From bec68ae812ef0683c3bd5878566c91d3af816a5b Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 11 Nov 2024 00:58:45 +0000 Subject: [PATCH] Auto-Update: 2024-11-11T00:55:44.062717+00:00 --- CVE-2020/CVE-2020-103xx/CVE-2020-10367.json | 33 +++++ CVE-2020/CVE-2020-103xx/CVE-2020-10368.json | 33 +++++ CVE-2020/CVE-2020-103xx/CVE-2020-10369.json | 33 +++++ CVE-2020/CVE-2020-103xx/CVE-2020-10370.json | 37 +++++ CVE-2021/CVE-2021-354xx/CVE-2021-35473.json | 25 ++++ CVE-2021/CVE-2021-417xx/CVE-2021-41737.json | 25 ++++ CVE-2023/CVE-2023-404xx/CVE-2023-40457.json | 36 +++++ CVE-2024/CVE-2024-110xx/CVE-2024-11058.json | 145 ++++++++++++++++++++ CVE-2024/CVE-2024-110xx/CVE-2024-11059.json | 141 +++++++++++++++++++ README.md | 24 ++-- _state.csv | 23 +++- 11 files changed, 537 insertions(+), 18 deletions(-) create mode 100644 CVE-2020/CVE-2020-103xx/CVE-2020-10367.json create mode 100644 CVE-2020/CVE-2020-103xx/CVE-2020-10368.json create mode 100644 CVE-2020/CVE-2020-103xx/CVE-2020-10369.json create mode 100644 CVE-2020/CVE-2020-103xx/CVE-2020-10370.json create mode 100644 CVE-2021/CVE-2021-354xx/CVE-2021-35473.json create mode 100644 CVE-2021/CVE-2021-417xx/CVE-2021-41737.json create mode 100644 CVE-2023/CVE-2023-404xx/CVE-2023-40457.json create mode 100644 CVE-2024/CVE-2024-110xx/CVE-2024-11058.json create mode 100644 CVE-2024/CVE-2024-110xx/CVE-2024-11059.json diff --git a/CVE-2020/CVE-2020-103xx/CVE-2020-10367.json b/CVE-2020/CVE-2020-103xx/CVE-2020-10367.json new file mode 100644 index 00000000000..e1b791a0d7d --- /dev/null +++ b/CVE-2020/CVE-2020-103xx/CVE-2020-10367.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2020-10367", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-10T23:15:04.170", + "lastModified": "2024-11-11T00:15:13.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Certain Cypress (and Broadcom) Wireless Combo chips, when a January 2021 firmware update is not present, allow memory access via a \"Spectra\" attack." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052676", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/RPi-Distro/bluez-firmware/commit/8445a53ce2c51a77472b908a0c8f6f8e1fa5c37a", + "source": "cve@mitre.org" + }, + { + "url": "https://www.informatik.tu-darmstadt.de/fb20/aktuelles_fb20/fb20_neuigkeiten/neuigkeiten_fb20_details_203136.de.jsp", + "source": "cve@mitre.org" + }, + { + "url": "https://www.informatik.tu-darmstadt.de/seemoo/team_seemoo/jiska_classen/index.en.jsp", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2020/CVE-2020-103xx/CVE-2020-10368.json b/CVE-2020/CVE-2020-103xx/CVE-2020-10368.json new file mode 100644 index 00000000000..85c44c68768 --- /dev/null +++ b/CVE-2020/CVE-2020-103xx/CVE-2020-10368.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2020-10368", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-10T23:15:04.247", + "lastModified": "2024-11-11T00:15:13.607", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Certain Cypress (and Broadcom) Wireless Combo chips, when a January 2021 firmware update is not present, allow memory read access via a \"Spectra\" attack." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052676", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/RPi-Distro/bluez-firmware/commit/8445a53ce2c51a77472b908a0c8f6f8e1fa5c37a", + "source": "cve@mitre.org" + }, + { + "url": "https://www.informatik.tu-darmstadt.de/fb20/aktuelles_fb20/fb20_neuigkeiten/neuigkeiten_fb20_details_203136.de.jsp", + "source": "cve@mitre.org" + }, + { + "url": "https://www.informatik.tu-darmstadt.de/seemoo/team_seemoo/jiska_classen/index.en.jsp", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2020/CVE-2020-103xx/CVE-2020-10369.json b/CVE-2020/CVE-2020-103xx/CVE-2020-10369.json new file mode 100644 index 00000000000..ac2f15c2f2a --- /dev/null +++ b/CVE-2020/CVE-2020-103xx/CVE-2020-10369.