diff --git a/CVE-2023/CVE-2023-520xx/CVE-2023-52070.json b/CVE-2023/CVE-2023-520xx/CVE-2023-52070.json index 7bf18596a03..1abf0a59a83 100644 --- a/CVE-2023/CVE-2023-520xx/CVE-2023-52070.json +++ b/CVE-2023/CVE-2023-520xx/CVE-2023-52070.json @@ -2,12 +2,12 @@ "id": "CVE-2023-52070", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-10T19:15:48.973", - "lastModified": "2024-04-10T19:49:51.183", + "lastModified": "2024-04-11T19:15:16.037", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "JFreeChart v1.5.4 was discovered to be vulnerable to ArrayIndexOutOfBounds via the 'setSeriesNeedle(int index, int type)' method." + "value": "JFreeChart v1.5.4 was discovered to be vulnerable to ArrayIndexOutOfBounds via the 'setSeriesNeedle(int index, int type)' method. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-229xx/CVE-2024-22949.json b/CVE-2024/CVE-2024-229xx/CVE-2024-22949.json index d00aec0774d..058f36843b4 100644 --- a/CVE-2024/CVE-2024-229xx/CVE-2024-22949.json +++ b/CVE-2024/CVE-2024-229xx/CVE-2024-22949.json @@ -2,12 +2,12 @@ "id": "CVE-2024-22949", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T23:15:07.647", - "lastModified": "2024-04-09T12:48:04.090", + "lastModified": "2024-04-11T19:15:16.113", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "JFreeChart v1.5.4 was discovered to contain a NullPointerException via the component /chart/annotations/CategoryLineAnnotation." + "value": "JFreeChart v1.5.4 was discovered to contain a NullPointerException via the component /chart/annotations/CategoryLineAnnotation. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23076.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23076.json index 094e8808bf9..95c3ed67964 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23076.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23076.json @@ -2,12 +2,16 @@ "id": "CVE-2024-23076", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-10T12:15:09.190", - "lastModified": "2024-04-10T13:23:38.787", + "lastModified": "2024-04-11T19:15:16.170", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "FreeChart v1.5.4 was discovered to contain a NullPointerException via the component /labels/BubbleXYItemLabelGenerator.java." + "value": "JFreeChart v1.5.4 was discovered to contain a NullPointerException via the component /labels/BubbleXYItemLabelGenerator.java. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que FreeChart v1.5.4 conten\u00eda una excepci\u00f3n NullPointerException a trav\u00e9s del componente /labels/BubbleXYItemLabelGenerator.java." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23077.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23077.json index 3eaa497249c..4b472fadd87 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23077.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23077.json @@ -2,12 +2,12 @@ "id": "CVE-2024-23077", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-10T19:15:49.020", - "lastModified": "2024-04-10T19:49:51.183", + "lastModified": "2024-04-11T19:15:16.223", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "JFreeChart v1.5.4 was discovered to be vulnerable to ArrayIndexOutOfBounds via the component /chart/plot/CompassPlot.java." + "value": "JFreeChart v1.5.4 was discovered to be vulnerable to ArrayIndexOutOfBounds via the component /chart/plot/CompassPlot.java. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23078.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23078.json index 1aa59647848..4c74d3ffa81 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23078.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23078.json @@ -2,12 +2,12 @@ "id": "CVE-2024-23078", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T20:15:08.500", - "lastModified": "2024-04-09T12:48:04.090", + "lastModified": "2024-04-11T19:15:16.270", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "JGraphT Core v1.5.2 was discovered to contain a NullPointerException via the component org.jgrapht.alg.util.ToleranceDoubleComparator::compare(Double, Double)." + "value": "JGraphT Core v1.5.2 was discovered to contain a NullPointerException via the component org.jgrapht.alg.util.ToleranceDoubleComparator::compare(Double, Double). NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23079.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23079.json index 39602546a81..76264108213 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23079.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23079.json @@ -2,12 +2,12 @@ "id": "CVE-2024-23079", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T23:15:07.703", - "lastModified": "2024-04-09T12:48:04.090", + "lastModified": "2024-04-11T19:15:16.317", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "JGraphT Core v1.5.2 was discovered to contain a NullPointerException via the component org.jgrapht.alg.util.ToleranceDoubleComparator::compare(Double, Double)." + "value": "JGraphT Core v1.5.2 was discovered to contain a NullPointerException via the component org.jgrapht.alg.util.ToleranceDoubleComparator::compare(Double, Double). NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23080.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23080.json index 9e437ac2f84..eb9bdfb9cc6 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23080.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23080.json @@ -2,12 +2,16 @@ "id": "CVE-2024-23080", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-10T13:51:38.547", - "lastModified": "2024-04-10T19:49:51.183", + "lastModified": "2024-04-11T19:15:16.360", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "Joda Time v2.12.5 was discovered to contain a NullPointerException via the component org.joda.time.format.PeriodFormat::wordBased(Locale)." + "value": "Joda Time v2.12.5 was discovered to contain a NullPointerException via the component org.joda.time.format.PeriodFormat::wordBased(Locale). NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Joda Time v2.12.5 conten\u00eda una NullPointerException a trav\u00e9s del componente org.joda.time.format.PeriodFormat::wordBased(Locale)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23081.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23081.json index 76864a714ff..bd8ecb9e910 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23081.