Auto-Update: 2024-03-21T17:01:03.199130+00:00

This commit is contained in:
cad-safe-bot 2024-03-21 17:03:52 +00:00
parent 922ddbf9f9
commit b4be1255c4
26 changed files with 477 additions and 65 deletions

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2023-47715",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-03-21T15:15:07.593",
"lastModified": "2024-03-21T15:24:35.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Storage Protect Plus Server 10.1.0 through 10.1.16 could allow an authenticated user with read-only permissions to add or delete entries from an existing HyperVisor configuration. IBM X-Force ID: 271538."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/271538",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7144861",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-1394",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-03-21T13:00:08.037",
"lastModified": "2024-03-21T13:00:08.037",
"vulnStatus": "Received",
"lastModified": "2024-03-21T15:24:35.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs\u200b. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey\u200b and ctx\u200b. That function uses named return parameters to free pkey\u200b and ctx\u200b if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the \"return nil, nil, fail(...)\" pattern, meaning that pkey\u200b and ctx\u200b will be nil inside the deferred function that should free them."
"value": "A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs?. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey? and ctx?. That function uses named return parameters to free pkey? and ctx? if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the \"return nil, nil, fail(...)\" pattern, meaning that pkey? and ctx? will be nil inside the deferred function that should free them."
}
],
"metrics": {

View File

@ -0,0 +1,41 @@
{
"id": "CVE-2024-2463",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-03-21T15:16:54.417",
"lastModified": "2024-03-21T15:24:35.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Weak password recovery mechanism in CDeX application allows to retrieve\u00a0password\u00a0reset token.This issue affects CDeX application versions through 5.7.1.\n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "cvd@cert.pl",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-640"
}
]
}
],
"references": [
{
"url": "https://cdex.cloud/",
"source": "cvd@cert.pl"
},
{
"url": "https://cert.pl/en/posts/2024/03/CVE-2024-2463/",
"source": "cvd@cert.pl"
},
{
"url": "https://cert.pl/posts/2024/03/CVE-2024-2463/",
"source": "cvd@cert.pl"
}
]
}

View File

@ -0,0 +1,41 @@
{
"id": "CVE-2024-2464",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-03-21T15:16:54.490",
"lastModified": "2024-03-21T15:24:35.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users.This issue affects CDeX application versions through 5.7.1.\n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "cvd@cert.pl",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
}
],
"references": [
{
"url": "https://cdex.cloud/",
"source": "cvd@cert.pl"
},
{
"url": "https://cert.pl/en/posts/2024/03/CVE-2024-2463/",
"source": "cvd@cert.pl"
},
{
"url": "https://cert.pl/posts/2024/03/CVE-2024-2463/",
"source": "cvd@cert.pl"
}
]
}

View File

@ -0,0 +1,41 @@
{
"id": "CVE-2024-2465",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-03-21T15:16:54.553",
