Auto-Update: 2024-05-16T02:00:30.323989+00:00

This commit is contained in:
cad-safe-bot 2024-05-16 02:03:21 +00:00
parent 91efdb5ea1
commit 485cf9ab3c
19 changed files with 446 additions and 65 deletions

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-1870",
"sourceIdentifier": "product-security@apple.com",
"published": "2021-04-02T19:15:20.567",
"lastModified": "2023-11-07T03:28:52.360",
"lastModified": "2024-05-16T01:00:02.197",
"vulnStatus": "Modified",
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Apple iOS, iPadOS, and macOS Remote Code Execution Vulnerability",
"cisaVulnerabilityName": "Apple iOS, iPadOS, and macOS WebKit Remote Code Execution Vulnerability",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-1871",
"sourceIdentifier": "product-security@apple.com",
"published": "2021-04-02T19:15:20.663",
"lastModified": "2023-11-07T03:28:52.430",
"lastModified": "2024-05-16T01:00:02.197",
"vulnStatus": "Modified",
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Apple iOS, iPadOS, and macOS Remote Code Execution Vulnerability",
"cisaVulnerabilityName": "Apple iOS, iPadOS, and macOS WebKit Remote Code Execution Vulnerability",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-1879",
"sourceIdentifier": "product-security@apple.com",
"published": "2021-04-02T19:15:20.770",
"lastModified": "2023-01-09T16:41:59.350",
"lastModified": "2024-05-16T01:00:02.197",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Apple iOS, iPadOS, and watchOS Cross-Site Scripting (XSS) Vulnerability",
"cisaVulnerabilityName": "Apple iOS, iPadOS, and watchOS WebKit Cross-Site Scripting (XSS) Vulnerability",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-30661",
"sourceIdentifier": "product-security@apple.com",
"published": "2021-09-08T15:15:13.320",
"lastModified": "2021-09-20T12:26:22.673",
"lastModified": "2024-05-16T01:00:02.197",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Apple Multiple Products Use-After-Free Vulnerability",
"cisaVulnerabilityName": "Apple Multiple Products WebKit Storage Use-After-Free Vulnerability",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-30663",
"sourceIdentifier": "product-security@apple.com",
"published": "2021-09-08T15:15:13.413",
"lastModified": "2024-02-02T03:08:37.943",
"lastModified": "2024-05-16T01:00:02.197",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Apple Multiple Products Integer Overflow Vulnerability",
"cisaVulnerabilityName": "Apple Multiple Products WebKit Integer Overflow Vulnerability",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-30665",
"sourceIdentifier": "product-security@apple.com",
"published": "2021-09-08T15:15:13.507",
"lastModified": "2022-05-03T16:04:40.443",
"lastModified": "2024-05-16T01:00:02.197",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Apple Multiple Products Memory Corruption Vulnerability",
"cisaVulnerabilityName": "Apple Multiple Products WebKit Memory Corruption Vulnerability",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-30666",
"sourceIdentifier": "product-security@apple.com",
"published": "2021-09-08T15:15:13.553",
"lastModified": "2022-07-12T17:42:04.277",
"lastModified": "2024-05-16T01:00:02.197",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Apple iOS Buffer Overflow Vulnerability",
"cisaVulnerabilityName": "Apple iOS WebKit Buffer Overflow Vulnerability",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-30761",
"sourceIdentifier": "product-security@apple.com",
"published": "2021-09-08T14:15:10.257",
"lastModified": "2021-09-14T19:20:50.890",
"lastModified": "2024-05-16T01:00:02.197",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Apple iOS Memory Corruption Vulnerability",
"cisaVulnerabilityName": "Apple iOS WebKit Memory Corruption Vulnerability",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-30762",
"sourceIdentifier": "product-security@apple.com",
"published": "2021-09-08T14:15:10.300",
"lastModified": "2021-09-14T19:29:08.017",
"lastModified": "2024-05-16T01:00:02.197",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Apple iOS Use-After-Free Vulnerability",
"cisaVulnerabilityName": "Apple iOS WebKit Use-After-Free Vulnerability",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-22620",
"sourceIdentifier": "product-security@apple.com",
"published": "2022-03-18T18:15:13.787",
"lastModified": "2022-09-09T20:41:25.447",
"lastModified": "2024-05-16T01:00:02.197",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2022-02-11",
"cisaActionDue": "2022-02-25",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Apple Webkit Remote Code Execution Vulnerability",
"cisaVulnerabilityName": "Apple iOS, iPadOS, and macOS Webkit Use-After-Free Vulnerability",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-22353",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-03-31T12:15:50.430",
"lastModified": "2024-04-02T17:56:57.187",
"vulnStatus": "Analyzed",
"lastModified": "2024-05-16T00:15:08.057",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "IBM WebSphere Application Server Liberty 17.0.0.3 through 24.0.0.3 is vulnerable to a denial of service, caused by sending a specially crafted request. A remote attacker could exploit this vulnerability to cause the server to consume memory resources. IBM X-Force ID: 280400."
