Auto-Update: 2024-11-11T00:55:44.062717+00:00

This commit is contained in:
cad-safe-bot 2024-11-11 00:58:45 +00:00
parent d8324c1adc
commit bec68ae812
11 changed files with 537 additions and 18 deletions

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2020-10367",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-10T23:15:04.170",
"lastModified": "2024-11-11T00:15:13.480",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain Cypress (and Broadcom) Wireless Combo chips, when a January 2021 firmware update is not present, allow memory access via a \"Spectra\" attack."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052676",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/RPi-Distro/bluez-firmware/commit/8445a53ce2c51a77472b908a0c8f6f8e1fa5c37a",
"source": "cve@mitre.org"
},
{
"url": "https://www.informatik.tu-darmstadt.de/fb20/aktuelles_fb20/fb20_neuigkeiten/neuigkeiten_fb20_details_203136.de.jsp",
"source": "cve@mitre.org"
},
{
"url": "https://www.informatik.tu-darmstadt.de/seemoo/team_seemoo/jiska_classen/index.en.jsp",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2020-10368",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-10T23:15:04.247",
"lastModified": "2024-11-11T00:15:13.607",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain Cypress (and Broadcom) Wireless Combo chips, when a January 2021 firmware update is not present, allow memory read access via a \"Spectra\" attack."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052676",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/RPi-Distro/bluez-firmware/commit/8445a53ce2c51a77472b908a0c8f6f8e1fa5c37a",
"source": "cve@mitre.org"
},
{
"url": "https://www.informatik.tu-darmstadt.de/fb20/aktuelles_fb20/fb20_neuigkeiten/neuigkeiten_fb20_details_203136.de.jsp",
"source": "cve@mitre.org"
},
{
"url": "https://www.informatik.tu-darmstadt.de/seemoo/team_seemoo/jiska_classen/index.en.jsp",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2020-10369",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-10T23:15:04.307",
"lastModified": "2024-11-11T00:15:13.660",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain Cypress (and Broadcom) Wireless Combo chips, when a January 2021 firmware update is not present, allow inferences about memory content via a \"Spectra\" attack."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052676",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/RPi-Distro/bluez-firmware/commit/8445a53ce2c51a77472b908a0c8f6f8e1fa5c37a",
"source": "cve@mitre.org"
},
{
"url": "https://www.informatik.tu-darmstadt.de/fb20/aktuelles_fb20/fb20_neuigkeiten/neuigkeiten_fb20_details_203136.de.jsp",
"source": "cve@mitre.org"
},
{
"url": "https://www.informatik.tu-darmstadt.de/seemoo/team_seemoo/jiska_classen/index.en.jsp",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2020-10370",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-11T00:15:13.707",
"lastModified": "2024-11-11T00:15:13.707",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain Cypress (and Broadcom) Wireless Combo chips such as CYW43455, when a 2021-01-26 Bluetooth firmware update is not present, allow a Bluetooth outage via a \"Spectra\" attack."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052676",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/RPi-Distro/bluez-firmware/commit/8445a53ce2c51a77472b908a0c8f6f8e1fa5c37a",
"source": "cve@mitre.org"
},
{
"url": "https://security-tracker.debian.org/tracker/CVE-2020-10370",
"source": "cve@mitre.org"
},
{
"url": "https://www.informatik.tu-darmstadt.de/fb20/aktuelles_fb20/fb20_neuigkeiten/neuigkeiten_fb20_details_203136.de.jsp",
"source": "cve@mitre.org"
},
{
"url": "https://www.informatik.tu-darmstadt.de/seemoo/team_seemoo/jiska_classen/index.en.jsp",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2021-35473",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-10T23:15:04.383",
"lastModified": "2024-11-10T23:15:04.383",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in LemonLDAP::NG before 2.0.12. There is a missing expiration check in the OAuth2.0 handler, i.e., it does not verify access token validity. An attacker can use a expired access token from an OIDC client to access the OAuth2 handler The earliest affected version is 2.0.4."