"lastModified": "2024-03-21T15:24:35.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Open redirection vulnerability in CDeX application\u00a0allows to redirect users to arbitrary websites via a specially crafted URL.This issue affects CDeX application versions through 5.7.1.\n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "cvd@cert.pl",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://cdex.cloud/",
"source": "cvd@cert.pl"
},
{
"url": "https://cert.pl/en/posts/2024/03/CVE-2024-2463/",
"source": "cvd@cert.pl"
},
{
"url": "https://cert.pl/posts/2024/03/CVE-2024-2463/",
"source": "cvd@cert.pl"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2494",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-03-21T14:15:10.350",
"lastModified": "2024-03-21T14:15:10.350",
"vulnStatus": "Received",
"lastModified": "2024-03-21T15:24:35.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-27993",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-21T15:16:53.697",
"lastModified": "2024-03-21T15:24:35.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Typps Calendarista Basic Edition.This issue affects Calendarista Basic Edition: from n/a through 3.0.2.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/calendarista-basic-edition/wordpress-calendarista-basic-edition-plugin-3-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-27994",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-21T15:16:53.950",
"lastModified": "2024-03-21T15:24:35.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in YITH YITH WooCommerce Product Add-Ons allows Reflected XSS.This issue affects YITH WooCommerce Product Add-Ons: from n/a through 4.5.0.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/yith-woocommerce-product-add-ons/wordpress-yith-woocommerce-product-add-ons-plugin-4-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-27995",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-21T15:16:54.133",
"lastModified": "2024-03-21T15:24:35.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Repute Infosystems ARMember \u2013 Membership Plugin, Content Restriction, Member Levels, User Profile & User signup allows Stored XSS.This issue affects ARMember \u2013 Membership Plugin, Content Restriction, Member Levels, User Profile & User signup: from n/a through 4.0.23.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/armember-membership/wordpress-armember-plugin-4-0-23-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28834",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-03-21T14:15:07.547",
"lastModified": "2024-03-21T14:15:07.547",
"vulnStatus": "Received",
"lastModified": "2024-03-21T15:24:35.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-29243",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-21T15:16:54.320",
"lastModified": "2024-03-21T15:24:35.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Shenzhen Libituo Technology Co., Ltd LBT-T300-mini v1.2.9 was discovered to contain a buffer overflow via the vpn_client_ip parameter at /apply.cgi."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/AdamRitz/lbtvul/blob/main/t300mini-2.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-29244",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-21T15:16:54.377",