"value": "IBM WebSphere Application Server Liberty 17.0.0.3 through 24.0.0.4 is vulnerable to a denial of service, caused by sending a specially crafted request. A remote attacker could exploit this vulnerability to cause the server to consume memory resources. IBM X-Force ID: 280400."
},
{
"lang": "es",
@ -65,7 +65,7 @@
"description": [
{
"lang": "en",
"value": "CWE-400"
"value": "CWE-770"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-23222",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-23T01:15:11.500",
"lastModified": "2024-03-08T02:15:47.547",
"lastModified": "2024-05-16T01:00:02.200",
"vulnStatus": "Modified",
"cisaExploitAdd": "2024-01-23",
"cisaActionDue": "2024-02-13",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Apple Multiple Products Type Confusion Vulnerability",
"cisaVulnerabilityName": "Apple Multiple Products WebKit Type Confusion Vulnerability",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-27268",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-04-04T18:15:13.823",
"lastModified": "2024-05-04T14:16:02.520",
"lastModified": "2024-05-16T01:15:07.370",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "IBM WebSphere Application Server Liberty 18.0.0.2 through 24.0.0.3 is vulnerable to a denial of service, caused by sending a specially crafted request. A remote attacker could exploit this vulnerability to cause the server to consume memory resources. IBM X-Force ID: 284574."
"value": "IBM WebSphere Application Server Liberty 18.0.0.2 through 24.0.0.4 is vulnerable to a denial of service, caused by sending a specially crafted request. A remote attacker could exploit this vulnerability to cause the server to consume memory resources. IBM X-Force ID: 284574."
},
{
"lang": "es",
@ -41,11 +41,11 @@
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
"value": "CWE-770"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-4919",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-16T00:15:08.280",
"lastModified": "2024-05-16T00:15:08.280",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Campcodes Online Examination System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /adminpanel/admin/query/addCourseExe.php. The manipulation of the argument course_name leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-264454 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_addCourseExe.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.264454",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.264454",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.333416",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-4920",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-16T00:15:08.563",
