From 36c1053e891b91ab83436a4ba31727acf5ae5021 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 1 Nov 2024 00:58:45 +0000 Subject: [PATCH] Auto-Update: 2024-11-01T00:55:44.576151+00:00 --- CVE-2023/CVE-2023-20xx/CVE-2023-2062.json | 8 +- CVE-2024/CVE-2024-106xx/CVE-2024-10600.json | 137 +++++++++++++++++++ CVE-2024/CVE-2024-106xx/CVE-2024-10601.json | 137 +++++++++++++++++++ CVE-2024/CVE-2024-106xx/CVE-2024-10602.json | 137 +++++++++++++++++++ CVE-2024/CVE-2024-106xx/CVE-2024-10605.json | 141 ++++++++++++++++++++ README.md | 26 ++-- _state.csv | 28 ++-- 7 files changed, 584 insertions(+), 30 deletions(-) create mode 100644 CVE-2024/CVE-2024-106xx/CVE-2024-10600.json create mode 100644 CVE-2024/CVE-2024-106xx/CVE-2024-10601.json create mode 100644 CVE-2024/CVE-2024-106xx/CVE-2024-10602.json create mode 100644 CVE-2024/CVE-2024-106xx/CVE-2024-10605.json diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2062.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2062.json index 61658eb7a6c..d20d73662d1 100644 --- a/CVE-2023/CVE-2023-20xx/CVE-2023-2062.json +++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2062.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2062", "sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "published": "2023-06-02T05:15:10.187", - "lastModified": "2023-06-16T14:56:51.317", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-31T23:15:11.873", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -195,6 +195,10 @@ "Third Party Advisory" ] }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-157-02", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + }, { "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2023-004.pdf", "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10600.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10600.json new file mode 100644 index 00000000000..434cf92abe7 --- /dev/null +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10600.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-10600", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-31T23:15:12.067", + "lastModified": "2024-10-31T23:15:12.067", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in Tongda OA 2017 up to 11.6. Affected is an unknown function of the file pda/appcenter/submenu.php. The manipulation of the argument appid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/LvZCh/td/issues/3", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.282612", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.282612", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.433497", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10601.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10601.json new file mode 100644 index 00000000000..4e04b1ba639 --- /dev/null +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10601.