Auto-Update: 2024-11-08T05:00:19.778813+00:00

This commit is contained in:
cad-safe-bot 2024-11-08 05:03:20 +00:00
parent 0feba4fe23
commit 805c85c6e1
8 changed files with 624 additions and 13 deletions

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2024-10987",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-08T04:15:15.190",
"lastModified": "2024-11-08T04:15:15.190",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects E-Health Care System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /Doctor/user_appointment.php. The manipulation of the argument schedule_id/schedule_date/schedule_day/start_time/end_time/booking leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/qqqbalabala/cve/blob/main/sql20.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.283453",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.283453",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.437351",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2024-10988",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-08T04:15:15.503",
"lastModified": "2024-11-08T04:15:15.503",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects E-Health Care System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /Doctor/doctor_login.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/20241018/cve/blob/main/sql.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.283454",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.283454",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.438286",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2024-10989",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-08T04:15:15.783",
"lastModified": "2024-11-08T04:15:15.783",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in code-projects E-Health Care System 1.0. This affects an unknown part of the file /Admin/detail.php. The manipulation of the argument s_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory confuses the vulnerability class of this issue."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/miaoyum/cve/blob/main/sql21.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.283455",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.283455",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.438421",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-45759",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-11-08T03:15:03.647",
"lastModified": "2024-11-08T03:15:03.647",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell PowerProtect Data Domain, versions prior to 8.1.0.0, 7.13.1.10, 7.10.1.40, and 7.7.5.50, contains an escalation of privilege vulnerability. A local low privileged attacker could potentially exploit this vulnerability, leading to unauthorized execution of certain commands to overwrite system config of the application. Exploitation may lead to denial of service of system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-266"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000245360/dsa-2024-424-security-update-for-dell-pdsa-2024-424-security-update-for-dell-powerprotect-dd-vulnerabilityowerprotect-dd-vulnerability",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-48010",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-11-08T03:15:03.933",
