Auto-Update: 2024-03-06T23:00:24.910954+00:00

This commit is contained in:
cad-safe-bot 2024-03-06 23:00:28 +00:00
parent 23ced37ffd
commit c6d3700ef2
45 changed files with 296 additions and 103 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48703",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-06T20:15:47.343",
"lastModified": "2024-03-06T20:15:47.343",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:48.053",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50167",
"sourceIdentifier": "security@pega.com",
"published": "2024-03-06T18:15:46.133",
"lastModified": "2024-03-06T18:15:46.133",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:54.697",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50716",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-06T18:15:46.360",
"lastModified": "2024-03-06T18:15:46.360",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:48.053",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20346",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-03-06T17:15:10.173",
"lastModified": "2024-03-06T17:15:10.173",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:54.697",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2173",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-03-06T19:15:08.973",
"lastModified": "2024-03-06T19:15:08.973",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:48.053",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2174",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-03-06T19:15:09.037",
"lastModified": "2024-03-06T19:15:09.037",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:48.053",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2176",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-03-06T19:15:09.090",
"lastModified": "2024-03-06T19:15:09.090",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:48.053",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2215",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2024-03-06T17:15:11.593",
"lastModified": "2024-03-06T17:15:11.593",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:54.697",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2216",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2024-03-06T17:15:11.640",
"lastModified": "2024-03-06T17:15:11.640",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:54.697",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-2236",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-03-06T22:15:57.977",
"lastModified": "2024-03-06T22:15:57.977",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-208"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-2236",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268268",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24761",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-06T18:15:46.620",
"lastModified": "2024-03-06T18:15:46.620",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:48.053",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24765",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-06T18:15:46.807",
"lastModified": "2024-03-06T18:15:46.807",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:48.053",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24766",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-06T19:15:07.290",
"lastModified": "2024-03-06T19:15:07.290",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:48.053",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24767",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-06T18:15:46.983",
"lastModified": "2024-03-06T18:15:46.983",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:48.053",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25111",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-06T19:15:07.510",
"lastModified": "2024-03-06T19:15:07.510",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:48.053",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27287",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-06T19:15:07.723",
"lastModified": "2024-03-06T19:15:07.723",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:48.053",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27288",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-06T19:15:07.933",
"lastModified": "2024-03-06T19:15:07.933",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:48.053",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27289",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-06T19:15:08.140",
"lastModified": "2024-03-06T19:15:08.140",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:48.053",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27302",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-06T19:15:08.330",
"lastModified": "2024-03-06T19:15:08.330",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:48.053",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27303",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-06T19:15:08.553",
"lastModified": "2024-03-06T19:15:08.553",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:48.053",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27304",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-06T19:15:08.767",
"lastModified": "2024-03-06T19:15:08.767",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:48.053",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27307",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-06T20:15:47.537",
"lastModified": "2024-03-06T20:15:47.537",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:48.053",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27308",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-06T20:15:47.730",
"lastModified": "2024-03-06T20:15:47.730",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:48.053",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27915",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-06T20:15:47.930",
"lastModified": "2024-03-06T20:15:47.930",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:48.053",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27917",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-06T20:15:48.120",
"lastModified": "2024-03-06T20:15:48.120",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:48.053",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-27929",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-05T17:15:07.097",
"lastModified": "2024-03-05T18:50:18.333",
"lastModified": "2024-03-06T22:15:57.473",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "ImageSharp is a managed, cross-platform, 2D graphics library. A heap-use-after-free flaw was found in ImageSharp's InitializeImage() function of PngDecoderCore.cs file. This vulnerability is triggered when an attacker passes a specially crafted PNG image file to ImageSharp for conversion, potentially leading to information disclosure. This issue has been patched in version 3.1.3."
"value": "ImageSharp is a managed, cross-platform, 2D graphics library. A heap-use-after-free flaw was found in ImageSharp's InitializeImage() function of PngDecoderCore.cs file. This vulnerability is triggered when an attacker passes a specially crafted PNG image file to ImageSharp for conversion, potentially leading to information disclosure. This issue has been patched in versions 3.1.3 and 2.1.7."