"lastModified": "2024-05-16T00:15:08.563",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Online Discussion Forum Site 1.0. It has been rated as critical. This issue affects some unknown processing of the file registerH.php. The manipulation of the argument ima leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-264455."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://github.com/CveSecLook/cve/issues/27",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.264455",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.264455",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.333477",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-4921",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-16T01:15:07.540",
"lastModified": "2024-05-16T01:15:07.540",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. Affected is an unknown function of the file /employee_gatepass/classes/Users.php?f=ssave. The manipulation of the argument img leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264456."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://github.com/I-Schnee-I/cev/blob/main/upload.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.264456",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.264456",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.333662",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-4922",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-16T01:15:07.813",
"lastModified": "2024-05-16T01:15:07.813",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in SourceCodester Simple Image Stack Website 1.0. This affects an unknown part. The manipulation of the argument page leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-264459."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/HuoMingZ/aoligei/blob/main/ceshi.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.264459",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.264459",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.333760",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-05-15T23:55:30.228712+00:00
2024-05-16T02:00:30.323989+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-05-15T23:15:08.210000+00:00
2024-05-16T01:15:07.813000+00:00
```
### Last Data Feed Release
@ -27,33 +27,42 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2024-05-15T00:00:20.269004+00:00
2024-05-16T00:00:20.245238+00:00
```
### Total Number of included CVEs
```plain
250058
250062
```
### CVEs added in the last Commit
Recently added CVEs: `7`
Recently added CVEs: `4`
- [CVE-2024-35183](CVE-2024/CVE-2024-351xx/CVE-2024-35183.json) (`2024-05-15T22:15:08.580`)
- [CVE-2024-35184](CVE-2024/CVE-2024-351xx/CVE-2024-35184.json) (`2024-05-15T22:15:08.867`)
- [CVE-2024-4914](CVE-2024/CVE-2024-49xx/CVE-2024-4914.json) (`2024-05-15T22:15:09.153`)
- [CVE-2024-4915](CVE-2024/CVE-2024-49xx/CVE-2024-4915.json) (`2024-05-15T22:15:09.563`)
- [CVE-2024-4916](CVE-2024/CVE-2024-49xx/CVE-2024-4916.json) (`2024-05-15T23:15:07.607`)
- [CVE-2024-4917](CVE-2024/CVE-2024-49xx/CVE-2024-4917.json) (`2024-05-15T23:15:07.920`)
- [CVE-2024-4918](CVE-2024/CVE-2024-49xx/CVE-2024-4918.json) (`2024-05-15T23:15:08.210`)
- [CVE-2024-4919](CVE-2024/CVE-2024-49xx/CVE-2024-4919.json) (`2024-05-16T00:15:08.280`)
- [CVE-2024-4920](CVE-2024/CVE-2024-49xx/CVE-2024-4920.json) (`2024-05-16T00:15:08.563`)
- [CVE-2024-4921](CVE-2024/CVE-2024-49xx/CVE-2024-4921.json) (`2024-05-16T01:15:07.540`)
