Auto-Update: 2024-11-11T00:55:44.062717+00:00

This commit is contained in:
cad-safe-bot 2024-11-11 00:58:45 +00:00
parent d8324c1adc
commit bec68ae812
11 changed files with 537 additions and 18 deletions

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2020-10367",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-10T23:15:04.170",
"lastModified": "2024-11-11T00:15:13.480",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain Cypress (and Broadcom) Wireless Combo chips, when a January 2021 firmware update is not present, allow memory access via a \"Spectra\" attack."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052676",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/RPi-Distro/bluez-firmware/commit/8445a53ce2c51a77472b908a0c8f6f8e1fa5c37a",
"source": "cve@mitre.org"
},
{
"url": "https://www.informatik.tu-darmstadt.de/fb20/aktuelles_fb20/fb20_neuigkeiten/neuigkeiten_fb20_details_203136.de.jsp",
"source": "cve@mitre.org"
},
{
"url": "https://www.informatik.tu-darmstadt.de/seemoo/team_seemoo/jiska_classen/index.en.jsp",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2020-10368",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-10T23:15:04.247",
"lastModified": "2024-11-11T00:15:13.607",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain Cypress (and Broadcom) Wireless Combo chips, when a January 2021 firmware update is not present, allow memory read access via a \"Spectra\" attack."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052676",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/RPi-Distro/bluez-firmware/commit/8445a53ce2c51a77472b908a0c8f6f8e1fa5c37a",
"source": "cve@mitre.org"
},
{
"url": "https://www.informatik.tu-darmstadt.de/fb20/aktuelles_fb20/fb20_neuigkeiten/neuigkeiten_fb20_details_203136.de.jsp",
"source": "cve@mitre.org"
},
{
"url": "https://www.informatik.tu-darmstadt.de/seemoo/team_seemoo/jiska_classen/index.en.jsp",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2020-10369",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-10T23:15:04.307",
"lastModified": "2024-11-11T00:15:13.660",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain Cypress (and Broadcom) Wireless Combo chips, when a January 2021 firmware update is not present, allow inferences about memory content via a \"Spectra\" attack."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052676",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/RPi-Distro/bluez-firmware/commit/8445a53ce2c51a77472b908a0c8f6f8e1fa5c37a",
"source": "cve@mitre.org"
},
{
"url": "https://www.informatik.tu-darmstadt.de/fb20/aktuelles_fb20/fb20_neuigkeiten/neuigkeiten_fb20_details_203136.de.jsp",
"source": "cve@mitre.org"
},
{
"url": "https://www.informatik.tu-darmstadt.de/seemoo/team_seemoo/jiska_classen/index.en.jsp",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2020-10370",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-11T00:15:13.707",
"lastModified": "2024-11-11T00:15:13.707",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain Cypress (and Broadcom) Wireless Combo chips such as CYW43455, when a 2021-01-26 Bluetooth firmware update is not present, allow a Bluetooth outage via a \"Spectra\" attack."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052676",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/RPi-Distro/bluez-firmware/commit/8445a53ce2c51a77472b908a0c8f6f8e1fa5c37a",
"source": "cve@mitre.org"
},
{
"url": "https://security-tracker.debian.org/tracker/CVE-2020-10370",
"source": "cve@mitre.org"
},
{
"url": "https://www.informatik.tu-darmstadt.de/fb20/aktuelles_fb20/fb20_neuigkeiten/neuigkeiten_fb20_details_203136.de.jsp",
"source": "cve@mitre.org"
},
{
"url": "https://www.informatik.tu-darmstadt.de/seemoo/team_seemoo/jiska_classen/index.en.jsp",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2021-35473",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-10T23:15:04.383",
"lastModified": "2024-11-10T23:15:04.383",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in LemonLDAP::NG before 2.0.12. There is a missing expiration check in the OAuth2.0 handler, i.e., it does not verify access token validity. An attacker can use a expired access token from an OIDC client to access the OAuth2 handler The earliest affected version is 2.0.4."