"lastModified": "2024-03-21T15:24:35.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Shenzhen Libituo Technology Co., Ltd LBT-T300-mini v1.2.9 was discovered to contain a buffer overflow via the pin_code_3g parameter at /apply.cgi."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/AdamRitz/lbtvul/blob/main/t300mini-2.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29866",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-21T14:15:07.810",
"lastModified": "2024-03-21T14:15:07.810",
"vulnStatus": "Received",
"lastModified": "2024-03-21T15:24:35.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29870",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-03-21T14:15:07.867",
"lastModified": "2024-03-21T14:15:07.867",
"vulnStatus": "Received",
"lastModified": "2024-03-21T15:24:35.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29871",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-03-21T14:15:08.080",
"lastModified": "2024-03-21T14:15:08.080",
"vulnStatus": "Received",
"lastModified": "2024-03-21T15:24:35.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29872",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-03-21T14:15:08.313",
"lastModified": "2024-03-21T14:15:08.313",
"vulnStatus": "Received",
"lastModified": "2024-03-21T15:24:35.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29873",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-03-21T14:15:08.520",
"lastModified": "2024-03-21T14:15:08.520",
"vulnStatus": "Received",
"lastModified": "2024-03-21T15:24:35.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29874",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-03-21T14:15:08.767",
"lastModified": "2024-03-21T14:15:08.767",
"vulnStatus": "Received",
"lastModified": "2024-03-21T15:24:35.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29875",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-03-21T14:15:08.980",
"lastModified": "2024-03-21T14:15:08.980",
"vulnStatus": "Received",
"lastModified": "2024-03-21T15:24:35.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29876",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-03-21T14:15:09.163",
"lastModified": "2024-03-21T14:15:09.163",
"vulnStatus": "Received",
"lastModified": "2024-03-21T15:24:35.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29877",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-03-21T14:15:09.353",
"lastModified": "2024-03-21T14:15:09.353",
"vulnStatus": "Received",
"lastModified": "2024-03-21T15:24:35.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29878",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-03-21T14:15:09.593",
"lastModified": "2024-03-21T14:15:09.593",
"vulnStatus": "Received",
"lastModified": "2024-03-21T15:24:35.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29879",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-03-21T14:15:09.817",
"lastModified": "2024-03-21T14:15:09.817",
"vulnStatus": "Received",
"lastModified": "2024-03-21T15:24:35.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29880",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-03-21T14:15:10.077",
"lastModified": "2024-03-21T14:15:10.077",
"vulnStatus": "Received",
"lastModified": "2024-03-21T15:24:35.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-03-21T15:01:01.490580+00:00
2024-03-21T17:01:03.199130+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-03-21T14:15:10.350000+00:00
2024-03-21T15:24:35.093000+00:00
```
### Last Data Feed Release
@ -29,33 +29,43 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
242338
242347
```
### CVEs added in the last Commit
Recently added CVEs: `14`