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2020-10369", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-10T23:15:04.307", + "lastModified": "2024-11-11T00:15:13.660", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Certain Cypress (and Broadcom) Wireless Combo chips, when a January 2021 firmware update is not present, allow inferences about memory content via a \"Spectra\" attack." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052676", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/RPi-Distro/bluez-firmware/commit/8445a53ce2c51a77472b908a0c8f6f8e1fa5c37a", + "source": "cve@mitre.org" + }, + { + "url": "https://www.informatik.tu-darmstadt.de/fb20/aktuelles_fb20/fb20_neuigkeiten/neuigkeiten_fb20_details_203136.de.jsp", + "source": "cve@mitre.org" + }, + { + "url": "https://www.informatik.tu-darmstadt.de/seemoo/team_seemoo/jiska_classen/index.en.jsp", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2020/CVE-2020-103xx/CVE-2020-10370.json b/CVE-2020/CVE-2020-103xx/CVE-2020-10370.json new file mode 100644 index 00000000000..dc3447de18f --- /dev/null +++ b/CVE-2020/CVE-2020-103xx/CVE-2020-10370.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2020-10370", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-11T00:15:13.707", + "lastModified": "2024-11-11T00:15:13.707", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Certain Cypress (and Broadcom) Wireless Combo chips such as CYW43455, when a 2021-01-26 Bluetooth firmware update is not present, allow a Bluetooth outage via a \"Spectra\" attack." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052676", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/RPi-Distro/bluez-firmware/commit/8445a53ce2c51a77472b908a0c8f6f8e1fa5c37a", + "source": "cve@mitre.org" + }, + { + "url": "https://security-tracker.debian.org/tracker/CVE-2020-10370", + "source": "cve@mitre.org" + }, + { + "url": "https://www.informatik.tu-darmstadt.de/fb20/aktuelles_fb20/fb20_neuigkeiten/neuigkeiten_fb20_details_203136.de.jsp", + "source": "cve@mitre.org" + }, + { + "url": "https://www.informatik.tu-darmstadt.de/seemoo/team_seemoo/jiska_classen/index.en.jsp", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-354xx/CVE-2021-35473.json b/CVE-2021/CVE-2021-354xx/CVE-2021-35473.json new file mode 100644 index 00000000000..84b65b376ea --- /dev/null +++ b/CVE-2021/CVE-2021-354xx/CVE-2021-35473.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2021-35473", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-10T23:15:04.383", + "lastModified": "2024-11-10T23:15:04.383", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in LemonLDAP::NG before 2.0.12. There is a missing expiration check in the OAuth2.0 handler, i.e., it does not verify access token validity. An attacker can use a expired access token from an OIDC client to access the OAuth2 handler The earliest affected version is 2.0.4." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2549", + "source": "cve@mitre.org" + }, + { + "url": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/tags", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-417xx/CVE-2021-41737.json b/CVE-2021/CVE-2021-417xx/CVE-2021-41737.json new file mode 100644 index 00000000000..7ac13d7136f --- /dev/null +++ b/CVE-2021/CVE-2021-417xx/CVE-2021-41737.