}
],
"metrics": {},
"references": [
{
"url": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2549",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/tags",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2021-41737",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-10T23:15:04.450",
"lastModified": "2024-11-10T23:15:04.450",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Faust 2.23.1, an input file with the lines \"// r visualisation tCst\" and \"//process = +: L: abM-^Q;\" and \"process = route(3333333333333333333,2,1,2,3,1) : *;\" leads to stack consumption."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/grame-cncm/faust/issues/653",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/grame-cncm/faust/tree/e682dbeeb7cc0ec9a1fcb6872f53433e454aa233",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2023-40457",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-11T00:15:13.817",
"lastModified": "2024-11-11T00:15:13.817",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The BGP daemon in Extreme Networks ExtremeXOS (aka EXOS) 30.7.1.1 allows an attacker (who is not on a directly connected network) to cause a denial of service (BGP session reset) because of BGP attribute error mishandling (for attribute 21 and 25). NOTE: the vendor disputes this because it is \"evaluating support for RFC 7606 as a future feature\" and believes that \"customers that have chosen to not require or implement RFC 7606 have done so willingly and with knowledge of what is needed to defend against these types of attacks.\""
}
],
"metrics": {},
"references": [
{
"url": "https://blog.benjojo.co.uk/asset/JgH8G5duO1",
"source": "cve@mitre.org"
},
{
"url": "https://blog.benjojo.co.uk/post/bgp-path-attributes-grave-error-handling",
"source": "cve@mitre.org"
},
{
"url": "https://supportdocs.extremenetworks.com/support/documentation/extremexos-32-5/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2024-11058",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-10T23:15:04.570",
"lastModified": "2024-11-10T23:15:04.570",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in CodeAstro Real Estate Management System up to 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /aboutedit.php of the component About Us Page. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.1,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://codeastro.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/EmilGallajov/zero-day/blob/main/codeastro_real_estate_ms_sqli.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.283804",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.283804",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.439683",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-11059",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-11T00:15:13.957",
"lastModified": "2024-11-11T00:15:13.957",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Project Worlds Free Download Online Shopping System up to 192.168.1.88. It has been rated as critical. This issue affects some unknown processing of the file /online-shopping-webvsite-in-php-master/success.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/Sy0ung-cmd/Cve-report/blob/main/SQLi-1.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.283805",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.283805",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.440337",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-11-10T23:00:28.478727+00:00
