mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2024-05-02T23:55:29.494845+00:00
This commit is contained in:
parent
2f3af6e450
commit
137c47e7cc
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2020-28246",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-06-02T14:15:26.700",
|
||||
"lastModified": "2024-04-23T07:15:42.260",
|
||||
"lastModified": "2024-05-02T22:15:07.067",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Server-Side Template Injection (SSTI) was discovered in Form.io 2.0.0. This leads to Remote Code Execution during deletion of the default Email template URL. NOTE: the email templating service was removed after 2020."
|
||||
"value": "A Server-Side Template Injection (SSTI) was discovered in Form.io 2.0.0. This leads to Remote Code Execution during deletion of the default Email template URL. NOTE: the email templating service was removed after 2020. Additionally, the vendor disputes this issue indicating this is sandboxed and only executable by admins."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,105 +2,14 @@
|
||||
"id": "CVE-2020-36123",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-03-10T17:41:20.330",
|
||||
"lastModified": "2022-03-12T04:01:30.460",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-05-02T22:15:07.230",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "saitoha libsixel v1.8.6 was discovered to contain a double free via the component sixel_chunk_destroy at /root/libsixel/src/chunk.c."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha detectado que libsixel versi\u00f3n v1.8.6, contiene una doble liberaci\u00f3n por medio del componente sixel_chunk_destroy en el archivo /root/libsixel/src/chunk.c"
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "MEDIUM",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.8
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.6,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": true
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-415"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D78CB59C-7966-46E3-A325-A7508F0ED51D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/saitoha/libsixel/issues/144",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,19 +2,14 @@
|
||||
"id": "CVE-2021-36593",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-01T22:15:09.340",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-02T22:15:07.430",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Oxwall 1.8.7 (11111) is vulnerable to Incorrect Access Control. Unauthenticated file upload allows an attacker to upload image files."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/mir-hossein/7a1e44f4d2519e743392c97a76232d1f",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,19 +2,14 @@
|
||||
"id": "CVE-2021-36594",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-01T22:15:09.413",
|
||||
"lastModified": "2024-05-02T13:27:25.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-02T22:15:07.487",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SSRF in Oxwall 1.8.7 (11111) allows an attacker to execute arbitrary commands via Phar deserialization or internal API server or ... (via url parameter)"
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/mir-hossein/7a1e44f4d2519e743392c97a76232d1f",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,107 +2,14 @@
|
||||
"id": "CVE-2021-42248",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-05-24T15:15:07.457",
|
||||
"lastModified": "2023-08-08T14:22:24.967",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-05-02T22:15:07.540",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "GJSON <= 1.9.2 allows attackers to cause a redos via crafted JSON input."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "GJSON versiones anteriores a 1.9.2 incluy\u00e9ndola, permite a atacantes causar un redos por medio de una entrada JSON dise\u00f1ada"
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-42836. Reason: This candidate is a duplicate of CVE-2021-42836. Notes: All CVE users should reference CVE-2021-42836 instead of this candidate."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 5.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1333"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gjson_project:gjson:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.9.2",
|
||||
"matchCriteriaId": "D5029ECE-F518-4D44-93F0-E1828C7B756E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/tidwall/gjson/issues/237",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-31621",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-05-25T21:15:08.573",
|
||||
"lastModified": "2022-11-05T01:55:18.800",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-05-02T22:15:07.650",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_xbstream.cc, when an error occurs (stream_ctxt->dest_file == NULL) while executing the method xbstream_open, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock."
|
||||
"value": "MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_xbstream.cc, when an error occurs (stream_ctxt->dest_file == NULL) while executing the method xbstream_open, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock. Note: The vendor argues this is just an improper locking bug and not a vulnerability with adverse effects."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -130,6 +130,14 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://jira.mariadb.org/browse/MDEV-26561",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://jira.mariadb.org/browse/MDEV-26574",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://jira.mariadb.org/browse/MDEV-26574?filter=-2",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-31622",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-05-25T21:15:08.617",
|
||||
"lastModified": "2023-08-08T14:22:24.967",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-05-02T23:15:06.753",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (pthread_create returns a nonzero value) while executing the method create_worker_threads, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock."