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2021-41737", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-10T23:15:04.450", + "lastModified": "2024-11-10T23:15:04.450", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Faust 2.23.1, an input file with the lines \"// r visualisation tCst\" and \"//process = +: L: abM-^Q;\" and \"process = route(3333333333333333333,2,1,2,3,1) : *;\" leads to stack consumption." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/grame-cncm/faust/issues/653", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/grame-cncm/faust/tree/e682dbeeb7cc0ec9a1fcb6872f53433e454aa233", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40457.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40457.json new file mode 100644 index 00000000000..4b5aa4a99cc --- /dev/null +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40457.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2023-40457", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-11T00:15:13.817", + "lastModified": "2024-11-11T00:15:13.817", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "The BGP daemon in Extreme Networks ExtremeXOS (aka EXOS) 30.7.1.1 allows an attacker (who is not on a directly connected network) to cause a denial of service (BGP session reset) because of BGP attribute error mishandling (for attribute 21 and 25). NOTE: the vendor disputes this because it is \"evaluating support for RFC 7606 as a future feature\" and believes that \"customers that have chosen to not require or implement RFC 7606 have done so willingly and with knowledge of what is needed to defend against these types of attacks.\"" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://blog.benjojo.co.uk/asset/JgH8G5duO1", + "source": "cve@mitre.org" + }, + { + "url": "https://blog.benjojo.co.uk/post/bgp-path-attributes-grave-error-handling", + "source": "cve@mitre.org" + }, + { + "url": "https://supportdocs.extremenetworks.com/support/documentation/extremexos-32-5/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11058.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11058.json new file mode 100644 index 00000000000..d2f813c398a --- /dev/null +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11058.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2024-11058", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-11-10T23:15:04.570", + "lastModified": "2024-11-10T23:15:04.570", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in CodeAstro Real Estate Management System up to 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /aboutedit.php of the component About Us Page. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 5.8 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 6.4, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://codeastro.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/EmilGallajov/zero-day/blob/main/codeastro_real_estate_ms_sqli.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.283804", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.283804", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.439683", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11059.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11059.json new file mode 100644 index 00000000000..5a101a1e57d --- /dev/null +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11059.