024-25645,0,0,611af6391fb4617a6b65e5d2ff91bac5a4003873b65f133d0cd2495d911bd094,2024-03-12T12:40:13.500000 +CVE-2024-25646,1,1,c75d00751fed3de8449144392cb0585f29e46e25016c4f17748ae725d45561c2,2024-04-09T01:15:48.343000 CVE-2024-25649,0,0,3e37b8e86c2aaae32174cb72f32869171ec886cd62bb95537557a32583b80d63,2024-03-14T12:52:09.877000 CVE-2024-2565,0,0,f29b341373f4135f8349505114db202bd5fab0820f3e8d9e62cea3dd3d097a89,2024-03-21T02:52:38.533000 CVE-2024-25650,0,0,dc8b4afe4a9ab50c0ebaf06dbcbf0134b9648b4ff2232925762633c6b3fe0179,2024-03-14T12:52:16.723000 @@ -242984,7 +242985,7 @@ CVE-2024-27627,0,0,6b314556f3fa2e7fb50707266f0d07d8792d06426c2d3b5f17382297ce118 CVE-2024-2763,0,0,8e9d345d7389664f80611635b46c2cef2ec874e0b9963bec2a0f291297e78b38,2024-03-22T12:45:36.130000 CVE-2024-27630,0,0,1af794bd73a1a981369ee11a8d740d74c2d4ddaa2b8325a16bd8d015c271d702,2024-04-08T21:15:09.983000 CVE-2024-27631,0,0,06f624de111450e75fa73f39020e095767cb778364bea9eef968fd43c313a3d4,2024-04-08T21:15:10.067000 -CVE-2024-27632,1,1,77b2fef9184238aa65b7a05f1fcf8e38cdd5d8baed8ae8b674ef90fb91227938,2024-04-08T22:15:08.413000 +CVE-2024-27632,0,0,77b2fef9184238aa65b7a05f1fcf8e38cdd5d8baed8ae8b674ef90fb91227938,2024-04-08T22:15:08.413000 CVE-2024-2764,0,0,3ec67dc4c0d54764b942178e18d5d6721bd9017d0e5926b52df0eec1f7386756,2024-03-22T12:45:36.130000 CVE-2024-27655,0,0,65a637f75a188da438b32cc13f4600329f3f424dcd0f437c9989c4c9314e002f,2024-03-01T14:04:26.010000 CVE-2024-27656,0,0,2f731c51e226b6152416f771e826d74f69590b91bf713c56222b4fac3d8f2331,2024-03-01T14:04:26.010000 @@ -243048,7 +243049,10 @@ CVE-2024-27894,0,0,249999fc9487c1b63574e09bae3fbcbcdf7b20ef335df69d9151a0f5ea4d7 CVE-2024-27895,0,0,e8e082e473ed76dea7e0db1fd0e0603d1d69d1ba5e6a1a82578100cdf406ffed,2024-04-08T18:48:40.217000 CVE-2024-27896,0,0,88fc4dc869bbb4cce477334b59754ef261ad68592aa0aa0ff71f89ccdf4b1875,2024-04-08T18:48:40.217000 CVE-2024-27897,0,0,6aeb0d28af447513b32ff29a7545806bc788b73261dbf5d52e00ce86aa2905c0,2024-04-08T18:48:40.217000 +CVE-2024-27898,1,1,29b0a9172a1eebfd24f6675c2ebbbf977083adceed455d2567ab962a2a31f8d6,2024-04-09T01:15:48.583000 +CVE-2024-27899,1,1,45f5f66a4e3da7332edf34d39ccf63b255c4cb8cac5cb60aac62b9fd2729ddf2,2024-04-09T01:15:48.777000 CVE-2024-27900,0,0,00f9885d5a06fec36b56a14fdc3be21ddc255c1561a408e91e09aee1b7ac8b37,2024-03-12T12:40:13.500000 +CVE-2024-27901,1,1,1f100058faa206f75a8299605708ec984f36533043410845917ace6aec0b805e,2024-04-09T01:15:48.993000 