|
||||
"value": "MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (pthread_create returns a nonzero value) while executing the method create_worker_threads, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock. Note: The vendor argues this is just an improper locking bug and not a vulnerability with adverse effects."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -137,6 +137,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://jira.mariadb.org/browse/MDEV-26561",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://jira.mariadb.org/browse/MDEV-26561?filter=-2",
|
||||
"source": "cve@mitre.org",
|
||||
@ -146,6 +150,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://jira.mariadb.org/browse/MDEV-26574",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220707-0006/",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-31623",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-05-25T21:15:08.657",
|
||||
"lastModified": "2022-11-05T01:45:16.387",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-05-02T23:15:06.870",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (i.e., going to the err label) while executing the method create_worker_threads, the held lock thd->ctrl_mutex is not released correctly, which allows local users to trigger a denial of service due to the deadlock."
|
||||
"value": "MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (i.e., going to the err label) while executing the method create_worker_threads, the held lock thd->ctrl_mutex is not released correctly, which allows local users to trigger a denial of service due to the deadlock. Note: The vendor argues this is just an improper locking bug and not a vulnerability with adverse effects."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -145,6 +145,14 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://jira.mariadb.org/browse/MDEV-26561",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://jira.mariadb.org/browse/MDEV-26574",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220707-0006/",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-4140",
|
||||
"sourceIdentifier": "security@ubuntu.com",
|
||||
"published": "2024-05-02T20:15:07.333",
|
||||
"lastModified": "2024-05-02T20:15:07.333",
|
||||
"lastModified": "2024-05-02T23:15:06.990",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,6 +51,30 @@
|
||||
"url": "https://bugs.debian.org/960062",
|
||||
"source": "security@ubuntu.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rjbs/Email-MIME/commit/02bf3e26812c8f38a86a33c168571f9783365df2",
|
||||
"source": "security@ubuntu.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rjbs/Email-MIME/commit/3a12edd119e493156a5a05e45dd50f4e36b702e8",