Recently added CVEs: `9`
* [CVE-2024-2494](CVE-2024/CVE-2024-24xx/CVE-2024-2494.json) (`2024-03-21T14:15:10.350`)
* [CVE-2024-28834](CVE-2024/CVE-2024-288xx/CVE-2024-28834.json) (`2024-03-21T14:15:07.547`)
* [CVE-2024-29866](CVE-2024/CVE-2024-298xx/CVE-2024-29866.json) (`2024-03-21T14:15:07.810`)
* [CVE-2024-29870](CVE-2024/CVE-2024-298xx/CVE-2024-29870.json) (`2024-03-21T14:15:07.867`)
* [CVE-2024-29871](CVE-2024/CVE-2024-298xx/CVE-2024-29871.json) (`2024-03-21T14:15:08.080`)
* [CVE-2024-29872](CVE-2024/CVE-2024-298xx/CVE-2024-29872.json) (`2024-03-21T14:15:08.313`)
* [CVE-2024-29873](CVE-2024/CVE-2024-298xx/CVE-2024-29873.json) (`2024-03-21T14:15:08.520`)
* [CVE-2024-29874](CVE-2024/CVE-2024-298xx/CVE-2024-29874.json) (`2024-03-21T14:15:08.767`)
* [CVE-2024-29875](CVE-2024/CVE-2024-298xx/CVE-2024-29875.json) (`2024-03-21T14:15:08.980`)
* [CVE-2024-29876](CVE-2024/CVE-2024-298xx/CVE-2024-29876.json) (`2024-03-21T14:15:09.163`)
* [CVE-2024-29877](CVE-2024/CVE-2024-298xx/CVE-2024-29877.json) (`2024-03-21T14:15:09.353`)
* [CVE-2024-29878](CVE-2024/CVE-2024-298xx/CVE-2024-29878.json) (`2024-03-21T14:15:09.593`)
* [CVE-2024-29879](CVE-2024/CVE-2024-298xx/CVE-2024-29879.json) (`2024-03-21T14:15:09.817`)
* [CVE-2024-29880](CVE-2024/CVE-2024-298xx/CVE-2024-29880.json) (`2024-03-21T14:15:10.077`)
* [CVE-2023-47715](CVE-2023/CVE-2023-477xx/CVE-2023-47715.json) (`2024-03-21T15:15:07.593`)
* [CVE-2024-2463](CVE-2024/CVE-2024-24xx/CVE-2024-2463.json) (`2024-03-21T15:16:54.417`)
* [CVE-2024-2464](CVE-2024/CVE-2024-24xx/CVE-2024-2464.json) (`2024-03-21T15:16:54.490`)
* [CVE-2024-2465](CVE-2024/CVE-2024-24xx/CVE-2024-2465.json) (`2024-03-21T15:16:54.553`)
* [CVE-2024-27993](CVE-2024/CVE-2024-279xx/CVE-2024-27993.json) (`2024-03-21T15:16:53.697`)
* [CVE-2024-27994](CVE-2024/CVE-2024-279xx/CVE-2024-27994.json) (`2024-03-21T15:16:53.950`)
* [CVE-2024-27995](CVE-2024/CVE-2024-279xx/CVE-2024-27995.json) (`2024-03-21T15:16:54.133`)
* [CVE-2024-29243](CVE-2024/CVE-2024-292xx/CVE-2024-29243.json) (`2024-03-21T15:16:54.320`)
* [CVE-2024-29244](CVE-2024/CVE-2024-292xx/CVE-2024-29244.json) (`2024-03-21T15:16:54.377`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `15`
* [CVE-2024-1394](CVE-2024/CVE-2024-13xx/CVE-2024-1394.json) (`2024-03-21T15:24:35.093`)
* [CVE-2024-2494](CVE-2024/CVE-2024-24xx/CVE-2024-2494.json) (`2024-03-21T15:24:35.093`)
* [CVE-2024-28834](CVE-2024/CVE-2024-288xx/CVE-2024-28834.json) (`2024-03-21T15:24:35.093`)
* [CVE-2024-29866](CVE-2024/CVE-2024-298xx/CVE-2024-29866.json) (`2024-03-21T15:24:35.093`)
* [CVE-2024-29870](CVE-2024/CVE-2024-298xx/CVE-2024-29870.json) (`2024-03-21T15:24:35.093`)
* [CVE-2024-29871](CVE-2024/CVE-2024-298xx/CVE-2024-29871.json) (`2024-03-21T15:24:35.093`)
* [CVE-2024-29872](CVE-2024/CVE-2024-298xx/CVE-2024-29872.json) (`2024-03-21T15:24:35.093`)
* [CVE-2024-29873](CVE-2024/CVE-2024-298xx/CVE-2024-29873.json) (`2024-03-21T15:24:35.093`)
* [CVE-2024-29874](CVE-2024/CVE-2024-298xx/CVE-2024-29874.json) (`2024-03-21T15:24:35.093`)
* [CVE-2024-29875](CVE-2024/CVE-2024-298xx/CVE-2024-29875.json) (`2024-03-21T15:24:35.093`)
* [CVE-2024-29876](CVE-2024/CVE-2024-298xx/CVE-2024-29876.json) (`2024-03-21T15:24:35.093`)
* [CVE-2024-29877](CVE-2024/CVE-2024-298xx/CVE-2024-29877.json) (`2024-03-21T15:24:35.093`)
* [CVE-2024-29878](CVE-2024/CVE-2024-298xx/CVE-2024-29878.json) (`2024-03-21T15:24:35.093`)
* [CVE-2024-29879](CVE-2024/CVE-2024-298xx/CVE-2024-29879.json) (`2024-03-21T15:24:35.093`)
