Auto-Update: 2024-12-30T23:00:20.050896+00:00

This commit is contained in:
cad-safe-bot 2024-12-30 23:03:43 +00:00
parent 2c5db5e52b
commit 86647941cd
18 changed files with 1106 additions and 71 deletions

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-11944",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-30T21:15:05.493",
"lastModified": "2024-12-30T21:15:05.493",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "iXsystems TrueNAS CORE tarfile.extractall Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of iXsystems TrueNAS devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the tarfile.extractall method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-25626."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://www.truenas.com/docs/core/13.0/gettingstarted/corereleasenotes/#130-u63",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1643/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-11946",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-30T21:15:05.920",
"lastModified": "2024-12-30T21:15:05.920",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "iXsystems TrueNAS CORE fetch_plugin_packagesites tar Cleartext Transmission of Sensitive Information Vulnerability. This vulnerability allows network-adjacent attackers to tamper with firmware update files on affected installations of iXsystems TrueNAS devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of firmware updates. The issue results from the use of an insecure protocol to deliver updates. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-25668."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 3.1,
"baseSeverity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-319"
}
]
}
],
"references": [
{
"url": "https://www.truenas.com/docs/core/13.0/gettingstarted/corereleasenotes/#130-u63",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1644/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-12751",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-30T21:15:06.130",
"lastModified": "2024-12-30T21:15:06.130",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Reader AcroForm Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of AcroForms. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25344."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.foxit.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1737/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-12752",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-30T21:15:06.260",
"lastModified": "2024-12-30T21:15:06.260",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Reader AcroForm Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of AcroForms. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25345."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://www.foxit.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1738/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-12753",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-30T21:15:06.400",
"lastModified": "2024-12-30T21:15:06.400",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Reader Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Foxit PDF Reader. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the product installer. By creating a junction, an attacker can abuse the installer process to create an arbitrary file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-25408."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
}
],
"references": [
{
"url": "https://www.foxit.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1739/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2024-13042",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-30T21:15:06.523",
"lastModified": "2024-12-30T21:15:06.523",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Tsinghua Unigroup Electronic Archives Management System 3.2.210802(62532). It has been classified as problematic. Affected is the function download of the file SubjectController.class.php. The manipulation of the argument path leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
},
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/BxYQ/zg_fileread",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/BxYQ/zg_fileread/blob/main/poc.py",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.289788",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.289788",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.472068",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-13043",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-30T21:15:06.713",
"lastModified": "2024-12-30T21:15:06.713",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Panda Security Dome Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Panda Security Dome. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the Hotspot Shield. By creating a junction, an attacker can abuse the application to delete arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-23478."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1727/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-13044",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-30T21:15:06.840",