CVE-2024-27902,0,0,7aa835c5c3cccf2434107e43a6dd21c3ee48d8e6664a62d49734964bcc016141,2024-03-12T12:40:13.500000 CVE-2024-27905,0,0,3e20ed1ee55859457fccacd02ccfd33b203e184f29107e3c93e267df9f8d58a8,2024-03-21T02:52:20.520000 CVE-2024-27906,0,0,e279155c32f0030358ce7d189e782f3e54d78a6a202b13937f95f2706818bee5,2024-02-29T13:49:29.390000 @@ -243103,6 +243107,7 @@ CVE-2024-27968,0,0,81cf818ff4c52a717cdd4ac78ff685291ab11ee5a0785fe2aaaed4be1173d CVE-2024-27972,0,0,e0f7933a8078741e5e2cdbc1c8aaffaa42eca2ccffc4cf4f10a410272b4fcf47,2024-04-03T12:38:04.840000 CVE-2024-27974,0,0,c5d12161a6a294fb4d33a068888d07d2dec693f9073d8d47f06182bf4fe2779a,2024-03-18T12:38:25.490000 CVE-2024-27981,0,0,bca4d502eb0003b495c2e3eabf4c8b77f995ffb842787b13a54996fb18ec7ff9,2024-04-05T12:40:52.763000 +CVE-2024-27983,1,1,462e2e83b9f399bcd91568acb26b09d2f5c5418ba921c90db44ae36772ba68d2,2024-04-09T01:15:49.197000 CVE-2024-27986,0,0,221ac31a72264e8303bc0dc716d0bcad27f92aa2e3b64824247f9d02601983b8,2024-03-14T12:52:09.877000 CVE-2024-27987,0,0,457341cfe208a4dd4f1ca3a12fe23df96b337000dbd585aed58689be29e5bec4,2024-03-15T12:53:06.423000 CVE-2024-27993,0,0,4178545ce3cee5131bcc85417ac208f6615c9c5305016cf5248ec96a71c28f2b,2024-03-21T15:24:35.093000 @@ -243209,6 +243214,7 @@ CVE-2024-28160,0,0,d3496ce06cdd6165787a1abcbf55db9c0fb2db641796e2cfba31e7190572a CVE-2024-28161,0,0,ac1d3f11953e0c8ea875284019208bd8e81c5e134926913a38bbbd0ca21cd968,2024-03-06T21:42:54.697000 CVE-2024-28162,0,0,9bc5df2476915a3318874e35bcdb7d25e1035d05316c0fdc6385663896a911e1,2024-03-06T21:42:54.697000 CVE-2024-28163,0,0,04503ad76f6d74637a8e6f8a7d443052dfa73d2acab964dffd0d8da32b69e3b5,2024-03-12T12:40:13.500000 +CVE-2024-28167,1,1,9a55ab4d6b3ad8b492f0fc017ea43d153c689b6906572f369d8da09ce3625626,2024-04-09T01:15:49.380000 CVE-2024-2817,0,0,e0fe06a461ef795accd74c0bb92d92dd98cb14b12292f98e359c857cfb17ef6d,2024-03-26T03:15:19.720000 CVE-2024-28171,0,0,c1f19d20247dc1e3f04cbf911cc73142848c14a173b812d8f71f312ba63d2b48,2024-03-22T12:45:36.130000 CVE-2024-28173,0,0,542df716604f915101d48aeccfd0a59d896ed582a3774f62c0cc2b438bc897c4,2024-03-06T21:42:54.697000 @@ -243427,7 +243433,7 @@ CVE-2024-28757,0,0,6f674e74da8b1d303f1997061736a8f7699c424c20f0aba68e441f140f441 CVE-2024-28782,0,0,2c346a16649d57b4cd6688055d888a86d12f94177200ab9afb6a4e0c69d4e875,2024-04-03T12:38:04.840000 CVE-2024-28784,0,0,c979b0334a0081e1847a4bc955e67dbbc0397aed136c4d3aa1b489c4f3f267b2,2024-03-27T15:49:51.300000 