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23081.json @@ -2,12 +2,12 @@ "id": "CVE-2024-23081", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T23:15:07.757", - "lastModified": "2024-04-09T12:48:04.090", + "lastModified": "2024-04-11T19:15:16.410", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "ThreeTen Backport v1.6.8 was discovered to contain a NullPointerException via the component org.threeten.bp.LocalDate::compareTo(ChronoLocalDate)." + "value": "ThreeTen Backport v1.6.8 was discovered to contain a NullPointerException via the component org.threeten.bp.LocalDate::compareTo(ChronoLocalDate). NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23082.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23082.json index f00340753aa..1cd2f6b64e3 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23082.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23082.json @@ -2,12 +2,16 @@ "id": "CVE-2024-23082", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T18:15:08.460", - "lastModified": "2024-04-08T18:48:40.217", + "lastModified": "2024-04-11T19:15:16.470", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "ThreeTen Backport v1.6.8 was discovered to contain an integer overflow via the component org.threeten.bp.format.DateTimeFormatter::parse(CharSequence, ParsePosition)." + "value": "ThreeTen Backport v1.6.8 was discovered to contain an integer overflow via the component org.threeten.bp.format.DateTimeFormatter::parse(CharSequence, ParsePosition). NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que ThreeTen Backport v1.6.8 contiene un desbordamiento de enteros a trav\u00e9s del componente org.treeten.bp.format.DateTimeFormatter::parse(CharSequence, ParsePosition)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23083.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23083.json index 900ba52556a..e664d1b517f 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23083.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23083.json @@ -2,12 +2,16 @@ "id": "CVE-2024-23083", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-10T14:15:07.430", - "lastModified": "2024-04-10T19:49:51.183", + "lastModified": "2024-04-11T19:15:16.523", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "Time4J Base v5.9.3 was discovered to contain a NullPointerException via the component net.time4j.format.internal.FormatUtils::useDefaultWeekmodel(Locale)." + "value": "Time4J Base v5.9.3 was discovered to contain a NullPointerException via the component net.time4j.format.internal.FormatUtils::useDefaultWeekmodel(Locale). NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Time4J Base v5.9.3 conten\u00eda una excepci\u00f3n NullPointerException a trav\u00e9s del componente net.time4j.format.internal.FormatUtils::useDefaultWeekmodel(Locale)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23084.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23084.json index 8507a398c37..89b7e137c0c 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23084.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23084.json @@ -2,12 +2,12 @@ "id": "CVE-2024-23084", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T23:15:07.803", - "lastModified": "2024-04-09T12:48:04.090", + "lastModified": "2024-04-11T19:15:16.573", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "Apfloat v1.10.1 was discovered to contain an ArrayIndexOutOfBoundsException via the component org.apfloat.internal.DoubleCRTMath::add(double[], double[])." + "value": "Apfloat v1.10.1 was discovered to contain an ArrayIndexOutOfBoundsException via the component org.apfloat.internal.DoubleCRTMath::add(double[], double[]). NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23085.