"lastModified": "2024-12-30T21:15:06.840",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ashlar-Vellum Cobalt AR File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of AR files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24870."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1728/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-13045",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-30T21:15:06.963",
"lastModified": "2024-12-30T21:15:06.963",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ashlar-Vellum Cobalt AR File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of AR files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24848."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1729/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-13046",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-30T21:15:07.097",
"lastModified": "2024-12-30T21:15:07.097",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ashlar-Vellum Cobalt CO File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of CO files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24867."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1730/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-13047",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-30T21:15:07.220",
"lastModified": "2024-12-30T21:15:07.220",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ashlar-Vellum Cobalt CO File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of CO files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24843."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1731/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-13048",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-30T21:15:07.347",
"lastModified": "2024-12-30T21:15:07.347",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ashlar-Vellum Cobalt XE File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of XE files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24844."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1732/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-13049",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-30T21:15:07.470",
"lastModified": "2024-12-30T21:15:07.470",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ashlar-Vellum Cobalt XE File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of XE files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24847."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1733/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-13050",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-30T21:15:07.593",
"lastModified": "2024-12-30T21:15:07.593",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ashlar-Vellum Graphite VC6 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Graphite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of VC6 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24976."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1734/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-13051",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-30T21:15:07.717",
"lastModified": "2024-12-30T21:15:07.717",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ashlar-Vellum Graphite VC6 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Graphite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of VC6 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24977."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1735/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2024-13058",
"sourceIdentifier": "0a72a055-908d-47f5-a16a-1f09049c16c6",
"published": "2024-12-30T22:15:05.957",
"lastModified": "2024-12-30T22:15:05.957",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue exists in SoftIron HyperCloud\n where authenticated, but non-admin users can create data pools, which could potentially impact the performance and availability of the backend software-defined storage subsystem.\n\nThis issue only impacts SoftIron HyperCloud and related software products (such as VM Squared) software versions 2.3.0 to before 2.5.0."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "0a72a055-908d-47f5-a16a-1f09049c16c6",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:U/V:D/RE:M/U:Green",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "LOW",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NEGLIGIBLE",
"automatable": "YES",
"recovery": "USER",
"valueDensity": "DIFFUSE",
"vulnerabilityResponseEffort": "MODERATE",
"providerUrgency": "GREEN"
}
}
]
},
"weaknesses": [
{
"source": "0a72a055-908d-47f5-a16a-1f09049c16c6",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
},
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://advisories.softiron.cloud/",
"source": "0a72a055-908d-47f5-a16a-1f09049c16c6"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-12-30T21:00:20.105512+00:00
2024-12-30T23:00:20.050896+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-12-30T20:09:41.537000+00:00
2024-12-30T22:15:05.957000+00:00