- [CVE-2024-4922](CVE-2024/CVE-2024-49xx/CVE-2024-4922.json) (`2024-05-16T01:15:07.813`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `13`
- [CVE-2020-29312](CVE-2020/CVE-2020-293xx/CVE-2020-29312.json) (`2024-05-15T22:15:08.280`)
- [CVE-2021-1870](CVE-2021/CVE-2021-18xx/CVE-2021-1870.json) (`2024-05-16T01:00:02.197`)
- [CVE-2021-1871](CVE-2021/CVE-2021-18xx/CVE-2021-1871.json) (`2024-05-16T01:00:02.197`)
- [CVE-2021-1879](CVE-2021/CVE-2021-18xx/CVE-2021-1879.json) (`2024-05-16T01:00:02.197`)
- [CVE-2021-30661](CVE-2021/CVE-2021-306xx/CVE-2021-30661.json) (`2024-05-16T01:00:02.197`)
- [CVE-2021-30663](CVE-2021/CVE-2021-306xx/CVE-2021-30663.json) (`2024-05-16T01:00:02.197`)
- [CVE-2021-30665](CVE-2021/CVE-2021-306xx/CVE-2021-30665.json) (`2024-05-16T01:00:02.197`)
- [CVE-2021-30666](CVE-2021/CVE-2021-306xx/CVE-2021-30666.json) (`2024-05-16T01:00:02.197`)
- [CVE-2021-30761](CVE-2021/CVE-2021-307xx/CVE-2021-30761.json) (`2024-05-16T01:00:02.197`)
- [CVE-2021-30762](CVE-2021/CVE-2021-307xx/CVE-2021-30762.json) (`2024-05-16T01:00:02.197`)
- [CVE-2022-22620](CVE-2022/CVE-2022-226xx/CVE-2022-22620.json) (`2024-05-16T01:00:02.197`)
- [CVE-2024-22353](CVE-2024/CVE-2024-223xx/CVE-2024-22353.json) (`2024-05-16T00:15:08.057`)
- [CVE-2024-23222](CVE-2024/CVE-2024-232xx/CVE-2024-23222.json) (`2024-05-16T01:00:02.200`)
- [CVE-2024-27268](CVE-2024/CVE-2024-272xx/CVE-2024-27268.json) (`2024-05-16T01:15:07.370`)
## Download and Usage

View File

@ -157299,7 +157299,7 @@ CVE-2020-29303,0,0,717655a3d9e225f97e23641b8f0dbd1d39e9de6907efdee1dbb270370c419
CVE-2020-29304,0,0,84975babe9f5ae6c0f0f0a51fa3e2512e1024340a2d783c5c20dedaa6297203f,2020-12-15T16:49:03.950000
CVE-2020-2931,0,0,03bf87fad374d78526f736b31005a9cc40eaee9c9e517b855e446310dbb59038,2020-04-16T20:01:45.827000
CVE-2020-29311,0,0,41b3e7e3a6200eb87718ee2c6728c703f47a995684bcbf17cb36161bed533b8e,2021-07-21T11:39:23.747000
CVE-2020-29312,0,1,ccfcf5bd761bb5fd24d8577150bed1bd46bba3d9b3c846fbbef0bbb7959dc5d1,2024-05-15T22:15:08.280000
CVE-2020-29312,0,0,ccfcf5bd761bb5fd24d8577150bed1bd46bba3d9b3c846fbbef0bbb7959dc5d1,2024-05-15T22:15:08.280000
CVE-2020-29315,0,0,abe7e86f34527c61d1d483d3a72cc22d790ff07cba0482a17d0c05481ea9b9c0,2023-12-07T14:22:18.950000
CVE-2020-2932,0,0,667f0eefde131418b1963e0b53fb3de15afa80260ba5051f3741b41d052cd116,2020-04-16T20:02:22.827000
CVE-2020-29321,0,0,17ccef2e8e7fab45b03c666e840bc4ddcd9bb69d6184715ab8017020b6df59de,2022-07-12T17:42:04.277000
@ -166154,8 +166154,8 @@ CVE-2021-1864,0,0,8e26d91252a9b5e9e28835cfd3c0e453de998fc9314aa768e351caaca0b208
CVE-2021-1865,0,0,3d688b01054555a6cbdcaa16125ae13ad10e50f91be7adb0d081d1f16aeb8e57,2021-09-16T19:49:47.477000
CVE-2021-1867,0,0,288ed50e08496debd4c5e15dd0965819d65bccc069e18e9b4272f94ae014712d,2021-09-20T18:32:04.427000
CVE-2021-1868,0,0,1dfb254923e7afacac2616c3ca8c3a54ab36b820e1c2ac525988774c86085a4a,2021-09-20T12:39:19.897000
CVE-2021-1870,0,0,e4ae500156f8ba460be5941bcc115316c06f1d8a2ce0f48a257ee4f614df68fd,2023-11-07T03:28:52.360000