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-10601", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-31T23:15:12.343", + "lastModified": "2024-10-31T23:15:12.343", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in Tongda OA 2017 up to 11.10 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /general/address/private/address/query/delete.php. The manipulation of the argument where_repeat leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/LvZCh/td/issues/4", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.282613", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.282613", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.433498", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10602.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10602.json new file mode 100644 index 00000000000..03c3d5ff59c --- /dev/null +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10602.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-10602", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-11-01T00:15:02.973", + "lastModified": "2024-11-01T00:15:02.973", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Tongda OA 2017 up to 11.9 and classified as critical. Affected by this issue is some unknown functionality of the file /general/approve_center/list/input_form/data_picker_link.php. The manipulation of the argument dataSrc leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/LvZCh/td/issues/5", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.282614", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.282614", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.433499", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10605.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10605.json new file mode 100644 index 00000000000..a8b3eda8149 --- /dev/null +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10605.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-10605", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-11-01T00:15:03.243", + "lastModified": "2024-11-01T00:15:03.243", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been classified as problematic. This affects an unknown part of the file /file/request.php. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 5.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/bevennyamande/receiver_request_sample_csrf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.282615", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.282615", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.434756", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 743a9eea165..830f5225f7c 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-31T23:00:19.959534+00:00 +2024-11-01T00:55:44.576151+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-31T22:15:03.817000+00:00 +2024-11-01T00:15:03.243000+00:00 ``` ### Last Data Feed Release @@ -33,30 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -267769 +267773 ``` ### CVEs added in the last Commit -Recently added CVEs: `8` +Recently added CVEs: `4` -- [CVE-2024-10594](CVE-2024/CVE-2024-105xx/CVE-2024-10594.json) (`2024-10-31T21:15:14.990`) -- [CVE-2024-10595](CVE-2024/CVE-2024-105xx/CVE-2024-10595.json) (`2024-10-31T21:15:15.387`) -- [CVE-2024-10596](CVE-2024/CVE-2024-105xx/CVE-2024-10596.json) (`2024-10-31T21:15:15.647`) -- [CVE-2024-10597](CVE-2024/CVE-2024-105xx/CVE-2024-10597.json) (`2024-10-31T21:15:15.893`) -- [CVE-2024-10598](CVE-2024/CVE-2024-105xx/CVE-2024-10598.json) (`2024-10-31T22:15:02.960`) -- [CVE-2024-10599](CVE-2024/CVE-2024-105xx/CVE-2024-10599.json) (`2024-10-31T22:15:03.267`) -- [CVE-2024-6479](CVE-2024/CVE-2024-64xx/CVE-2024-6479.json) (`2024-10-31T22:15:03.577`) -- [CVE-2024-6480](CVE-2024/CVE-2024-64xx/CVE-2024-6480.json) (`2024-10-31T22:15:03.817`) +- [CVE-2024-10600](CVE-2024/CVE-2024-106xx/CVE-2024-10600.json) (`2024-10-31T23:15:12.067`) +- [CVE-2024-10601](CVE-2024/CVE-2024-106xx/CVE-2024-10601.json) (`2024-10-31T23:15:12.343`) +- [CVE-2024-10602](CVE-2024/CVE-2024-106xx/CVE-2024-10602.json) (`2024-11-01T00:15:02.973`) +- [CVE-2024-10605](CVE-2024/CVE-2024-106xx/CVE-2024-10605.json) (`2024-11-01T00:15:03.243`) ### CVEs modified in the last Commit -Recently modified CVEs: `3` +Recently modified CVEs: `1` -- [CVE-2021-29544](CVE-2021/CVE-2021-295xx/CVE-2021-29544.json) (`2024-10-31T21:15:14.753`) -- [CVE-2023-43279](CVE-2023/CVE-2023-432xx/CVE-2023-43279.json) (`2024-10-31T21:35:01.493`) -- [CVE-2024-35958](CVE-2024/CVE-2024-359xx/CVE-2024-35958.json) (`2024-10-31T21:35:03.013`) +- [CVE-2023-2062](CVE-2023/CVE-2023-20xx/CVE-2023-2062.json) (`2024-10-31T23:15:11.873`) ## Download and Usage diff --git a/_state.csv b/_state.csv index e8f122eedfe..2c66b60b3d1 100644 --- a/_state.csv +++ b/_state.csv @@ -173901,7 +173901,7 @@ CVE-2021-29540,0,0,6bad1a6f8fd18b0a1ccdb809a99c882267a7f0c108c21dea2b5289d5c3616 CVE-2021-29541,0,0,89a4770cea44aff177ab657eeb99a5b3579b49f9b413b4e363aaf2602bb04dfd,2021-05-20T16:21:49.497000 CVE-2021-29542,0,0,e91fd2a87da4ff6f7a25ff597f10426d792f7ea3cac2344e5cc61f01e3c8f05b,2022-04-25T20:03:53.697000 CVE-2021-29543,0,0,439ae44eee6be4fc3ba37999bcdf7d8fe4f567c1b98dee702fc13cc474228983,2021-07-27T17:26:18.650000 -CVE-2021-29544,0,1,8e95ac745b4e271056b789635ce51a85a9798e546c3ac5a0c0153447d2f10b98,2024-10-31T21:15:14.753000 +CVE-2021-29544,0,0,8e95ac745b4e271056b789635ce51a85a9798e546c3ac5a0c0153447d2f10b98,2024-10-31T21:15:14.753000 CVE-2021-29545,0,0,d101357d3540a261628815a68a077d27c4794d1c137851d6b96e2158975ade20,2021-07-27T17:25:16.893000 CVE-2021-29546,0,0,a887be9f8827c190703f6fd6e7b8f2a19677dec9cf4f29012563f4ecbcab0392,2021-07-26T16:05:50.307000 CVE-2021-29547,0,0,a74fd81ac3600ad0ce1085236749009c9a476d7bf3d768a064e06cbecf7b0040,2021-07-27T17:25:10.117000 @@ -215034,7 +215034,7 @@ CVE-2023-20615,0,0,403d2208ea9cfe7674ec83dce5bd02fbc023ef44016fa56e0176ea8c1c6ce CVE-2023-20616,0,0,3092ae68b1a37fd77970d6937f7300306f59e3a93bd4cb5a02257aa2d42d5447,2023-02-14T17:59:08.763000 CVE-2023-20618,0,0,bfc9c086da18547a444623e23619ddcb0ce992b631ecf6ed8d966be502829b8d,2023-02-14T18:02:12.267000 CVE-2023-20619,0,0,b2fd6630cee592c2582609468e56ceabcfe7c2d157b79665609b43c3d2a735f5,2023-02-14T18:10:07.637000 -CVE-2023-2062,0,0,5b6375b5ca20bf7ad2eee4b5a59d128b6fccf7689c566224bbd98a8b42425d9f,2023-06-16T14:56:51.317000 +CVE-2023-2062,0,1,3259b85ada336c249c0a3127aa4a92c6b50d3c8d3c87bdb21bc9db2b1076dfcc,2024-10-31T23:15:11.873000 