```
### Last Data Feed Release
@ -33,47 +33,35 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
275186
275202
```
### CVEs added in the last Commit
Recently added CVEs: `3`
Recently added CVEs: `16`
- [CVE-2024-56799](CVE-2024/CVE-2024-567xx/CVE-2024-56799.json) (`2024-12-30T19:15:08.160`)
- [CVE-2024-56800](CVE-2024/CVE-2024-568xx/CVE-2024-56800.json) (`2024-12-30T19:15:08.333`)
- [CVE-2024-56801](CVE-2024/CVE-2024-568xx/CVE-2024-56801.json) (`2024-12-30T19:15:08.483`)
- [CVE-2024-11944](CVE-2024/CVE-2024-119xx/CVE-2024-11944.json) (`2024-12-30T21:15:05.493`)
- [CVE-2024-11946](CVE-2024/CVE-2024-119xx/CVE-2024-11946.json) (`2024-12-30T21:15:05.920`)
- [CVE-2024-12751](CVE-2024/CVE-2024-127xx/CVE-2024-12751.json) (`2024-12-30T21:15:06.130`)
- [CVE-2024-12752](CVE-2024/CVE-2024-127xx/CVE-2024-12752.json) (`2024-12-30T21:15:06.260`)
- [CVE-2024-12753](CVE-2024/CVE-2024-127xx/CVE-2024-12753.json) (`2024-12-30T21:15:06.400`)
- [CVE-2024-13042](CVE-2024/CVE-2024-130xx/CVE-2024-13042.json) (`2024-12-30T21:15:06.523`)
- [CVE-2024-13043](CVE-2024/CVE-2024-130xx/CVE-2024-13043.json) (`2024-12-30T21:15:06.713`)
- [CVE-2024-13044](CVE-2024/CVE-2024-130xx/CVE-2024-13044.json) (`2024-12-30T21:15:06.840`)
- [CVE-2024-13045](CVE-2024/CVE-2024-130xx/CVE-2024-13045.json) (`2024-12-30T21:15:06.963`)
- [CVE-2024-13046](CVE-2024/CVE-2024-130xx/CVE-2024-13046.json) (`2024-12-30T21:15:07.097`)
- [CVE-2024-13047](CVE-2024/CVE-2024-130xx/CVE-2024-13047.json) (`2024-12-30T21:15:07.220`)
- [CVE-2024-13048](CVE-2024/CVE-2024-130xx/CVE-2024-13048.json) (`2024-12-30T21:15:07.347`)
- [CVE-2024-13049](CVE-2024/CVE-2024-130xx/CVE-2024-13049.json) (`2024-12-30T21:15:07.470`)
- [CVE-2024-13050](CVE-2024/CVE-2024-130xx/CVE-2024-13050.json) (`2024-12-30T21:15:07.593`)
- [CVE-2024-13051](CVE-2024/CVE-2024-130xx/CVE-2024-13051.json) (`2024-12-30T21:15:07.717`)
- [CVE-2024-13058](CVE-2024/CVE-2024-130xx/CVE-2024-13058.json) (`2024-12-30T22:15:05.957`)
### CVEs modified in the last Commit
Recently modified CVEs: `35`
Recently modified CVEs: `0`
- [CVE-2021-47254](CVE-2021/CVE-2021-472xx/CVE-2021-47254.json) (`2024-12-30T19:50:58.543`)
- [CVE-2021-47388](CVE-2021/CVE-2021-473xx/CVE-2021-47388.json) (`2024-12-30T20:05:07.740`)
- [CVE-2021-47390](CVE-2021/CVE-2021-473xx/CVE-2021-47390.json) (`2024-12-30T20:01:12.947`)
- [CVE-2021-47409](CVE-2021/CVE-2021-474xx/CVE-2021-47409.json) (`2024-12-30T20:00:41.677`)
- [CVE-2021-47413](CVE-2021/CVE-2021-474xx/CVE-2021-47413.json) (`2024-12-30T20:00:33.497`)
- [CVE-2021-47420](CVE-2021/CVE-2021-474xx/CVE-2021-47420.json) (`2024-12-30T19:37:04.973`)
- [CVE-2021-47422](CVE-2021/CVE-2021-474xx/CVE-2021-47422.json) (`2024-12-30T19:36:28.193`)
- [CVE-2021-47423](CVE-2021/CVE-2021-474xx/CVE-2021-47423.json) (`2024-12-30T19:36:10.670`)
- [CVE-2023-52812](CVE-2023/CVE-2023-528xx/CVE-2023-52812.json) (`2024-12-30T20:09:10.617`)
- [CVE-2023-52818](CVE-2023/CVE-2023-528xx/CVE-2023-52818.json) (`2024-12-30T20:08:57.877`)
- [CVE-2023-52826](CVE-2023/CVE-2023-528xx/CVE-2023-52826.json) (`2024-12-30T20:08:33.040`)
- [CVE-2023-52849](CVE-2023/CVE-2023-528xx/CVE-2023-52849.json) (`2024-12-30T20:09:41.537`)
- [CVE-2023-52850](CVE-2023/CVE-2023-528xx/CVE-2023-52850.json) (`2024-12-30T20:09:31.393`)
- [CVE-2023-52852](CVE-2023/CVE-2023-528xx/CVE-2023-52852.json) (`2024-12-30T20:09:19.563`)
- [CVE-2024-13019](CVE-2024/CVE-2024-130xx/CVE-2024-13019.json) (`2024-12-30T19:15:06.847`)
- [CVE-2024-13020](CVE-2024/CVE-2024-130xx/CVE-2024-13020.json) (`2024-12-30T19:15:07.537`)
- [CVE-2024-35902](CVE-2024/CVE-2024-359xx/CVE-2024-35902.json) (`2024-12-30T19:47:46.853`)
- [CVE-2024-35905](CVE-2024/CVE-2024-359xx/CVE-2024-35905.json) (`2024-12-30T19:47:30.700`)
- [CVE-2024-35907](CVE-2024/CVE-2024-359xx/CVE-2024-35907.json) (`2024-12-30T19:35:53.437`)
- [CVE-2024-35921](CVE-2024/CVE-2024-359xx/CVE-2024-35921.json) (`2024-12-30T19:35:04.897`)
- [CVE-2024-35922](CVE-2024/CVE-2024-359xx/CVE-2024-35922.json) (`2024-12-30T19:27:42.720`)
- [CVE-2024-35929](CVE-2024/CVE-2024-359xx/CVE-2024-35929.json) (`2024-12-30T19:56:30.927`)
- [CVE-2024-35930](CVE-2024/CVE-2024-359xx/CVE-2024-35930.json) (`2024-12-30T19:52:55.313`)
- [CVE-2024-35933](CVE-2024/CVE-2024-359xx/CVE-2024-35933.json) (`2024-12-30T19:51:27.687`)
- [CVE-2024-3596](CVE-2024/CVE-2024-35xx/CVE-2024-3596.json) (`2024-12-30T19:23:20.437`)
## Download and Usage

View File

@ -187420,28 +187420,28 @@ CVE-2021-47229,0,0,7eaf4c4dfd8a0b01ff059e9e140d1f30b6435b38480e86920eedf73b5f29c
CVE-2021-47230,0,0,9617dea962ae526cc57e3344dadddf0ce492d4dd862e205112638780de1d75fd,2024-11-21T06:35:40.480000
CVE-2021-47231,0,0,fe02362946c9b3cfaf3a64994b44f8b9d73df65115a2eb261246bd28b6bc8925,2024-11-21T06:35:40.683000
CVE-2021-47232,0,0,24ca5d35ff26d1803c655d5dd07b9040f95874dd3a1b7eb44bb77884c953b1a2,2024-11-21T06:35:40.883000
CVE-2021-47233,0,1,49bd84981d757bdeb030b5d808f06c049b1dc1bf9565f1010d44de6f30baa449,2024-12-30T19:51:12.613000
CVE-2021-47233,0,0,49bd84981d757bdeb030b5d808f06c049b1dc1bf9565f1010d44de6f30baa449,2024-12-30T19:51:12.613000