|
||||
"source": "security@ubuntu.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rjbs/Email-MIME/commit/3dcf096eeccb8e4dd42738de676c8f4a5aa7a531",
|
||||
"source": "security@ubuntu.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rjbs/Email-MIME/commit/7e96ecfa1da44914a407f82ae98ba817bba08f2d",
|
||||
"source": "security@ubuntu.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rjbs/Email-MIME/commit/b2cb62f19e12580dd235f79e2546d44a6bec54d1",
|
||||
"source": "security@ubuntu.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rjbs/Email-MIME/commit/fc0fededd24a71ccc51bcd8b1e486385d09aae63",
|
||||
"source": "security@ubuntu.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rjbs/Email-MIME/issues/66",
|
||||
"source": "security@ubuntu.com"
|
||||
|
25
README.md
25
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-05-02T22:00:31.103483+00:00
|
||||
2024-05-02T23:55:29.494845+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-05-02T21:16:12.523000+00:00
|
||||
2024-05-02T23:15:06.990000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -38,22 +38,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `8`
|
||||
Recently added CVEs: `0`
|
||||
|
||||
- [CVE-2024-25047](CVE-2024/CVE-2024-250xx/CVE-2024-25047.json) (`2024-05-02T21:16:11.330`)
|
||||
- [CVE-2024-30301](CVE-2024/CVE-2024-303xx/CVE-2024-30301.json) (`2024-05-02T21:16:11.537`)
|
||||
- [CVE-2024-30302](CVE-2024/CVE-2024-303xx/CVE-2024-30302.json) (`2024-05-02T21:16:11.747`)
|
||||
- [CVE-2024-30303](CVE-2024/CVE-2024-303xx/CVE-2024-30303.json) (`2024-05-02T21:16:11.943`)
|
||||
- [CVE-2024-30304](CVE-2024/CVE-2024-303xx/CVE-2024-30304.json) (`2024-05-02T21:16:12.130`)
|
||||
- [CVE-2024-30305](CVE-2024/CVE-2024-303xx/CVE-2024-30305.json) (`2024-05-02T21:16:12.327`)
|
||||
- [CVE-2024-30306](CVE-2024/CVE-2024-303xx/CVE-2024-30306.json) (`2024-05-02T21:16:12.523`)
|
||||
- [CVE-2024-4140](CVE-2024/CVE-2024-41xx/CVE-2024-4140.json) (`2024-05-02T20:15:07.333`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `9`
|
||||
|
||||
- [CVE-2020-28246](CVE-2020/CVE-2020-282xx/CVE-2020-28246.json) (`2024-05-02T22:15:07.067`)
|
||||
- [CVE-2020-36123](CVE-2020/CVE-2020-361xx/CVE-2020-36123.json) (`2024-05-02T22:15:07.230`)
|
||||
- [CVE-2021-36593](CVE-2021/CVE-2021-365xx/CVE-2021-36593.json) (`2024-05-02T22:15:07.430`)
|
||||
- [CVE-2021-36594](CVE-2021/CVE-2021-365xx/CVE-2021-36594.json) (`2024-05-02T22:15:07.487`)
|
||||
- [CVE-2021-42248](CVE-2021/CVE-2021-422xx/CVE-2021-42248.json) (`2024-05-02T22:15:07.540`)
|
||||
- [CVE-2022-31621](CVE-2022/CVE-2022-316xx/CVE-2022-31621.json) (`2024-05-02T22:15:07.650`)
|
||||