2024-11-11T00:55:44.062717+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-11-10T22:15:12.943000+00:00
2024-11-11T00:15:13.957000+00:00
```
### Last Data Feed Release
@ -33,20 +33,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
268952
268961
```
### CVEs added in the last Commit
Recently added CVEs: `7`
Recently added CVEs: `9`
- [CVE-2024-46613](CVE-2024/CVE-2024-466xx/CVE-2024-46613.json) (`2024-11-10T21:15:14.790`)
- [CVE-2024-46951](CVE-2024/CVE-2024-469xx/CVE-2024-46951.json) (`2024-11-10T21:15:14.880`)
- [CVE-2024-46952](CVE-2024/CVE-2024-469xx/CVE-2024-46952.json) (`2024-11-10T22:15:12.677`)
- [CVE-2024-46953](CVE-2024/CVE-2024-469xx/CVE-2024-46953.json) (`2024-11-10T22:15:12.750`)
- [CVE-2024-46954](CVE-2024/CVE-2024-469xx/CVE-2024-46954.json) (`2024-11-10T22:15:12.813`)
- [CVE-2024-46955](CVE-2024/CVE-2024-469xx/CVE-2024-46955.json) (`2024-11-10T22:15:12.887`)
- [CVE-2024-46956](CVE-2024/CVE-2024-469xx/CVE-2024-46956.json) (`2024-11-10T22:15:12.943`)
- [CVE-2020-10367](CVE-2020/CVE-2020-103xx/CVE-2020-10367.json) (`2024-11-10T23:15:04.170`)
- [CVE-2020-10368](CVE-2020/CVE-2020-103xx/CVE-2020-10368.json) (`2024-11-10T23:15:04.247`)
- [CVE-2020-10369](CVE-2020/CVE-2020-103xx/CVE-2020-10369.json) (`2024-11-10T23:15:04.307`)
- [CVE-2020-10370](CVE-2020/CVE-2020-103xx/CVE-2020-10370.json) (`2024-11-11T00:15:13.707`)
- [CVE-2021-35473](CVE-2021/CVE-2021-354xx/CVE-2021-35473.json) (`2024-11-10T23:15:04.383`)
- [CVE-2021-41737](CVE-2021/CVE-2021-417xx/CVE-2021-41737.json) (`2024-11-10T23:15:04.450`)
- [CVE-2023-40457](CVE-2023/CVE-2023-404xx/CVE-2023-40457.json) (`2024-11-11T00:15:13.817`)
- [CVE-2024-11058](CVE-2024/CVE-2024-110xx/CVE-2024-11058.json) (`2024-11-10T23:15:04.570`)
- [CVE-2024-11059](CVE-2024/CVE-2024-110xx/CVE-2024-11059.json) (`2024-11-11T00:15:13.957`)
### CVEs modified in the last Commit

View File

@ -145379,7 +145379,11 @@ CVE-2020-1036,0,0,2874076b164573c9efd1f421af714a327548905044a81ef0e8ef1552d41acb
CVE-2020-10364,0,0,611ab9368b8f83e21cead790c378447607502fb33a5a29a9f13f245e88a058ce,2021-07-21T11:39:23.747000
CVE-2020-10365,0,0,d3d68b994e9bb439f53a91ee98dcef796959b6dd3c666ec37fae3d2b425582d8,2020-03-27T14:06:01.573000
CVE-2020-10366,0,0,4e2a033e67dfec1f609656013334699a8eb3fc01e5fc13ccd6a347df3aa59246,2020-04-09T13:42:55.633000
CVE-2020-10367,1,1,99366d757934e2ffcb318b2e00eaf0dbe399e6cacd27b7afad7a728db9b6d240,2024-11-11T00:15:13.480000
CVE-2020-10368,1,1,cb24fa279f6bc07ed167d02787a9b540b83587eff5bfcf1d5f872ca1af07b78d,2024-11-11T00:15:13.607000
CVE-2020-10369,1,1,146d5275af3b0aa5bfb1751bac3ef184b0829729e95059ab6c1e6fb775f2e6cd,2024-11-11T00:15:13.660000
CVE-2020-1037,0,0,37b1f612d83cc30e182161b72b7dc2b33f54db0b1459846101bbe7832ab961da,2021-07-21T11:39:23.747000
CVE-2020-10370,1,1,6ca9d2352207dd9158e75dbbcc2780dc6b2a2eef508efe6fb4a47ba50a0144b8,2024-11-11T00:15:13.707000
CVE-2020-10372,0,0,057fe8c3886242ba4743ee0731c1b3e91bd8fbd5a9e094cfadb7ecd7f966e658,2020-03-12T18:43:14.093000
CVE-2020-10374,0,0,e0f5cf824a69e15c19ce778116ec2d478043887f56c7a9bb00a2741bd484b3e6,2020-06-25T16:15:11.720000
CVE-2020-10375,0,0,15c11a13974b4c046916cbe154b2872bf5997eee5295d16adb96c2f3f2d2a322,2021-07-21T11:39:23.747000
@ -178524,6 +178528,7 @@ CVE-2021-35465,0,0,4b40f2b45af9ec0164fa72705921db5f1b77a62d6ff8c449d4a17854ab8ac