CVE-2021-47234,0,0,273d7ee3f66e04272422c623c3f10a6131b83f867533db8cd4feea3001cff253,2024-11-21T06:35:41.203000
CVE-2021-47235,0,1,8b53251b18ef7a00638c8566452347f25d3f12a1756e9c95ca2b9ee9d09320d4,2024-12-30T19:06:05.170000
CVE-2021-47235,0,0,8b53251b18ef7a00638c8566452347f25d3f12a1756e9c95ca2b9ee9d09320d4,2024-12-30T19:06:05.170000
CVE-2021-47236,0,0,b87ff6e7bbebf51be21d4b4f1bddb0b9e9f26bf1b1f348eef469192eeef1e5fe,2024-11-21T06:35:41.480000
CVE-2021-47237,0,1,21a5b46828785b47344dfa5d33d76cb4f95f34c264877088c08c9f3183bb0375,2024-12-30T19:05:28.320000
CVE-2021-47237,0,0,21a5b46828785b47344dfa5d33d76cb4f95f34c264877088c08c9f3183bb0375,2024-12-30T19:05:28.320000
CVE-2021-47238,0,0,b41f2250ae1e52d3fe19a4a1a3f096f7b6ff7daceb9aaf3a7950aecde0975b5e,2024-11-21T06:35:41.743000
CVE-2021-47239,0,1,426aab874d3868aa4677b22537307b93d5214463451278a00c2a583e2a8b5c7b,2024-12-30T19:05:15.167000
CVE-2021-47240,0,1,7d569215feef44a17dae0b0b3463f2bc32c191ad3939d0983404aab4d26d862a,2024-12-30T19:04:58.760000
CVE-2021-47239,0,0,426aab874d3868aa4677b22537307b93d5214463451278a00c2a583e2a8b5c7b,2024-12-30T19:05:15.167000
CVE-2021-47240,0,0,7d569215feef44a17dae0b0b3463f2bc32c191ad3939d0983404aab4d26d862a,2024-12-30T19:04:58.760000
CVE-2021-47241,0,0,a0218b63a37a83cd88010171c29ce1ae8094e5b2a4be5c22a8819de8551be48e,2024-11-21T06:35:42.163000
CVE-2021-47242,0,0,9e2ec51f01fe9a8aad67669f97a4ff925113d9d899dff1b65690d8eceeb8de62,2024-11-21T06:35:42.343000
CVE-2021-47243,0,1,f3ce19b96978056d91cf0a2bc489aea47b0aa209106c9ae341645d6e0a65d4c0,2024-12-30T19:04:26.770000
CVE-2021-47243,0,0,f3ce19b96978056d91cf0a2bc489aea47b0aa209106c9ae341645d6e0a65d4c0,2024-12-30T19:04:26.770000
CVE-2021-47244,0,0,ca6b3b87479e59071b8004632c8d4b6f1e9d11643d6de68216b8ad6a0872acb6,2024-11-21T06:35:42.640000
CVE-2021-47245,0,1,4b0fd78442e693c8c9ad1c36bf34d80eb49c87d890eb02e4e5da728a0703b468,2024-12-30T19:03:58.273000
CVE-2021-47245,0,0,4b0fd78442e693c8c9ad1c36bf34d80eb49c87d890eb02e4e5da728a0703b468,2024-12-30T19:03:58.273000
CVE-2021-47246,0,0,9f782402bd919affe114e8e45d84ed93cdf78270af91f3168742be0308c7f0f6,2024-11-21T06:35:42.950000
CVE-2021-47247,0,1,cf90397ea9a0d803e299cc12d5f4b86d634ea5464c7c4e150ba6bab1f935c450,2024-12-30T19:03:42.583000
CVE-2021-47247,0,0,cf90397ea9a0d803e299cc12d5f4b86d634ea5464c7c4e150ba6bab1f935c450,2024-12-30T19:03:42.583000
CVE-2021-47248,0,0,6815ade5961ff0ed77e72f0840fb9b58804880066f8794fef7922658c81186c7,2024-11-21T06:35:43.190000
CVE-2021-47249,0,1,9df064926874e19baf591bf7503852913c51ff093c8d41822dae8720c5b2ce56,2024-12-30T19:01:43.417000
CVE-2021-47250,0,1,3895234a4bca9fd42201e364d83eda41b7862d08052563ff8d97516234423938,2024-12-30T19:00:27.217000
CVE-2021-47249,0,0,9df064926874e19baf591bf7503852913c51ff093c8d41822dae8720c5b2ce56,2024-12-30T19:01:43.417000
CVE-2021-47250,0,0,3895234a4bca9fd42201e364d83eda41b7862d08052563ff8d97516234423938,2024-12-30T19:00:27.217000
CVE-2021-47251,0,0,910383b3bb8c00e34855fcda8c3ec1d6bd52252a19036ebff555cedb288a9861,2024-11-21T06:35:43.570000
CVE-2021-47252,0,0,8f2ae53195e1d344dcddbea9cafebc6f137c371b83b1765850464be0bba730c1,2024-11-21T06:35:43.683000
CVE-2021-47253,0,0,9bc677a4b5d13cd8fd06f4b9374a9aa62a3778e7b12c1d5302b8dc1a583e0856,2024-12-30T18:59:10.807000
CVE-2021-47254,0,1,8ad5e1955743b8c3f06c84a200072a25601d6c4b3267d5b5db59a4daa0deeb02,2024-12-30T19:50:58.543000
CVE-2021-47254,0,0,8ad5e1955743b8c3f06c84a200072a25601d6c4b3267d5b5db59a4daa0deeb02,2024-12-30T19:50:58.543000
CVE-2021-47255,0,0,ab70f22d16c8786e854f11454b2eea8afe54254c834b2d2bd6063c66081a9479,2024-11-21T06:35:44.037000
CVE-2021-47256,0,0,0f51de379b692c2d0a857a25782e52c1e5499b2d759e9b9b493c9ede6fbb425a,2024-11-21T06:35:44.143000
CVE-2021-47257,0,0,56979cfa19b4e765d1c353c91739346331d68d4f631479f694c06bdaf5dfe282,2024-11-21T06:35:44.263000
@ -187575,9 +187575,9 @@ CVE-2021-47384,0,0,bb89862113d2a6336d33a29fcea8543dd2e3a5aaa8344e5d7c7ced6e0e1c1
CVE-2021-47385,0,0,c6a82e7a12e897338326b0272d766105a2467dab6588deae93331929ba6df3aa,2024-12-23T21:01:31.227000
CVE-2021-47386,0,0,e2c2600fd20b80e34f73e540ac913f3f01a2782eb98515ebb9fa3047ce7b2d75,2024-11-21T06:36:02.267000
CVE-2021-47387,0,0,f9abbc75a71e5f75679f53162608a51731e5b30a945f073035121479b6bfac5c,2024-11-21T06:36:02.443000
CVE-2021-47388,0,1,5a99c0375f375933a2ee3ed84e78b90361dbfbf675205e3e3fce5b62f99bd86e,2024-12-30T20:05:07.740000
CVE-2021-47388,0,0,5a99c0375f375933a2ee3ed84e78b90361dbfbf675205e3e3fce5b62f99bd86e,2024-12-30T20:05:07.740000
CVE-2021-47389,0,0,a22c8848716a5fab6e02d5133120c67e86b798dc6ef581a21bef1750e67cc07a,2024-11-21T06:36:02.683000
CVE-2021-47390,0,1,76b23b24c5c2d0ae53e9c1096f39d0e46b517e03d31e39981405101939ea2a5e,2024-12-30T20:01:12.947000
CVE-2021-47390,0,0,76b23b24c5c2d0ae53e9c1096f39d0e46b517e03d31e39981405101939ea2a5e,2024-12-30T20:01:12.947000
CVE-2021-47391,0,0,f4d175a858a736db63367addd002e1ba9b1dcfb405e34dc62cdb19aff0fd59b2,2024-11-21T06:36:02.967000
CVE-2021-47392,0,0,3f96e381be60800107bbde2dc3edea028b592fe3ad227fb19a1c81e6c3642f9c,2024-11-21T06:36:03.080000
CVE-2021-47393,0,0,cb8604c1f678df5603c14287ccd222cdf9bee87fd56ca2dc7d6971ba3d537ad9,2024-11-21T06:36:03.193000