- [CVE-2022-31622](CVE-2022/CVE-2022-316xx/CVE-2022-31622.json) (`2024-05-02T23:15:06.753`)
|
||||
- [CVE-2022-31623](CVE-2022/CVE-2022-316xx/CVE-2022-31623.json) (`2024-05-02T23:15:06.870`)
|
||||
- [CVE-2024-4140](CVE-2024/CVE-2024-41xx/CVE-2024-4140.json) (`2024-05-02T23:15:06.990`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
32
_state.csv
32
_state.csv
@ -156662,7 +156662,7 @@ CVE-2020-2824,0,0,1b3839e690239e450ef59e3ea9ce79ec653bbbd631a6c0510b497b249f8111
|
||||
CVE-2020-28241,0,0,2118c7a09bd70d775b0c7b5012205a38632906f6eb54c3a3b193c9a6d0339ed1,2023-11-07T03:21:08.773000
|
||||
CVE-2020-28242,0,0,a991398b2a2de3e82e9526dd86cfec431befdc15722d23a2d322ac76a63478ea,2023-11-07T03:21:08.837000
|
||||
CVE-2020-28243,0,0,c34f2b4d09890f3ab1d571b65534f37170456ebf56bb4b342197109455d8ffe4,2023-12-21T18:31:01.147000
|
||||
CVE-2020-28246,0,0,5b76cc4c46b73bbf7015a68b677044abc8c32e956a66a2826cf1812321bde014,2024-04-23T07:15:42.260000
|
||||
CVE-2020-28246,0,1,15b783bab3af224d8cc0d84870681c487e891fd84190aae813c2620f0002d64b,2024-05-02T22:15:07.067000
|
||||
CVE-2020-28247,0,0,746f877bb001e17d44affe5c44ffa78d2b337205523a4e4f405079cf6652a2e1,2021-01-29T01:00:46.653000
|
||||
CVE-2020-28248,0,0,cef6e3d5bee771e4a44b7fb8a23466a07d115803d24dd3f38876d0e696b9dfb7,2021-07-21T11:39:23.747000
|
||||
CVE-2020-28249,0,0,c320854d40e07ad6da93ecb085c4a2a5a23620de069fa64a6444a115124b1629,2020-11-12T18:34:15.967000
|
||||
@ -158665,7 +158665,7 @@ CVE-2020-3611,0,0,4205be1d40002a7dbb23f30b163c7a670538515a6aea125e32bfd918a153e6
|
||||
CVE-2020-36112,0,0,7dbeea2ae35f0f83994b4837c11ebc2eb880bbcab8b7aa2862657c9de91d3b93,2021-01-07T21:17:45.607000
|
||||
CVE-2020-36115,0,0,2c92803d2212a3ff1d579437ef19d36c6ea2f2c7231fbdc644ce83f27e778956,2021-02-03T14:25:08.153000
|
||||
CVE-2020-36120,0,0,77d02b71c2b0ef93b937c532fce8dc0ec44d20cb014e70feeadd25d012155d91,2021-04-16T21:20:45.803000
|
||||
CVE-2020-36123,0,0,9ff8ff083315ef6101f8affeebd0d1752049ac988704ac1ccf5544535f52774a,2022-03-12T04:01:30.460000
|
||||
CVE-2020-36123,0,1,7224141763d2b457bf4d3409d478d45eabe752f89221239ae104f3b30939dffe,2024-05-02T22:15:07.230000
|
||||
CVE-2020-36124,0,0,21f24383fecc0c9ef3730425c102adeb624d197a908c2aa60d51db40a302c5ab,2021-05-13T16:00:05.387000
|
||||
CVE-2020-36125,0,0,5ea1a9b956c9743bebc5bf762bdee302ae1b1b0e6306690980cb887152f0603a,2022-06-28T14:11:45.273000
|
||||
CVE-2020-36126,0,0,fe9e5b6ab0ed4ecc7197b586e7b6e42037fd076b16aeae2ac8993fb9168cf208,2022-07-12T17:42:04.277000
|
||||
@ -179059,8 +179059,8 @@ CVE-2021-36581,0,0,28f8ea59999d4558aee34d2c014fcb68377b3d5200cfb73c0f2065280cb46
|
||||
CVE-2021-36582,0,0,aec2b4c2ad5639c3875456cc05c5a75c67ea0c230a00eecca0f7679b2d6b74cb,2021-09-28T14:57:24.057000
|