"lastModified": "2024-11-08T03:15:03.933",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell PowerProtect DD, versions prior to 8.1.0.0, 7.13.1.10, 7.10.1.40, and 7.7.5.50, contains an access control vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to escalation of privilege on the application."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000245360/dsa-2024-424-security-update-for-dell-pdsa-2024-424-security-update-for-dell-powerprotect-dd-vulnerabilityowerprotect-dd-vulnerability",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-48011",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-11-08T03:15:04.160",
"lastModified": "2024-11-08T03:15:04.160",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell PowerProtect DD, versions prior to 7.7.5.50, contains an Exposure of Sensitive Information to an Unauthorized Actor vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000245360/dsa-2024-424-security-update-for-dell-pdsa-2024-424-security-update-for-dell-powerprotect-dd-vulnerabilityowerprotect-dd-vulnerability",
"source": "security_alert@emc.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-11-08T03:00:24.197584+00:00
2024-11-08T05:00:19.778813+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-11-08T02:00:02.450000+00:00
2024-11-08T04:15:15.783000+00:00
```
### Last Data Feed Release
@ -33,23 +33,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
268607
268613
```
### CVEs added in the last Commit
Recently added CVEs: `0`
Recently added CVEs: `6`
- [CVE-2024-10987](CVE-2024/CVE-2024-109xx/CVE-2024-10987.json) (`2024-11-08T04:15:15.190`)
- [CVE-2024-10988](CVE-2024/CVE-2024-109xx/CVE-2024-10988.json) (`2024-11-08T04:15:15.503`)
- [CVE-2024-10989](CVE-2024/CVE-2024-109xx/CVE-2024-10989.json) (`2024-11-08T04:15:15.783`)
- [CVE-2024-45759](CVE-2024/CVE-2024-457xx/CVE-2024-45759.json) (`2024-11-08T03:15:03.647`)
- [CVE-2024-48010](CVE-2024/CVE-2024-480xx/CVE-2024-48010.json) (`2024-11-08T03:15:03.933`)
- [CVE-2024-48011](CVE-2024/CVE-2024-480xx/CVE-2024-48011.json) (`2024-11-08T03:15:04.160`)
### CVEs modified in the last Commit
Recently modified CVEs: `4`
Recently modified CVEs: `0`
- [CVE-2019-16278](CVE-2019/CVE-2019-162xx/CVE-2019-16278.json) (`2024-11-08T02:00:02.450`)
- [CVE-2021-4043](CVE-2021/CVE-2021-40xx/CVE-2021-4043.json) (`2024-11-08T02:00:01.817`)
- [CVE-2024-51567](CVE-2024/CVE-2024-515xx/CVE-2024-51567.json) (`2024-11-08T02:00:02.450`)
- [CVE-2024-5910](CVE-2024/CVE-2024-59xx/CVE-2024-5910.json) (`2024-11-08T02:00:02.450`)
## Download and Usage

View File

@ -134074,7 +134074,7 @@ CVE-2019-16274,0,0,ab3405ccc15ab55071a81ba36ddf4f0a6b99edcf7fe43797bab9416e4b175
CVE-2019-16275,0,0,600e6c221a4c1d0dc1f26ab56c2db4dee17a2b380574beca3e282acb466282f1,2023-11-07T03:05:39.733000
CVE-2019-16276,0,0,f6fc1f63d9d43aa18cfa4e403e75595f1c257525e8e4d080ca6d94ba659ffa12,2023-11-07T03:05:39.850000
CVE-2019-16277,0,0,1c2b8f157dbcd08da194c7f62be48420469eddf36d20e9a3db926d5543d41ebe,2020-08-24T17:37:01.140000
CVE-2019-16278,0,1,5a074e8499097d129c28a3b2328d007189e54ea81fe4fdddb93ae6ab6b9f20ac,2024-11-08T02:00:02.450000