@ -187596,21 +187596,21 @@ CVE-2021-47405,0,0,89d57154146c49bfe9495517a8aa4581b03bbe87f488a973134e87054c50f
CVE-2021-47406,0,0,29847dbf301ed41a53321d345125f661ba83b5bdb100a716152af1df0991e844,2024-11-21T06:36:04.807000
CVE-2021-47407,0,0,99d0a8ae031df6e833de865dd6448cf1a9c23ee872668167073223966e2f1959,2024-11-21T06:36:04.980000
CVE-2021-47408,0,0,1bb9de9f9fb0c138f101bdd077c488720764253896933e9ddd90af986223f012,2024-11-21T06:36:05.087000
CVE-2021-47409,0,1,4409848935610c806a916f78420b16db2a2ab2efcb7ac8dd99c83d5249f8b960,2024-12-30T20:00:41.677000
CVE-2021-47409,0,0,4409848935610c806a916f78420b16db2a2ab2efcb7ac8dd99c83d5249f8b960,2024-12-30T20:00:41.677000
CVE-2021-47410,0,0,4075c00f9d5ffd89b59e95e73a9e5fa86e05d5bb14ffa8d2023787fcb8cce122,2024-11-21T06:36:05.360000
CVE-2021-47411,0,0,d0414849cfb396e83266669cd4701dbb6a1022ea5a51c35023bb94eb4cfc8a37,2024-05-25T14:15:50.770000
CVE-2021-47412,0,0,af5c4c1fde936342c029e1565c710bac695bfb5efd8710ea589f197b466eba8a,2024-11-21T06:36:05.480000
CVE-2021-47413,0,1,269d04830df035e17e52fb59428cdae6c99bbe3c5236fc44bbeb5952e9d53939,2024-12-30T20:00:33.497000
CVE-2021-47413,0,0,269d04830df035e17e52fb59428cdae6c99bbe3c5236fc44bbeb5952e9d53939,2024-12-30T20:00:33.497000
CVE-2021-47414,0,0,a83b6ed138679e0a43562ce58d15e7d1f7e5382db9d90a7386573fd9d8fa4042,2024-11-21T06:36:05.703000
CVE-2021-47415,0,0,dc3acb10fb2f650ccb4aeb9f23bddae7fbe6e40ab8bea8780dde5bc4fdccf5e4,2024-11-21T06:36:05.823000
CVE-2021-47416,0,0,562046249992ab3df84dbdde2ab890f105644babba8615b4902e2b57236f0090,2024-11-21T06:36:05.920000
CVE-2021-47417,0,0,ef21ffbd1d0dcc69c944405c3efcd8ac7dd51ac01c5d60bc09bf913df733ed89,2024-11-21T06:36:06.070000
CVE-2021-47418,0,0,6899899fab7502122cb0d0c6605217d6cf7dea34523bfc84e2e3729ce30f6da9,2024-11-21T06:36:06.193000
CVE-2021-47419,0,0,b982e6e4a9c1837e4bd26bb12e302c41eb5725451cbe81290498c856c22cca0d,2024-11-21T06:36:06.323000
CVE-2021-47420,0,1,00afc3432a4f0c3aee8977e415c889a3d8886055a9490eac336ef9b40a80b4d4,2024-12-30T19:37:04.973000
CVE-2021-47420,0,0,00afc3432a4f0c3aee8977e415c889a3d8886055a9490eac336ef9b40a80b4d4,2024-12-30T19:37:04.973000
CVE-2021-47421,0,0,0a40ba093314e9e6469359d21a45f9f0d40d5425308999e0d98a4f7123360a17,2024-11-21T06:36:06.613000
CVE-2021-47422,0,1,dc3123e6db84d59806cae4c311d5662de81263eadfad4838d331b275a8dfec7e,2024-12-30T19:36:28.193000
CVE-2021-47423,0,1,12196f2af306d0a79235a9a7ad0c2f133ac495899947bc147939c1ec99649cea,2024-12-30T19:36:10.670000
CVE-2021-47422,0,0,dc3123e6db84d59806cae4c311d5662de81263eadfad4838d331b275a8dfec7e,2024-12-30T19:36:28.193000
CVE-2021-47423,0,0,12196f2af306d0a79235a9a7ad0c2f133ac495899947bc147939c1ec99649cea,2024-12-30T19:36:10.670000
CVE-2021-47424,0,0,4189ff43dc60d9554241d2c4440ad32e804985d54f34f55be1f82bcc2cd87d99,2024-11-21T06:36:06.987000
CVE-2021-47425,0,0,e2b5aa50172001766bba9e788a9bbaed4a647c805f4b3c14b325213525f5549f,2024-11-21T06:36:07.100000
CVE-2021-47426,0,0,2989407fa517372e9bf01c80af57d6ddef49052db8615ac698619e5b677bfbb2,2024-11-21T06:36:07.227000
@ -240244,13 +240244,13 @@ CVE-2023-52809,0,0,06fb50dbad98d780f58c95c2791d1c3f12990ff40b05f531900523b7250be
CVE-2023-5281,0,0,0dde3d47be17b2e8c89e29d997d88d34ff2d1fb77efff2971add322c1411cd86,2024-11-21T08:41:26.610000
CVE-2023-52810,0,0,033e202b1b964254c835a600951f39154677f181fd64fb65ba86c78b507462ab,2024-11-21T08:40:38.193000
CVE-2023-52811,0,0,6fdf1ae36bbdb81962026ac9ebba5264232faf33780b5e5f3c66be7583e2123c,2024-11-21T08:40:38.407000
CVE-2023-52812,0,1,29ae65b672d446eaba78c5d133c587913587b8743f8010a5f01fbaedd5e1c51a,2024-12-30T20:09:10.617000
CVE-2023-52812,0,0,29ae65b672d446eaba78c5d133c587913587b8743f8010a5f01fbaedd5e1c51a,2024-12-30T20:09:10.617000
CVE-2023-52813,0,0,8bb52da0dbdd61653b93b1afd030ae1f5a08c060ed89db967b31f8f0a0970c37,2024-11-21T08:40:38.687000
CVE-2023-52814,0,0,830f385e469f6ffe6e68841284fe631ce857af0bbb2762e1d231569f00870fc8,2024-11-21T08:40:38.810000
CVE-2023-52815,0,0,eba5e163497404c554cd332b709abdb9a171e906ea3b7ec2abe2060b2f441f9b,2024-11-21T08:40:39.020000
CVE-2023-52816,0,0,9a0a74d8664865f0e0bb0f116931b35d5d03409bf5c25f7a6061234fd638f707,2024-11-21T08:40:39.150000
CVE-2023-52817,0,0,b5060cef143e775e53bbfdee136aa7f53eaa21f086cca6ff62fdbcd7b7ff64a7,2024-11-21T08:40:39.267000
CVE-2023-52818,0,1,8d862ce39250d59b027ef9571ebf92c690255c750be947bdfdada81197754ff0,2024-12-30T20:08:57.877000
CVE-2023-52818,0,0,8d862ce39250d59b027ef9571ebf92c690255c750be947bdfdada81197754ff0,2024-12-30T20:08:57.877000
CVE-2023-52819,0,0,48cddf6448d32c2a1ec97c9c5728d4b7bb305534785e1ac963cb6a5f64346f51,2024-11-21T08:40:39.620000
CVE-2023-5282,0,0,f07e37baff0e63cc749ec7f71e21860f35e668717bdaaacfad36980ef0fc48b2,2024-11-21T08:41:26.737000
CVE-2023-52820,0,0,7b049c5fb4ec6057c00414a07ea263a069fc43603dbf16ccc3b91309982944d6,2024-05-24T16:15:09.313000
@ -240259,7 +240259,7 @@ CVE-2023-52822,0,0,54640bd0e26163fd48ceee5b222b2b51878103ab2e09d2e9082e078e10e4f
CVE-2023-52823,0,0,365706db1426da8a360d5c4a5d6e4e80add016a67d8a72c25123ad52152b123d,2024-05-24T11:15:09.367000
CVE-2023-52824,0,0,58849bdf8b7c9d9f7a6f0f83e4cf0467639c25e06971d60aecad6c886ee28255,2024-05-24T16:15:09.777000