||||
CVE-2021-36584,0,0,f9476909b004a3c17d2b2fb626756e5e1ce61872e9bc17b0420d36921e31c97f,2021-08-12T18:56:25.233000
|
||||
CVE-2021-3659,0,0,f6fc2184fd003eece7a84f930a31721a62bc4c4eab4def2834bf08132b926069,2023-11-07T03:38:11.547000
|
||||
CVE-2021-36593,0,0,33f6ee3b593829bb556439be69cabe3ea83905e273d461bcedf335295e86166a,2024-05-02T13:27:25.103000
|
||||
CVE-2021-36594,0,0,9d68287e23e0a7190a393a52ed4e64fa87e82cd43f6169ce4cd49454b6821931,2024-05-02T13:27:25.103000
|
||||
CVE-2021-36593,0,1,d32f116b21b4381bc18ca6e0e0237e57ee8598fb72759f6ae2a560a9179078bb,2024-05-02T22:15:07.430000
|
||||
CVE-2021-36594,0,1,29311dabafa60010316b41beabc3323e620711ed404ad356287deb097bc2073a,2024-05-02T22:15:07.487000
|
||||
CVE-2021-3660,0,0,45339e93b73a8e367140c34fa3b160abd0afe9d9c5b347481f7388450a2dafee,2023-02-12T23:42:07.917000
|
||||
CVE-2021-36601,0,0,efd8db70ae16b416c5df047a47a4200389b707a770874f88bfc7d6ece7c156e8,2021-08-19T14:05:14.620000
|
||||
CVE-2021-36603,0,0,7fb0e80c74bdfd8f2dc4edef2e166e14fe11ff7343deacfe1c010480e838d371,2023-01-13T14:59:33.493000
|
||||
@ -183504,7 +183504,7 @@ CVE-2021-42237,0,0,ed1f5241968746e80e28334c85a23d63c13074f53feb301ad4189ad523cd0
|
||||
CVE-2021-42242,0,0,f381a7e01eb25cdb097056a549a4d5603cc489dfd56b38736d303ca34bfaaa55,2022-05-12T19:38:59.783000
|
||||
CVE-2021-42244,0,0,d4afdd4d2aaa70b35fabd99a9998192492cba62ae8f66cf414bef0ff4f4e64f2,2022-03-08T14:07:52.177000
|
||||
CVE-2021-42245,0,0,7dbc21d0f6ca044edef380368e838bb06bbbec9a058f26fb4d273cede1bfbe93,2022-06-14T11:42:08.230000
|
||||
CVE-2021-42248,0,0,867ea31fed9532f51ba5bacda1ad731fc534fb4556c4bfb6da4d8986507d05c7,2023-08-08T14:22:24.967000
|
||||
CVE-2021-42248,0,1,45055b743a84912f992d6c4b4ab164f40a11578f90383a82971b014294b0be7f,2024-05-02T22:15:07.540000
|
||||
CVE-2021-4225,0,0,e8402d4cdb39cecf44eea235ee82334d2063e55c4dcde9ab6c55b003e784750e,2022-05-03T19:17:42.013000
|
||||
CVE-2021-42250,0,0,249385c1b7ce553eeb78b399635b5c4464cc30a03fdfa47a6a9e795983428baa,2022-04-25T18:07:37.467000
|
||||
CVE-2021-42252,0,0,1560ed56380e9140031849f526bd73ecbdda3bacd8441acc1a5347dc60f44b75,2021-12-03T03:07:42.693000
|
||||
@ -198885,9 +198885,9 @@ CVE-2022-31618,0,0,41e9a5629b3e7a0cacb1fc6efc70ba258a1785e4dde4faed327aecab5a444
|
||||
CVE-2022-31619,0,0,33cad2a97c46cdd1a7b57613dc89ed05cdbae5b499d41fa5314d42fe21627129,2023-02-23T17:41:22.513000
|
||||
CVE-2022-3162,0,0,ff90a8c39afd46c3dec73bd12f4e158546a1dc72efb4c022d0e9f65cc84a8cd7,2023-05-11T15:15:09.510000
|
||||
CVE-2022-31620,0,0,87ba9cfebb9437c8a9e17e84f62c848b977e8a6f13892c2e22974a5ec7f4de2c,2023-08-08T14:21:49.707000
|
||||
CVE-2022-31621,0,0,3d860cd91f6864fe13ee3d978da8919f3e5cae57d567ff8792e4f491f7dc7e46,2022-11-05T01:55:18.800000