CVE-2024-28787,0,0,466884053e2fb97771b0b18e87658d91d7f6894823937327962bdc9b1ecfdc33,2024-04-04T19:24:50.670000 -CVE-2024-2879,0,1,b3cb63a21efa9503ae3e8fbd2c3fbecce8466a6f50871d6397f8e38479a77e62,2024-04-08T22:49:41.533000 +CVE-2024-2879,0,0,b3cb63a21efa9503ae3e8fbd2c3fbecce8466a6f50871d6397f8e38479a77e62,2024-04-08T22:49:41.533000 CVE-2024-28815,0,0,f9ba7e38674697b7d17d51e7b24c9c896d5b8cd72333d8b6833bda1b0cb49c74,2024-03-27T12:29:30.307000 CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000 CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e9dc,2024-03-11T12:47:42.653000 @@ -243701,11 +243707,12 @@ CVE-2024-29741,0,0,58a208fae70919819896a10b0ac69af17481c90fbaf33f6b074138668c845 CVE-2024-29742,0,0,013e0935d87738e02ad985787df8e1bdb20608d450a31e334d4001bfd987aadc,2024-04-08T18:49:25.863000 CVE-2024-29743,0,0,2d88b2eb4af432fcf658c698c6f44520850b6e65f42e4f9d8e435f0857ed03f4,2024-04-08T18:49:25.863000 CVE-2024-29744,0,0,ca9c34220842db20c040958869ee7619d2f9abf8c801f17b5df2ee3c7b5aa48c,2024-04-08T18:49:25.863000 -CVE-2024-29745,0,1,360b3e0cef9ad697b4849e4b6c4e59a864e3d365e1324c003422150c1ef1dda2,2024-04-08T22:53:32.127000 +CVE-2024-29745,0,0,360b3e0cef9ad697b4849e4b6c4e59a864e3d365e1324c003422150c1ef1dda2,2024-04-08T22:53:32.127000 CVE-2024-29746,0,0,29af8006f9fbd7af7095512e80e5bf0ae4c64952a941d41acef3a04849082a4e,2024-04-08T18:49:25.863000 CVE-2024-29747,0,0,87f4e304e93f8b6f286c656028c07dd1ca332ec61fa47e7ce7d137f30fe66b91,2024-04-08T18:49:25.863000 -CVE-2024-29748,0,1,521433bbadcb400dfc92897155d667884ae0c1a8d67cb01db78baff427b50b49,2024-04-08T22:52:33.780000 +CVE-2024-29748,0,0,521433bbadcb400dfc92897155d667884ae0c1a8d67cb01db78baff427b50b49,2024-04-08T22:52:33.780000 CVE-2024-29749,0,0,33b9f39d00d5461e17b7d5a8f346443f168cc7b139342c04719e9f38cd1e308c,2024-04-08T18:49:25.863000 +CVE-2024-2975,1,1,bc6630236fbea59ea85108099a00f8d460e796c3dd2ded65943ede8bd6baee37,2024-04-09T01:15:49.583000 CVE-2024-29750,0,0,cd8489f4573c543020a3b6e8b96290737b84849a080d45bc65ef0ff04a2c59f0,2024-04-08T18:49:25.863000 CVE-2024-29751,0,0,3bc4aa316cc8565894aaa2a9c412da7054d4f835fd37d50bf2ebd4a04ae9df25,2024-04-08T18:49:25.863000 CVE-2024-29752,0,0,8570c8346da874298f8f35ea2088404fb97ccfc316a51781a5f28a7a73ba2064,2024-04-08T18:49:25.863000 @@ -243913,6 +243920,11 @@ CVE-2024-30202,0,0,31db9c331e53ee7e35e14a4f4da9c9118966173e7dfd1773c267c14439e4d CVE-2024-30203,0,0,444aebb38c12835907cb7a31abaa6167c0351378679f511812ede323236ede80,2024-03-25T16:43:06.137000 