* [CVE-2024-29880](CVE-2024/CVE-2024-298xx/CVE-2024-29880.json) (`2024-03-21T15:24:35.093`)
## Download and Usage

View File

@ -233215,6 +233215,7 @@ CVE-2023-47705,0,0,e3d4b068cec26511f3145778a695a8a2080173336ca900c2cb1d02fe4260e
CVE-2023-47706,0,0,0cfaecc187d4236dd38d13dc0e25752f35e7adc63caac950330b0f64c0b0d36d,2023-12-22T10:11:40.633000
CVE-2023-47707,0,0,c0b40bcf5eaa712d14fa41e4477281db7d00ecb46e35f8e08b13ff46eeb7db79,2023-12-22T10:00:51.667000
CVE-2023-4771,0,0,d0a9b68633cdbf963bbdd2b3878793c4ef1f150510595f6b4aa4f9d063a414b2,2023-11-28T19:09:05.517000
CVE-2023-47715,1,1,0c6694596606d941ea5afe5ea7b27770e5a0d9728d61ef06d70df0e6fcec99f2,2024-03-21T15:24:35.093000
CVE-2023-47716,0,0,62bb7b17d2839b029f6ac267e0b09b92e0e697ce278d1faccc537c28ae26ec06,2024-03-01T14:04:26.010000
CVE-2023-47718,0,0,c741441681738efc3979d67da4409868f353d29cc92314f5037f92d0809304bd,2024-01-24T21:23:15.540000
CVE-2023-4772,0,0,cfd718e5f5f861c90ad1b1b61b69dbfa920c9351e02c2667625b5fa349288ce0,2023-11-07T04:22:57.827000
@ -238774,7 +238775,7 @@ CVE-2024-1390,0,0,760bcdaac2db269a3249aaa20e58e1659b2977bdb995748ef5e46a1ecb8544
CVE-2024-1391,0,0,d263861df201411e95604a0f8dea4a32aa5aa465f14e9d3ee26c7cf1dddcea30,2024-03-13T18:15:58.530000
CVE-2024-1392,0,0,854e6aa0a85eb7f6e01984f9f2b39f09c3e464c67a90f670cafc735773e56736,2024-03-13T18:15:58.530000
CVE-2024-1393,0,0,139d32a27df25f29abc2bcda3159db69b338e05c68d7680abed80afd815e8ff5,2024-03-13T18:15:58.530000
CVE-2024-1394,0,0,0a23089c4be2fb9578409d22ba1cb72a18b442f1853d1ebf0f27f82a8e874c2f,2024-03-21T13:00:08.037000
CVE-2024-1394,0,1,294b053d2ffc51433a2d64e8d98c3ac8a415fb04eaae593428f7a34b72b8edc5,2024-03-21T15:24:35.093000
CVE-2024-1397,0,0,e6d8c9c2beca75d3fdc5f918cb423cf21913a9c807f46126d5b49c29c7bd60f0,2024-03-13T12:33:51.697000
CVE-2024-1398,0,0,7a7783e481aa897afa83bd125da0d53c431d5a5a9d43f1ade8b1e715449f59a0,2024-03-04T13:58:23.447000
CVE-2024-1400,0,0,295a10f36c3e13d694d09cafc6872c0c48f9e2b4c87da0889327ecdac7abe4ac,2024-03-12T12:40:13.500000
@ -240882,6 +240883,9 @@ CVE-2024-24593,0,0,155720893bd9aa302467d506c561d7f3174f3ae580a95d8dad9c1ee6fc9e6
CVE-2024-24594,0,0,2d1d6ef3edb6eea27d760a77187cf0f21d8b0e3aa5e2b1e9eb45515b37617cb4,2024-02-15T16:47:17.213000
CVE-2024-24595,0,0,53aa45116d4573f7c0b646b17e4787137c5ab03b6e722457f3ddd917489c99e4,2024-02-13T14:08:55.650000
CVE-2024-2460,0,0,ae8df8f819284d0f0ea1a2589261357f393234fec195be42118065d37d02123d,2024-03-20T13:00:16.367000
CVE-2024-2463,1,1,d32eed22bf8a5fcf19609631d56de6b5b6d90eae3a6bf9f710f87e5bdc1555f5,2024-03-21T15:24:35.093000
CVE-2024-2464,1,1,56f44447e0d256990841443a68df981cd7582a3850793a83bd5ba95f65e47e1c,2024-03-21T15:24:35.093000
CVE-2024-2465,1,1,2a77d33e3025e3f4f2328d9cfb33df2ea3c6a07d249ae9c526b18aebbde46668,2024-03-21T15:24:35.093000
CVE-2024-24680,0,0,00c6b06cbd399fac9a1cb69a45fdeee991ea9572aae73c195704c3555b436eb7,2024-02-15T18:46:48.693000
CVE-2024-24681,0,0,705110c1a0575ef95794934b23101ccc4a6f384f7c61c4db9f4dbf9a8c528dd4,2024-02-26T13:42:22.567000
CVE-2024-24683,0,0,5dcfcb131b936f6ead6cae5418b28b2fe1bb1011c1c921fe73c5d9bd261bf34a,2024-03-19T13:26:46
@ -241057,7 +241061,7 @@ CVE-2024-24936,0,0,b40cba45486310464826445db58797cda9708090ef629993d6b65c1322a94
CVE-2024-24937,0,0,c158a1376665515fcdd077ebbbc61196266e17dfca3642cdd3f2b284922e7576,2024-02-09T01:05:30.783000
CVE-2024-24938,0,0,919f0844348072e68674027ea0a3644c0c8fc392a786b352b8f3abde920f1f60,2024-02-09T01:05:13.527000