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23085.json index 227329053df..771c1596f7e 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23085.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23085.json @@ -2,12 +2,12 @@ "id": "CVE-2024-23085", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T20:15:08.567", - "lastModified": "2024-04-09T12:48:04.090", + "lastModified": "2024-04-11T19:15:16.620", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "Apfloat v1.10.1 was discovered to contain a NullPointerException via the component org.apfloat.internal.DoubleScramble::scramble(double[], int, int[])." + "value": "Apfloat v1.10.1 was discovered to contain a NullPointerException via the component org.apfloat.internal.DoubleScramble::scramble(double[], int, int[]). NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23086.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23086.json index 51e85937eed..36bce39e444 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23086.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23086.json @@ -2,12 +2,12 @@ "id": "CVE-2024-23086", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T20:15:08.620", - "lastModified": "2024-04-09T12:48:04.090", + "lastModified": "2024-04-11T19:15:16.670", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "Apfloat v1.10.1 was discovered to contain a stack overflow via the component org.apfloat.internal.DoubleModMath::modPow(double." + "value": "Apfloat v1.10.1 was discovered to contain a stack overflow via the component org.apfloat.internal.DoubleModMath::modPow(double. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30271.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30271.json new file mode 100644 index 00000000000..53c4aa254c5 --- /dev/null +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30271.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30271", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-04-11T18:15:07.090", + "lastModified": "2024-04-11T18:15:07.090", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Illustrator versions 28.3, 27.9.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/illustrator/apsb24-25.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30272.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30272.json new file mode 100644 index 00000000000..7822f834df1 --- /dev/null +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30272.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30272", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-04-11T18:15:07.307", + "lastModified": "2024-04-11T18:15:07.307", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Illustrator versions 28.3, 27.9.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/illustrator/apsb24-25.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30273.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30273.json new file mode 100644 index 00000000000..bededb0cc87 --- /dev/null +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30273.