CVE-2023-52825,0,0,e7b7702f2cc7ed84bf0e0f9f8e3877f1b1c0e191fbf2064a0fb697b01f131a2c,2024-11-21T08:40:39.997000
CVE-2023-52826,0,1,93c3777132f6f809db8434b53ccec4473148479dd75f9b54635ec0f454099ac8,2024-12-30T20:08:33.040000
CVE-2023-52826,0,0,93c3777132f6f809db8434b53ccec4473148479dd75f9b54635ec0f454099ac8,2024-12-30T20:08:33.040000
CVE-2023-52827,0,0,d47b608f5ab430a0594861c22553453691e94d4b3b3045af43ae10820dc28549,2024-11-21T08:40:40.303000
CVE-2023-52828,0,0,5f2dd0feef02aa3514ddb029f4a2a290346e0237ddb1f2f0873fdf7b02d9ebc4,2024-11-21T08:40:40.430000
CVE-2023-52829,0,0,411a0ce7532cfe1210c0999ae4b6a679f98c4d1ae9f3d811a60990427b0bad12,2024-12-04T21:15:20.377000
@ -240284,11 +240284,11 @@ CVE-2023-52845,0,0,bcb26e737dc4f3baf2d24ecd49e9efae880cfdcf8864ebe288815eafff3e8
CVE-2023-52846,0,0,01c42a6b8e7be25d575b319f42737d3ecdca641a56e94f022df4a7164eb6f02c,2024-11-21T08:40:42.700000
CVE-2023-52847,0,0,6304dbc304f676ebb867c7a55ce40656720c1406d9bed9bac29a8b368f29bd19,2024-11-21T08:40:42.820000
CVE-2023-52848,0,0,b83baba516532b1010d7c66d73abfe92a1b9c878ad414616a7feb31a5f084310,2024-11-21T08:40:42.947000
CVE-2023-52849,0,1,f6ddd31d6e2b7b97c260676cfb8b85b07561190bd66bad001b32fe754a29cfca,2024-12-30T20:09:41.537000
CVE-2023-52849,0,0,f6ddd31d6e2b7b97c260676cfb8b85b07561190bd66bad001b32fe754a29cfca,2024-12-30T20:09:41.537000
CVE-2023-5285,0,0,8e1cd37b97e33f0f0685b14f4312036f59f160d705ec149a6ef0ac0f38fce8bc,2024-11-21T08:41:27.130000
CVE-2023-52850,0,1,b48747e9fef3d05f3a3f87733c20b6b6c87bf8863b4830cf8b2416b04cab3e39,2024-12-30T20:09:31.393000
CVE-2023-52850,0,0,b48747e9fef3d05f3a3f87733c20b6b6c87bf8863b4830cf8b2416b04cab3e39,2024-12-30T20:09:31.393000
CVE-2023-52851,0,0,31bace3bc49e77cdc3e77d0890b11d567f07b4d68474bfec4e20aab64829efd4,2024-11-21T08:40:43.290000
CVE-2023-52852,0,1,56c0e6b2ce3e3baf070288075905fde5a1f96329a996ea3ff2ad9456eb26c5f5,2024-12-30T20:09:19.563000
CVE-2023-52852,0,0,56c0e6b2ce3e3baf070288075905fde5a1f96329a996ea3ff2ad9456eb26c5f5,2024-12-30T20:09:19.563000
CVE-2023-52853,0,0,32c4f67493ddd24d490332b3435324973b5881d501d41ef50aa43506d33b569d,2024-11-21T08:40:43.527000
CVE-2023-52854,0,0,9f48ddf6cf641b50de9ded856ef6355837062d853a3b3d9d622b9fb3fb40325c,2024-11-21T08:40:43.647000
CVE-2023-52855,0,0,fefd8691b2ed782148f182e3b7ecd154c88289d5d9aed5fb9541a88d6e6f2d63,2024-11-21T08:40:43.770000
@ -244676,7 +244676,9 @@ CVE-2024-11940,0,0,01a3f490196796516894d51522c528bc6c3ce1fe45bff9fda5a3ce37bc326
CVE-2024-11941,0,0,45c946faed9eb1ec18b9452e07479f063cfb793c63899cab9a102bedb1be5328,2024-12-05T16:15:23.893000
CVE-2024-11942,0,0,55526aafa6b479f8732b6654f613495eb95fa16f8129024967b3914532d074f0,2024-12-05T16:15:24.033000
CVE-2024-11943,0,0,5db2b5cec073953e68197fa73fddd59bb82bf096d7a8174dee13bdb32f9486e1,2024-12-07T02:15:18.393000
CVE-2024-11944,1,1,b634172a3925b100e35875fcdb68c272c3b5ca712036d9b14bc3c274d75de098,2024-12-30T21:15:05.493000
CVE-2024-11945,0,0,d5529e16b2c34f9b5e6b9ddc5a03f73ebf6c118ac10e072ab626561b83cdfe71,2024-12-10T10:15:04.810000
CVE-2024-11946,1,1,9bb9e62cef0f7be1b4ba198de6929920aa5b1c620ccfeccadc62834476767120,2024-12-30T21:15:05.920000
CVE-2024-11947,0,0,76594c096f66db4264ce24827f38ddba1b904bd8285bdd79729a6ff69e4900e9,2024-12-13T19:33:07.497000
CVE-2024-11948,0,0,63c29d57ca2d54a9012c75c22d15bb5abf864d6477c7fa55fde21714e103ae6a,2024-12-13T19:32:21.150000
CVE-2024-11949,0,0,8c8ca0b9d255f5a6445ed2a115142b5d13432f7081db7ee9affe350ed098a50e,2024-12-13T19:28:30.873000
@ -245096,6 +245098,9 @@ CVE-2024-12744,0,0,db2cef6174f0f203336fd1a602951ac160bef125d0730a8230a23f49ec8a8
CVE-2024-12745,0,0,d39132eefd07723f30fb227ef12fb8aaf3a83b250d0f3b28d89ab1e076f94541,2024-12-26T15:15:06.527000
CVE-2024-12746,0,0,df5c191123ddac7611e41b52ec167446638f37d1f7bfb5919f7163608ca92308,2024-12-26T15:15:06.650000
CVE-2024-1275,0,0,55e303d499b7cd70146b064f11442ebd0ad45cafbb26b305d69871c04faa255a,2024-11-21T08:50:12.913000
CVE-2024-12751,1,1,c021fa6050fdcc7d460a13e6fbbdc375489db9f83ffb1d4962a94fd17a310ee0,2024-12-30T21:15:06.130000
CVE-2024-12752,1,1,aceb91b13a48ab0b91f2671dfccf956bcd438f2d51f93df4dee52b510998e9fe,2024-12-30T21:15:06.260000
CVE-2024-12753,1,1,e4ba0db71191a4ffaab183a2c11034bf6d7abf0b7b96de04fec1007267c8b1fd,2024-12-30T21:15:06.400000
CVE-2024-12754,0,0,cc49a740b9b02282be04809e0ec9e9f9181e846c2c42209dd24ca5d17558bc72,2024-12-30T17:15:07.127000
CVE-2024-1276,0,0,342e07ea1475f57185158b84be14279572eebbc1b91e4c07c491730599e6701d,2024-11-21T08:50:13.050000
CVE-2024-1277,0,0,fdccc6e1d66b4b759fea691d8a9a7ad4f8cc0afd5b2fb224e654b3bd9de12942,2024-11-21T08:50:13.170000
@ -245255,9 +245260,9 @@ CVE-2024-13015,0,0,3dcd014dbef30b2e70ec20ccecdaaf615115de618369fe62c340a42e4d8d8
CVE-2024-13016,0,0,b67ea70e64cef9d4f2f5d631157f934916ce9c950363c714e96ab8c161eaacc5,2024-12-29T16:15:05.300000
CVE-2024-13017,0,0,406d1ed5cbe2575a1a54010aafe73d57848810b7f6f5e6c2e0a9b1cec549270f,2024-12-29T17:15:05.873000
CVE-2024-13018,0,0,083b5e4e2fa86246983f0fd476b84784f9dac25dcba6ed963c92124634ebb897,2024-12-29T18:15:05.027000
CVE-2024-13019,0,1,72a1973cf4f4a77621dcfa6c2ee34bdcf9f28c12b7f488cb496979d278302450,2024-12-30T19:15:06.847000