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-11059", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-11-11T00:15:13.957", + "lastModified": "2024-11-11T00:15:13.957", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Project Worlds Free Download Online Shopping System up to 192.168.1.88. It has been rated as critical. This issue affects some unknown processing of the file /online-shopping-webvsite-in-php-master/success.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Sy0ung-cmd/Cve-report/blob/main/SQLi-1.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.283805", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.283805", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.440337", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index ea429839443..0c1bb90a58d 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-11-10T23:00:28.478727+00:00 +2024-11-11T00:55:44.062717+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-11-10T22:15:12.943000+00:00 +2024-11-11T00:15:13.957000+00:00 ``` ### Last Data Feed Release @@ -33,20 +33,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -268952 +268961 ``` ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `9` -- [CVE-2024-46613](CVE-2024/CVE-2024-466xx/CVE-2024-46613.json) (`2024-11-10T21:15:14.790`) -- [CVE-2024-46951](CVE-2024/CVE-2024-469xx/CVE-2024-46951.json) (`2024-11-10T21:15:14.880`) -- [CVE-2024-46952](CVE-2024/CVE-2024-469xx/CVE-2024-46952.json) (`2024-11-10T22:15:12.677`) -- [CVE-2024-46953](CVE-2024/CVE-2024-469xx/CVE-2024-46953.json) (`2024-11-10T22:15:12.750`) -- [CVE-2024-46954](CVE-2024/CVE-2024-469xx/CVE-2024-46954.json) (`2024-11-10T22:15:12.813`) -- [CVE-2024-46955](CVE-2024/CVE-2024-469xx/CVE-2024-46955.json) (`2024-11-10T22:15:12.887`) -- [CVE-2024-46956](CVE-2024/CVE-2024-469xx/CVE-2024-46956.json) (`2024-11-10T22:15:12.943`) +- [CVE-2020-10367](CVE-2020/CVE-2020-103xx/CVE-2020-10367.json) (`2024-11-10T23:15:04.170`) +- [CVE-2020-10368](CVE-2020/CVE-2020-103xx/CVE-2020-10368.json) (`2024-11-10T23:15:04.247`) +- [CVE-2020-10369](CVE-2020/CVE-2020-103xx/CVE-2020-10369.json) (`2024-11-10T23:15:04.307`) +- [CVE-2020-10370](CVE-2020/CVE-2020-103xx/CVE-2020-10370.json) (`2024-11-11T00:15:13.707`) +- [CVE-2021-35473](CVE-2021/CVE-2021-354xx/CVE-2021-35473.json) (`2024-11-10T23:15:04.383`) +- [CVE-2021-41737](CVE-2021/CVE-2021-417xx/CVE-2021-41737.json) (`2024-11-10T23:15:04.450`) +- [CVE-2023-40457](CVE-2023/CVE-2023-404xx/CVE-2023-40457.json) (`2024-11-11T00:15:13.817`) +- [CVE-2024-11058](CVE-2024/CVE-2024-110xx/CVE-2024-11058.json) (`2024-11-10T23:15:04.570`) +- [CVE-2024-11059](CVE-2024/CVE-2024-110xx/CVE-2024-11059.json) (`2024-11-11T00:15:13.957`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index 9fa891d1f89..8763c296abd 100644 --- a/_state.csv +++ b/_state.csv @@ -145379,7 +145379,11 @@ CVE-2020-1036,0,0,2874076b164573c9efd1f421af714a327548905044a81ef0e8ef1552d41acb CVE-2020-10364,0,0,611ab9368b8f83e21cead790c378447607502fb33a5a29a9f13f245e88a058ce,2021-07-21T11:39:23.747000 CVE-2020-10365,0,0,d3d68b994e9bb439f53a91ee98dcef796959b6dd3c666ec37fae3d2b425582d8,2020-03-27T14:06:01.573000 CVE-2020-10366,0,0,4e2a033e67dfec1f609656013334699a8eb3fc01e5fc13ccd6a347df3aa59246,2020-04-09T13:42:55.633000 +CVE-2020-10367,1,1,99366d757934e2ffcb318b2e00eaf0dbe399e6cacd27b7afad7a728db9b6d240,2024-11-11T00:15:13.480000 +CVE-2020-10368,1,1,cb24fa279f6bc07ed167d02787a9b540b83587eff5bfcf1d5f872ca1af07b78d,2024-11-11T00:15:13.607000 +CVE-2020-10369,1,1,146d5275af3b0aa5bfb1751bac3ef184b0829729e95059ab6c1e6fb775f2e6cd,2024-11-11T00:15:13.660000 CVE-2020-1037,0,0,37b1f612d83cc30e182161b72b7dc2b33f54db0b1459846101bbe7832ab961da,2021-07-21T11:39:23.747000 +CVE-2020-10370,1,1,6ca9d2352207dd9158e75dbbcc2780dc6b2a2eef508efe6fb4a47ba50a0144b8,2024-11-11T00:15:13.707000 