}
],
"metrics": {},
"references": [
{
"url": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2549",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/tags",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2021-41737",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-10T23:15:04.450",
"lastModified": "2024-11-10T23:15:04.450",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Faust 2.23.1, an input file with the lines \"// r visualisation tCst\" and \"//process = +: L: abM-^Q;\" and \"process = route(3333333333333333333,2,1,2,3,1) : *;\" leads to stack consumption."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/grame-cncm/faust/issues/653",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/grame-cncm/faust/tree/e682dbeeb7cc0ec9a1fcb6872f53433e454aa233",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2023-40457",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-11T00:15:13.817",
"lastModified": "2024-11-11T00:15:13.817",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The BGP daemon in Extreme Networks ExtremeXOS (aka EXOS) 30.7.1.1 allows an attacker (who is not on a directly connected network) to cause a denial of service (BGP session reset) because of BGP attribute error mishandling (for attribute 21 and 25). NOTE: the vendor disputes this because it is \"evaluating support for RFC 7606 as a future feature\" and believes that \"customers that have chosen to not require or implement RFC 7606 have done so willingly and with knowledge of what is needed to defend against these types of attacks.\""
}
],
"metrics": {},
"references": [
{
"url": "https://blog.benjojo.co.uk/asset/JgH8G5duO1",
"source": "cve@mitre.org"
},
{
"url": "https://blog.benjojo.co.uk/post/bgp-path-attributes-grave-error-handling",
"source": "cve@mitre.org"
},
{
"url": "https://supportdocs.extremenetworks.com/support/documentation/extremexos-32-5/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2024-11058",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-10T23:15:04.570",
"lastModified": "2024-11-10T23:15:04.570",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in CodeAstro Real Estate Management System up to 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /aboutedit.php of the component About Us Page. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.1,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://codeastro.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/EmilGallajov/zero-day/blob/main/codeastro_real_estate_ms_sqli.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.283804",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.283804",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.439683",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-11059",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-11T00:15:13.957",