CVE-2021-35469,0,0,a587ed95e25d1382ac367eee42f15573c5a79c9cdd594adf12a01139af795092,2021-07-19T14:06:16.277000
CVE-2021-3547,0,0,f595c8015d8baa6bd1a62ebce3408c6f420d2e86a4376e57a05473047d1168aa,2022-10-27T12:22:43.533000
CVE-2021-35472,0,0,e466d5ad2f2a80b4ba0e1bfa2a33c254e082505f4937060ee5dd54bad8c013c8,2021-08-11T15:31:21.203000
CVE-2021-35473,1,1,5fd42e3cf7e9e3c5a1ee81f1ec902f7a21b7a4cc34ed2418e5be0953eb1036cb,2024-11-10T23:15:04.383000
CVE-2021-35474,0,0,d630b5060f1559d9408d5370a1905ba3c16c56cadbdc14d4b0bbc392332371f9,2021-09-20T18:54:54.040000
CVE-2021-35475,0,0,263c975acc88e371a5a2ff65ef4308846de5257ff3719c93490216d8f0c3a54d,2021-07-01T16:02:54.013000
CVE-2021-35477,0,0,71b9e463e20f82dabd3fd53dbc939aa60018a38659174e658a66faf9b8626d08,2023-11-07T03:36:31.740000
@ -183316,6 +183321,7 @@ CVE-2021-41731,0,0,e6e3ae708cb53c3ee174f23b1c9f4a781449f711c97fa0c8a78a607f5ef8f
CVE-2021-41732,0,0,897f66499ebbed068f851fa966a737d858d6beb30b12d36d7461474c03f754d1,2024-08-04T04:15:52.463000
CVE-2021-41733,0,0,a725fec9a1a6247805745405c4a02baf8d225a69ff70ff07765035ffd0080b34,2021-11-09T19:59:21.390000
CVE-2021-41736,0,0,af26875a9ac9429f2e98dd9f2c1bc5ec136a44a22f31c345a4e9732b67f1d317,2022-03-28T20:52:06.847000
CVE-2021-41737,1,1,a8c0c3b8ff34e44121693922ddb6ce2e354ee67077c1e8c234c638bd26908de4,2024-11-10T23:15:04.450000
CVE-2021-41738,0,0,5ecef1922584bd33f22d216a7c0c4a032a1a7e6d0f93421920e97565f6d61230,2023-11-07T03:38:59.843000
CVE-2021-41739,0,0,88e08a7f86585fea82594e389c7305bb5b0e4ea5e959031890111bbec15040ea,2023-11-07T03:38:59.903000
CVE-2021-41744,0,0,27671c50c8426c0fa11c45ec2325d871ef966a0ab3e64e276e305da6188796d4,2021-10-28T19:19:48.443000
@ -230820,6 +230826,7 @@ CVE-2023-40453,0,0,130c1ba245794699f114636eda3c5cf90574ba5b46bd6a704fe406b89dec0
CVE-2023-40454,0,0,c10b12346537ef1e5c8787b1e2fe9d4cb45cf0b585647c357d5bb525587ce317,2023-11-07T04:20:15.070000
CVE-2023-40455,0,0,058abdb8c2eae30e165ec5b264dbf295ba8e09c6c3830c69886965016a5de75b,2023-10-12T02:29:35.947000
CVE-2023-40456,0,0,7169803686183a5f1d426b39f88228ec6dce3691ab53bc177c949c7a8fd9efca,2023-11-07T04:20:15.193000
CVE-2023-40457,1,1,3ed0c0366718f77c6a06776af5f75deea62fe67f01ba95131767df09aa944960,2024-11-11T00:15:13.817000
CVE-2023-40458,0,0,79a445a17e1f85e1f6c9345cf6a43d9301aed3a647416fbf1fc2770253362cdc,2023-12-05T01:55:09.410000
CVE-2023-40459,0,0,72958d07cda00b0c6d4ae1b61eff24e072a6de9dcd7e9245179ab8da7c7dd63d,2023-12-08T15:47:51.637000
CVE-2023-4046,0,0,74357e4a22d4d6aa6afa8fb2beea6097492a98a519070e944818d05926f858bb,2024-10-22T16:35:14.267000
@ -242952,6 +242959,8 @@ CVE-2024-11054,0,0,e9c381aaeadf77c9d1b7183ed948b8e0efb44af47725b580dad26f17bcbd8
CVE-2024-11055,0,0,a5efff63e76a30be29de1b6d8133b8709ef43e7645ef6bbc215face7032b3517,2024-11-10T15:15:13.970000
CVE-2024-11056,0,0,4a4bf302243450bab1b56f5e438a4b75a3770dd2ba6723208513ba0d1a1f0011,2024-11-10T17:15:15.697000
CVE-2024-11057,0,0,a5800f82f061d1ad6f5682014c58d51ff756f3c210f42f4633c2f0dde988ab69,2024-11-10T18:15:16.517000
CVE-2024-11058,1,1,45ee5c2c3e782b6e528b2a5ebd9a1df09e71040696e6c54587f55db5a31eb4ed,2024-11-10T23:15:04.570000
CVE-2024-11059,1,1,4701f67edbe381eeaf9aee2ff329a7f7c3dee9bcc39cff6c54d2e0d0b473d86f,2024-11-11T00:15:13.957000
CVE-2024-1106,0,0,20cb4a0a045157ac9e013fd166b9513d5a44a1304cf8a8ccabd3185b4a52ab40,2024-10-27T23:35:01.747000