CVE-2021-1871,0,0,ee43eb7e823b28912ce82826b8fb8907bd383511f444b7bea13561c725915078,2023-11-07T03:28:52.430000
CVE-2021-1870,0,1,01ec51930b8a65724e778ab0c99704b1858614987780d00d4c6053299333fdbc,2024-05-16T01:00:02.197000
CVE-2021-1871,0,1,0a74a4ae952f89b48ede139d4612f9f015e7d55a380efee0a17ea786e6089713,2024-05-16T01:00:02.197000
CVE-2021-1872,0,0,c7f6d42de4fad056d615bed9f98ede1fdd9ba465bf505e23b3aed47cdcdb4007,2021-09-20T19:11:39.863000
CVE-2021-1873,0,0,0d434fa4bbf59afef33251394e5c365eb74741dbf21368fbc3b88782c6cb651a,2022-07-12T17:42:04.277000
CVE-2021-1874,0,0,01831726a4017e42ec0b903f9e783cee536f9423afb270804796af487a831b18,2021-09-20T19:05:43.507000
@ -166163,7 +166163,7 @@ CVE-2021-1875,0,0,f596a58abc60fd8c3bde5f566700a3f292297b106975487a6677339c5274a9
CVE-2021-1876,0,0,d1104ce4d5570e3e2087d9039236244e45137fdc70fa3d634877356bd62e60b8,2021-09-20T14:23:56.827000
CVE-2021-1877,0,0,19711153a80cca58b6c12f071c4203853cbbbbcaa28d299d0d8966c129917af0,2021-09-20T12:09:40.643000
CVE-2021-1878,0,0,52e89cae37004f754af0a92634fb4c2279d1e6fe13edbd5b41106f8be37a4f61,2021-09-20T12:51:30.223000
CVE-2021-1879,0,0,0c50c22df97ca3303cea9fe2b05018d705d511dde8acb899b610807b2cd91ee7,2023-01-09T16:41:59.350000
CVE-2021-1879,0,1,6137e04831dfaef82d55fe53810f4a86f5158404bdecb0ccf3c13da1ce513cdd,2024-05-16T01:00:02.197000
CVE-2021-1880,0,0,780b5d0900b6009641f7b712523c9ba2e918f134af74f96d781fa87ec1ef635c,2021-09-20T12:14:00.740000
CVE-2021-1881,0,0,469063abe7dceee3bccdbd8354a0f91fc65a46a88ba7c04aa34b0ef4b1507656,2021-09-17T19:26:53.670000
CVE-2021-1882,0,0,279f64d385299ac85df920d5fffa8a2811465e56fc9975ae6e72309c1199d465,2021-09-20T18:04:33.287000
@ -174652,12 +174652,12 @@ CVE-2021-30657,0,0,99ca1992fb3dfc6a541cb82d4aea250f3fcd656d9c777f83f05542a9a9cb4
CVE-2021-30658,0,0,df64bc4b043d06eb8f90a9c1bd5cebd4b041a71159d1a8aa513dc0c4f0a8485b,2021-09-21T15:29:33.150000
CVE-2021-30659,0,0,e530a8547e31c4a91777fde33c5b4c8d6766f06e448a762ad90b36b01951abc8,2021-09-17T14:26:26.420000
CVE-2021-30660,0,0,c2b33d647e4286b547415615a2b5ed54a22508246db81a1a1bda87aff173cee3,2021-09-20T13:15:02.383000
CVE-2021-30661,0,0,6ee7bc9064f9ea4090da254810cd61da190b3bbb4388ed1086b5523ba8ed3013,2021-09-20T12:26:22.673000
CVE-2021-30661,0,1,f6d9380b8d9f176346adaba4a073f2dc597f190fcd1925f474b20241edb51f16,2024-05-16T01:00:02.197000
CVE-2021-30662,0,0,fc2a2e73bbb70fc21b4631d1cbc668ad92a09b31502ed1667c5c53772f753d23,2021-09-20T12:26:52.893000
CVE-2021-30663,0,0,859b787843d695bd666191907d2c8715dafed0e911d68de9f8e6dda6263ef0c0,2024-02-02T03:08:37.943000
CVE-2021-30663,0,1,35069a740fdbc2d5c75571757b0eb0259708ec0e7c286bf59582dbded7368425,2024-05-16T01:00:02.197000
CVE-2021-30664,0,0,ff883536798ab1148dc2a1b1228cf4c81c4db706cd252b357d0ea4fa18eb75b6,2021-09-17T11:28:58.813000
CVE-2021-30665,0,0,c102c87d1c7302e53628f5202f5871112ffe85723519f039b5839918222edf84,2022-05-03T16:04:40.443000
CVE-2021-30666,0,0,98eba84490d8dcfcaec686e9bd2f5811a10213002b117113d82c1ea79b33bbc2,2022-07-12T17:42:04.277000
CVE-2021-30665,0,1,e82ab10cdd5408fb4a5f0744f448e87cff64669abf6699ef90f4b75351d31e98,2024-05-16T01:00:02.197000