"lastModified": "2024-11-11T00:15:13.957",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Project Worlds Free Download Online Shopping System up to 192.168.1.88. It has been rated as critical. This issue affects some unknown processing of the file /online-shopping-webvsite-in-php-master/success.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/Sy0ung-cmd/Cve-report/blob/main/SQLi-1.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.283805",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.283805",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.440337",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2024-11-10T23:00:28.478727+00:00 2024-11-11T00:55:44.062717+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2024-11-10T22:15:12.943000+00:00 2024-11-11T00:15:13.957000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,20 +33,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
268952 268961
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `7` Recently added CVEs: `9`
- [CVE-2024-46613](CVE-2024/CVE-2024-466xx/CVE-2024-46613.json) (`2024-11-10T21:15:14.790`) - [CVE-2020-10367](CVE-2020/CVE-2020-103xx/CVE-2020-10367.json) (`2024-11-10T23:15:04.170`)
- [CVE-2024-46951](CVE-2024/CVE-2024-469xx/CVE-2024-46951.json) (`2024-11-10T21:15:14.880`) - [CVE-2020-10368](CVE-2020/CVE-2020-103xx/CVE-2020-10368.json) (`2024-11-10T23:15:04.247`)
- [CVE-2024-46952](CVE-2024/CVE-2024-469xx/CVE-2024-46952.json) (`2024-11-10T22:15:12.677`) - [CVE-2020-10369](CVE-2020/CVE-2020-103xx/CVE-2020-10369.json) (`2024-11-10T23:15:04.307`)
- [CVE-2024-46953](CVE-2024/CVE-2024-469xx/CVE-2024-46953.json) (`2024-11-10T22:15:12.750`) - [CVE-2020-10370](CVE-2020/CVE-2020-103xx/CVE-2020-10370.json) (`2024-11-11T00:15:13.707`)
- [CVE-2024-46954](CVE-2024/CVE-2024-469xx/CVE-2024-46954.json) (`2024-11-10T22:15:12.813`) - [CVE-2021-35473](CVE-2021/CVE-2021-354xx/CVE-2021-35473.json) (`2024-11-10T23:15:04.383`)
- [CVE-2024-46955](CVE-2024/CVE-2024-469xx/CVE-2024-46955.json) (`2024-11-10T22:15:12.887`) - [CVE-2021-41737](CVE-2021/CVE-2021-417xx/CVE-2021-41737.json) (`2024-11-10T23:15:04.450`)
- [CVE-2024-46956](CVE-2024/CVE-2024-469xx/CVE-2024-46956.json) (`2024-11-10T22:15:12.943`) - [CVE-2023-40457](CVE-2023/CVE-2023-404xx/CVE-2023-40457.json) (`2024-11-11T00:15:13.817`)
- [CVE-2024-11058](CVE-2024/CVE-2024-110xx/CVE-2024-11058.json) (`2024-11-10T23:15:04.570`)
- [CVE-2024-11059](CVE-2024/CVE-2024-110xx/CVE-2024-11059.json) (`2024-11-11T00:15:13.957`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit

View File

@ -145379,7 +145379,11 @@ CVE-2020-1036,0,0,2874076b164573c9efd1f421af714a327548905044a81ef0e8ef1552d41acb
CVE-2020-10364,0,0,611ab9368b8f83e21cead790c378447607502fb33a5a29a9f13f245e88a058ce,2021-07-21T11:39:23.747000 CVE-2020-10364,0,0,611ab9368b8f83e21cead790c378447607502fb33a5a29a9f13f245e88a058ce,2021-07-21T11:39:23.747000
CVE-2020-10365,0,0,d3d68b994e9bb439f53a91ee98dcef796959b6dd3c666ec37fae3d2b425582d8,2020-03-27T14:06:01.573000 CVE-2020-10365,0,0,d3d68b994e9bb439f53a91ee98dcef796959b6dd3c666ec37fae3d2b425582d8,2020-03-27T14:06:01.573000
CVE-2020-10366,0,0,4e2a033e67dfec1f609656013334699a8eb3fc01e5fc13ccd6a347df3aa59246,2020-04-09T13:42:55.633000 CVE-2020-10366,0,0,4e2a033e67dfec1f609656013334699a8eb3fc01e5fc13ccd6a347df3aa59246,2020-04-09T13:42:55.633000