CVE-2024-30204,0,0,036541cdb0b2547c6a0b159ebcde955e789df823270814d2ecf5a2ea473b3058,2024-03-25T16:43:06.137000 CVE-2024-30205,0,0,49c6abb5e041dbd344a1c2878ff4314f11b475ed55487542fa5ade5e7cd812b8,2024-03-25T16:43:06.137000 +CVE-2024-30214,1,1,9cbb84d5a31cde891755a74be46005a7ae14cc0fe7a81a16294b5e794e71b95b,2024-04-09T01:15:49.750000 +CVE-2024-30215,1,1,63c0103988a8a22d50b4f5920b1d344f44816b12c4a4bd2838f874c7170c27f7,2024-04-09T01:15:49.953000 +CVE-2024-30216,1,1,23e6330d5e67b3939a808dea3c48b015ea93ffe0e940d5e3db258ada971a742a,2024-04-09T01:15:50.140000 +CVE-2024-30217,1,1,dc05ee90d167762240bbfd4770ae1675986fb9f2999d716d3c5750c55a05cbce,2024-04-09T01:15:50.353000 +CVE-2024-30218,1,1,d0680a6e32010322311576701fff049a2fb3821324253bdcc8e519d58dbb41f6,2024-04-09T01:15:50.570000 CVE-2024-3022,0,0,f291c8130c561158256d7e5f236acfb4472a78c940a59eb4c1d015abd789d2b5,2024-04-04T12:48:41.700000 CVE-2024-30221,0,0,8c33faec8eecbd1bc4775ea7d226df03d8dec1186991b9fb17295c2b460f3a49,2024-03-28T12:42:56.150000 CVE-2024-30222,0,0,16d5c6200c88be9ed99126042f393681469af79a0a1fab7e0ddf18cd42a248eb,2024-03-28T12:42:56.150000 @@ -244149,8 +244161,8 @@ CVE-2024-30607,0,0,e51d37ea841a6aa5a58d29c2fd2f369dad1d9ac4d04df2e45c313680f9d80 CVE-2024-3061,0,0,054a64adadf829199461c8947e83d82d0bfbaf37f9787cbdfa16d3c5c41cdbff,2024-03-29T12:45:02.937000 CVE-2024-30612,0,0,d3e38b0b52b131f63a2436162f6169b4c7f41927a463362731d27c02d3dc5490,2024-03-28T16:07:30.893000 CVE-2024-30613,0,0,85edf4dcba25f48e47bd3fb552d267b1bc1ba9edabbb038873d2002086974cfb,2024-03-29T13:28:22.880000 -CVE-2024-30620,0,1,f9b642c1a8666a3b209896f3d8c00f6cf482b0f3ba6d96dea1aa48dc74a998f4,2024-04-08T22:48:50.340000 -CVE-2024-30621,0,1,9fba13a7080ae15640edcf3cb18d8dd79481c10bb3102533f267ff3982d5b57e,2024-04-08T22:48:53.950000 +CVE-2024-30620,0,0,f9b642c1a8666a3b209896f3d8c00f6cf482b0f3ba6d96dea1aa48dc74a998f4,2024-04-08T22:48:50.340000 +CVE-2024-30621,0,0,9fba13a7080ae15640edcf3cb18d8dd79481c10bb3102533f267ff3982d5b57e,2024-04-08T22:48:53.950000 CVE-2024-30622,0,0,0da5246ef4e8510b5fbd6bec86e149da05d8dfe76b52aa744b083196821dd6ad,2024-03-29T13:28:22.880000 CVE-2024-30623,0,0,6ede78fde134768f49ef746b2af5d5df00d246247702695d5ba85541fd1d9066,2024-03-29T13:28:22.880000 CVE-2024-30624,0,0,66d3e2d7e06cec16684c816196f2a69004a5a14026cf6f1d337c7e127ed9e3f6,2024-03-29T13:28:22.880000 @@ -244230,7 +244242,7 @@ CVE-2024-31022,0,0,a14e43455f8667f5b08643f4accc0ded65ef08c98d3d4f6b069b1542bbf69 