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30273", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-04-11T18:15:07.510", + "lastModified": "2024-04-11T18:15:07.510", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Illustrator versions 28.3, 27.9.2 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/illustrator/apsb24-25.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index d17bf3efb18..b342c0f57e1 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-04-11T18:00:39.882622+00:00 +2024-04-11T20:00:37.404662+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-04-11T17:15:30.427000+00:00 +2024-04-11T19:15:16.670000+00:00 ``` ### Last Data Feed Release @@ -33,23 +33,35 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -245254 +245257 ``` ### CVEs added in the last Commit Recently added CVEs: `3` -- [CVE-2023-50949](CVE-2023/CVE-2023-509xx/CVE-2023-50949.json) (`2024-04-11T17:15:30.427`) -- [CVE-2024-0881](CVE-2024/CVE-2024-08xx/CVE-2024-0881.json) (`2024-04-11T16:15:24.800`) -- [CVE-2024-31678](CVE-2024/CVE-2024-316xx/CVE-2024-31678.json) (`2024-04-11T16:15:25.127`) +- [CVE-2024-30271](CVE-2024/CVE-2024-302xx/CVE-2024-30271.json) (`2024-04-11T18:15:07.090`) +- [CVE-2024-30272](CVE-2024/CVE-2024-302xx/CVE-2024-30272.json) (`2024-04-11T18:15:07.307`) +- [CVE-2024-30273](CVE-2024/CVE-2024-302xx/CVE-2024-30273.json) (`2024-04-11T18:15:07.510`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `13` -- [CVE-2024-2866](CVE-2024/CVE-2024-28xx/CVE-2024-2866.json) (`2024-04-11T16:15:24.870`) +- [CVE-2023-52070](CVE-2023/CVE-2023-520xx/CVE-2023-52070.json) (`2024-04-11T19:15:16.037`) +- [CVE-2024-22949](CVE-2024/CVE-2024-229xx/CVE-2024-22949.json) (`2024-04-11T19:15:16.113`) +- [CVE-2024-23076](CVE-2024/CVE-2024-230xx/CVE-2024-23076.json) (`2024-04-11T19:15:16.170`) +- [CVE-2024-23077](CVE-2024/CVE-2024-230xx/CVE-2024-23077.json) (`2024-04-11T19:15:16.223`) +- [CVE-2024-23078](CVE-2024/CVE-2024-230xx/CVE-2024-23078.json) (`2024-04-11T19:15:16.270`) +- [CVE-2024-23079](CVE-2024/CVE-2024-230xx/CVE-2024-23079.json) (`2024-04-11T19:15:16.317`) +- [CVE-2024-23080](CVE-2024/CVE-2024-230xx/CVE-2024-23080.json) (`2024-04-11T19:15:16.360`) +- [CVE-2024-23081](CVE-2024/CVE-2024-230xx/CVE-2024-23081.json) (`2024-04-11T19:15:16.410`) +- [CVE-2024-23082](CVE-2024/CVE-2024-230xx/CVE-2024-23082.json) (`2024-04-11T19:15:16.470`) +- [CVE-2024-23083](CVE-2024/CVE-2024-230xx/CVE-2024-23083.json) (`2024-04-11T19:15:16.523`) +- [CVE-2024-23084](CVE-2024/CVE-2024-230xx/CVE-2024-23084.json) (`2024-04-11T19:15:16.573`) +- [CVE-2024-23085](CVE-2024/CVE-2024-230xx/CVE-2024-23085.json) (`2024-04-11T19:15:16.620`) +- [CVE-2024-23086](CVE-2024/CVE-2024-230xx/CVE-2024-23086.json) (`2024-04-11T19:15:16.670`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 2dbd162dd96..870896dcba8 100644 --- a/_state.csv +++ b/_state.csv @@ -235442,7 +235442,7 @@ CVE-2023-50943,0,0,9de9b170e61e152149ef3400c6b47c1c1683e5f697e4225e96f5644f1c9cf CVE-2023-50944,0,0,30d6475db55fa5214a0eb86acb7bde474255e9eb6366c067f979612f143e5789,2024-01-30T22:58:18.047000 CVE-2023-50947,0,0,9d9c6311280a8f7937919991c5be0caaec13d505f0f919f091478b3a0eb44a28,2024-02-10T00:57:09.610000 CVE-2023-50948,0,0,3c02519a72037dff711d5ee48432aa7f2b5638da69466874289b5ec8a9701c27,2024-01-11T17:00:50.077000 -CVE-2023-50949,1,1,bd2eeb1d43281ce6e0dc5f44516b92d8a98e4798139be8c8f8390cc0c69793e9,2024-04-11T17:15:30.427000 +CVE-2023-50949,0,0,bd2eeb1d43281ce6e0dc5f44516b92d8a98e4798139be8c8f8390cc0c69793e9,2024-04-11T17:15:30.427000 CVE-2023-50950,0,0,dfea2c60bf930725232ee8dec76ee1dc7db647db5a23e4d3c95d00ce14c241f2,2024-01-24T19:42:29.450000 CVE-2023-50951,0,0,ac9a2ba6b69cc6219b314f88f75f8d16d80977a7838c8861bc4cc4a5a90b32d2,2024-02-20T19:50:53.960000 CVE-2023-50955,0,0,2dac25424bb634048955c93e845cd595a5737c34f7a73119031e8a018fd0e20a,2024-02-22T19:07:27.197000 @@ -236010,7 +236010,7 @@ CVE-2023-52064,0,0,d161416577f26fcbecd38bb973b8c964ce87228edb02a6ee42c92f03db6b0 CVE-2023-52068,0,0,46dc0fb42ad609daf31d3e02e701415ff11a96cf786461d87c5b67e664893e04,2024-01-22T19:53:08.497000 CVE-2023-52069,0,0,770903ab1d55ddc9209197d2b9a5ac15e4c462725c148188d13afa72d2843b5a,2024-01-23T21:41:02.097000 CVE-2023-5207,0,0,68bb12ed05545b826662bd3f81bdb86f249305fd13af79b5c6ef464a8fb92564,2023-10-04T01:55:31.953000 -CVE-2023-52070,0,0,74b9c81339cac8b7dfb6be70ad507723e107f8672d679f4dc3dc9d7a0c67c883,2024-04-10T19:49:51.183000 +CVE-2023-52070,0,1,8966cb69ab112df374514f68f3740e32c894d7a9d7ef3e0954b2323fbfa4c980,2024-04-11T19:15:16.037000 CVE-2023-52071,0,0,ad965383e3002b3edaaabcd0d35cb4f0d481af86aa23ed4bd97e6efd9d6aa2dc,2024-02-23T09:15:21.867000 CVE-2023-52072,0,0,02127eb9ae4273b1ad79732d9280cd4f630158412943ba361c9a56a2bce352ce,2024-01-11T20:05:45.403000 CVE-2023-52073,0,0,123468189ce68f3cfbeab56f91e9e4c60c12979b9e605872064a295c45e39979,2024-01-11T20:05:37.137000 @@ -238859,7 +238859,7 @@ CVE-2024-0872,0,0,ada5775916c2cac4c195eaa3d280c11fbe735ac51fe2a74eac9940cadda51b CVE-2024-0873,0,0,95754cd203c9a7796aab440a440d7aceb25e9f419f0726f1824dd4021e5694ea,2024-04-10T13:24:00.070000 CVE-2024-0879,0,0,71dbf86688bbf3d39fdd16f3840204e31946256b985438bb8d263e8d387364ad,2024-01-31T19:16:07.630000 CVE-2024-0880,0,0,12dd80add99b4278efc505ba644272f57307bd9169ca281bf7019fd00c56c698,2024-04-11T01:24:11.007000 -CVE-2024-0881,1,1,a54131dbe2db0be7af91dd421a66cdf6e1d3119d615e3ed285ad1362b7fa10f6,2024-04-11T16:15:24.800000 +CVE-2024-0881,0,0,a54131dbe2db0be7af91dd421a66cdf6e1d3119d615e3ed285ad1362b7fa10f6,2024-04-11T16:15:24.800000 CVE-2024-0882,0,0,e76bfa499fa073969fa1373a3afdea70f0e1bf497e80578c905b9674f5689a35,2024-04-11T01:24:11.103000 CVE-2024-0883,0,0,00a44d9a3355974533aaf203e591423357e542413d02bd2b075da4621ae51603,2024-04-11T01:24:11.197000 CVE-2024-0884,0,0,3ee0e8d74c812a9b0417625628bb93bebd86d3e96d99fb3be333fcbf90b56dc8,2024-04-11T01:24:11.290000 @@ -241007,7 +241007,7 @@ CVE-2024-22938,0,0,d14c96ecc84394e0c226b15d653363af8f866fc8a362ffe8912d5673a5fc1 CVE-2024-22939,0,0,98ae5450b25ceaff1169d7851ac12cb3d1f8ed4212f5c71a0110eb042c52a6d7,2024-02-29T13:49:29.390000 CVE-2024-2294,0,0,7adaa24a33704366500d65a38c52ba5d5887ad22bed1bd0562d7b36efb6d901e,2024-03-17T22:38:29.433000 CVE-2024-22942,0,0,27e1b96b16010d66938a1930cd0293d602396f85521af099c802bf269035b527,2024-01-18T15:15:47.273000 -CVE-2024-22949,0,0,5a39ec4e6a69cf95914d802d151998eb5762c2e80f80af227e65b64f7b64e313,2024-04-09T12:48:04.090000 +CVE-2024-22949,0,1,03d6827f41bb06eac79397128b1e202ff15f9ad974eb2b9788a10fca24f98746,2024-04-11T19:15:16.113000 CVE-2024-22955,0,0,4ae6e1e162ac27be2c1563f300454f76989ec1b9814e0f4be1652f56a6f11be5,2024-01-25T14:54:48.427000 CVE-2024-22956,0,0,2da6b272cb072bcb92b74c4c5c3faca0048e5b46583e9ffdd9571398ebecd789,2024-01-25T14:55:01.053000 