CVE-2024-13019,0,0,72a1973cf4f4a77621dcfa6c2ee34bdcf9f28c12b7f488cb496979d278302450,2024-12-30T19:15:06.847000
CVE-2024-1302,0,0,50e21539c22b43b4db748f33a4680786d0cd3b39c9a7a5fc858bc75c33660782,2024-11-21T08:50:16.467000
CVE-2024-13020,0,1,59c12b2192e99fc7791f2432b5fbc4c1305151c3f5328f38436d2f225c41c63a,2024-12-30T19:15:07.537000
CVE-2024-13020,0,0,59c12b2192e99fc7791f2432b5fbc4c1305151c3f5328f38436d2f225c41c63a,2024-12-30T19:15:07.537000
CVE-2024-13021,0,0,db94a67fd5023220dfcd097aa849d00631aaccd25e2ab01bcc8f620ec54fee4a,2024-12-30T18:15:08.877000
CVE-2024-13022,0,0,31946f46234a2f885529fc55fb9df522feaa7112e2244bd255db91f99134c814,2024-12-29T20:15:05.980000
CVE-2024-13023,0,0,a6002ae756a126843e0244f11dec8062c69ff459b14d4771d8dead00e17d6b47,2024-12-29T21:15:06.020000
@ -245277,7 +245282,18 @@ CVE-2024-13037,0,0,ad1a2687fd8ca034a4ba7eb450dd7b7cb6ce76af79e47f53a4dcc006981f2
CVE-2024-13038,0,0,4583c4724ce1695329d04a091cf334038675ae1fc4b89e1e9c52332e7b115d63,2024-12-30T17:15:08.473000
CVE-2024-13039,0,0,5fcf5529e0f60e939c342e8ff9bcb8e9371ea109f210669df3b0c791fd94ef0a,2024-12-30T17:15:08.597000
CVE-2024-1304,0,0,7f3d377d10786bd7b29e3437adfa1f791151a43db698785def3901d685804d14,2024-11-21T08:50:16.717000
CVE-2024-13042,1,1,79d3038a3776ed8900f4502faeed80d95c375db4f2c3ae792b7f1b6168d6c4e8,2024-12-30T21:15:06.523000
CVE-2024-13043,1,1,a57d8becfe9ca92a82190ea64963a694c6040f83cb00135ce055f57002bf8d4c,2024-12-30T21:15:06.713000
CVE-2024-13044,1,1,6d3c3cdcc975fb5586b26099e393540139d286d458e4c5db4ccad7a86d240708,2024-12-30T21:15:06.840000
CVE-2024-13045,1,1,b32d594c46ea0f4c48c42384ee94c921a68ba0cc53643756bb2b38fcd53b620a,2024-12-30T21:15:06.963000
CVE-2024-13046,1,1,c23d299c3b59ae6bc264c7b5c5d03889b2a4f3b7dfc1a98cde8f678439be865b,2024-12-30T21:15:07.097000
CVE-2024-13047,1,1,dc7aafd74287433931ab2a00582ad328a0bfc903e0fe51d5645e7afe6ca004bd,2024-12-30T21:15:07.220000
CVE-2024-13048,1,1,67adbf23fa9118f8304c09b8b6e3ff63b96c91828b41fba5df352ed6981833f4,2024-12-30T21:15:07.347000
CVE-2024-13049,1,1,f591721723d514d93b81ea9ce6a3f8016e8d2fa1c15ed626bcbaa083ac3ec9cd,2024-12-30T21:15:07.470000
CVE-2024-1305,0,0,61bd2e20ff0aa394ece1e84d5d848dafdcba1e6f1c6375393ac194bd0f52a153,2024-11-21T08:50:16.840000
CVE-2024-13050,1,1,84109de165147e4a5232ee1fdc9c6d22162f7758c34e8757df3c209c53af5194,2024-12-30T21:15:07.593000
CVE-2024-13051,1,1,1be1ae94a61dba469e5e49f0e3a210eb507d631c9c82589acffd3c63211509af,2024-12-30T21:15:07.717000
CVE-2024-13058,1,1,91396049ed5baf4a6f156f57d5990485463c9e52e997b4c7fdc31249002c7bf7,2024-12-30T22:15:05.957000
CVE-2024-1306,0,0,0542247252f536db3d3f5f372f6b06cf8f9322e7de2b3d2f5040c13d3f80547b,2024-11-21T08:50:17.053000
CVE-2024-1307,0,0,791d403fd6ce043b636953425f5891ef42986249387c4cd3003ec2c058fbc715,2024-11-21T08:50:17.233000
CVE-2024-1308,0,0,b2bb733c7402260f9ace902e9d676967e691f690d52b513a8afbdef713b7d4c5,2024-11-21T08:50:17.413000
@ -257933,12 +257949,12 @@ CVE-2024-35899,0,0,11a2b23cf941f9839b39efc317ac13f10c84ba39dab1cd8d40a7557ebbc83
CVE-2024-3590,0,0,d22476fa387864e078186d0e7523ee0ad7036681a9b2a59859776de3e93311e6,2024-11-21T09:29:56.237000
CVE-2024-35900,0,0,50e870acb72fb71c84dc7dff1cb78cd820e12556e9b4f3f5b0b8691544c6253e,2024-11-21T09:21:09.730000
CVE-2024-35901,0,0,cd3edf70ee28e7cbd408545a03be56c550e1844b8b07be05abd5f15de057a4a1,2024-11-21T09:21:09.867000
CVE-2024-35902,0,1,d96a0ab7e74ae781082c74956ec3689f5500ab1ae77b1478881cc822cd8de55a,2024-12-30T19:47:46.853000
CVE-2024-35902,0,0,d96a0ab7e74ae781082c74956ec3689f5500ab1ae77b1478881cc822cd8de55a,2024-12-30T19:47:46.853000
CVE-2024-35903,0,0,b0a58707169cb46f406dc8821e52458e0f21e86329172db70bd8d6d3fc236b53,2024-11-21T09:21:10.117000
CVE-2024-35904,0,0,6a8a43a00a33be7e600d0f99425837d586e2af006bd244b99f0bb205e27e9e6d,2024-11-21T09:21:10.303000
CVE-2024-35905,0,1,2e853f5ed500836fa8d6b9061945a68ee5b2669edf25898295696baf9e37a1f0,2024-12-30T19:47:30.700000
CVE-2024-35905,0,0,2e853f5ed500836fa8d6b9061945a68ee5b2669edf25898295696baf9e37a1f0,2024-12-30T19:47:30.700000
CVE-2024-35906,0,0,70641f3710ab7a414753b1ae812647e2cbc2c61278b599a8ddd224db78108501,2024-05-23T14:15:10.010000
CVE-2024-35907,0,1,dc58b910ee9f37226f3c1c8277b48e81a4767166656743ae592d874b9cfc4a3b,2024-12-30T19:35:53.437000
CVE-2024-35907,0,0,dc58b910ee9f37226f3c1c8277b48e81a4767166656743ae592d874b9cfc4a3b,2024-12-30T19:35:53.437000
CVE-2024-35908,0,0,9a3127fc2dcc56fa3ef0510f5888d8233de37b1948ac31e2d9fa490a31721ab0,2024-11-21T09:21:10.690000
CVE-2024-35909,0,0,554c220395a9f5a1375258e018f8ed986d0caa4f773d6b01782597a19e34fda4,2024-11-21T09:21:10.813000
CVE-2024-3591,0,0,e422baa207375a68d2a2fad897f062ac1001b3182aef2bc5608dbc800290852d,2024-11-21T09:29:56.423000
@ -257954,20 +257970,20 @@ CVE-2024-35918,0,0,b84a4a8eaff0e9aa0772539706471f0485db8b7ae1e504faf03291dd1bedb
CVE-2024-35919,0,0,e631246407300ae6e30d83cedcbee4935288a2744219786e10d196588f3f5df9,2024-11-21T09:21:12.250000
CVE-2024-3592,0,0,ff5147fd52698b783751119964844ea2247003cb656728005bbdc75700fd6e1d,2024-11-21T09:29:56.610000
CVE-2024-35920,0,0,d5937bd2774497f79326452f53ec5c30b02bc25bf82e6f9690d0e6395feac28d,2024-11-21T09:21:12.443000