CVE-2020-10372,0,0,057fe8c3886242ba4743ee0731c1b3e91bd8fbd5a9e094cfadb7ecd7f966e658,2020-03-12T18:43:14.093000 CVE-2020-10374,0,0,e0f5cf824a69e15c19ce778116ec2d478043887f56c7a9bb00a2741bd484b3e6,2020-06-25T16:15:11.720000 CVE-2020-10375,0,0,15c11a13974b4c046916cbe154b2872bf5997eee5295d16adb96c2f3f2d2a322,2021-07-21T11:39:23.747000 @@ -178524,6 +178528,7 @@ CVE-2021-35465,0,0,4b40f2b45af9ec0164fa72705921db5f1b77a62d6ff8c449d4a17854ab8ac CVE-2021-35469,0,0,a587ed95e25d1382ac367eee42f15573c5a79c9cdd594adf12a01139af795092,2021-07-19T14:06:16.277000 CVE-2021-3547,0,0,f595c8015d8baa6bd1a62ebce3408c6f420d2e86a4376e57a05473047d1168aa,2022-10-27T12:22:43.533000 CVE-2021-35472,0,0,e466d5ad2f2a80b4ba0e1bfa2a33c254e082505f4937060ee5dd54bad8c013c8,2021-08-11T15:31:21.203000 +CVE-2021-35473,1,1,5fd42e3cf7e9e3c5a1ee81f1ec902f7a21b7a4cc34ed2418e5be0953eb1036cb,2024-11-10T23:15:04.383000 CVE-2021-35474,0,0,d630b5060f1559d9408d5370a1905ba3c16c56cadbdc14d4b0bbc392332371f9,2021-09-20T18:54:54.040000 CVE-2021-35475,0,0,263c975acc88e371a5a2ff65ef4308846de5257ff3719c93490216d8f0c3a54d,2021-07-01T16:02:54.013000 CVE-2021-35477,0,0,71b9e463e20f82dabd3fd53dbc939aa60018a38659174e658a66faf9b8626d08,2023-11-07T03:36:31.740000 @@ -183316,6 +183321,7 @@ CVE-2021-41731,0,0,e6e3ae708cb53c3ee174f23b1c9f4a781449f711c97fa0c8a78a607f5ef8f CVE-2021-41732,0,0,897f66499ebbed068f851fa966a737d858d6beb30b12d36d7461474c03f754d1,2024-08-04T04:15:52.463000 CVE-2021-41733,0,0,a725fec9a1a6247805745405c4a02baf8d225a69ff70ff07765035ffd0080b34,2021-11-09T19:59:21.390000 CVE-2021-41736,0,0,af26875a9ac9429f2e98dd9f2c1bc5ec136a44a22f31c345a4e9732b67f1d317,2022-03-28T20:52:06.847000 +CVE-2021-41737,1,1,a8c0c3b8ff34e44121693922ddb6ce2e354ee67077c1e8c234c638bd26908de4,2024-11-10T23:15:04.450000 CVE-2021-41738,0,0,5ecef1922584bd33f22d216a7c0c4a032a1a7e6d0f93421920e97565f6d61230,2023-11-07T03:38:59.843000 CVE-2021-41739,0,0,88e08a7f86585fea82594e389c7305bb5b0e4ea5e959031890111bbec15040ea,2023-11-07T03:38:59.903000 CVE-2021-41744,0,0,27671c50c8426c0fa11c45ec2325d871ef966a0ab3e64e276e305da6188796d4,2021-10-28T19:19:48.443000 @@ -230820,6 +230826,7 @@ CVE-2023-40453,0,0,130c1ba245794699f114636eda3c5cf90574ba5b46bd6a704fe406b89dec0 CVE-2023-40454,0,0,c10b12346537ef1e5c8787b1e2fe9d4cb45cf0b585647c357d5bb525587ce317,2023-11-07T04:20:15.070000 CVE-2023-40455,0,0,058abdb8c2eae30e165ec5b264dbf295ba8e09c6c3830c69886965016a5de75b,2023-10-12T02:29:35.947000 CVE-2023-40456,0,0,7169803686183a5f1d426b39f88228ec6dce3691ab53bc177c949c7a8fd9efca,2023-11-07T04:20:15.193000 +CVE-2023-40457,1,1,3ed0c0366718f77c6a06776af5f75deea62fe67f01ba95131767df09aa944960,2024-11-11T00:15:13.817000 CVE-2023-40458,0,0,79a445a17e1f85e1f6c9345cf6a43d9301aed3a647416fbf1fc2770253362cdc,2023-12-05T01:55:09.410000 CVE-2023-40459,0,0,72958d07cda00b0c6d4ae1b61eff24e072a6de9dcd7e9245179ab8da7c7dd63d,2023-12-08T15:47:51.637000 CVE-2023-4046,0,0,74357e4a22d4d6aa6afa8fb2beea6097492a98a519070e944818d05926f858bb,2024-10-22T16:35:14.267000 @@ -242952,6 +242959,8 @@ CVE-2024-11054,0,0,e9c381aaeadf77c9d1b7183ed948b8e0efb44af47725b580dad26f17bcbd8 CVE-2024-11055,0,0,a5efff63e76a30be29de1b6d8133b8709ef43e7645ef6bbc215face7032b3517,2024-11-10T15:15:13.970000 CVE-2024-11056,0,0,4a4bf302243450bab1b56f5e438a4b75a3770dd2ba6723208513ba0d1a1f0011,2024-11-10T17:15:15.697000 CVE-2024-11057,0,0,a5800f82f061d1ad6f5682014c58d51ff756f3c210f42f4633c2f0dde988ab69,2024-11-10T18:15:16.517000 +CVE-2024-11058,1,1,45ee5c2c3e782b6e528b2a5ebd9a1df09e71040696e6c54587f55db5a31eb4ed,2024-11-10T23:15:04.570000 +CVE-2024-11059,1,1,4701f67edbe381eeaf9aee2ff329a7f7c3dee9bcc39cff6c54d2e0d0b473d86f,2024-11-11T00:15:13.957000 CVE-2024-1106,0,0,20cb4a0a045157ac9e013fd166b9513d5a44a1304cf8a8ccabd3185b4a52ab40,2024-10-27T23:35:01.747000 CVE-2024-1107,0,0,7fae6df9cdce298be180c2cb6d3dacceb0e976e847fc87cce19a7d73f37dfe2b,2024-09-16T19:08:27.840000 CVE-2024-1108,0,0,72e8aa7ee320c630f0cd3020b574b902dcf572a1d2888f0afb29692e74e18247,2024-02-22T19:07:37.840000 @@ -262489,7 +262498,7 @@ CVE-2024-46609,0,0,867378c24ca26a245e4713a4ba27c2af9d0d9faadf75c6778954203857675 CVE-2024-4661,0,0,c3df946503e9b828d76c6d82332cda3e4be930bda3f80537afbf8f2ae2d7bc25,2024-10-31T18:21:43.683000 CVE-2024-46610,0,0,dfd11b66ad880194d4e8759fea756317b6075d327e3519259cd11f18ae0f4b82,2024-09-30T16:30:50.833000 CVE-2024-46612,0,0,a589f709811c7445ac7df28a3a7782b0e1ab03ae28a72339e484d8d02cc7d048,2024-09-26T13:32:02.803000 -CVE-2024-46613,1,1,7c4fd82c17c4219c5e51d9748b014d9a85b72da0644a4217195f5db5d431168a,2024-11-10T21:15:14.790000 +CVE-2024-46613,0,0,7c4fd82c17c4219c5e51d9748b014d9a85b72da0644a4217195f5db5d431168a,2024-11-10T21:15:14.790000 CVE-2024-4662,0,0,42d3ec88d759fc9bf88fc92972e0c9891830916b90a0cdbb0331ad5486f420dd,2024-05-24T01:15:30.977000 CVE-2024-46626,0,0,b2dbe1e3c2ee97096cbfddcd538250ce5664f2528c19dd2dc51892ffc471844d,2024-10-04T13:50:43.727000 CVE-2024-46627,0,0,4cc8890cea4e8322a4c476b42c8fefe2b4b66b62a78446cc66eb2d1a373670f4,2024-09-30T12:46:20.237000 @@ -262758,12 +262767,12 @@ CVE-2024-46946,0,0,5adf6fed09d7522a85c453ac4c470cad5917d88736dbb3b605636f5befca4 CVE-2024-46947,0,0,b59f7f41af30aded4ad65024485f8c1125aef585b68596d5293e6a508028cc3d,2024-11-08T19:35:17.037000 CVE-2024-46948,0,0,5eb36279b3db7d39a170e75a824e340b32845061d149091503a0443c63f28aee,2024-11-08T19:01:03.880000 CVE-2024-4695,0,0,aa253f1bdce79ef626aa7622c4e367006f6b60359a6a2b0af989b23a6e81f980,2024-05-21T12:37:59.687000 -CVE-2024-46951,1,1,a590b01ff00d122edc7c393e0584316e387ead1929e30efa702d9cb162273c03,2024-11-10T21:15:14.880000 -CVE-2024-46952,1,1,5f2dc698a479b665e428264deb2f9db19101378c167512b02bcee2c3c78ffee6,2024-11-10T22:15:12.677000 -CVE-2024-46953,1,1,8557b9e76013152e714b226e7e735df7649283224db642674cd03550fb1a1b30,2024-11-10T22:15:12.750000 -CVE-2024-46954,1,1,dc68b212deeeb32d7a421086c96d55276cc6f53c37328ba6af62e50d0a203762,2024-11-10T22:15:12.813000 -CVE-2024-46955,1,1,ac8a85c2e73cac4c869ffe409551bba2c98eaf63aa7490425f5f246a60304330,2024-11-10T22:15:12.887000 -CVE-2024-46956,1,1,28c7298f28e4abf86c547c7b3d03f69bd8116aff63a926f5f2f42ca6cfba5183,2024-11-10T22:15:12.943000 +CVE-2024-46951,0,0,a590b01ff00d122edc7c393e0584316e387ead1929e30efa702d9cb162273c03,2024-11-10T21:15:14.880000 +CVE-2024-46952,0,0,5f2dc698a479b665e428264deb2f9db19101378c167512b02bcee2c3c78ffee6,2024-11-10T22:15:12.677000 +CVE-2024-46953,0,0,8557b9e76013152e714b226e7e735df7649283224db642674cd03550fb1a1b30,2024-11-10T22:15:12.750000 +CVE-2024-46954,0,0,dc68b212deeeb32d7a421086c96d55276cc6f53c37328ba6af62e50d0a203762,2024-11-10T22:15:12.813000 +CVE-2024-46955,0,0,ac8a85c2e73cac4c869ffe409551bba2c98eaf63aa7490425f5f246a60304330,2024-11-10T22:15:12.887000 +CVE-2024-46956,0,0,28c7298f28e4abf86c547c7b3d03f69bd8116aff63a926f5f2f42ca6cfba5183,2024-11-10T22:15:12.943000 CVE-2024-46957,0,0,1a1f161c8d8bab3db62f1fa9272e11eb4217a378f1fb9334b95d7f852bd44900,2024-09-26T16:15:08.883000 CVE-2024-46958,0,0,a066074c8ea90ca6497e29c818dbf400ff90cc8827530871d9d45fb4a3abe93e,2024-09-20T22:41:38.223000 CVE-2024-46959,0,0,49609311db8eb2484a5bda279fc39cc9dccd98f1d151343e94689d8818c061d9,2024-09-20T14:35:13.063000