|
||||
CVE-2022-31622,0,0,425ac04db4cd8873c0c01e7110950475e034954d7cb84a9db616ee95b7b7ad25,2023-08-08T14:22:24.967000
|
||||
CVE-2022-31623,0,0,249017898e584ea172a87d4e9cada4bf179cb71005332c5633770ee777c9b383,2022-11-05T01:45:16.387000
|
||||
CVE-2022-31621,0,1,95b4b3aa7ed07b0ad54b084dc5b5b7f6fd62b090a28ac2d61f51d705db6a7370,2024-05-02T22:15:07.650000
|
||||
CVE-2022-31622,0,1,7821e8d0c48ffd9027f1dd20604d3bbd1bd9498d041664b8893039e9c75d957a,2024-05-02T23:15:06.753000
|
||||
CVE-2022-31623,0,1,550a4ff0a5d23899a46a8b63ae93caf52edf239364c3f24934f4b3afcc892f3b,2024-05-02T23:15:06.870000
|
||||
CVE-2022-31624,0,0,031dfe44b6d6ef53929842eb04961f57f1d2bbbdc85c4f4a9b7e67b4ce106d0b,2023-08-08T14:22:24.967000
|
||||
CVE-2022-31625,0,0,438f51ed37efdd0f37f6d666c41e13c922d645462042644d552444beb2893f45,2023-11-07T03:47:39.820000
|
||||
CVE-2022-31626,0,0,ef6dc3537ebac378c37f6b29679033faa0e66cd614afadf8401bca607189aac0,2023-11-07T03:47:39.910000
|
||||
@ -242753,7 +242753,7 @@ CVE-2024-2503,0,0,5d07265154895f081d1c26884c52969906f9ead0ba05f09a08094998837926
|
||||
CVE-2024-25030,0,0,fc3de3fd573e21787e1c0bdd960fb3a4c590b360d40ba7c7d9e34380b9c90bde,2024-04-03T17:24:18.150000
|
||||
CVE-2024-2504,0,0,b952b345d554f248180cfc37dd33de3d29aef92bb40f82f2454b4ee2e2c1523d,2024-04-10T13:23:38.787000
|
||||
CVE-2024-25046,0,0,64b67efbc5b2947bdef146aee983b6003b7daa23659b2bfe93519b90947330ac,2024-04-03T17:24:18.150000
|
||||
CVE-2024-25047,1,1,b7fe3302d910eba6caeae561605fe5a9308cd579718528f756fd609fad1cdac4,2024-05-02T21:16:11.330000
|
||||
CVE-2024-25047,0,0,b7fe3302d910eba6caeae561605fe5a9308cd579718528f756fd609fad1cdac4,2024-05-02T21:16:11.330000
|
||||
CVE-2024-25048,0,0,6d53411a0a868398493d30c05da0cf8e4498f5c5f370a4dd847bf80ee7eda785,2024-04-29T12:42:03.667000
|
||||
CVE-2024-2505,0,0,a408a881ce1b3d782d9a55f384dcaf564a35b80326e5482499bc461d86d93b7d,2024-04-29T12:42:03.667000
|
||||
CVE-2024-25050,0,0,c80cff68caab3c78fd9cb2d79bdb17c94506d1ed594890da246ba93d0d268958,2024-04-29T12:42:03.667000
|
||||
@ -245700,12 +245700,12 @@ CVE-2024-30273,0,0,430d9deac2ea84fb25615ee056f7341da6ab62ae3551a67df5079d8156e28
|
||||
CVE-2024-3028,0,0,080bb069f1a2cade59952c14793e39c6c54825fa436573f5b60987254afab568,2024-04-16T13:24:07.103000
|
||||
CVE-2024-3029,0,0,54e489ae31021cd62a123b17a985eef09bd69f22c945608ba51d64fcde83450f,2024-04-16T13:24:07.103000
|
||||
CVE-2024-3030,0,0,88c29228ef56d61e184f00d5d8d99ea5dd9800435eeb42a07f389309c9f00688,2024-04-04T12:48:41.700000
|
||||
CVE-2024-30301,1,1,a08aede664e1f52604f9aec802877fee8f523a2bd6087bfc7d9fe2bde179bb07,2024-05-02T21:16:11.537000
|
||||
CVE-2024-30302,1,1,90cf502b030c0efb53e5e4007cafbb5f629dcc7a7c5dc57fc2509ca8cdb8f308,2024-05-02T21:16:11.747000
