diff --git a/CVE-2021/CVE-2021-44xx/CVE-2021-4438.json b/CVE-2021/CVE-2021-44xx/CVE-2021-4438.json new file mode 100644 index 00000000000..b29bfbd18e1 --- /dev/null +++ b/CVE-2021/CVE-2021-44xx/CVE-2021-4438.json @@ -0,0 +1,96 @@ +{ + "id": "CVE-2021-4438", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-04-07T09:15:07.980", + "lastModified": "2024-04-07T09:15:07.980", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in kyivstarteam react-native-sms-user-consent up to 1.1.4 on Android. Affected by this issue is the function registerReceiver of the file android/src/main/java/ua/kyivstar/reactnativesmsuserconsent/SmsUserConsentModule.kt. The manipulation leads to improper export of android application components. Attacking locally is a requirement. Upgrading to version 1.1.5 is able to address this issue. The name of the patch is 5423dcb0cd3e4d573b5520a71fa08aa279e4c3c7. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-259508." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 4.3 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 3.1, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-926" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/kyivstarteam/react-native-sms-user-consent/commit/5423dcb0cd3e4d573b5520a71fa08aa279e4c3c7", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/kyivstarteam/react-native-sms-user-consent/pull/4", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/kyivstarteam/react-native-sms-user-consent/releases/tag/1.1.5", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.259508", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.259508", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52382.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52382.json new file mode 100644 index 00000000000..f41323f6cb4 --- /dev/null +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52382.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-52382", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-04-07T09:15:08.317", + "lastModified": "2024-04-07T09:15:08.317", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability of improper control over foreground service notifications in the notification module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/", + "source": "psirt@huawei.com" + }, + { + "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52713.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52713.json new file mode 100644 index 00000000000..b35e0c924c0 --- /dev/null +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52713.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-52713", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-04-07T09:15:08.377", + "lastModified": "2024-04-07T09:15:08.377", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability of improper permission control in the window management module.\nImpact: Successful exploitation of this vulnerability will affect availability and confidentiality." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/", + "source": "psirt@huawei.com" + }, + { + "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52714.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52714.json new file mode 100644 index 00000000000..5247f37716c --- /dev/null +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52714.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-52714", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-04-07T09:15:08.423", + "lastModified": "2024-04-07T09:15:08.423", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability of defects introduced in the design process in the hwnff module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/", + "source": "psirt@huawei.com" + }, + { + "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52715.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52715.json new file mode 100644 index 00000000000..bf042ff3728 --- /dev/null +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52715.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-52715", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-04-07T09:15:08.477", + "lastModified": "2024-04-07T09:15:08.477", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The SystemUI module has a vulnerability in permission management.\nImpact: Successful exploitation of this vulnerability may affect availability." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/", + "source": "psirt@huawei.com" + }, + { + "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52716.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52716.json new file mode 100644 index 00000000000..089979188e8 --- /dev/null +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52716.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2023-52716", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-04-07T09:15:08.520", + "lastModified": "2024-04-07T09:15:08.520", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability of starting activities in the background in the ActivityManagerService (AMS) module.\nImpact: Successful exploitation of this vulnerability will affect availability." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/", + "source": "psirt@huawei.com" + }, + { + "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52717.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52717.json new file mode 100644 index 00000000000..2604e460d26 --- /dev/null +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52717.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-52717", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-04-07T09:15:08.600", + "lastModified": "2024-04-07T09:15:08.600", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Permission verification vulnerability in the lock screen module.\nImpact: Successful exploitation of this vulnerability will affect availability." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/", + "source": "psirt@huawei.com" + }, + { + "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30413.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30413.json new file mode 100644 index 00000000000..591b6b3ba35 --- /dev/null +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30413.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-30413", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-04-07T08:15:07.227", + "lastModified": "2024-04-07T08:15:07.227", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability of improper permission control in the window management module.\nImpact: Successful exploitation of this vulnerability will affect availability." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/", + "source": "psirt@huawei.com" + }, + { + "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30414.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30414.json new file mode 100644 index 00000000000..affe73c531c --- /dev/null +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30414.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2024-30414", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-04-07T08:15:07.373", + "lastModified": "2024-04-07T08:15:07.373", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Command injection vulnerability in the AccountManager module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/", + "source": "psirt@huawei.com" + }, + { + "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30415.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30415.json new file mode 100644 index 00000000000..fba4910b745 --- /dev/null +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30415.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-30415", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-04-07T08:15:07.483", + "lastModified": "2024-04-07T08:15:07.483", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability of improper permission control in the window management module.\nImpact: Successful exploitation of this vulnerability will affect availability." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/", + "source": "psirt@huawei.com" + }, + { + "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30416.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30416.json new file mode 100644 index 00000000000..46fdd04a8eb --- /dev/null +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30416.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2024-30416", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-04-07T09:15:08.650", + "lastModified": "2024-04-07T09:15:08.650", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Use After Free (UAF) vulnerability in the underlying driver module.