CVE-2023-20620,0,0,c185d10c903b959c24e1ba03baa3c548712f99a8095b9a842a3b855269c7669a,2023-03-13T03:57:10.570000 CVE-2023-20621,0,0,085abfcd6a2e25116d69f753d336955a363b8c522cae98983eb845b1a00e5b7e,2023-03-13T03:57:00.093000 CVE-2023-20623,0,0,4a739139ff8c04950bc70f9d126619146f9f37a276b7be7f445065eef2b13a69,2023-03-13T03:56:40.467000 @@ -232843,7 +232843,7 @@ CVE-2023-43271,0,0,b638f0a53dac82b777acfdc20c2f8998778c958c894beb64990d47b1c8094 CVE-2023-43274,0,0,a681bf6827cce8cd35b9042f24c0c4d4f1147f877fe813500c3f6e06aa3c154d,2024-09-25T01:36:23.600000 CVE-2023-43275,0,0,3a669c1ce34ae3001e62dbde8d7352445b229bf3d3f0e90c97eeb345a92e1bbd,2024-08-14T19:35:09.223000 CVE-2023-43278,0,0,bbf061d83d67120f51666ab71df16ebf01407dd058278fae4fe9b8df8566b218,2023-09-26T14:38:05.117000 -CVE-2023-43279,0,1,3a6d944d383140c910a01804d8127ea5ff343f1314583034cca81ef31869fb7f,2024-10-31T21:35:01.493000 +CVE-2023-43279,0,0,3a6d944d383140c910a01804d8127ea5ff343f1314583034cca81ef31869fb7f,2024-10-31T21:35:01.493000 CVE-2023-4328,0,0,40b8eb5b819235e4ef316ebd3c814a2d53149e055382221e427be30f3464080e,2024-09-25T01:15:39.207000 CVE-2023-43281,0,0,a8043741c9358a4c4a6eb393caa7cb080a33c75aaafb8cfaf3705b4ad1ef0d37,2023-11-07T04:21:19.967000 CVE-2023-43284,0,0,eb069cb8ee8a4baf7f83215c049a2651e0474ffdc63962764af570e0ae6fe118,2024-09-19T20:35:11.857000 @@ -242666,13 +242666,17 @@ CVE-2024-1057,0,0,afa16fae44234143422d3d8f32f1ab0c34f389c2f0ebb0a7139bb0ca7e4b17 CVE-2024-10573,0,0,b38ef3f6c3eadff638aac2b1e2e94dea1b67cb67b399073de7c8b41bfb551c32,2024-10-31T19:15:12.540000 CVE-2024-1058,0,0,6b5e9e2c8572168cf164dc3fe2cb55f99ab49ff2791e71ab226d135ab3271443,2024-02-29T13:49:29.390000 CVE-2024-1059,0,0,76d1b9b40438f497b680a6494941e57752e942263b38e7996980a78bf67b658a,2024-02-05T20:50:26.783000 -CVE-2024-10594,1,1,b4f1fb29c5afe6af171160e5cc65bdd1200faadbec6a5137635be1dd3e1bc4bb,2024-10-31T21:15:14.990000 -CVE-2024-10595,1,1,2c72b19db86abaf6645cfc895e5a8fcf945fde99576d8acc26b7572d7e8e711a,2024-10-31T21:15:15.387000 -CVE-2024-10596,1,1,d5e9bc732fabeccdf454849939a8f5227fcd4ec4a195d0748f0f61b783871014,2024-10-31T21:15:15.647000 -CVE-2024-10597,1,1,e5c082b349a51a1b6f0ee07ba6030bc60245ddd1b7e068b73a97bdc4429987b8,2024-10-31T21:15:15.893000 -CVE-2024-10598,1,1,c44377b1077988455a06c0b4e2acbae274518924cc0ed44dd3e440b21fcc1734,2024-10-31T22:15:02.960000 -CVE-2024-10599,1,1,763b8efbfd0c5d284ab90275072b60fcec14f32211193fad12ef4d7af1c43894,2024-10-31T22:15:03.267000 +CVE-2024-10594,0,0,b4f1fb29c5afe6af171160e5cc65bdd1200faadbec6a5137635be1dd3e1bc4bb,2024-10-31T21:15:14.990000 +CVE-2024-10595,0,0,2c72b19db86abaf6645cfc895e5a8fcf945fde99576d8acc26b7572d7e8e711a,2024-10-31T21:15:15.387000 +CVE-2024-10596,0,0,d5e9bc732fabeccdf454849939a8f5227fcd4ec4a195d0748f0f61b783871014,2024-10-31T21:15:15.647000 +CVE-2024-10597,0,0,e5c082b349a51a1b6f0ee07ba6030bc60245ddd1b7e068b73a97bdc4429987b8,2024-10-31T21:15:15.893000 +CVE-2024-10598,0,0,c44377b1077988455a06c0b4e2acbae274518924cc0ed44dd3e440b21fcc1734,2024-10-31T22:15:02.960000 +CVE-2024-10599,0,0,763b8efbfd0c5d284ab90275072b60fcec14f32211193fad12ef4d7af1c43894,2024-10-31T22:15:03.267000 