CVE-2024-24939,0,0,b2b5d03f9e7db36f290b4e039454a0e87440b3b4044776d74739544bb234180a,2024-02-09T01:04:16.577000
CVE-2024-2494,1,1,63f261f20581d4b36948213d752abea41e22762bf93a52da0bccbbbbb8d98c6b,2024-03-21T14:15:10.350000
CVE-2024-2494,0,1,84ede45321bf48443a2c564f3d4c5fb0def59051719248e3d2f74255b0f14448,2024-03-21T15:24:35.093000
CVE-2024-24940,0,0,3b807f9711835fcb1381b61d94808660dccf6fdaaa44b568b18928314f306783,2024-02-07T23:45:31.493000
CVE-2024-24941,0,0,3ce7539cc2c00ca21eaf8843bb8dfa494f8daac6c677d25fe85a072b680aec63,2024-02-09T01:05:05.250000
CVE-2024-24942,0,0,98967e5f253d2f0e2d6c9adde01d5feb324664bac3fce3b7b875de585c5550eb,2024-02-09T01:03:13.453000
@ -242053,6 +242057,9 @@ CVE-2024-27961,0,0,3162bfbc67900a83a9b4114dba265e7189f0bad8c0ddf2d85f6724674d135
CVE-2024-27974,0,0,c5d12161a6a294fb4d33a068888d07d2dec693f9073d8d47f06182bf4fe2779a,2024-03-18T12:38:25.490000
CVE-2024-27986,0,0,221ac31a72264e8303bc0dc716d0bcad27f92aa2e3b64824247f9d02601983b8,2024-03-14T12:52:09.877000
CVE-2024-27987,0,0,ce6fd0b1730cd837f285c0aaaa1258cf6aa8505469e7f313401adb363ee7f395,2024-03-15T12:53:06.423000
CVE-2024-27993,1,1,b4c5383b47399ec74c3480cf4f572eb4d9bdde4b0737cbc8bf7ed8cbe49e4ed8,2024-03-21T15:24:35.093000
CVE-2024-27994,1,1,e85e7bc4f691478aca76ee076ff4f9f23d2d33165eac31a30e8922db5bb9bf99,2024-03-21T15:24:35.093000
CVE-2024-27995,1,1,31db9c3046ef3b6826fd04aab15586376d26e0b529bdf84ce7eba17bac569f0a,2024-03-21T15:24:35.093000
CVE-2024-27996,0,0,79cff30308b011c07df476cb18acc5ff1830e7bf17b14d1ca5a0d9446fa716b8,2024-03-20T13:00:16.367000
CVE-2024-27997,0,0,b42c7cf4751e4a11a6e5eeb90c0df264fce89958ee556b8b06894cd2e68b11ce,2024-03-20T13:00:16.367000
CVE-2024-27998,0,0,325b1a8419d02931fcb08c1286afe5c33e53c5bf8527e201a365155e360914cf,2024-03-20T13:00:16.367000
@ -242239,7 +242246,7 @@ CVE-2024-28754,0,0,9281349f951cf3fa92b3f484f1e5f3e3b9f20229dcabe6872ba34e9bebaf3
CVE-2024-28757,0,0,83cb6aefc1d6f4ccc5441198cdfc19ec27b4e109d2bc2864c936baa137f8e197,2024-03-19T03:15:06.893000
CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000
CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e9dc,2024-03-11T12:47:42.653000
CVE-2024-28834,1,1,49dd8c5bce1ef5354057f5beed8f9118273750b7ba7af3f57c721b8c69f2dbe9,2024-03-21T14:15:07.547000
CVE-2024-28834,0,1,841718fd8fddff124f231102263dad7d394e02b19e9697b20d411d85f567df2c,2024-03-21T15:24:35.093000
CVE-2024-28835,0,0,807354fa6b4609be92d801df299988ca81259642594a0e94cba8cafe4de90346,2024-03-21T12:58:51.093000
CVE-2024-28847,0,0,77ca7298b6799783b77992e414cebfaaf69a1bd2c05124cbdf6b914d3e0bb310,2024-03-17T22:38:29.433000
CVE-2024-28848,0,0,f738fe56a5bc4cdb728fabdb4b9cb52618afbf9827db3dbc12ec3f1fb91169bf,2024-03-21T02:52:25.197000
@ -242313,6 +242320,8 @@ CVE-2024-29143,0,0,a3f92e2c9ae6aaf4168f841be16c13a544cace199faa049656661980aa53e
CVE-2024-29151,0,0,ef852a662e1eaee7e15d971ee7451f2c3e954b3d808a30cb9a36bbe68bb24c8f,2024-03-18T12:38:25.490000
CVE-2024-29154,0,0,dab131c9ff393e828252009730d8617a5e1a4fb5cfb7f2db054056bc6f27c2ba,2024-03-18T12:38:25.490000
CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2326,2024-03-18T12:38:25.490000
CVE-2024-29243,1,1,80b3eab65af2d9fbeb7b6048e074697688a19de63e1138c377d0b826523dd7db,2024-03-21T15:24:35.093000
CVE-2024-29244,1,1,ab4dadc4ff7b45a2c285edb922de956bae0828f007627c62339f15145e95a7b7,2024-03-21T15:24:35.093000
CVE-2024-29419,0,0,1f113c646466febbefbd1317ecc5036f9bdf6e219db156971cfdda70e05f32f0,2024-03-20T17:18:21.343000