CVE-2024-1107,0,0,7fae6df9cdce298be180c2cb6d3dacceb0e976e847fc87cce19a7d73f37dfe2b,2024-09-16T19:08:27.840000
CVE-2024-1108,0,0,72e8aa7ee320c630f0cd3020b574b902dcf572a1d2888f0afb29692e74e18247,2024-02-22T19:07:37.840000
@ -262489,7 +262498,7 @@ CVE-2024-46609,0,0,867378c24ca26a245e4713a4ba27c2af9d0d9faadf75c6778954203857675
CVE-2024-4661,0,0,c3df946503e9b828d76c6d82332cda3e4be930bda3f80537afbf8f2ae2d7bc25,2024-10-31T18:21:43.683000
CVE-2024-46610,0,0,dfd11b66ad880194d4e8759fea756317b6075d327e3519259cd11f18ae0f4b82,2024-09-30T16:30:50.833000
CVE-2024-46612,0,0,a589f709811c7445ac7df28a3a7782b0e1ab03ae28a72339e484d8d02cc7d048,2024-09-26T13:32:02.803000
CVE-2024-46613,1,1,7c4fd82c17c4219c5e51d9748b014d9a85b72da0644a4217195f5db5d431168a,2024-11-10T21:15:14.790000
CVE-2024-46613,0,0,7c4fd82c17c4219c5e51d9748b014d9a85b72da0644a4217195f5db5d431168a,2024-11-10T21:15:14.790000
CVE-2024-4662,0,0,42d3ec88d759fc9bf88fc92972e0c9891830916b90a0cdbb0331ad5486f420dd,2024-05-24T01:15:30.977000
CVE-2024-46626,0,0,b2dbe1e3c2ee97096cbfddcd538250ce5664f2528c19dd2dc51892ffc471844d,2024-10-04T13:50:43.727000
CVE-2024-46627,0,0,4cc8890cea4e8322a4c476b42c8fefe2b4b66b62a78446cc66eb2d1a373670f4,2024-09-30T12:46:20.237000
@ -262758,12 +262767,12 @@ CVE-2024-46946,0,0,5adf6fed09d7522a85c453ac4c470cad5917d88736dbb3b605636f5befca4
CVE-2024-46947,0,0,b59f7f41af30aded4ad65024485f8c1125aef585b68596d5293e6a508028cc3d,2024-11-08T19:35:17.037000
CVE-2024-46948,0,0,5eb36279b3db7d39a170e75a824e340b32845061d149091503a0443c63f28aee,2024-11-08T19:01:03.880000
CVE-2024-4695,0,0,aa253f1bdce79ef626aa7622c4e367006f6b60359a6a2b0af989b23a6e81f980,2024-05-21T12:37:59.687000
CVE-2024-46951,1,1,a590b01ff00d122edc7c393e0584316e387ead1929e30efa702d9cb162273c03,2024-11-10T21:15:14.880000
CVE-2024-46952,1,1,5f2dc698a479b665e428264deb2f9db19101378c167512b02bcee2c3c78ffee6,2024-11-10T22:15:12.677000
CVE-2024-46953,1,1,8557b9e76013152e714b226e7e735df7649283224db642674cd03550fb1a1b30,2024-11-10T22:15:12.750000
CVE-2024-46954,1,1,dc68b212deeeb32d7a421086c96d55276cc6f53c37328ba6af62e50d0a203762,2024-11-10T22:15:12.813000
CVE-2024-46955,1,1,ac8a85c2e73cac4c869ffe409551bba2c98eaf63aa7490425f5f246a60304330,2024-11-10T22:15:12.887000
CVE-2024-46956,1,1,28c7298f28e4abf86c547c7b3d03f69bd8116aff63a926f5f2f42ca6cfba5183,2024-11-10T22:15:12.943000
CVE-2024-46951,0,0,a590b01ff00d122edc7c393e0584316e387ead1929e30efa702d9cb162273c03,2024-11-10T21:15:14.880000
CVE-2024-46952,0,0,5f2dc698a479b665e428264deb2f9db19101378c167512b02bcee2c3c78ffee6,2024-11-10T22:15:12.677000
CVE-2024-46953,0,0,8557b9e76013152e714b226e7e735df7649283224db642674cd03550fb1a1b30,2024-11-10T22:15:12.750000
CVE-2024-46954,0,0,dc68b212deeeb32d7a421086c96d55276cc6f53c37328ba6af62e50d0a203762,2024-11-10T22:15:12.813000
CVE-2024-46955,0,0,ac8a85c2e73cac4c869ffe409551bba2c98eaf63aa7490425f5f246a60304330,2024-11-10T22:15:12.887000
CVE-2024-46956,0,0,28c7298f28e4abf86c547c7b3d03f69bd8116aff63a926f5f2f42ca6cfba5183,2024-11-10T22:15:12.943000
CVE-2024-46957,0,0,1a1f161c8d8bab3db62f1fa9272e11eb4217a378f1fb9334b95d7f852bd44900,2024-09-26T16:15:08.883000
CVE-2024-46958,0,0,a066074c8ea90ca6497e29c818dbf400ff90cc8827530871d9d45fb4a3abe93e,2024-09-20T22:41:38.223000
CVE-2024-46959,0,0,49609311db8eb2484a5bda279fc39cc9dccd98f1d151343e94689d8818c061d9,2024-09-20T14:35:13.063000

Can't render this file because it is too large.