CVE-2021-30666,0,1,f99d46c3a16fc1833642a06ca751a2463db538297089a1e57c962df8ac96bea9,2024-05-16T01:00:02.197000
CVE-2021-30667,0,0,b567a120dc2f62acc7835231ce7220e73d0df4014daf61e4fc499311275c32f1,2021-09-16T19:10:56.633000
CVE-2021-30668,0,0,ccac2a70ffd9d0df113a711da4967f9fba721b92218118bce12b4b7e6cb09ff6,2021-09-16T19:12:19.280000
CVE-2021-30669,0,0,0a8875c08687e95ea3a81fc22decd8281df8e208d9126c3af121b6e2510fde15,2021-09-16T16:47:43.090000
@ -174745,8 +174745,8 @@ CVE-2021-30757,0,0,d3d56c6906b27240f0f9e387c7d17f692b7b562e6a2e2f0574def3255013e
CVE-2021-30758,0,0,4a50cbb866560b9225c1187afb1bf1fff4d82a0b6c36471da0454f1c109ca12e,2021-09-14T20:00:04.913000
CVE-2021-30759,0,0,4bebe4566e6a97dd14bf02022046da6da5254b76fabde080882241d7a837174b,2021-09-14T20:20:14.083000
CVE-2021-30760,0,0,f0f67da202ffc51c91cc0e5bd3fc7cc95eafadb5c8d84ba6a4d3f7a5cb640335,2023-01-09T16:41:59.350000
CVE-2021-30761,0,0,d7c864e51e02932798103d8a73d80364fc5c7b8debd3fad12394f3e54b9edffa,2021-09-14T19:20:50.890000
CVE-2021-30762,0,0,a995c102ea66094c1e3e847919e6aac466cecdaeabb321f2b5be3edc213ea254,2021-09-14T19:29:08.017000
CVE-2021-30761,0,1,f98edd3b4a073ad4d47e92596e3ccc783db1cda5a162147c9c1707c601010336,2024-05-16T01:00:02.197000
CVE-2021-30762,0,1,b0a03d3c1a0855dda28fecbe75352154bb97d64278f5c92ab9052bc780472d2c,2024-05-16T01:00:02.197000
CVE-2021-30763,0,0,20d365012a73f2a57642ebb55f579b2a260a2e7232d04bc939481e11e0ec4bf5,2021-09-14T19:35:20.543000
CVE-2021-30764,0,0,eba5c09f8a49766c9f0ea77c6b7f32eb11b844f03685ee600eada4ebada74ba2,2021-09-14T19:38:39.237000
CVE-2021-30765,0,0,dbea043c2b9960ce9d4d176284418c295d1d5598315341df5fb67c714afaca1e,2021-09-16T13:39:36.783000
@ -191400,7 +191400,7 @@ CVE-2022-22616,0,0,52c1c954cce76263c8e305f0639bb0be1380dcc3f40bc1e8be8645ada7408
CVE-2022-22617,0,0,13da63862a1b54b6a9abaa860bfb892ed6fa580a6c0fcbf6132240a70f1d00da,2023-08-08T14:21:49.707000
CVE-2022-22618,0,0,65d9bde8794565ffbd1d22a82eef5e5b23fb726a1f26218cb87cf8606c2d2e06,2023-08-08T14:22:24.967000
CVE-2022-2262,0,0,ba1d526772c19e170f1ec434ae572dba94ebd9dbb639bab2f18e588731137ba9,2022-07-19T12:49:09.400000
CVE-2022-22620,0,0,d8e8c2bfd644e966d0ccc0cf3fa2e4edffbe011c6b40e6cc62f61d9aff98a844,2022-09-09T20:41:25.447000
CVE-2022-22620,0,1,322c49c3dd47969c25d6a7f0bcf3d95437a5691820f12fc841cc9379c8eb8e70,2024-05-16T01:00:02.197000
CVE-2022-22621,0,0,8bf47d44500d948b0bafacc9346537e8655e8be363255215c97d8714dcd15e40,2023-08-08T14:22:24.967000
CVE-2022-22622,0,0,5b564b910094c45b9fad430373bc3a40599bb4a01383004951f11ae9e83a94e8,2023-08-08T14:22:24.967000
CVE-2022-22623,0,0,dad3c00e07f4763ff3e9fd56be0d83d903337d6c160f53fea522b08823551a66,2023-11-07T03:43:56.890000
@ -242374,7 +242374,7 @@ CVE-2024-22344,0,0,d45fd6fc8ab9fa39eaa3f858727d1a3351c9b5e65218b1d4466a8f0fb66dd
CVE-2024-22345,0,0,d014aa3562325035b774e2fe45385508f179170d4ff82ff6e601139eae8cffc0,2024-05-14T16:13:02.773000
CVE-2024-22346,0,0,638ee4e9687c7c28032b432c317662713c057110b08b4b27024e81eb8453bf9e,2024-03-19T16:50:10.570000
CVE-2024-22352,0,0,8ad74f9c108b142191e10d9f1af5800c7055fc5b8e79f7a9a2cf40171c06b8cd,2024-04-01T15:23:54.530000