}
],
"metrics": {

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-28110",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-06T22:15:57.550",
"lastModified": "2024-03-06T22:15:57.550",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Go SDK for CloudEvents is the official CloudEvents SDK to integrate applications with CloudEvents. Prior to version 2.15.2, using cloudevents.WithRoundTripper to create a cloudevents.Client with an authenticated http.RoundTripper causes the go-sdk to leak credentials to arbitrary endpoints. When the transport is populated with an authenticated transport, then http.DefaultClient is modified with the authenticated transport and will start to send Authorization tokens to any endpoint it is used to contact. Version 2.15.2 patches this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"references": [
{
"url": "https://github.com/cloudevents/sdk-go/blob/67e389964131d55d65cd14b4eb32d57a47312695/v2/protocol/http/protocol.go#L104-L110",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/cloudevents/sdk-go/commit/de2f28370b0d2a0f64f92c0c6139fa4b8a7c3851",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/cloudevents/sdk-go/security/advisories/GHSA-5pf6-2qwx-pxm2",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-28111",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-06T22:15:57.780",
"lastModified": "2024-03-06T22:15:57.780",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Canarytokens helps track activity and actions on a network. Canarytokens.org supports exporting the history of a Canarytoken's incidents in CSV format. The generation of these CSV files is vulnerable to a CSV Injection vulnerability. This flaw can be used by an attacker who discovers an HTTP-based Canarytoken to target the Canarytoken's owner, if the owner exports the incident history to CSV and opens in a reader application such as Microsoft Excel. The impact is that this issue could lead to code execution on the machine on which the CSV file is opened. Version sha-c595a1f8 contains a fix for this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1236"
}
]
}
],
"references": [
{
"url": "https://github.com/thinkst/canarytokens/commit/c595a1f884b986da2ca05aa5bff9ae5f93c6a4aa",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/thinkst/canarytokens/security/advisories/GHSA-fqh6-v4qp-65fv",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28149",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2024-03-06T17:15:10.450",
"lastModified": "2024-03-06T17:15:10.450",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:54.697",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28150",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2024-03-06T17:15:10.510",
"lastModified": "2024-03-06T17:15:10.510",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:54.697",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28151",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2024-03-06T17:15:10.570",
"lastModified": "2024-03-06T17:15:10.570",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:54.697",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28152",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2024-03-06T17:15:10.637",
"lastModified": "2024-03-06T17:15:10.637",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:54.697",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28153",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2024-03-06T17:15:10.687",
"lastModified": "2024-03-06T17:15:10.687",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:54.697",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28154",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2024-03-06T17:15:10.733",
"lastModified": "2024-03-06T17:15:10.733",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:54.697",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28155",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2024-03-06T17:15:10.787",
"lastModified": "2024-03-06T17:15:10.787",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:54.697",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28156",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2024-03-06T17:15:10.837",
"lastModified": "2024-03-06T17:15:10.837",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:54.697",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28157",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2024-03-06T17:15:10.890",
"lastModified": "2024-03-06T17:15:10.890",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:54.697",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28158",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2024-03-06T17:15:10.940",
"lastModified": "2024-03-06T17:15:10.940",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:54.697",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28159",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2024-03-06T17:15:10.987",
"lastModified": "2024-03-06T17:15:10.987",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:54.697",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28160",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2024-03-06T17:15:11.040",
"lastModified": "2024-03-06T17:15:11.040",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:54.697",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28161",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2024-03-06T17:15:11.090",