CVE-2024-22957,0,0,045bad9ba8bb739147d8dcd83b4e5a0ded4b848e11c744629a53c265926b4f4e,2024-01-25T14:59:59.737000 @@ -241035,18 +241035,18 @@ CVE-2024-2306,0,0,bc5118b4183fb8d85b363074da38c21425d73c04ce07dac09760780e15d985 CVE-2024-23060,0,0,293f3db63669f513fdf6243d872feab4a40014b3abd2eff3b8edca7a0ed1b3d3,2024-01-18T15:17:35.587000 CVE-2024-23061,0,0,d40b225d92d8f0f0d47201622b24e50bc3550ed3e56a2682a133a8aeae5027e3,2024-01-18T15:18:14.357000 CVE-2024-2307,0,0,4b089dd0281a455952ab30b1c14e2b1725f875efc3e98fe223b3d9160259d255,2024-03-20T13:00:16.367000 -CVE-2024-23076,0,0,52c255ca9ab7781385d8e3020a001d7970b1a5ca7171525999c588fa36537326,2024-04-10T13:23:38.787000 -CVE-2024-23077,0,0,4c56b5fddcba18deb13531c7da543e19113d1c46412db123578c47ef01f32139,2024-04-10T19:49:51.183000 -CVE-2024-23078,0,0,9d7aaea68d8acb3538ca428049148f2dac206a89706e35d40108cb3eb8be6ee5,2024-04-09T12:48:04.090000 -CVE-2024-23079,0,0,c1744d41ef3d7ad1d99296d598f8fcec333fcf26813851f4f429e9678b14abb3,2024-04-09T12:48:04.090000 +CVE-2024-23076,0,1,700ca636baaf983297d803f7f456b25aa5c602cae51535b97505ad7243477397,2024-04-11T19:15:16.170000 +CVE-2024-23077,0,1,df31910c1e429b1e9f298bd00c0b1f1808de437ccbe476ca6824b67d02870831,2024-04-11T19:15:16.223000 +CVE-2024-23078,0,1,7542b39a6d77d318cffec2a0d48f88fc80581f152adedc13166a11343c2a6b36,2024-04-11T19:15:16.270000 +CVE-2024-23079,0,1,0e48d79f0a15a7541c0b37162a74d592ae7fd494b012db345a4a7c0c62a4ecb4,2024-04-11T19:15:16.317000 CVE-2024-2308,0,0,e35ab419c5c511708eb8574821633f88a1168237ea61ded1d7aa5b331f06479a,2024-03-17T22:38:29.433000 -CVE-2024-23080,0,0,2d72ee15a636c06d79451cf099c7178af5ef05efb3d159e49bf2c8ed8e66d945,2024-04-10T19:49:51.183000 -CVE-2024-23081,0,0,9fa2a613be75462894d464b8e34e68b6da9b9d59d63e22685e547814dd9a5ab9,2024-04-09T12:48:04.090000 -CVE-2024-23082,0,0,0a9e38aa01f043532a8be7b3040bd9f24c4cb812cc5c2c38c18325d962369a71,2024-04-08T18:48:40.217000 -CVE-2024-23083,0,0,ae8313200a6da4d29d95ed3fd5fa28ce3e6cd133bf222ee1491a75d948506409,2024-04-10T19:49:51.183000 -CVE-2024-23084,0,0,82d7094530d5cd6c77dbe215344f65b7328c1ecf1670686e248abcdd712b3b36,2024-04-09T12:48:04.090000 -CVE-2024-23085,0,0,f435d93167b9f4a31bec2831629dfa7b34bb533a49bb29329c43fee636db5bac,2024-04-09T12:48:04.090000 -CVE-2024-23086,0,0,d8559a198e6f56b9e1a9a9c93fee6add743a34a70b05d723355a013a78276599,2024-04-09T12:48:04.090000 +CVE-2024-23080,0,1,0dc870fc34ca263494d91a1d4277ef25dd449969d7da35594508801303b52305,2024-04-11T19:15:16.360000 +CVE-2024-23081,0,1,37f1c5a50e9747e6a908a6795ae398bb43a7c1ac49d25256bee9702ed2265fc4,2024-04-11T19:15:16.410000 +CVE-2024-23082,0,1,4927d1876ebf507acbbf9d7013f9a52a8f10cfd1604412dbf3b1d67af64d98e9,2024-04-11T19:15:16.470000 +CVE-2024-23083,0,1,8a46cc09679b624942342c2da2ca06884962c092bd89812e0271f88f22f9435a,2024-04-11T19:15:16.523000 +CVE-2024-23084,0,1,2d04cef8c6b37f78b757c3809ebaf1c23e3bc250ee3bdff2ab0ebb977d593daa,2024-04-11T19:15:16.573000 +CVE-2024-23085,0,1,27d0f44875030ba128821d0a5604f24565f110d196fa9a9783c10c633bc8b87a,2024-04-11T19:15:16.620000 +CVE-2024-23086,0,1,84287977eab241265f69ad39dd1efe49fbc488d3bee216c68604fc835c00c346,2024-04-11T19:15:16.670000 CVE-2024-23094,0,0,8b7fd2c37601b9f636934db44ed8e567ef20eff4d921df465afdbb6ef925a041,2024-02-22T19:07:27.197000 