CVE-2024-35921,0,1,4526cc1ba7186dbcecaca88016f42ddd8138d3cd50124e674014b54b22fb74d3,2024-12-30T19:35:04.897000
CVE-2024-35922,0,1,0c88e554ffaa341ceefcaf9be80ad5df621b046da9f94425d0c621a8e53f1e17,2024-12-30T19:27:42.720000
CVE-2024-35921,0,0,4526cc1ba7186dbcecaca88016f42ddd8138d3cd50124e674014b54b22fb74d3,2024-12-30T19:35:04.897000
CVE-2024-35922,0,0,0c88e554ffaa341ceefcaf9be80ad5df621b046da9f94425d0c621a8e53f1e17,2024-12-30T19:27:42.720000
CVE-2024-35923,0,0,e200bbefa4260a7322c5705e6c101e370170f714b6cca2259ba31c94a243aae4,2024-05-25T14:15:53.013000
CVE-2024-35924,0,0,51a8e81a5087f6b00f86aef3df30b13903521527bd7c24804424b3f4f88b017b,2024-11-21T09:21:12.833000
CVE-2024-35925,0,0,527fefad4777ff7cb6251a7bffe472b80d43edd30c48c261e4833904b72dcd03,2024-11-21T09:21:12.953000
CVE-2024-35926,0,0,c1b13d208fac57fe78f6933a263aa2f330043107ad1ad5de4da551ecec504628,2024-11-21T09:21:13.097000
CVE-2024-35927,0,0,278ce2f015c27adcc7ff8c3c6be22b3e8c5bb291856afb164b072d0d8d61b636,2024-11-21T09:21:13.223000
CVE-2024-35928,0,0,1c31dc8c665b8952880067e761bee324da2eee6fa320ed892680e88b3dd7b63e,2024-12-19T12:15:06.590000
CVE-2024-35929,0,1,7da540c66ffc823238b17395ecbf47d1012e0cd64e229ac26e5cc7bd9ae7f5a8,2024-12-30T19:56:30.927000
CVE-2024-35929,0,0,7da540c66ffc823238b17395ecbf47d1012e0cd64e229ac26e5cc7bd9ae7f5a8,2024-12-30T19:56:30.927000
CVE-2024-3593,0,0,7dfe1a06ca99b709e0966f80e5fa7243762a8725a5825da6ebc20a944f2ce167,2024-11-21T09:29:56.757000
CVE-2024-35930,0,1,5013df0e99717b1ece542581ca441e3bc2ac723ea4bcaf3c94a778bd9158d242,2024-12-30T19:52:55.313000
CVE-2024-35930,0,0,5013df0e99717b1ece542581ca441e3bc2ac723ea4bcaf3c94a778bd9158d242,2024-12-30T19:52:55.313000
CVE-2024-35931,0,0,82567fcbead3c5129937032b3ec99d3e2b49554c36aa4a0599fa7a1399168c13,2024-11-21T09:21:13.837000
CVE-2024-35932,0,0,793922418147ab2c922ff7f32e99bfc27b35844d6861bc041d1cc83782b09a20,2024-11-21T09:21:13.957000
CVE-2024-35933,0,1,0325908b6390f4a1c9c15094b5dc41c2e597d6d95f2ad6932f319d5dab89c0d2,2024-12-30T19:51:27.687000
CVE-2024-35933,0,0,0325908b6390f4a1c9c15094b5dc41c2e597d6d95f2ad6932f319d5dab89c0d2,2024-12-30T19:51:27.687000
CVE-2024-35934,0,0,361be744c073c07234d0642797a28f51b9670336f6d7218b1ba2a8dcda01d171,2024-11-21T09:21:14.217000
CVE-2024-35935,0,0,082a285269746fc3fb873203b6e873841d4b83b7804fa4f36094730041c93f93,2024-11-21T09:21:14.350000
CVE-2024-35936,0,0,c01c5dac7b5e0bd9601007610c8046f83929460d70171551603976f6ee883491,2024-11-21T09:21:14.507000
@ -257996,7 +258012,7 @@ CVE-2024-35956,0,0,a2df20ee828a684480220f597be9391b4a50d33880f1470bf6aeca6acac4f
CVE-2024-35957,0,0,63f1ef216f981899f739038c72e590e5dc7a92a6cab95efc5de09be8bad6816d,2024-11-21T09:21:17.513000
CVE-2024-35958,0,0,dea59fdb3b17c08467afba7fa0588c1d2e5cd5eb65fea4ada743f1bfb3c216a3,2024-11-21T09:21:17.707000
CVE-2024-35959,0,0,53f6e1bb6d9d49084925276b5c45c193850da3a7ac9cb385334abc5f14e36dbd,2024-11-21T09:21:17.913000
CVE-2024-3596,0,1,a73be4dbd1ba2f2be100ff8602358c44e097c68e335a7e6fccfaec4ec8e338cc,2024-12-30T19:23:20.437000
CVE-2024-3596,0,0,a73be4dbd1ba2f2be100ff8602358c44e097c68e335a7e6fccfaec4ec8e338cc,2024-12-30T19:23:20.437000
CVE-2024-35960,0,0,85a643c1126146028b0f246face42ec63a48e10da60dacaff32d51eebc9fc072,2024-11-21T09:21:18.037000
CVE-2024-35961,0,0,d8bede3118f3213f6531e3d4764ee351899ee3c652f6f84602e33285303dd68f,2024-11-21T09:21:18.270000
CVE-2024-35962,0,0,f360f85bc8ef52af04a2c558b97f52575478fb0db43fb8c16bc09d6f51c8dcff,2024-11-21T09:21:18.400000
@ -271521,10 +271537,10 @@ CVE-2024-5676,0,0,42e21ca7cdab0bdccf25cf6637d45fef7f036494b6d014c88b5835e6e48473
CVE-2024-5677,0,0,1c94c489b32a2f3740f8b8867e0aff380d1e56445098bb97785a4bdba0037977,2024-11-21T09:48:08.540000
CVE-2024-5678,0,0,bb4133b16eab99226f567cd512e0bec4d1a7175fc845cb5a8a3e18dcdbfd75d7,2024-08-15T18:05:54.847000
CVE-2024-5679,0,0,dc654eef86d673e662acc6dfc1ecb27b2f541880d76227d1d93861f825adc641,2024-11-21T09:48:08.710000
CVE-2024-56799,1,1,0dd8de9f29ee83d8d3d1718949c04ffed21addd8ed96891a089cf418021b9018,2024-12-30T19:15:08.160000
CVE-2024-56799,0,0,0dd8de9f29ee83d8d3d1718949c04ffed21addd8ed96891a089cf418021b9018,2024-12-30T19:15:08.160000
CVE-2024-5680,0,0,926c5c2f45d297ec0fa81be8768753266fc85d73f972d4984111118e8fceffa2,2024-11-21T09:48:08.837000
CVE-2024-56800,1,1,2d9ccaf12da8a18d45c48258f139cc5fdee9e79e0e5d7096bfd7de919c9c0c9a,2024-12-30T19:15:08.333000
CVE-2024-56801,1,1,ceaecdb1b2443408b3d440c831110179f2ea438cecab41e9ec9b39e4392684c3,2024-12-30T19:15:08.483000
CVE-2024-56800,0,0,2d9ccaf12da8a18d45c48258f139cc5fdee9e79e0e5d7096bfd7de919c9c0c9a,2024-12-30T19:15:08.333000
CVE-2024-56801,0,0,ceaecdb1b2443408b3d440c831110179f2ea438cecab41e9ec9b39e4392684c3,2024-12-30T19:15:08.483000
CVE-2024-5681,0,0,25a463be80d3bb29af40554a62ba0e4276aefee689d98e36dee0bcfe769073f6,2024-11-21T09:48:08.953000
CVE-2024-5682,0,0,61babb4b22790f05b1e6fb044157f817a85668af929c91e823c0d3ae99b2f335,2024-09-20T12:30:51.220000
CVE-2024-5683,0,0,881352e7cddbf9570cae104e43894ad6185c01dcb07cd1be33b2f8fea4b1c33b,2024-11-21T09:48:09.327000

Can't render this file because it is too large.