|
||||
CVE-2024-30303,1,1,143beb93fc818d7c8e9cffac1c1b77e413a68235c7b0c6ae75e4ab2b852282b7,2024-05-02T21:16:11.943000
|
||||
CVE-2024-30304,1,1,019708f1023061a397e2a271b4fceb2e3d514f7fd5eac7dd15587a8e752ea18d,2024-05-02T21:16:12.130000
|
||||
CVE-2024-30305,1,1,3f2e52c312b7a904030110ceb51cb67a9e46a014ad6dc8c85baf399f5271d4ae,2024-05-02T21:16:12.327000
|
||||
CVE-2024-30306,1,1,10385de1e6d1877d940c8e9c3571e18c2843db9b409f8680dcc4c87c4484f01a,2024-05-02T21:16:12.523000
|
||||
CVE-2024-30301,0,0,a08aede664e1f52604f9aec802877fee8f523a2bd6087bfc7d9fe2bde179bb07,2024-05-02T21:16:11.537000
|
||||
CVE-2024-30302,0,0,90cf502b030c0efb53e5e4007cafbb5f629dcc7a7c5dc57fc2509ca8cdb8f308,2024-05-02T21:16:11.747000
|
||||
CVE-2024-30303,0,0,143beb93fc818d7c8e9cffac1c1b77e413a68235c7b0c6ae75e4ab2b852282b7,2024-05-02T21:16:11.943000
|
||||
CVE-2024-30304,0,0,019708f1023061a397e2a271b4fceb2e3d514f7fd5eac7dd15587a8e752ea18d,2024-05-02T21:16:12.130000
|
||||
CVE-2024-30305,0,0,3f2e52c312b7a904030110ceb51cb67a9e46a014ad6dc8c85baf399f5271d4ae,2024-05-02T21:16:12.327000
|
||||
CVE-2024-30306,0,0,10385de1e6d1877d940c8e9c3571e18c2843db9b409f8680dcc4c87c4484f01a,2024-05-02T21:16:12.523000
|
||||
CVE-2024-30322,0,0,82127178dd2c4390457a625b1b802dc21960ed844c23f33ac3f61e8d8c162a4f,2024-04-03T17:24:18.150000
|
||||
CVE-2024-30323,0,0,4ba71c995b9c718766f72cb8f425ef56f31d70d4141fb317ff1b84d1d4bea62f,2024-04-03T17:24:18.150000
|
||||
CVE-2024-30324,0,0,b34850e80ab56aec12159793bc4cf321b46343aaa9dfe2615612dc24168ff93e,2024-04-03T17:24:18.150000
|
||||
@ -247653,7 +247653,7 @@ CVE-2024-4126,0,0,52d53c69f90fffba02f4ee03823f6932b3dbf87e0fe4c676029ee51a28a916
|
||||
CVE-2024-4127,0,0,4364ebf3636399a6b862124e1d4818af14c41cdffb5c73435c8a8f0aa84db1d3,2024-04-25T13:18:20.370000
|
||||
CVE-2024-4128,0,0,dbb061a4cce465a0cb61b00ade10d9b747ca5e17e039d640902bb2e7236edc48,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4133,0,0,edddaf22ac50287e4d41278289e1df9ea316ee8a51647f77da27d00841431234,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4140,1,1,7d119656c12f60b648f61d22d556fcdcecfe0ee63aafbd9fdd9018ba6dedca61,2024-05-02T20:15:07.333000
|
||||
CVE-2024-4140,0,1,114e888fac173522e4ba383f0d05c1981d71481aff21e9353e71f95213817013,2024-05-02T23:15:06.990000
|
||||
CVE-2024-4141,0,0,569cd2fcd9188d9eabeb08d432690880975d5549c17482aa7e239fef9c6bb2e6,2024-04-24T19:58:40.710000
|
||||
CVE-2024-4142,0,0,6297707db3df670a282f3d4e6720e4836d7467220b5fcc108ef053e6a6308f68,2024-05-02T13:27:25.103000
|
||||
CVE-2024-4156,0,0,08ed32a025121f03b8a02946b754b432972d33916a48e29ae90b57a1d08fdf80,2024-05-02T18:00:37.360000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user