diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11944.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11944.json new file mode 100644 index 00000000000..c33e6a24769 --- /dev/null +++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11944.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-11944", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2024-12-30T21:15:05.493", + "lastModified": "2024-12-30T21:15:05.493", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "iXsystems TrueNAS CORE tarfile.extractall Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of iXsystems TrueNAS devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the tarfile.extractall method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-25626." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://www.truenas.com/docs/core/13.0/gettingstarted/corereleasenotes/#130-u63", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1643/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11946.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11946.json new file mode 100644 index 00000000000..c628ad69329 --- /dev/null +++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11946.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-11946", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2024-12-30T21:15:05.920", + "lastModified": "2024-12-30T21:15:05.920", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "iXsystems TrueNAS CORE fetch_plugin_packagesites tar Cleartext Transmission of Sensitive Information Vulnerability. This vulnerability allows network-adjacent attackers to tamper with firmware update files on affected installations of iXsystems TrueNAS devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of firmware updates. The issue results from the use of an insecure protocol to deliver updates. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-25668." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 3.1, + "baseSeverity": "LOW", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], + "references": [ + { + "url": "https://www.truenas.com/docs/core/13.0/gettingstarted/corereleasenotes/#130-u63", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1644/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12751.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12751.json new file mode 100644 index 00000000000..5875f0cbba0 --- /dev/null +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12751.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-12751", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2024-12-30T21:15:06.130", + "lastModified": "2024-12-30T21:15:06.130", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Foxit PDF Reader AcroForm Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of AcroForms. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25344." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://www.foxit.com/support/security-bulletins.html", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1737/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12752.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12752.json new file mode 100644 index 00000000000..8fe418583a4 --- /dev/null +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12752.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-12752", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2024-12-30T21:15:06.260", + "lastModified": "2024-12-30T21:15:06.260", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Foxit PDF Reader AcroForm Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of AcroForms. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25345." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://www.foxit.com/support/security-bulletins.html", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1738/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12753.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12753.json new file mode 100644 index 00000000000..d8fe2ba8c1f --- /dev/null +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12753.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-12753", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2024-12-30T21:15:06.400", + "lastModified": "2024-12-30T21:15:06.400", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Foxit PDF Reader Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Foxit PDF Reader. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the product installer. By creating a junction, an attacker can abuse the installer process to create an arbitrary file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-25408." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://www.foxit.com/support/security-bulletins.html", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1739/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13042.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13042.json new file mode 100644 index 00000000000..42dd22fa133 --- /dev/null +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13042.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2024-13042", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-30T21:15:06.523", + "lastModified": "2024-12-30T21:15:06.523", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Tsinghua Unigroup Electronic Archives Management System 3.2.210802(62532). It has been classified as problematic. Affected is the function download of the file SubjectController.class.php. The manipulation of the argument path leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + }, + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/BxYQ/zg_fileread", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/BxYQ/zg_fileread/blob/main/poc.py", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.289788", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.289788", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.472068", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13043.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13043.json new file mode 100644 index 00000000000..1709b258a9d --- /dev/null +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13043.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-13043", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2024-12-30T21:15:06.713", + "lastModified": "2024-12-30T21:15:06.713", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Panda Security Dome Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Panda Security Dome. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the Hotspot Shield. By creating a junction, an attacker can abuse the application to delete arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-23478." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1727/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13044.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13044.json new file mode 100644 index 00000000000..f66608581e0 --- /dev/null +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13044.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-13044", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2024-12-30T21:15:06.840", + "lastModified": "2024-12-30T21:15:06.840", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Ashlar-Vellum Cobalt AR File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of AR files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24870." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1728/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13045.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13045.json new file mode 100644 index 00000000000..704908c8e5d --- /dev/null +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13045.