CVE-2024-1060,0,0,d653064ebc7376d659eeceb53018669b809b93fa1e3915db85367d79da8fa5c6,2024-02-05T20:49:55.413000 +CVE-2024-10600,1,1,1bea1a7b10b438194688009d120bfd1ff9709bd75db4bcc5ccc94bf8e5f334ed,2024-10-31T23:15:12.067000 +CVE-2024-10601,1,1,7b8255e9af3488a6a39c1d0a5dfdeb386957e032065b46d4068072fbb9667706,2024-10-31T23:15:12.343000 +CVE-2024-10602,1,1,96d2ae9bab76099abc9d680c159fbb5dc171ea7c8d49aec28979a944835cde6f,2024-11-01T00:15:02.973000 +CVE-2024-10605,1,1,e29ff38a00b23eefa1c3da967b46cee3d2cf09ab833c3586b164656be09dc238,2024-11-01T00:15:03.243000 CVE-2024-1061,0,0,b0142398cd9b9f174f90c4c080cff8303ffcef7270f68849f3de92ae586ec72f,2024-02-05T18:21:08.577000 CVE-2024-1062,0,0,96fd163b87faa7f96df00eff21b1688e595dd6d409735135ea0e59da2984f85b,2024-10-10T14:22:28.617000 CVE-2024-1063,0,0,74a897918202555ab7dea6b1737e329d32a036051a3381cf0244644b537611c7,2024-02-05T18:25:57.167000 @@ -255244,7 +255248,7 @@ CVE-2024-35954,0,0,53b732a73cdf4d897ff80165a356234cd2c56623fd0ddd9040cf09a2b2f32 CVE-2024-35955,0,0,20944e36f3c060eab9931576f0bfc456815a44d088df82e5772d50ce721db86f,2024-07-03T02:02:29.083000 CVE-2024-35956,0,0,6daaa17f6daf5c1e7dbe25b31d8f284c6d8eb8dc7456f0a10055a1b94b729d44,2024-05-20T13:00:04.957000 CVE-2024-35957,0,0,e141b1b9097a7806a00bb0c48ac64502ac9af857ac6124b5c3fe838aeabb39c1,2024-05-20T13:00:04.957000 -CVE-2024-35958,0,1,520ce99d6fe125a999a2b3543d8dd4f95c7cc5bcf844ab7755130375b8b34663,2024-10-31T21:35:03.013000 +CVE-2024-35958,0,0,520ce99d6fe125a999a2b3543d8dd4f95c7cc5bcf844ab7755130375b8b34663,2024-10-31T21:35:03.013000 CVE-2024-35959,0,0,dedb0d273081072306561ee363e733e771e14b093e6ca1312bedc816a5a31709,2024-05-20T13:00:04.957000 CVE-2024-3596,0,0,cb33925615133cc12f1d779362e2e2cf3367c987c4531f8ee95e198d5de65bd7,2024-07-23T09:15:02.697000 CVE-2024-35960,0,0,11d604c76d60dfaa78f70c27cc242617c170ee1b403a8338bbdc80eef71892f9,2024-07-03T02:02:30.127000 @@ -265268,8 +265272,8 @@ CVE-2024-6471,0,0,09d48a1225aac8158aa4c1ca2c8aef77a523ae62ed5b11e34f01b64da625d3 CVE-2024-6472,0,0,06cfc3c26e9764572c1adb3e446cad13cb9599b02c4c47946f6698a134e25867,2024-08-06T16:31:05.780000 CVE-2024-6473,0,0,9d329dd670917bde4dfbebd26b87a1f0ac64a0b550d97fba6854ff35150aadd6,2024-09-05T14:19:45.153000 CVE-2024-6477,0,0,095ad8bec127bb97feb0819e6df5852cd52601b6cc4ba1d92128a3b9897811f6,2024-09-06T17:35:19.087000 -CVE-2024-6479,1,1,b187a9b2ebc95c66d0576f80651a80571f113b65201ba6de3354308e4193d4b5,2024-10-31T22:15:03.577000 -CVE-2024-6480,1,1,8745763e9470610e8729645e8e5b11a85f4d1024e9db27de60ed15c1f6e3c043,2024-10-31T22:15:03.817000 +CVE-2024-6479,0,0,b187a9b2ebc95c66d0576f80651a80571f113b65201ba6de3354308e4193d4b5,2024-10-31T22:15:03.577000 +CVE-2024-6480,0,0,8745763e9470610e8729645e8e5b11a85f4d1024e9db27de60ed15c1f6e3c043,2024-10-31T22:15:03.817000 CVE-2024-6481,0,0,8a6ed16cb15e9b1be7b8ecc3c869a269748ddec5ecbc3504e8d7f068ea116af3,2024-08-08T14:35:14.190000 CVE-2024-6482,0,0,72bf8f43b51dedcbd3503b13fb1098e532f5e135aadff3ebc844afe2ce28381d,2024-09-27T13:54:53.837000 CVE-2024-6484,0,0,bc633abd6bfb9da06585afdfb273066dfbc508847026385eb612d46f7c70ed29,2024-07-11T18:09:58.777000