CVE-2020-10367,1,1,99366d757934e2ffcb318b2e00eaf0dbe399e6cacd27b7afad7a728db9b6d240,2024-11-11T00:15:13.480000
CVE-2020-10368,1,1,cb24fa279f6bc07ed167d02787a9b540b83587eff5bfcf1d5f872ca1af07b78d,2024-11-11T00:15:13.607000
CVE-2020-10369,1,1,146d5275af3b0aa5bfb1751bac3ef184b0829729e95059ab6c1e6fb775f2e6cd,2024-11-11T00:15:13.660000
CVE-2020-1037,0,0,37b1f612d83cc30e182161b72b7dc2b33f54db0b1459846101bbe7832ab961da,2021-07-21T11:39:23.747000 CVE-2020-1037,0,0,37b1f612d83cc30e182161b72b7dc2b33f54db0b1459846101bbe7832ab961da,2021-07-21T11:39:23.747000
CVE-2020-10370,1,1,6ca9d2352207dd9158e75dbbcc2780dc6b2a2eef508efe6fb4a47ba50a0144b8,2024-11-11T00:15:13.707000
CVE-2020-10372,0,0,057fe8c3886242ba4743ee0731c1b3e91bd8fbd5a9e094cfadb7ecd7f966e658,2020-03-12T18:43:14.093000 CVE-2020-10372,0,0,057fe8c3886242ba4743ee0731c1b3e91bd8fbd5a9e094cfadb7ecd7f966e658,2020-03-12T18:43:14.093000
CVE-2020-10374,0,0,e0f5cf824a69e15c19ce778116ec2d478043887f56c7a9bb00a2741bd484b3e6,2020-06-25T16:15:11.720000 CVE-2020-10374,0,0,e0f5cf824a69e15c19ce778116ec2d478043887f56c7a9bb00a2741bd484b3e6,2020-06-25T16:15:11.720000
CVE-2020-10375,0,0,15c11a13974b4c046916cbe154b2872bf5997eee5295d16adb96c2f3f2d2a322,2021-07-21T11:39:23.747000 CVE-2020-10375,0,0,15c11a13974b4c046916cbe154b2872bf5997eee5295d16adb96c2f3f2d2a322,2021-07-21T11:39:23.747000
@ -178524,6 +178528,7 @@ CVE-2021-35465,0,0,4b40f2b45af9ec0164fa72705921db5f1b77a62d6ff8c449d4a17854ab8ac
CVE-2021-35469,0,0,a587ed95e25d1382ac367eee42f15573c5a79c9cdd594adf12a01139af795092,2021-07-19T14:06:16.277000 CVE-2021-35469,0,0,a587ed95e25d1382ac367eee42f15573c5a79c9cdd594adf12a01139af795092,2021-07-19T14:06:16.277000
CVE-2021-3547,0,0,f595c8015d8baa6bd1a62ebce3408c6f420d2e86a4376e57a05473047d1168aa,2022-10-27T12:22:43.533000 CVE-2021-3547,0,0,f595c8015d8baa6bd1a62ebce3408c6f420d2e86a4376e57a05473047d1168aa,2022-10-27T12:22:43.533000
CVE-2021-35472,0,0,e466d5ad2f2a80b4ba0e1bfa2a33c254e082505f4937060ee5dd54bad8c013c8,2021-08-11T15:31:21.203000 CVE-2021-35472,0,0,e466d5ad2f2a80b4ba0e1bfa2a33c254e082505f4937060ee5dd54bad8c013c8,2021-08-11T15:31:21.203000
CVE-2021-35473,1,1,5fd42e3cf7e9e3c5a1ee81f1ec902f7a21b7a4cc34ed2418e5be0953eb1036cb,2024-11-10T23:15:04.383000
CVE-2021-35474,0,0,d630b5060f1559d9408d5370a1905ba3c16c56cadbdc14d4b0bbc392332371f9,2021-09-20T18:54:54.040000 CVE-2021-35474,0,0,d630b5060f1559d9408d5370a1905ba3c16c56cadbdc14d4b0bbc392332371f9,2021-09-20T18:54:54.040000
CVE-2021-35475,0,0,263c975acc88e371a5a2ff65ef4308846de5257ff3719c93490216d8f0c3a54d,2021-07-01T16:02:54.013000 CVE-2021-35475,0,0,263c975acc88e371a5a2ff65ef4308846de5257ff3719c93490216d8f0c3a54d,2021-07-01T16:02:54.013000
CVE-2021-35477,0,0,71b9e463e20f82dabd3fd53dbc939aa60018a38659174e658a66faf9b8626d08,2023-11-07T03:36:31.740000 CVE-2021-35477,0,0,71b9e463e20f82dabd3fd53dbc939aa60018a38659174e658a66faf9b8626d08,2023-11-07T03:36:31.740000
@ -183316,6 +183321,7 @@ CVE-2021-41731,0,0,e6e3ae708cb53c3ee174f23b1c9f4a781449f711c97fa0c8a78a607f5ef8f