"lastModified": "2024-03-06T17:15:11.090",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:54.697",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28162",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2024-03-06T17:15:11.140",
"lastModified": "2024-03-06T17:15:11.140",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:54.697",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28173",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-03-06T17:15:11.190",
"lastModified": "2024-03-06T17:15:11.190",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:54.697",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28174",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-03-06T17:15:11.397",
"lastModified": "2024-03-06T17:15:11.397",
"vulnStatus": "Received",
"lastModified": "2024-03-06T21:42:54.697",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-03-06T21:00:24.297999+00:00
2024-03-06T23:00:24.910954+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-03-06T20:15:48.120000+00:00
2024-03-06T22:15:57.977000+00:00
```
### Last Data Feed Release
@ -29,35 +29,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
240712
240715
```
### CVEs added in the last Commit
Recently added CVEs: `16`
Recently added CVEs: `3`
* [CVE-2023-48703](CVE-2023/CVE-2023-487xx/CVE-2023-48703.json) (`2024-03-06T20:15:47.343`)
* [CVE-2024-24766](CVE-2024/CVE-2024-247xx/CVE-2024-24766.json) (`2024-03-06T19:15:07.290`)
* [CVE-2024-25111](CVE-2024/CVE-2024-251xx/CVE-2024-25111.json) (`2024-03-06T19:15:07.510`)
* [CVE-2024-27287](CVE-2024/CVE-2024-272xx/CVE-2024-27287.json) (`2024-03-06T19:15:07.723`)
* [CVE-2024-27288](CVE-2024/CVE-2024-272xx/CVE-2024-27288.json) (`2024-03-06T19:15:07.933`)
* [CVE-2024-27289](CVE-2024/CVE-2024-272xx/CVE-2024-27289.json) (`2024-03-06T19:15:08.140`)
* [CVE-2024-27302](CVE-2024/CVE-2024-273xx/CVE-2024-27302.json) (`2024-03-06T19:15:08.330`)
* [CVE-2024-27303](CVE-2024/CVE-2024-273xx/CVE-2024-27303.json) (`2024-03-06T19:15:08.553`)
* [CVE-2024-27304](CVE-2024/CVE-2024-273xx/CVE-2024-27304.json) (`2024-03-06T19:15:08.767`)
* [CVE-2024-2173](CVE-2024/CVE-2024-21xx/CVE-2024-2173.json) (`2024-03-06T19:15:08.973`)
* [CVE-2024-2174](CVE-2024/CVE-2024-21xx/CVE-2024-2174.json) (`2024-03-06T19:15:09.037`)
* [CVE-2024-2176](CVE-2024/CVE-2024-21xx/CVE-2024-2176.json) (`2024-03-06T19:15:09.090`)
* [CVE-2024-27307](CVE-2024/CVE-2024-273xx/CVE-2024-27307.json) (`2024-03-06T20:15:47.537`)
* [CVE-2024-27308](CVE-2024/CVE-2024-273xx/CVE-2024-27308.json) (`2024-03-06T20:15:47.730`)
* [CVE-2024-27915](CVE-2024/CVE-2024-279xx/CVE-2024-27915.json) (`2024-03-06T20:15:47.930`)
* [CVE-2024-27917](CVE-2024/CVE-2024-279xx/CVE-2024-27917.json) (`2024-03-06T20:15:48.120`)
* [CVE-2024-28110](CVE-2024/CVE-2024-281xx/CVE-2024-28110.json) (`2024-03-06T22:15:57.550`)
* [CVE-2024-28111](CVE-2024/CVE-2024-281xx/CVE-2024-28111.json) (`2024-03-06T22:15:57.780`)
* [CVE-2024-2236](CVE-2024/CVE-2024-22xx/CVE-2024-2236.json) (`2024-03-06T22:15:57.977`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `41`
* [CVE-2024-2176](CVE-2024/CVE-2024-21xx/CVE-2024-2176.json) (`2024-03-06T21:42:48.053`)
* [CVE-2024-27307](CVE-2024/CVE-2024-273xx/CVE-2024-27307.json) (`2024-03-06T21:42:48.053`)
* [CVE-2024-27308](CVE-2024/CVE-2024-273xx/CVE-2024-27308.json) (`2024-03-06T21:42:48.053`)
* [CVE-2024-27915](CVE-2024/CVE-2024-279xx/CVE-2024-27915.json) (`2024-03-06T21:42:48.053`)
* [CVE-2024-27917](CVE-2024/CVE-2024-279xx/CVE-2024-27917.json) (`2024-03-06T21:42:48.053`)
* [CVE-2024-20346](CVE-2024/CVE-2024-203xx/CVE-2024-20346.json) (`2024-03-06T21:42:54.697`)
* [CVE-2024-28149](CVE-2024/CVE-2024-281xx/CVE-2024-28149.json) (`2024-03-06T21:42:54.697`)
* [CVE-2024-28150](CVE-2024/CVE-2024-281xx/CVE-2024-28150.json) (`2024-03-06T21:42:54.697`)
* [CVE-2024-28151](CVE-2024/CVE-2024-281xx/CVE-2024-28151.json) (`2024-03-06T21:42:54.697`)
* [CVE-2024-28152](CVE-2024/CVE-2024-281xx/CVE-2024-28152.json) (`2024-03-06T21:42:54.697`)
* [CVE-2024-28153](CVE-2024/CVE-2024-281xx/CVE-2024-28153.json) (`2024-03-06T21:42:54.697`)
* [CVE-2024-28154](CVE-2024/CVE-2024-281xx/CVE-2024-28154.json) (`2024-03-06T21:42:54.697`)
* [CVE-2024-28155](CVE-2024/CVE-2024-281xx/CVE-2024-28155.json) (`2024-03-06T21:42:54.697`)
* [CVE-2024-28156](CVE-2024/CVE-2024-281xx/CVE-2024-28156.json) (`2024-03-06T21:42:54.697`)
* [CVE-2024-28157](CVE-2024/CVE-2024-281xx/CVE-2024-28157.json) (`2024-03-06T21:42:54.697`)
* [CVE-2024-28158](CVE-2024/CVE-2024-281xx/CVE-2024-28158.json) (`2024-03-06T21:42:54.697`)
* [CVE-2024-28159](CVE-2024/CVE-2024-281xx/CVE-2024-28159.json) (`2024-03-06T21:42:54.697`)
* [CVE-2024-28160](CVE-2024/CVE-2024-281xx/CVE-2024-28160.json) (`2024-03-06T21:42:54.697`)
* [CVE-2024-28161](CVE-2024/CVE-2024-281xx/CVE-2024-28161.json) (`2024-03-06T21:42:54.697`)
* [CVE-2024-28162](CVE-2024/CVE-2024-281xx/CVE-2024-28162.json) (`2024-03-06T21:42:54.697`)
* [CVE-2024-28173](CVE-2024/CVE-2024-281xx/CVE-2024-28173.json) (`2024-03-06T21:42:54.697`)
* [CVE-2024-28174](CVE-2024/CVE-2024-281xx/CVE-2024-28174.json) (`2024-03-06T21:42:54.697`)
* [CVE-2024-2215](CVE-2024/CVE-2024-22xx/CVE-2024-2215.json) (`2024-03-06T21:42:54.697`)
* [CVE-2024-2216](CVE-2024/CVE-2024-22xx/CVE-2024-2216.json) (`2024-03-06T21:42:54.697`)
* [CVE-2024-27929](CVE-2024/CVE-2024-279xx/CVE-2024-27929.json) (`2024-03-06T22:15:57.473`)
## Download and Usage