Auto-Update: 2024-11-01T00:55:44.576151+00:00

This commit is contained in:
cad-safe-bot 2024-11-01 00:58:45 +00:00
parent 8bb8eb7767
commit 36c1053e89
7 changed files with 584 additions and 30 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2062",
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"published": "2023-06-02T05:15:10.187",
"lastModified": "2023-06-16T14:56:51.317",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-31T23:15:11.873",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -195,6 +195,10 @@
"Third Party Advisory"
]
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-157-02",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
},
{
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2023-004.pdf",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-10600",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-31T23:15:12.067",
"lastModified": "2024-10-31T23:15:12.067",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in Tongda OA 2017 up to 11.6. Affected is an unknown function of the file pda/appcenter/submenu.php. The manipulation of the argument appid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/LvZCh/td/issues/3",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.282612",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.282612",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.433497",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-10601",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-31T23:15:12.343",
"lastModified": "2024-10-31T23:15:12.343",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Tongda OA 2017 up to 11.10 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /general/address/private/address/query/delete.php. The manipulation of the argument where_repeat leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/LvZCh/td/issues/4",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.282613",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.282613",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.433498",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-10602",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-01T00:15:02.973",
"lastModified": "2024-11-01T00:15:02.973",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Tongda OA 2017 up to 11.9 and classified as critical. Affected by this issue is some unknown functionality of the file /general/approve_center/list/input_form/data_picker_link.php. The manipulation of the argument dataSrc leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/LvZCh/td/issues/5",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.282614",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.282614",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.433499",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-10605",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-01T00:15:03.243",
"lastModified": "2024-11-01T00:15:03.243",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been classified as problematic. This affects an unknown part of the file /file/request.php. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/bevennyamande/receiver_request_sample_csrf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.282615",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.282615",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.434756",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-10-31T23:00:19.959534+00:00