CVE-2021-41732,0,0,897f66499ebbed068f851fa966a737d858d6beb30b12d36d7461474c03f754d1,2024-08-04T04:15:52.463000 CVE-2021-41732,0,0,897f66499ebbed068f851fa966a737d858d6beb30b12d36d7461474c03f754d1,2024-08-04T04:15:52.463000
CVE-2021-41733,0,0,a725fec9a1a6247805745405c4a02baf8d225a69ff70ff07765035ffd0080b34,2021-11-09T19:59:21.390000 CVE-2021-41733,0,0,a725fec9a1a6247805745405c4a02baf8d225a69ff70ff07765035ffd0080b34,2021-11-09T19:59:21.390000
CVE-2021-41736,0,0,af26875a9ac9429f2e98dd9f2c1bc5ec136a44a22f31c345a4e9732b67f1d317,2022-03-28T20:52:06.847000 CVE-2021-41736,0,0,af26875a9ac9429f2e98dd9f2c1bc5ec136a44a22f31c345a4e9732b67f1d317,2022-03-28T20:52:06.847000
CVE-2021-41737,1,1,a8c0c3b8ff34e44121693922ddb6ce2e354ee67077c1e8c234c638bd26908de4,2024-11-10T23:15:04.450000
CVE-2021-41738,0,0,5ecef1922584bd33f22d216a7c0c4a032a1a7e6d0f93421920e97565f6d61230,2023-11-07T03:38:59.843000 CVE-2021-41738,0,0,5ecef1922584bd33f22d216a7c0c4a032a1a7e6d0f93421920e97565f6d61230,2023-11-07T03:38:59.843000
CVE-2021-41739,0,0,88e08a7f86585fea82594e389c7305bb5b0e4ea5e959031890111bbec15040ea,2023-11-07T03:38:59.903000 CVE-2021-41739,0,0,88e08a7f86585fea82594e389c7305bb5b0e4ea5e959031890111bbec15040ea,2023-11-07T03:38:59.903000
CVE-2021-41744,0,0,27671c50c8426c0fa11c45ec2325d871ef966a0ab3e64e276e305da6188796d4,2021-10-28T19:19:48.443000 CVE-2021-41744,0,0,27671c50c8426c0fa11c45ec2325d871ef966a0ab3e64e276e305da6188796d4,2021-10-28T19:19:48.443000
@ -230820,6 +230826,7 @@ CVE-2023-40453,0,0,130c1ba245794699f114636eda3c5cf90574ba5b46bd6a704fe406b89dec0
CVE-2023-40454,0,0,c10b12346537ef1e5c8787b1e2fe9d4cb45cf0b585647c357d5bb525587ce317,2023-11-07T04:20:15.070000 CVE-2023-40454,0,0,c10b12346537ef1e5c8787b1e2fe9d4cb45cf0b585647c357d5bb525587ce317,2023-11-07T04:20:15.070000
CVE-2023-40455,0,0,058abdb8c2eae30e165ec5b264dbf295ba8e09c6c3830c69886965016a5de75b,2023-10-12T02:29:35.947000 CVE-2023-40455,0,0,058abdb8c2eae30e165ec5b264dbf295ba8e09c6c3830c69886965016a5de75b,2023-10-12T02:29:35.947000
CVE-2023-40456,0,0,7169803686183a5f1d426b39f88228ec6dce3691ab53bc177c949c7a8fd9efca,2023-11-07T04:20:15.193000 CVE-2023-40456,0,0,7169803686183a5f1d426b39f88228ec6dce3691ab53bc177c949c7a8fd9efca,2023-11-07T04:20:15.193000
CVE-2023-40457,1,1,3ed0c0366718f77c6a06776af5f75deea62fe67f01ba95131767df09aa944960,2024-11-11T00:15:13.817000
CVE-2023-40458,0,0,79a445a17e1f85e1f6c9345cf6a43d9301aed3a647416fbf1fc2770253362cdc,2023-12-05T01:55:09.410000 CVE-2023-40458,0,0,79a445a17e1f85e1f6c9345cf6a43d9301aed3a647416fbf1fc2770253362cdc,2023-12-05T01:55:09.410000
CVE-2023-40459,0,0,72958d07cda00b0c6d4ae1b61eff24e072a6de9dcd7e9245179ab8da7c7dd63d,2023-12-08T15:47:51.637000 CVE-2023-40459,0,0,72958d07cda00b0c6d4ae1b61eff24e072a6de9dcd7e9245179ab8da7c7dd63d,2023-12-08T15:47:51.637000
CVE-2023-4046,0,0,74357e4a22d4d6aa6afa8fb2beea6097492a98a519070e944818d05926f858bb,2024-10-22T16:35:14.267000 CVE-2023-4046,0,0,74357e4a22d4d6aa6afa8fb2beea6097492a98a519070e944818d05926f858bb,2024-10-22T16:35:14.267000