CVE-2024-29469,0,0,acf93e04574e9669a29498319a75720c9b5a03ff4de2c06070b1f52ac9f365b7,2024-03-21T12:58:51.093000
CVE-2024-29470,0,0,ec8cc83a60b9ef7edaa49e0605acc097203825f31a2e1ca35494b606ac2473df,2024-03-21T12:58:51.093000
@ -242325,15 +242334,15 @@ CVE-2024-29858,0,0,585719d860c91771e96e52d882eed744121f21e899f727afe6b381f4ffbb3
CVE-2024-29859,0,0,6ebff5730a73f542ffebf0a56f74146bb69314ac3f95118519ec4b678666f245,2024-03-21T12:58:51.093000
CVE-2024-29862,0,0,78f62d6320f790cb50cb5767943bbca91d7f9763b83315a1495201af3fd41026,2024-03-21T12:58:51.093000
CVE-2024-29864,0,0,3c9560ffae0fa16acac4cf8327bf4ae3182996a8c684b25430908ed832b73c71,2024-03-21T12:58:51.093000
CVE-2024-29866,1,1,b7aae42ff0f8d26ef8d271f21c3bcba0c2676fb462916aab4cad2c78bb4e36f6,2024-03-21T14:15:07.810000
CVE-2024-29870,1,1,3505d6d3160d8f477a76dce538125c3d05fda98fea30d8cd2e776d2473790f7b,2024-03-21T14:15:07.867000
CVE-2024-29871,1,1,51c0f159938b8d9421ca76e3f560a6524eebd96fc5429c06757e4fcf784a6a98,2024-03-21T14:15:08.080000
CVE-2024-29872,1,1,51d8118ac7521ab72274e141dd426302a1a73491662744fcfdd12a6a22088085,2024-03-21T14:15:08.313000
CVE-2024-29873,1,1,08125b51ba63d3bf83ff2f8bb90c7ac43bee6fac5baf9c26bb47fd37946337d5,2024-03-21T14:15:08.520000
CVE-2024-29874,1,1,fcda0ac7dc303bbb7de5a3ffab12518861a224ac3ce1bd6053196d247e119c54,2024-03-21T14:15:08.767000
CVE-2024-29875,1,1,2d19c9eba5f8ffdc8816cd88cf5875cf8467329b3b7a945d029634e127a6f65f,2024-03-21T14:15:08.980000
CVE-2024-29876,1,1,2d4adfc531f81e22dcdb8d233db5ac43ff28b8756f3e2e97e2833a22df6dd30b,2024-03-21T14:15:09.163000
CVE-2024-29877,1,1,ae3711f0c18f7d645ce821470e00e41ff5a2fe70c0c6c066e4af620364c05194,2024-03-21T14:15:09.353000
CVE-2024-29878,1,1,d3448c7485a0c9c8d93283db8afe376c3d6d03a15eecf21f3d06cf15c244fd20,2024-03-21T14:15:09.593000
CVE-2024-29879,1,1,e7f8f9b502882e6d22482da09d9455e94a91e17212b7ad15ca68fcc8faaf940e,2024-03-21T14:15:09.817000
CVE-2024-29880,1,1,1bf20db2449227eb571e21d9b9932fbc8ffafb226464106d6cf267f6fb063df8,2024-03-21T14:15:10.077000
CVE-2024-29866,0,1,d3474a4cb7339082dcfbd889d056a2a906f051d7c933d6576013f44ee70632b2,2024-03-21T15:24:35.093000
CVE-2024-29870,0,1,04eec461d26d3928388aa1ebeda7f3889d70d7fb805b862b11fc37cdb9c73805,2024-03-21T15:24:35.093000
CVE-2024-29871,0,1,e7b820291fe87f3c68126b9e66a3cb2071635a1781039b23d1340b3ec50d7104,2024-03-21T15:24:35.093000
CVE-2024-29872,0,1,2ed0e31c2aeb7a79b11a328bd37ec6ac592cb7ae8ad49b21b1fd6587d921da01,2024-03-21T15:24:35.093000
CVE-2024-29873,0,1,4c88c2b5d7ca113616f149d7c91b297271846cd8b9ee3b6472184ffa855db09d,2024-03-21T15:24:35.093000
CVE-2024-29874,0,1,5f5afb1bffc520634cc09fd8c228b7ee62224828af0f713d405da9c49edc2676,2024-03-21T15:24:35.093000
CVE-2024-29875,0,1,36d66cc7949cb01f56ec16bc1f171847efe7ceac006d82066a5f62664aaf8bbb,2024-03-21T15:24:35.093000
CVE-2024-29876,0,1,81e9b92db68fe1869c86668a1e00f2a9ff624f59839df1fbe18d8e987774c206,2024-03-21T15:24:35.093000
CVE-2024-29877,0,1,5b6a7271e346dceec62c9141f9ae12b0e5342a31cc26366c653fe20c26c8bc21,2024-03-21T15:24:35.093000
CVE-2024-29878,0,1,59bd69937e12e8238cdc5eae96014d85a453bedc37861446ca2ffcb7373dda8d,2024-03-21T15:24:35.093000
CVE-2024-29879,0,1,f281e5565c18f62981e30c243c39ad05583d9bbab1631a620c93b3c78846e1db,2024-03-21T15:24:35.093000
CVE-2024-29880,0,1,e4ba47a3336aba44b26bc2b767c682c9997cfe6f0e16a9457e7fe50a3abeaa1c,2024-03-21T15:24:35.093000

Can't render this file because it is too large.