2024-11-01T00:55:44.576151+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-10-31T22:15:03.817000+00:00
2024-11-01T00:15:03.243000+00:00
```
### Last Data Feed Release
@ -33,30 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
267769
267773
```
### CVEs added in the last Commit
Recently added CVEs: `8`
Recently added CVEs: `4`
- [CVE-2024-10594](CVE-2024/CVE-2024-105xx/CVE-2024-10594.json) (`2024-10-31T21:15:14.990`)
- [CVE-2024-10595](CVE-2024/CVE-2024-105xx/CVE-2024-10595.json) (`2024-10-31T21:15:15.387`)
- [CVE-2024-10596](CVE-2024/CVE-2024-105xx/CVE-2024-10596.json) (`2024-10-31T21:15:15.647`)
- [CVE-2024-10597](CVE-2024/CVE-2024-105xx/CVE-2024-10597.json) (`2024-10-31T21:15:15.893`)
- [CVE-2024-10598](CVE-2024/CVE-2024-105xx/CVE-2024-10598.json) (`2024-10-31T22:15:02.960`)
- [CVE-2024-10599](CVE-2024/CVE-2024-105xx/CVE-2024-10599.json) (`2024-10-31T22:15:03.267`)
- [CVE-2024-6479](CVE-2024/CVE-2024-64xx/CVE-2024-6479.json) (`2024-10-31T22:15:03.577`)
- [CVE-2024-6480](CVE-2024/CVE-2024-64xx/CVE-2024-6480.json) (`2024-10-31T22:15:03.817`)
- [CVE-2024-10600](CVE-2024/CVE-2024-106xx/CVE-2024-10600.json) (`2024-10-31T23:15:12.067`)
- [CVE-2024-10601](CVE-2024/CVE-2024-106xx/CVE-2024-10601.json) (`2024-10-31T23:15:12.343`)
- [CVE-2024-10602](CVE-2024/CVE-2024-106xx/CVE-2024-10602.json) (`2024-11-01T00:15:02.973`)
- [CVE-2024-10605](CVE-2024/CVE-2024-106xx/CVE-2024-10605.json) (`2024-11-01T00:15:03.243`)
### CVEs modified in the last Commit
Recently modified CVEs: `3`
Recently modified CVEs: `1`
- [CVE-2021-29544](CVE-2021/CVE-2021-295xx/CVE-2021-29544.json) (`2024-10-31T21:15:14.753`)
- [CVE-2023-43279](CVE-2023/CVE-2023-432xx/CVE-2023-43279.json) (`2024-10-31T21:35:01.493`)
- [CVE-2024-35958](CVE-2024/CVE-2024-359xx/CVE-2024-35958.json) (`2024-10-31T21:35:03.013`)
- [CVE-2023-2062](CVE-2023/CVE-2023-20xx/CVE-2023-2062.json) (`2024-10-31T23:15:11.873`)
## Download and Usage

View File

@ -173901,7 +173901,7 @@ CVE-2021-29540,0,0,6bad1a6f8fd18b0a1ccdb809a99c882267a7f0c108c21dea2b5289d5c3616
CVE-2021-29541,0,0,89a4770cea44aff177ab657eeb99a5b3579b49f9b413b4e363aaf2602bb04dfd,2021-05-20T16:21:49.497000
CVE-2021-29542,0,0,e91fd2a87da4ff6f7a25ff597f10426d792f7ea3cac2344e5cc61f01e3c8f05b,2022-04-25T20:03:53.697000
CVE-2021-29543,0,0,439ae44eee6be4fc3ba37999bcdf7d8fe4f567c1b98dee702fc13cc474228983,2021-07-27T17:26:18.650000
CVE-2021-29544,0,1,8e95ac745b4e271056b789635ce51a85a9798e546c3ac5a0c0153447d2f10b98,2024-10-31T21:15:14.753000
CVE-2021-29544,0,0,8e95ac745b4e271056b789635ce51a85a9798e546c3ac5a0c0153447d2f10b98,2024-10-31T21:15:14.753000
CVE-2021-29545,0,0,d101357d3540a261628815a68a077d27c4794d1c137851d6b96e2158975ade20,2021-07-27T17:25:16.893000
CVE-2021-29546,0,0,a887be9f8827c190703f6fd6e7b8f2a19677dec9cf4f29012563f4ecbcab0392,2021-07-26T16:05:50.307000
CVE-2021-29547,0,0,a74fd81ac3600ad0ce1085236749009c9a476d7bf3d768a064e06cbecf7b0040,2021-07-27T17:25:10.117000
@ -215034,7 +215034,7 @@ CVE-2023-20615,0,0,403d2208ea9cfe7674ec83dce5bd02fbc023ef44016fa56e0176ea8c1c6ce
CVE-2023-20616,0,0,3092ae68b1a37fd77970d6937f7300306f59e3a93bd4cb5a02257aa2d42d5447,2023-02-14T17:59:08.763000