@ -242952,6 +242959,8 @@ CVE-2024-11054,0,0,e9c381aaeadf77c9d1b7183ed948b8e0efb44af47725b580dad26f17bcbd8
CVE-2024-11055,0,0,a5efff63e76a30be29de1b6d8133b8709ef43e7645ef6bbc215face7032b3517,2024-11-10T15:15:13.970000 CVE-2024-11055,0,0,a5efff63e76a30be29de1b6d8133b8709ef43e7645ef6bbc215face7032b3517,2024-11-10T15:15:13.970000
CVE-2024-11056,0,0,4a4bf302243450bab1b56f5e438a4b75a3770dd2ba6723208513ba0d1a1f0011,2024-11-10T17:15:15.697000 CVE-2024-11056,0,0,4a4bf302243450bab1b56f5e438a4b75a3770dd2ba6723208513ba0d1a1f0011,2024-11-10T17:15:15.697000
CVE-2024-11057,0,0,a5800f82f061d1ad6f5682014c58d51ff756f3c210f42f4633c2f0dde988ab69,2024-11-10T18:15:16.517000 CVE-2024-11057,0,0,a5800f82f061d1ad6f5682014c58d51ff756f3c210f42f4633c2f0dde988ab69,2024-11-10T18:15:16.517000
CVE-2024-11058,1,1,45ee5c2c3e782b6e528b2a5ebd9a1df09e71040696e6c54587f55db5a31eb4ed,2024-11-10T23:15:04.570000
CVE-2024-11059,1,1,4701f67edbe381eeaf9aee2ff329a7f7c3dee9bcc39cff6c54d2e0d0b473d86f,2024-11-11T00:15:13.957000
CVE-2024-1106,0,0,20cb4a0a045157ac9e013fd166b9513d5a44a1304cf8a8ccabd3185b4a52ab40,2024-10-27T23:35:01.747000 CVE-2024-1106,0,0,20cb4a0a045157ac9e013fd166b9513d5a44a1304cf8a8ccabd3185b4a52ab40,2024-10-27T23:35:01.747000
CVE-2024-1107,0,0,7fae6df9cdce298be180c2cb6d3dacceb0e976e847fc87cce19a7d73f37dfe2b,2024-09-16T19:08:27.840000 CVE-2024-1107,0,0,7fae6df9cdce298be180c2cb6d3dacceb0e976e847fc87cce19a7d73f37dfe2b,2024-09-16T19:08:27.840000
CVE-2024-1108,0,0,72e8aa7ee320c630f0cd3020b574b902dcf572a1d2888f0afb29692e74e18247,2024-02-22T19:07:37.840000 CVE-2024-1108,0,0,72e8aa7ee320c630f0cd3020b574b902dcf572a1d2888f0afb29692e74e18247,2024-02-22T19:07:37.840000
@ -262489,7 +262498,7 @@ CVE-2024-46609,0,0,867378c24ca26a245e4713a4ba27c2af9d0d9faadf75c6778954203857675
CVE-2024-4661,0,0,c3df946503e9b828d76c6d82332cda3e4be930bda3f80537afbf8f2ae2d7bc25,2024-10-31T18:21:43.683000 CVE-2024-4661,0,0,c3df946503e9b828d76c6d82332cda3e4be930bda3f80537afbf8f2ae2d7bc25,2024-10-31T18:21:43.683000
CVE-2024-46610,0,0,dfd11b66ad880194d4e8759fea756317b6075d327e3519259cd11f18ae0f4b82,2024-09-30T16:30:50.833000 CVE-2024-46610,0,0,dfd11b66ad880194d4e8759fea756317b6075d327e3519259cd11f18ae0f4b82,2024-09-30T16:30:50.833000
CVE-2024-46612,0,0,a589f709811c7445ac7df28a3a7782b0e1ab03ae28a72339e484d8d02cc7d048,2024-09-26T13:32:02.803000 CVE-2024-46612,0,0,a589f709811c7445ac7df28a3a7782b0e1ab03ae28a72339e484d8d02cc7d048,2024-09-26T13:32:02.803000
CVE-2024-46613,1,1,7c4fd82c17c4219c5e51d9748b014d9a85b72da0644a4217195f5db5d431168a,2024-11-10T21:15:14.790000 CVE-2024-46613,0,0,7c4fd82c17c4219c5e51d9748b014d9a85b72da0644a4217195f5db5d431168a,2024-11-10T21:15:14.790000
CVE-2024-4662,0,0,42d3ec88d759fc9bf88fc92972e0c9891830916b90a0cdbb0331ad5486f420dd,2024-05-24T01:15:30.977000 CVE-2024-4662,0,0,42d3ec88d759fc9bf88fc92972e0c9891830916b90a0cdbb0331ad5486f420dd,2024-05-24T01:15:30.977000
CVE-2024-46626,0,0,b2dbe1e3c2ee97096cbfddcd538250ce5664f2528c19dd2dc51892ffc471844d,2024-10-04T13:50:43.727000 CVE-2024-46626,0,0,b2dbe1e3c2ee97096cbfddcd538250ce5664f2528c19dd2dc51892ffc471844d,2024-10-04T13:50:43.727000