CVE-2024-31025,0,0,049c3aee715c9c75f255eea2ba7d71aee620ad97e93ef3b0e0a948ae51dd0b57,2024-04-04T12:48:41.700000 CVE-2024-31032,0,0,71dbb2a787f73b1914bf5d51e1b83b5365eb112b3ab9ed4df5d1066682b5223b,2024-04-01T01:12:59.077000 CVE-2024-31033,0,0,897cdecff344b121550f3f8e1b3cb821fdde5689eabf8f2834a81266f3e9da87,2024-04-03T03:15:10.670000 -CVE-2024-31047,1,1,c175d27ed17d4bf949120d8409b6dbaecb9c46ddadf7527ed65cef283f88c52d,2024-04-08T23:15:08.023000 +CVE-2024-31047,0,0,c175d27ed17d4bf949120d8409b6dbaecb9c46ddadf7527ed65cef283f88c52d,2024-04-08T23:15:08.023000 CVE-2024-31061,0,0,020e38014038ba97f692790c06c98735ee7323fcc8614755f16c9c5708fe33f5,2024-03-28T20:53:20.813000 CVE-2024-31062,0,0,9a85b45f2ef9be7ff3563a8d396c3a8dd45f237219d28fbf343c7fa8953f9bf5,2024-03-28T20:53:20.813000 CVE-2024-31063,0,0,8c5e031664c3b218697e91183f663111a47f52e7fd5496cafc4f238d7a0c4ce8,2024-03-28T20:53:20.813000 @@ -244273,10 +244285,10 @@ CVE-2024-31121,0,0,4fe9a2eff5a4d2ff266e2e268b50578938b85c71b50b3bd948fd3ec69947d CVE-2024-31122,0,0,745a899ec0013d7867b6d15accca135c5ce3d8a09d809883e11eb140dbea32b8,2024-04-01T01:12:59.077000 CVE-2024-31123,0,0,db6c777a75b99cd3d3fe96b0cba09aef21f155fa00f588627dc337a7a44a5e61,2024-04-01T01:12:59.077000 CVE-2024-31134,0,0,307f324939c3734fa79d1f0dddedc9adb8cc7847f094168b4a1c49e1a46ababb,2024-03-28T16:07:30.893000 -CVE-2024-31135,0,1,e1f83c93dca169dafe8886f98e7099ebeb7b296e29c7758b3d99556d317a623e,2024-04-08T22:39:48.067000 +CVE-2024-31135,0,0,e1f83c93dca169dafe8886f98e7099ebeb7b296e29c7758b3d99556d317a623e,2024-04-08T22:39:48.067000 CVE-2024-31136,0,0,9a1669032126d15d4a0add55ca0ae3fcacf2fba1c78134597f80eeb59ca3294e,2024-03-28T16:07:30.893000 -CVE-2024-31137,0,1,d8c60b512e3cd344cbe0e7070d591f251aa086e93689a00f3d05728c7eb4bc7e,2024-04-08T22:41:02.117000 -CVE-2024-31138,0,1,80619d8b23ffb923a4bb521ee1877f29e2a086a5161850672cdc2424af6c6396,2024-04-08T22:41:43.087000 +CVE-2024-31137,0,0,d8c60b512e3cd344cbe0e7070d591f251aa086e93689a00f3d05728c7eb4bc7e,2024-04-08T22:41:02.117000 +CVE-2024-31138,0,0,80619d8b23ffb923a4bb521ee1877f29e2a086a5161850672cdc2424af6c6396,2024-04-08T22:41:43.087000 CVE-2024-31139,0,0,6254efb24474a93bf19fb224a952376f20b94666e671b313ffb9fb5d6ba4e123,2024-03-28T16:07:30.893000 CVE-2024-31140,0,0,8ac72cdd6b5f7f56e71e87459ff46ad8714fcc8b963def523c845a786f9f62ca,2024-03-28T16:07:30.893000 CVE-2024-3116,0,0,442c5653c6cfe9feb902808d7a86b402a42b6c98e54ac39c11d1d128b28eb1d2,2024-04-04T16:33:06.610000