CVE-2024-22353,0,0,dcde4e1942667b685d2979f87ac00f95d42a8fc5d16f7dbd8bc9f66a2b78dfbb,2024-04-02T17:56:57.187000
CVE-2024-22353,0,1,ad692a077e5b804e1764ffb4f197bc72c54e38388ae47b5f805ac59827db6799,2024-05-16T00:15:08.057000
CVE-2024-22354,0,0,ad4c87b82596e233d2cc875f8c78b0beaca39f3f0e9b6f00e8ce2d52a80db805,2024-04-17T12:48:07.510000
CVE-2024-22355,0,0,d5e1a0b55aa53f554235616979c7aa7e85f01ce7f183bc4e8573dd18cbbe1419,2024-03-04T13:58:23.447000
CVE-2024-22356,0,0,d81d64e63fe9b642cced3e4c94acc5e30f0113b5fdf3bed9ebc6028d04aab3ff,2024-03-26T17:09:53.043000
@ -242778,7 +242778,7 @@ CVE-2024-23218,0,0,f9c63856068e91ff9b0c8acaa8fa5ee60b89ba853d892da3a1b57a30a48d4
CVE-2024-23219,0,0,6138a00dd33e643c6da7ab985c8bb39139630ef127b2b12e557a72994a3a6de9,2024-01-30T14:36:42.017000
CVE-2024-2322,0,0,60b35ad3bf9bd02d33facbaf1ddda5c64733f8e2d54364bad1f80ec56ba91bbf,2024-04-03T12:38:04.840000
CVE-2024-23220,0,0,8ac5f8ea712aad989eb58875485617fa914d9322cd1efd90091219b5c7412925,2024-03-13T23:15:46.087000
CVE-2024-23222,0,0,61f0a7f2953909b2da411f5647bebd2574cadd0ed79ad62454a1a9b27d6b5ecc,2024-03-08T02:15:47.547000
CVE-2024-23222,0,1,dbdfbb94ef7853af981ed6ff730267427ee1f33c1e3020606b19021bcf93c66d,2024-05-16T01:00:02.200000
CVE-2024-23223,0,0,d780b4d6e2ed4fd16bbb8e5d6b950b4f66cdf843fe3ec44eff85a2bd755e98e1,2024-01-27T03:48:24.797000
CVE-2024-23224,0,0,8c8e9af636b106e202b7f940d165666567457368baa4cae37acc93fd6c8a64d2,2024-01-27T03:45:02.100000
CVE-2024-23225,0,0,b045b8ce14b47c6046eb6998b70f65c4f611bc2259e19505fa6d0ddd8c29f039,2024-03-19T01:00:01.577000
@ -245359,7 +245359,7 @@ CVE-2024-2726,0,0,86fe8b0d397a8074a2c940021570750a55036cbee3d4d8f0a542dcc682e4af
CVE-2024-27261,0,0,bbed66d7d6087a4518d3eea41ca0d4f2f5d3d3e2b2ec24c87084c9ef60c5b4e2,2024-04-15T13:15:51.577000
CVE-2024-27265,0,0,caf2cbef481f9d0206d06f75a38ca052c5291ba0582e91875cea8f52e6d86a34,2024-03-19T16:52:02.767000
CVE-2024-27266,0,0,f3ab0f27c5fbbc81843b4329fa53134d5b91174cad9bacbbc5dbf01cfacc3864,2024-03-19T16:52:35.400000
CVE-2024-27268,0,0,5ee3875e7ce23e0a22f3973d639f8ec37762f6a4d7ebf553d0b8d456239df178,2024-05-04T14:16:02.520000
CVE-2024-27268,0,1,3c687588a19276e5b44431496d7af7239b9640f9b0218bde7d09fb0845bffcbc,2024-05-16T01:15:07.370000
CVE-2024-27269,0,0,9bbdf45cadb4233d15ddc0419941140b89c76def4ec46746de3b531c556735b5,2024-05-14T16:13:02.773000
CVE-2024-2727,0,0,958214357d5cfc59c51fd0300fa3ab5e09b0479b417a5156cb98159538007f76,2024-03-22T15:34:43.663000
CVE-2024-27270,0,0,90fac36f214c0b31b291ee9cc7c1398845637888710e65e72962c5636284122e,2024-03-27T15:49:51.300000
@ -249298,8 +249298,8 @@ CVE-2024-35171,0,0,4de8630e1bf094fb4a1152804e48c3dc58f770e96c7438fb408daec36dac0
CVE-2024-35172,0,0,618cb47da87cf9e4af4d56e1768459895814dd5f5800a2fcf0693eda1c64c373,2024-05-14T16:11:39.510000
CVE-2024-35175,0,0,30316f8adabe4b77ff55cf2c3104d884482b10f6e8ef0ea78ba2a92e169ff280,2024-05-15T16:40:19.330000
CVE-2024-35179,0,0,4433fc22ade8274a4e17f50ac56484b62a8701a589dbfa040c3c094fd870b93d,2024-05-15T16:40:19.330000
CVE-2024-35183,1,1,3bc58caec8e861e4c67d574c2532e9277af9566aecefebff3724908265352406,2024-05-15T22:15:08.580000