CVE-2024-46627,0,0,4cc8890cea4e8322a4c476b42c8fefe2b4b66b62a78446cc66eb2d1a373670f4,2024-09-30T12:46:20.237000 CVE-2024-46627,0,0,4cc8890cea4e8322a4c476b42c8fefe2b4b66b62a78446cc66eb2d1a373670f4,2024-09-30T12:46:20.237000
@ -262758,12 +262767,12 @@ CVE-2024-46946,0,0,5adf6fed09d7522a85c453ac4c470cad5917d88736dbb3b605636f5befca4
CVE-2024-46947,0,0,b59f7f41af30aded4ad65024485f8c1125aef585b68596d5293e6a508028cc3d,2024-11-08T19:35:17.037000 CVE-2024-46947,0,0,b59f7f41af30aded4ad65024485f8c1125aef585b68596d5293e6a508028cc3d,2024-11-08T19:35:17.037000
CVE-2024-46948,0,0,5eb36279b3db7d39a170e75a824e340b32845061d149091503a0443c63f28aee,2024-11-08T19:01:03.880000 CVE-2024-46948,0,0,5eb36279b3db7d39a170e75a824e340b32845061d149091503a0443c63f28aee,2024-11-08T19:01:03.880000
CVE-2024-4695,0,0,aa253f1bdce79ef626aa7622c4e367006f6b60359a6a2b0af989b23a6e81f980,2024-05-21T12:37:59.687000 CVE-2024-4695,0,0,aa253f1bdce79ef626aa7622c4e367006f6b60359a6a2b0af989b23a6e81f980,2024-05-21T12:37:59.687000
CVE-2024-46951,1,1,a590b01ff00d122edc7c393e0584316e387ead1929e30efa702d9cb162273c03,2024-11-10T21:15:14.880000 CVE-2024-46951,0,0,a590b01ff00d122edc7c393e0584316e387ead1929e30efa702d9cb162273c03,2024-11-10T21:15:14.880000
CVE-2024-46952,1,1,5f2dc698a479b665e428264deb2f9db19101378c167512b02bcee2c3c78ffee6,2024-11-10T22:15:12.677000 CVE-2024-46952,0,0,5f2dc698a479b665e428264deb2f9db19101378c167512b02bcee2c3c78ffee6,2024-11-10T22:15:12.677000
CVE-2024-46953,1,1,8557b9e76013152e714b226e7e735df7649283224db642674cd03550fb1a1b30,2024-11-10T22:15:12.750000 CVE-2024-46953,0,0,8557b9e76013152e714b226e7e735df7649283224db642674cd03550fb1a1b30,2024-11-10T22:15:12.750000
CVE-2024-46954,1,1,dc68b212deeeb32d7a421086c96d55276cc6f53c37328ba6af62e50d0a203762,2024-11-10T22:15:12.813000 CVE-2024-46954,0,0,dc68b212deeeb32d7a421086c96d55276cc6f53c37328ba6af62e50d0a203762,2024-11-10T22:15:12.813000
CVE-2024-46955,1,1,ac8a85c2e73cac4c869ffe409551bba2c98eaf63aa7490425f5f246a60304330,2024-11-10T22:15:12.887000 CVE-2024-46955,0,0,ac8a85c2e73cac4c869ffe409551bba2c98eaf63aa7490425f5f246a60304330,2024-11-10T22:15:12.887000
CVE-2024-46956,1,1,28c7298f28e4abf86c547c7b3d03f69bd8116aff63a926f5f2f42ca6cfba5183,2024-11-10T22:15:12.943000 CVE-2024-46956,0,0,28c7298f28e4abf86c547c7b3d03f69bd8116aff63a926f5f2f42ca6cfba5183,2024-11-10T22:15:12.943000
CVE-2024-46957,0,0,1a1f161c8d8bab3db62f1fa9272e11eb4217a378f1fb9334b95d7f852bd44900,2024-09-26T16:15:08.883000 CVE-2024-46957,0,0,1a1f161c8d8bab3db62f1fa9272e11eb4217a378f1fb9334b95d7f852bd44900,2024-09-26T16:15:08.883000
CVE-2024-46958,0,0,a066074c8ea90ca6497e29c818dbf400ff90cc8827530871d9d45fb4a3abe93e,2024-09-20T22:41:38.223000 CVE-2024-46958,0,0,a066074c8ea90ca6497e29c818dbf400ff90cc8827530871d9d45fb4a3abe93e,2024-09-20T22:41:38.223000
CVE-2024-46959,0,0,49609311db8eb2484a5bda279fc39cc9dccd98f1d151343e94689d8818c061d9,2024-09-20T14:35:13.063000 CVE-2024-46959,0,0,49609311db8eb2484a5bda279fc39cc9dccd98f1d151343e94689d8818c061d9,2024-09-20T14:35:13.063000

Can't render this file because it is too large.