CVE-2019-16278,0,0,5a074e8499097d129c28a3b2328d007189e54ea81fe4fdddb93ae6ab6b9f20ac,2024-11-08T02:00:02.450000
CVE-2019-16279,0,0,89ee89fd5982d7aabc0ed7b3aaa740df0e2949f4f34b03f5f886efb505386599,2019-10-21T14:15:10.947000
CVE-2019-1628,0,0,fae31ca43381a46f3659054a9eea9c4abe125c649161532f6593240f01c60aed,2021-10-29T17:50:10.163000
CVE-2019-16281,0,0,0add73aacadbb0a21ca24822f9ac6e77d029969a67accf6d83369358cbf788f7,2021-01-04T20:39:09.913000
@ -182277,7 +182277,7 @@ CVE-2021-40423,0,0,e70e7b6c63f7747ab6d60cb7eaca40f23cfcf6f4031a82b5a9e5bc13c852d
CVE-2021-40424,0,0,6cc9f49e082e3140aee85ce6a2c7035115acb383bfe5dffbaec66b3dd76ae3a8,2022-04-22T18:59:38.313000
CVE-2021-40425,0,0,986c807d5d980cb91d8cccc408073c21b5a6706f05cca05fa89896fb2c9a146d,2022-04-21T15:47:50.853000
CVE-2021-40426,0,0,5d72a17907f1725e43fb0aab61001410ddfaa528a0774ae1abefe783386aca67,2023-02-23T00:15:10.890000
CVE-2021-4043,0,1,51d45b699722848eab990427038e804aa1404be33b7344e45b33e1df539fe737,2024-11-08T02:00:01.817000
CVE-2021-4043,0,0,51d45b699722848eab990427038e804aa1404be33b7344e45b33e1df539fe737,2024-11-08T02:00:01.817000
CVE-2021-40438,0,0,5414e0c1495a90d6f42b1bae6a30b531da4e2d738b2ecf4184cc8a70d5198a3d,2024-07-24T17:08:07.093000
CVE-2021-40439,0,0,2a8b255e58952b8e3bc2fe39246b2c6164ca9e4eabf1fba2b4937eec3211dc19,2023-11-07T03:38:35.240000
CVE-2021-4044,0,0,063b69fc68b4e42b2f1ddc7170cc4d1cada10e4b27aa7dc6eec919242eaaa7d1,2023-11-09T14:44:33.733000
@ -242883,6 +242883,9 @@ CVE-2024-10968,0,0,4db13284bb2668db27212f9b23fd23c8786091fe6a0c1d8a9d9c495d0c587
CVE-2024-10969,0,0,f64a194bedc79492a1cc5931029c0d0397f9a3186d57d95808f266442abe04ea,2024-11-07T20:15:15.930000
CVE-2024-10975,0,0,34f1935a80bbd4cf8feb21b0a117889731e6fe93e5792e35ba6a53068ba38fbd,2024-11-07T21:15:06.383000
CVE-2024-1098,0,0,7637c79f93f6fef4c2ad0472be16e5b2b85cffeb9436b7defda280fbd3390871,2024-05-17T02:35:14.017000
CVE-2024-10987,1,1,b94b145339f83067d3aeaffe7ea2338ebcd1c20a11e5364a5367b00125f19377,2024-11-08T04:15:15.190000
CVE-2024-10988,1,1,8663ebc57f42ab108136835e3f7e50756f7c511afa43d70c3bca30fdee0e9cb3,2024-11-08T04:15:15.503000
CVE-2024-10989,1,1,c376ff6d0db20a8b01bcf485b8340a3cc10cc5b20414d0f26e44988d14165cb6,2024-11-08T04:15:15.783000
CVE-2024-1099,0,0,60fc16226818d332b7b359f2f2234cb026357af6ad05031d156ab3f490bb4021,2024-05-17T02:35:14.133000
CVE-2024-1100,0,0,f004473b9cf0d9d95a81c6b2db685e986de4389d0d38ab5c3537c8bbd36c025b,2024-07-03T01:44:59.517000
CVE-2024-1102,0,0,0928bf44049eedf97e0b54e5fbfa6f0206fb5c0a5ae4e275eff0db0e3aa685dd,2024-10-16T15:15:15.150000
@ -262064,6 +262067,7 @@ CVE-2024-45751,0,0,cc5d68fd09f5f304456a6be90ad821b34bc4a7f1a983b99ed7260cdb2141f
CVE-2024-45752,0,0,c56d2e99daff13fa264a8e02ee453ba88231a536487b9dd847b13fefb0df4a91,2024-09-25T16:54:27.520000
CVE-2024-45754,0,0,27881b9f8c3e60f9d5e35efd217ea03a3a53beb79b5679c0a5048b58d7f60f46,2024-10-15T16:35:07.827000
CVE-2024-45758,0,0,e058696ef4ee1e11dde5d7f4a1626a6964f9190aeabab6642796a352a4a3c2cd,2024-09-06T18:35:13.043000
CVE-2024-45759,1,1,500ecb99ca8a3207677fdcec0ade8911c3c57908478314a720778f2701615564,2024-11-08T03:15:03.647000
CVE-2024-4576,0,0,d47b5037987d3332638a14c0dba5a2bae073fe818289e35d14fa9c3b2b647939,2024-10-27T22:35:08.450000