CVE-2024-23108,0,0,4bd66ae4e2150cd9c3073e095bacf489de77af9a273b611e130c3e3fa4edf7ea,2024-02-07T15:02:00.203000 CVE-2024-23109,0,0,c2686a38cd2651bfef8ab0e98ee0dbcce98e98fd7c1f1805290cb9df9c03fe78,2024-02-07T15:04:28.237000 @@ -243802,7 +243802,7 @@ CVE-2024-28639,0,0,329b7b8ad88c37a706d7a70398ba531ff9e74bf0911225af5f9e1a6b5cf5a CVE-2024-2864,0,0,1aedd87fc58891bfced0cf84913cc38a985cc16fc422e05e5d28bea02686210b,2024-03-25T13:47:14.087000 CVE-2024-28640,0,0,e4f9177f5bcd97210c5334738dfd8748ea6c1196b829523c5ee5f16ed9874073,2024-03-17T22:38:29.433000 CVE-2024-2865,0,0,b112553debad5e10152e5bdccb20c93c0d6578c3f79ccf552d74c99c8c746fcd,2024-03-25T16:43:06.137000 -CVE-2024-2866,0,1,465c2e11d3bc4e1dcb66c1b8adc97e41b9833e464897ffa8b5116a3cf594e97d,2024-04-11T16:15:24.870000 +CVE-2024-2866,0,0,465c2e11d3bc4e1dcb66c1b8adc97e41b9833e464897ffa8b5116a3cf594e97d,2024-04-11T16:15:24.870000 CVE-2024-28662,0,0,69ece6d6842931df6f24b49f57aa09e3d2ee5159729500803e8b5fa3837da086,2024-03-14T12:52:16.723000 CVE-2024-28665,0,0,3da970721fb98fa61e50e971271bd0e638eaf6e4b5ee261eac2ece4940b67793,2024-03-13T14:28:45.217000 CVE-2024-28666,0,0,0a602d6f38395f6173995d550028f5ef3d41196962b1541950032a732a9f8cc0,2024-03-13T14:28:45.217000 @@ -244488,6 +244488,9 @@ CVE-2024-30265,0,0,8b7bd77316a7922f3fb99eedf42325c9dfd214ba3a070dae26dd8c71a6913 CVE-2024-30266,0,0,e3c467c9914201aad848d0a5b4b17739ce57c9b602514a7cf905d903659d55fa,2024-04-04T16:33:06.610000 CVE-2024-30269,0,0,08dc53837ae3c49db915ca6fbf68dbca18e8552aca089682c64e540b3e2addf0,2024-04-08T18:48:40.217000 CVE-2024-30270,0,0,1d63c3afc5f402042a52c95204320e8698a660fcf024b4b1cd2dbe82419521bf,2024-04-05T12:40:52.763000 +CVE-2024-30271,1,1,467452667eddfa0feca2162eb0646445420c7bef403eafd1c63ffaca3025ab5b,2024-04-11T18:15:07.090000 +CVE-2024-30272,1,1,bf8bce7ac6d26984a7aa484aae5289d7d2ea3038b8b7fb23c10b911d639a6f9c,2024-04-11T18:15:07.307000 +CVE-2024-30273,1,1,1a2b6fa316e99cf2c663de1d9a0d9422d56c23674d03d10d580a3aa522413a45,2024-04-11T18:15:07.510000 CVE-2024-3030,0,0,88c29228ef56d61e184f00d5d8d99ea5dd9800435eeb42a07f389309c9f00688,2024-04-04T12:48:41.700000 CVE-2024-30322,0,0,82127178dd2c4390457a625b1b802dc21960ed844c23f33ac3f61e8d8c162a4f,2024-04-03T17:24:18.150000 CVE-2024-30323,0,0,4ba71c995b9c718766f72cb8f425ef56f31d70d4141fb317ff1b84d1d4bea62f,2024-04-03T17:24:18.150000 @@ -245003,7 +245006,7 @@ CVE-2024-3162,0,0,7209bf9b1b4a4f41543ae01bfd19e9aec1dd355164cd1434a8cb5548ea161c CVE-2024-3164,0,0,7f780c294c8831979bff32bef1a48b2e6fa61521035bd6f029f476ca7c0385b5,2024-04-11T01:25:55.603000 CVE-2024-3165,0,0,de9c55d425cf1712b174cf5953c3fab2e18950a6202399f31519128938dc300f,2024-04-02T12:50:42.233000 CVE-2024-3167,0,0,588aeff7b6a3f0765daeb7f9f263a3ad6de4b6b1df80e4179885c415f61ea66c,2024-04-10T13:23:38.787000 -CVE-2024-31678,1,1,de45433236bbba8f748694b8f39f0b50695c1deba3ed0ccfab1c7c8de96cc7fc,2024-04-11T16:15:25.127000 +CVE-2024-31678,0,0,de45433236bbba8f748694b8f39f0b50695c1deba3ed0ccfab1c7c8de96cc7fc,2024-04-11T16:15:25.127000 CVE-2024-3178,0,0,e1b2edc538f836ffb506a17d476e0f961db2588242ddd1b2358ad3487cd818bf,2024-04-04T12:48:41.700000 CVE-2024-3179,0,0,5abb24f6a5051585dee8d043e9230e5c2a9202caf7e3c5044373b856d11a8a98,2024-04-04T12:48:41.700000 CVE-2024-3180,0,0,cb7e6ecd5dde884356237a2b2dbf7b6ac67d07b2baecdd8da937f602eadd96a4,2024-04-04T12:48:41.700000