CVE-2023-20618,0,0,bfc9c086da18547a444623e23619ddcb0ce992b631ecf6ed8d966be502829b8d,2023-02-14T18:02:12.267000
CVE-2023-20619,0,0,b2fd6630cee592c2582609468e56ceabcfe7c2d157b79665609b43c3d2a735f5,2023-02-14T18:10:07.637000
CVE-2023-2062,0,0,5b6375b5ca20bf7ad2eee4b5a59d128b6fccf7689c566224bbd98a8b42425d9f,2023-06-16T14:56:51.317000
CVE-2023-2062,0,1,3259b85ada336c249c0a3127aa4a92c6b50d3c8d3c87bdb21bc9db2b1076dfcc,2024-10-31T23:15:11.873000
CVE-2023-20620,0,0,c185d10c903b959c24e1ba03baa3c548712f99a8095b9a842a3b855269c7669a,2023-03-13T03:57:10.570000
CVE-2023-20621,0,0,085abfcd6a2e25116d69f753d336955a363b8c522cae98983eb845b1a00e5b7e,2023-03-13T03:57:00.093000
CVE-2023-20623,0,0,4a739139ff8c04950bc70f9d126619146f9f37a276b7be7f445065eef2b13a69,2023-03-13T03:56:40.467000
@ -232843,7 +232843,7 @@ CVE-2023-43271,0,0,b638f0a53dac82b777acfdc20c2f8998778c958c894beb64990d47b1c8094
CVE-2023-43274,0,0,a681bf6827cce8cd35b9042f24c0c4d4f1147f877fe813500c3f6e06aa3c154d,2024-09-25T01:36:23.600000
CVE-2023-43275,0,0,3a669c1ce34ae3001e62dbde8d7352445b229bf3d3f0e90c97eeb345a92e1bbd,2024-08-14T19:35:09.223000
CVE-2023-43278,0,0,bbf061d83d67120f51666ab71df16ebf01407dd058278fae4fe9b8df8566b218,2023-09-26T14:38:05.117000
CVE-2023-43279,0,1,3a6d944d383140c910a01804d8127ea5ff343f1314583034cca81ef31869fb7f,2024-10-31T21:35:01.493000
CVE-2023-43279,0,0,3a6d944d383140c910a01804d8127ea5ff343f1314583034cca81ef31869fb7f,2024-10-31T21:35:01.493000
CVE-2023-4328,0,0,40b8eb5b819235e4ef316ebd3c814a2d53149e055382221e427be30f3464080e,2024-09-25T01:15:39.207000
CVE-2023-43281,0,0,a8043741c9358a4c4a6eb393caa7cb080a33c75aaafb8cfaf3705b4ad1ef0d37,2023-11-07T04:21:19.967000
CVE-2023-43284,0,0,eb069cb8ee8a4baf7f83215c049a2651e0474ffdc63962764af570e0ae6fe118,2024-09-19T20:35:11.857000
@ -242666,13 +242666,17 @@ CVE-2024-1057,0,0,afa16fae44234143422d3d8f32f1ab0c34f389c2f0ebb0a7139bb0ca7e4b17
CVE-2024-10573,0,0,b38ef3f6c3eadff638aac2b1e2e94dea1b67cb67b399073de7c8b41bfb551c32,2024-10-31T19:15:12.540000
CVE-2024-1058,0,0,6b5e9e2c8572168cf164dc3fe2cb55f99ab49ff2791e71ab226d135ab3271443,2024-02-29T13:49:29.390000
CVE-2024-1059,0,0,76d1b9b40438f497b680a6494941e57752e942263b38e7996980a78bf67b658a,2024-02-05T20:50:26.783000
CVE-2024-10594,1,1,b4f1fb29c5afe6af171160e5cc65bdd1200faadbec6a5137635be1dd3e1bc4bb,2024-10-31T21:15:14.990000
CVE-2024-10595,1,1,2c72b19db86abaf6645cfc895e5a8fcf945fde99576d8acc26b7572d7e8e711a,2024-10-31T21:15:15.387000
CVE-2024-10596,1,1,d5e9bc732fabeccdf454849939a8f5227fcd4ec4a195d0748f0f61b783871014,2024-10-31T21:15:15.647000
CVE-2024-10597,1,1,e5c082b349a51a1b6f0ee07ba6030bc60245ddd1b7e068b73a97bdc4429987b8,2024-10-31T21:15:15.893000
CVE-2024-10598,1,1,c44377b1077988455a06c0b4e2acbae274518924cc0ed44dd3e440b21fcc1734,2024-10-31T22:15:02.960000
CVE-2024-10599,1,1,763b8efbfd0c5d284ab90275072b60fcec14f32211193fad12ef4d7af1c43894,2024-10-31T22:15:03.267000
CVE-2024-10594,0,0,b4f1fb29c5afe6af171160e5cc65bdd1200faadbec6a5137635be1dd3e1bc4bb,2024-10-31T21:15:14.990000
CVE-2024-10595,0,0,2c72b19db86abaf6645cfc895e5a8fcf945fde99576d8acc26b7572d7e8e711a,2024-10-31T21:15:15.387000
CVE-2024-10596,0,0,d5e9bc732fabeccdf454849939a8f5227fcd4ec4a195d0748f0f61b783871014,2024-10-31T21:15:15.647000
CVE-2024-10597,0,0,e5c082b349a51a1b6f0ee07ba6030bc60245ddd1b7e068b73a97bdc4429987b8,2024-10-31T21:15:15.893000