CVE-2024-45766,0,0,1ac6d864cfa84a9455e326aaa02a3b21331a9d91fce801a33cf0dbf2664ff28d,2024-10-18T12:53:04.627000
CVE-2024-45767,0,0,eb5f868ea4691213c1364b02500bffd0f089d1b21eaacec7a6a56a798a8a0e81,2024-10-18T12:53:04.627000
@ -263367,6 +263371,8 @@ CVE-2024-4798,0,0,a3036cf57ec44ed92aa705d72184468d7b712fcb492c4ff2950b8be117e010
CVE-2024-4799,0,0,bef187df7ab031f873bee32f009cee90466081192edf9662131655f9488e20b3,2024-06-04T19:20:49.917000
CVE-2024-4800,0,0,46f73cb5132c32f542b67f61b6f2138522f24eb42a7d5cb9e69a7f683ef97724,2024-06-04T19:20:50.013000
CVE-2024-4801,0,0,2bcdaba0a3afa2888c47ef732ae4862e81c0c79cd78d2076198cb242d0df3f0e,2024-06-04T19:20:50.120000
CVE-2024-48010,1,1,70c27e1e460582c4a479b346931cdb75c41073aeb667c3733482ee321f20260f,2024-11-08T03:15:03.933000
CVE-2024-48011,1,1,ea766f598ef98b69fd0349ef124666546ac27d88f79865168c748208da0e6c96,2024-11-08T03:15:04.160000
CVE-2024-48016,0,0,79b8427a21b025c2b604d3c3d72e2379266e5f76164b198ef3ca33d423daa7ad,2024-10-21T17:10:22.857000
CVE-2024-4802,0,0,9f23c738b4e7167dada064b214f9ad2d560e5cec48c7eaa4346088c33abc9143,2024-06-04T19:20:50.247000
CVE-2024-48020,0,0,dcbd5af80fa4e0ff77a2481b211c24b4aca48d4b01a6d0de815360ac1c5ff406,2024-10-15T12:57:46.880000
@ -264842,7 +264848,7 @@ CVE-2024-51559,0,0,c67bedfc7d7a4c2ba774f93c80aec83ca69ade0ef57eca0543a1b55b83273
CVE-2024-5156,0,0,15fe916f4b576f7b7dc0d841e2e4a8f8e08add666a82cde7e5fe7e09d48d907a,2024-06-20T16:07:50.417000
CVE-2024-51560,0,0,9f02ceb8504d368daba1c91c898aa5843478addd73c9ec30709d112c4db8e01d,2024-11-04T18:50:05.607000
CVE-2024-51561,0,0,d71b2d828707663b98815777acaed98461639611e766153c60c99f137da7ec5c,2024-11-06T15:59:22.287000
CVE-2024-51567,0,1,a132894c0fd6c9f40dc4bc3df5c78c10842d1872724b5d59c4a31710acb882a2,2024-11-08T02:00:02.450000
CVE-2024-51567,0,0,a132894c0fd6c9f40dc4bc3df5c78c10842d1872724b5d59c4a31710acb882a2,2024-11-08T02:00:02.450000
CVE-2024-51568,0,0,ef96c64ab696ce1dd0f4d9f421838b3895b55219506da5bc264e22e1b5e0e5b2,2024-11-01T12:57:03.417000
CVE-2024-5157,0,0,24d31b037c5fbef35f77d9be746cd537f78e6f1e98b9c21955d97a62fe59949f,2024-07-03T02:08:34.407000
CVE-2024-5158,0,0,b58e7eaee1d1dd9c5e85390b8596c36aa736d240ceb0715ad1a8e256309daea1,2024-09-15T19:35:04.757000
@ -265569,7 +265575,7 @@ CVE-2024-5906,0,0,203e49fc12cc805aa814a48bc1ee927a32a234142d80d51288f99e84c6703f
CVE-2024-5907,0,0,d1b055b40e0f23972d4010743c95e9e712740577d8745b01a87db7feb49b71fd,2024-08-07T16:59:29.527000
CVE-2024-5908,0,0,10ae8b07066771edd89ce262576520c1fd128ba78541519391a2b2649f95b086,2024-08-07T16:55:24.180000
CVE-2024-5909,0,0,e304efd89cf74e4d08d4ff371fbe388379e9204881ef926100a0f1e3a8d60e07,2024-08-07T16:53:10.633000
CVE-2024-5910,0,1,0b3ef408b2389baece3d7531ff8af88c01763914646724c675e24ce7c863ef41,2024-11-08T02:00:02.450000
CVE-2024-5910,0,0,0b3ef408b2389baece3d7531ff8af88c01763914646724c675e24ce7c863ef41,2024-11-08T02:00:02.450000
CVE-2024-5911,0,0,73115e3f042806be5dcc4a831e78f32335b6192481bdcb3b8ad74d5cdbbf1e0e,2024-07-11T13:05:54.930000
CVE-2024-5912,0,0,3efa6b60416ae7c89e8dc5a2081c5e6def286690a42a0087bed53b30b989bae2,2024-07-11T13:05:54.930000
CVE-2024-5913,0,0,307a9260d70a9d37ef03fc90a18fce4dac6ad981979537b72159d2890aa10b6b,2024-08-06T05:15:41.160000

Can't render this file because it is too large.