CVE-2024-35184,1,1,bbff83b52521abc9a3a25807a99b5f7723792594d4eda6aba812faba9de6f8db,2024-05-15T22:15:08.867000
CVE-2024-35183,0,0,3bc58caec8e861e4c67d574c2532e9277af9566aecefebff3724908265352406,2024-05-15T22:15:08.580000
CVE-2024-35184,0,0,bbff83b52521abc9a3a25807a99b5f7723792594d4eda6aba812faba9de6f8db,2024-05-15T22:15:08.867000
CVE-2024-3520,0,0,f6428e86e9ec472cba9c3c5754043cb34202461d79bcb1fa1b6a365d8347f93e,2024-05-02T18:00:37.360000
CVE-2024-35204,0,0,8d3cad343b73c9eacef2ac3c1c032cedd053b4ea3c17c07fa5f2f20d60725516,2024-05-14T16:11:39.510000
CVE-2024-35205,0,0,6c3c195f1e9ea6788d75f2fe16efcfbee96980b75a7c4536e4d4b7d48d63c4ae,2024-05-14T16:11:39.510000
@ -250047,11 +250047,15 @@ CVE-2024-4910,0,0,a82052dfa103200f3b9fc39482e4d4d960a5e5de9c8e240b89074cee62e90b
CVE-2024-4911,0,0,8d1608f0fa29a13cf0a21881c2ede6ff746ff4b49cb14c00be575f111b962149,2024-05-15T21:15:08.447000
CVE-2024-4912,0,0,959608c998df40105cb04722815b6866fe50f22984a019f9f852ebbd393b327c,2024-05-15T21:15:08.720000
CVE-2024-4913,0,0,ef1882efdbb97e7e5b3a9f1d624c71c7c6ca83c593dde5ac79d713777664dae8,2024-05-15T21:15:09
CVE-2024-4914,1,1,2c82d1f8833393182c7867bf3bb498ed1d9ac6e0ccf458fc6dc3c29f504ace8f,2024-05-15T22:15:09.153000
CVE-2024-4915,1,1,0ece382b6ad5961ea1f2edb3cd24a800ebe8e5db24cb03b1f9abd44792ca8d5f,2024-05-15T22:15:09.563000
CVE-2024-4916,1,1,0808d53e0c2ee3a5d56a480b41f4985f5cdba47f133d6974d9f06deb8a299632,2024-05-15T23:15:07.607000
CVE-2024-4917,1,1,cab3cd911fdb0d4da4d66130acff84648f1d28dedce375cf5a31196d5a50c5c1,2024-05-15T23:15:07.920000
CVE-2024-4918,1,1,d6e8570ed4f149bc4f85c05376cdadd0aae166933b8875d11496f633fdca44d0,2024-05-15T23:15:08.210000
CVE-2024-4914,0,0,2c82d1f8833393182c7867bf3bb498ed1d9ac6e0ccf458fc6dc3c29f504ace8f,2024-05-15T22:15:09.153000
CVE-2024-4915,0,0,0ece382b6ad5961ea1f2edb3cd24a800ebe8e5db24cb03b1f9abd44792ca8d5f,2024-05-15T22:15:09.563000
CVE-2024-4916,0,0,0808d53e0c2ee3a5d56a480b41f4985f5cdba47f133d6974d9f06deb8a299632,2024-05-15T23:15:07.607000
CVE-2024-4917,0,0,cab3cd911fdb0d4da4d66130acff84648f1d28dedce375cf5a31196d5a50c5c1,2024-05-15T23:15:07.920000
CVE-2024-4918,0,0,d6e8570ed4f149bc4f85c05376cdadd0aae166933b8875d11496f633fdca44d0,2024-05-15T23:15:08.210000
CVE-2024-4919,1,1,9395e269c4d639503899daba02f8f8ef3e889bf0a909530d3bcbde59080f90c7,2024-05-16T00:15:08.280000
CVE-2024-4920,1,1,7d4fbcd3c2333b8cd5d13050df57570cc73655912e9f0607ef2981105e7b4eff,2024-05-16T00:15:08.563000
CVE-2024-4921,1,1,74bf965278d37dd3b4a08b96a0a79c85e131f73322be52ee99eaef8e8fd7e138,2024-05-16T01:15:07.540000
CVE-2024-4922,1,1,107d8830fcd4c6b9ffa0f0768c22eb2d976c5b1746e34d23ce3bb57a1b3c122b,2024-05-16T01:15:07.813000
CVE-2024-4947,0,0,f706014ab5e494173f189b6b147bc73eaca2bb6d431298f9b49d098b14ff5782,2024-05-15T21:15:09.273000
CVE-2024-4948,0,0,bdd7cd38392862513bf6cf6f69f8c528e08e359340031d01daba548f07be3f14,2024-05-15T21:15:09.347000
CVE-2024-4949,0,0,7a7f679654eca12ebf0c1d1d6ac210b4148b3d26ab259c26b5f77d48b40c4cf5,2024-05-15T21:15:09.430000

Can't render this file because it is too large.