\nImpact: Successful exploitation of this vulnerability will affect availability." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/", + "source": "psirt@huawei.com" + }, + { + "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30417.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30417.json new file mode 100644 index 00000000000..5b842fa5ec2 --- /dev/null +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30417.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2024-30417", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-04-07T09:15:08.727", + "lastModified": "2024-04-07T09:15:08.727", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Path traversal vulnerability in the Bluetooth-based sharing module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/", + "source": "psirt@huawei.com" + }, + { + "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30418.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30418.json new file mode 100644 index 00000000000..b3b8e8dbf90 --- /dev/null +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30418.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-30418", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-04-07T09:15:08.810", + "lastModified": "2024-04-07T09:15:08.810", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability of insufficient permission verification in the app management module.\nImpact: Successful exploitation of this vulnerability will affect availability." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/", + "source": "psirt@huawei.com" + }, + { + "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 4fb45e70654..be3a88bb8f6 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-04-07T08:00:38.092428+00:00 +2024-04-07T10:00:38.318313+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-04-07T06:15:08.223000+00:00 +2024-04-07T09:15:08.810000+00:00 ``` ### Last Data Feed Release @@ -33,14 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -244301 +244314 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `13` -- [CVE-2024-3417](CVE-2024/CVE-2024-34xx/CVE-2024-3417.json) (`2024-04-07T06:15:08.223`) +- [CVE-2021-4438](CVE-2021/CVE-2021-44xx/CVE-2021-4438.json) (`2024-04-07T09:15:07.980`) +- [CVE-2023-52382](CVE-2023/CVE-2023-523xx/CVE-2023-52382.json) (`2024-04-07T09:15:08.317`) +- [CVE-2023-52713](CVE-2023/CVE-2023-527xx/CVE-2023-52713.json) (`2024-04-07T09:15:08.377`) +- [CVE-2023-52714](CVE-2023/CVE-2023-527xx/CVE-2023-52714.json) (`2024-04-07T09:15:08.423`) +- [CVE-2023-52715](CVE-2023/CVE-2023-527xx/CVE-2023-52715.json) (`2024-04-07T09:15:08.477`) +- [CVE-2023-52716](CVE-2023/CVE-2023-527xx/CVE-2023-52716.json) (`2024-04-07T09:15:08.520`) +- [CVE-2023-52717](CVE-2023/CVE-2023-527xx/CVE-2023-52717.json) (`2024-04-07T09:15:08.600`) +- [CVE-2024-30413](CVE-2024/CVE-2024-304xx/CVE-2024-30413.json) (`2024-04-07T08:15:07.227`) +- [CVE-2024-30414](CVE-2024/CVE-2024-304xx/CVE-2024-30414.json) (`2024-04-07T08:15:07.373`) +- [CVE-2024-30415](CVE-2024/CVE-2024-304xx/CVE-2024-30415.json) (`2024-04-07T08:15:07.483`) +- [CVE-2024-30416](CVE-2024/CVE-2024-304xx/CVE-2024-30416.json) (`2024-04-07T09:15:08.650`) +- [CVE-2024-30417](CVE-2024/CVE-2024-304xx/CVE-2024-30417.json) (`2024-04-07T09:15:08.727`) +- [CVE-2024-30418](CVE-2024/CVE-2024-304xx/CVE-2024-30418.json) (`2024-04-07T09:15:08.810`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index a2b4d8a3a27..855f01807ae 100644 --- a/_state.csv +++ b/_state.csv @@ -185016,6 +185016,7 @@ CVE-2021-44376,0,0,ef70a3af0a788bfe441fa3cea7278b2fd1473c6bd37e6305118fc4225d7cc CVE-2021-44377,0,0,82d9f1ee7625cf617c5207ed67c52743ff5cd59a53b29fd20eaab2bedc0c3c65,2022-10-25T17:45:19.107000 CVE-2021-44378,0,0,870e0612881d8a665fabb9b00101d49ceaddb187df8ea88f52e7214e1e791834,2022-10-25T17:45:12.060000 CVE-2021-44379,0,0,51327504aa3cccaa51d1f682f6476074bb5b893fa6786d25ec532872024e3202,2022-10-25T17:44:33.863000 +CVE-2021-4438,1,1,6990a0cce9d4303ae05d808caa0961520276040bea73ecf742bf42148acf73aa,2024-04-07T09:15:07.980000 CVE-2021-44380,0,0,443a97fca81c1b1c154ed9d4148e2b7583b2c41b9af3ee8cf674d3756df1b0fc,2022-10-25T17:44:25.900000 CVE-2021-44381,0,0,dba69d3bc7ac8803c1636b3170844432e2975cb35137a1f5631b90e20981faa3,2022-10-25T17:44:17.347000 CVE-2021-44382,0,0,1708be32e649249e0730e3064dd46b522eaf902f954fe0c6d8964a709e7b95b1,2022-10-25T17:44:29.867000 @@ -236153,6 +236154,7 @@ CVE-2023-52379,0,0,ca682d4d897e50937e81bcdf7730d5c2894d90bd816224171ff8486a1fbed CVE-2023-5238,0,0,a261b85ed6b7b17d61d99dc1a4da76845d0517dc6639c69481ed60057b693590,2023-11-08T18:37:35.557000 CVE-2023-52380,0,0,d58f8abe62c6a33934f8c0dca186b52f3ce877c05545d71e6b6419ff9d811f02,2024-02-20T19:50:53.960000 CVE-2023-52381,0,0,472b65e10275d2947c6588b1ef901c2b36df20ae38152db3173d8780f82018ab,2024-02-20T19:50:53.960000 +CVE-2023-52382,1,1,f973ee9d583d8e697e8b4f7637a6e5190862ca7e889e9b6c9293a012c3392d53,2024-04-07T09:15:08.317000 CVE-2023-52387,0,0,5d67110ecd6bd3e11c6d9a0b6111500c254e06ec210161b97966bed3e04d85cb,2024-02-20T19:50:53.960000 CVE-2023-52389,0,0,0fee7704e079ab3b4f714b445118b41a4b2e46d55413f0fbef2c2dadc64f3a04,2024-02-08T16:43:22.473000 CVE-2023-5239,0,0,7c3185e021110163a371df48ac7e58ad34571a8f388d20b4e340a0c44f625d88,2023-12-01T19:22:45.963000 @@ -236386,6 +236388,11 @@ CVE-2023-5268,0,0,0962b04b5f2e0bf762a96ebb8616f9140fd2d59b16626fe338dc7cc8ec8b84 CVE-2023-5269,0,0,4f38ec3d168762c5ca24d91f141ea3b0d5a2670e2027eea13a5d8bb7213d80e9,2024-03-21T02:50:12.440000 CVE-2023-5270,0,0,45e6e373740d9b24137c078ed2725b31491b15b24a5a3abd78c46fdf4eea0b37,2024-03-21T02:50:12.537000 CVE-2023-5271,0,0,72c78ae7eeaf234a144e38c51597ad336e62e29aa3a60522a770290559a4b05f,2024-03-21T02:50:12.613000 +CVE-2023-52713,1,1,9344407565b28aac5555737da721952ecb27b6ada3641a2503337c56c7efa958,2024-04-07T09:15:08.377000 +CVE-2023-52714,1,1,78b60c9f9e8cb02e8f71cd5f0cd761b045b65e9fef89079ea15dd3d7b855db81,2024-04-07T09:15:08.423000 +CVE-2023-52715,1,1,2cb5ced073851f70984636b09da9983fbac0efc453e117e436da6440da236c1e,2024-04-07T09:15:08.477000 +CVE-2023-52716,1,1,24c1ad970d25cbdd030294ff3f96772405729e13b1f4ae00c63e18bdd429535b,2024-04-07T09:15:08.520000 +CVE-2023-52717,1,1,3d4ee5754b53d2a9bd6433f121f5706b2bb7f0d39cf2c21fa3aebd9c29809199,2024-04-07T09:15:08.600000 CVE-2023-5272,0,0,0bb9b4e6b6780e8183edbfb5c097d850776c156d93382f68f3552c771fa7f059,2024-03-21T02:50:12.690000 CVE-2023-5273,0,0,3768d104890d72f805182c048009a35b3050621fe725bc64a0e78c6c7372d88f,2024-03-21T02:50:12.773000 CVE-2023-5274,0,0,230ef4c0e160801f289163632d814f7177c2b1395a715b72f33c8d0b5d876249,2023-12-05T18:20:39.937000 @@ -243917,6 +243924,12 @@ CVE-2024-30371,0,0,b1d655f20dce1a124d87b962baf334d2a249a3ceff7f094651f12c5849e1f CVE-2024-3039,0,0,81922daeb5016788549747eb633cf2cb36e0064f861b28dab53687d178ed51a9,2024-03-28T16:07:30.893000 CVE-2024-3040,0,0,e987ce224402b7c6ae92dea1553b3428b1d1ea83a8843974e3829b4ae2d222f5,2024-03-28T16:07:30.893000 CVE-2024-3041,0,0,6c17e75e5a23e8d64473e423f0739f5cbb4a4c0a92a00e74133d2d0cbfd4b93a,2024-03-28T16:07:30.893000 +CVE-2024-30413,1,1,a0e1eff62222949cb8be10b864594acd8caba3617db28ac986f09688d43d6c7d,2024-04-07T08:15:07.227000 +CVE-2024-30414,1,1,b27e1b4a39f9ba55e05dec2a6c8ff8717b4f2f33aba1895c77fb7100c6339363,2024-04-07T08:15:07.373000 +CVE-2024-30415,1,1,ec66a60a1026f4f723633cee4d5d5ef7a809aa29bf0dad743231374275b4777c,2024-04-07T08:15:07.483000 +CVE-2024-30416,1,1,2eceeea5f7d0943fabd5fe204f55f71ab3347211ad22117142e558cb5cae7c37,2024-04-07T09:15:08.650000 +CVE-2024-30417,1,1,afb8c378fd1228b6529f12ca1a856b8988ffcab3ce1021e751ec2a439341979d,2024-04-07T09:15:08.727000 +CVE-2024-30418,1,1,84ef1f436dd42d3e7bc9f5048cf9f0789a32fb90e830e451d8583fea4a305c1c,2024-04-07T09:15:08.810000 CVE-2024-3042,0,0,c14582e836c58b6dd5a313f7fba974623fe7cf38c96ce08ac4814f262bd27396,2024-03-28T16:07:30.893000 CVE-2024-30421,0,0,8cfd124574a85b45cac2d52527d901d612a69bb0525bed810c2e40b98978560c,2024-03-28T12:42:56.150000 CVE-2024-30422,0,0,ba819084ec2bbeb55fdd38ba0e9a54a8d622d3ff700a26bbbbcd13ded8068264,2024-03-28T12:42:56.150000 @@ -244299,4 +244312,4 @@ CVE-2024-3413,0,0,e1d44a7f6ecaa59001e0c3b7293038f73b00022993d5cfe2b006c5f004dd07 CVE-2024-3414,0,0,865b8b9a463ec948dc343c4a30756496edcf661fb9a023649606bd76ffc5f79d,2024-04-06T21:15:20.167000 CVE-2024-3415,0,0,23cc20be89e4c811c9f035ba78dae2c60f0134aa8421de0bb9bfdc4f8027ffdc,2024-04-06T23:15:07.630000 CVE-2024-3416,0,0,200d89ec70de0812fd3c5d8005f173692de3332633ae40be8d1d14b8003608f6,2024-04-07T04:15:07.853000 -CVE-2024-3417,1,1,b709776032706fffe344a55daccb44666332d7c2f5bd28c6517d5f92d2dba641,2024-04-07T06:15:08.223000 +CVE-2024-3417,0,0,b709776032706fffe344a55daccb44666332d7c2f5bd28c6517d5f92d2dba641,2024-04-07T06:15:08.223000