CVE-2024-10598,0,0,c44377b1077988455a06c0b4e2acbae274518924cc0ed44dd3e440b21fcc1734,2024-10-31T22:15:02.960000
CVE-2024-10599,0,0,763b8efbfd0c5d284ab90275072b60fcec14f32211193fad12ef4d7af1c43894,2024-10-31T22:15:03.267000
CVE-2024-1060,0,0,d653064ebc7376d659eeceb53018669b809b93fa1e3915db85367d79da8fa5c6,2024-02-05T20:49:55.413000
CVE-2024-10600,1,1,1bea1a7b10b438194688009d120bfd1ff9709bd75db4bcc5ccc94bf8e5f334ed,2024-10-31T23:15:12.067000
CVE-2024-10601,1,1,7b8255e9af3488a6a39c1d0a5dfdeb386957e032065b46d4068072fbb9667706,2024-10-31T23:15:12.343000
CVE-2024-10602,1,1,96d2ae9bab76099abc9d680c159fbb5dc171ea7c8d49aec28979a944835cde6f,2024-11-01T00:15:02.973000
CVE-2024-10605,1,1,e29ff38a00b23eefa1c3da967b46cee3d2cf09ab833c3586b164656be09dc238,2024-11-01T00:15:03.243000
CVE-2024-1061,0,0,b0142398cd9b9f174f90c4c080cff8303ffcef7270f68849f3de92ae586ec72f,2024-02-05T18:21:08.577000
CVE-2024-1062,0,0,96fd163b87faa7f96df00eff21b1688e595dd6d409735135ea0e59da2984f85b,2024-10-10T14:22:28.617000
CVE-2024-1063,0,0,74a897918202555ab7dea6b1737e329d32a036051a3381cf0244644b537611c7,2024-02-05T18:25:57.167000
@ -255244,7 +255248,7 @@ CVE-2024-35954,0,0,53b732a73cdf4d897ff80165a356234cd2c56623fd0ddd9040cf09a2b2f32
CVE-2024-35955,0,0,20944e36f3c060eab9931576f0bfc456815a44d088df82e5772d50ce721db86f,2024-07-03T02:02:29.083000
CVE-2024-35956,0,0,6daaa17f6daf5c1e7dbe25b31d8f284c6d8eb8dc7456f0a10055a1b94b729d44,2024-05-20T13:00:04.957000
CVE-2024-35957,0,0,e141b1b9097a7806a00bb0c48ac64502ac9af857ac6124b5c3fe838aeabb39c1,2024-05-20T13:00:04.957000
CVE-2024-35958,0,1,520ce99d6fe125a999a2b3543d8dd4f95c7cc5bcf844ab7755130375b8b34663,2024-10-31T21:35:03.013000
CVE-2024-35958,0,0,520ce99d6fe125a999a2b3543d8dd4f95c7cc5bcf844ab7755130375b8b34663,2024-10-31T21:35:03.013000
CVE-2024-35959,0,0,dedb0d273081072306561ee363e733e771e14b093e6ca1312bedc816a5a31709,2024-05-20T13:00:04.957000
CVE-2024-3596,0,0,cb33925615133cc12f1d779362e2e2cf3367c987c4531f8ee95e198d5de65bd7,2024-07-23T09:15:02.697000
CVE-2024-35960,0,0,11d604c76d60dfaa78f70c27cc242617c170ee1b403a8338bbdc80eef71892f9,2024-07-03T02:02:30.127000
@ -265268,8 +265272,8 @@ CVE-2024-6471,0,0,09d48a1225aac8158aa4c1ca2c8aef77a523ae62ed5b11e34f01b64da625d3
CVE-2024-6472,0,0,06cfc3c26e9764572c1adb3e446cad13cb9599b02c4c47946f6698a134e25867,2024-08-06T16:31:05.780000
CVE-2024-6473,0,0,9d329dd670917bde4dfbebd26b87a1f0ac64a0b550d97fba6854ff35150aadd6,2024-09-05T14:19:45.153000
CVE-2024-6477,0,0,095ad8bec127bb97feb0819e6df5852cd52601b6cc4ba1d92128a3b9897811f6,2024-09-06T17:35:19.087000
CVE-2024-6479,1,1,b187a9b2ebc95c66d0576f80651a80571f113b65201ba6de3354308e4193d4b5,2024-10-31T22:15:03.577000
CVE-2024-6480,1,1,8745763e9470610e8729645e8e5b11a85f4d1024e9db27de60ed15c1f6e3c043,2024-10-31T22:15:03.817000
CVE-2024-6479,0,0,b187a9b2ebc95c66d0576f80651a80571f113b65201ba6de3354308e4193d4b5,2024-10-31T22:15:03.577000
CVE-2024-6480,0,0,8745763e9470610e8729645e8e5b11a85f4d1024e9db27de60ed15c1f6e3c043,2024-10-31T22:15:03.817000
CVE-2024-6481,0,0,8a6ed16cb15e9b1be7b8ecc3c869a269748ddec5ecbc3504e8d7f068ea116af3,2024-08-08T14:35:14.190000
CVE-2024-6482,0,0,72bf8f43b51dedcbd3503b13fb1098e532f5e135aadff3ebc844afe2ce28381d,2024-09-27T13:54:53.837000
CVE-2024-6484,0,0,bc633abd6bfb9da06585afdfb273066dfbc508847026385eb612d46f7c70ed29,2024-07-11T18:09:58.777000

Can't render this file because it is too large.