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-13045", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2024-12-30T21:15:06.963", + "lastModified": "2024-12-30T21:15:06.963", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Ashlar-Vellum Cobalt AR File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of AR files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24848." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1729/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13046.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13046.json new file mode 100644 index 00000000000..44120f0bbea --- /dev/null +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13046.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-13046", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2024-12-30T21:15:07.097", + "lastModified": "2024-12-30T21:15:07.097", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Ashlar-Vellum Cobalt CO File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of CO files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24867." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1730/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13047.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13047.json new file mode 100644 index 00000000000..527d175cd86 --- /dev/null +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13047.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-13047", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2024-12-30T21:15:07.220", + "lastModified": "2024-12-30T21:15:07.220", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Ashlar-Vellum Cobalt CO File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of CO files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24843." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], + "references": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1731/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13048.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13048.json new file mode 100644 index 00000000000..242850fffc6 --- /dev/null +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13048.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-13048", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2024-12-30T21:15:07.347", + "lastModified": "2024-12-30T21:15:07.347", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Ashlar-Vellum Cobalt XE File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of XE files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24844." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1732/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13049.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13049.json new file mode 100644 index 00000000000..c365260e27e --- /dev/null +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13049.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-13049", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2024-12-30T21:15:07.470", + "lastModified": "2024-12-30T21:15:07.470", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Ashlar-Vellum Cobalt XE File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of XE files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24847." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], + "references": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1733/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13050.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13050.json new file mode 100644 index 00000000000..29e1d4ab755 --- /dev/null +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13050.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-13050", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2024-12-30T21:15:07.593", + "lastModified": "2024-12-30T21:15:07.593", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Ashlar-Vellum Graphite VC6 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Graphite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of VC6 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24976." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1734/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13051.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13051.json new file mode 100644 index 00000000000..6130fb88a12 --- /dev/null +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13051.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-13051", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2024-12-30T21:15:07.717", + "lastModified": "2024-12-30T21:15:07.717", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Ashlar-Vellum Graphite VC6 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Graphite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of VC6 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24977." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1735/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13058.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13058.json new file mode 100644 index 00000000000..545c9ac2a75 --- /dev/null +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13058.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-13058", + "sourceIdentifier": "0a72a055-908d-47f5-a16a-1f09049c16c6", + "published": "2024-12-30T22:15:05.957", + "lastModified": "2024-12-30T22:15:05.957", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue exists in SoftIron HyperCloud\n where authenticated, but non-admin users can create data pools, which could potentially impact the performance and availability of the backend software-defined storage subsystem.\n\nThis issue only impacts SoftIron HyperCloud and related software products (such as VM Squared) software versions 2.3.0 to before 2.5.0." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "0a72a055-908d-47f5-a16a-1f09049c16c6", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:U/V:D/RE:M/U:Green", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NEGLIGIBLE", + "automatable": "YES", + "recovery": "USER", + "valueDensity": "DIFFUSE", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "GREEN" + } + } + ] + }, + "weaknesses": [ + { + "source": "0a72a055-908d-47f5-a16a-1f09049c16c6", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + }, + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://advisories.softiron.cloud/", + "source": "0a72a055-908d-47f5-a16a-1f09049c16c6" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 67ac3f1d79c..1b246fd4ebb 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-30T21:00:20.105512+00:00 +2024-12-30T23:00:20.050896+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-30T20:09:41.537000+00:00 +2024-12-30T22:15:05.957000+00:00 ``` ### Last Data Feed Release @@ -33,47 +33,35 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -275186 +275202 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `16` -- [CVE-2024-56799](CVE-2024/CVE-2024-567xx/CVE-2024-56799.json) (`2024-12-30T19:15:08.160`) -- [CVE-2024-56800](CVE-2024/CVE-2024-568xx/CVE-2024-56800.json) (`2024-12-30T19:15:08.333`) -- [CVE-2024-56801](CVE-2024/CVE-2024-568xx/CVE-2024-56801.json) (`2024-12-30T19:15:08.483`) +- [CVE-2024-11944](CVE-2024/CVE-2024-119xx/CVE-2024-11944.json) (`2024-12-30T21:15:05.493`) +- [CVE-2024-11946](CVE-2024/CVE-2024-119xx/CVE-2024-11946.json) (`2024-12-30T21:15:05.920`) +- [CVE-2024-12751](CVE-2024/CVE-2024-127xx/CVE-2024-12751.json) (`2024-12-30T21:15:06.130`) +- [CVE-2024-12752](CVE-2024/CVE-2024-127xx/CVE-2024-12752.json) (`2024-12-30T21:15:06.260`) +- [CVE-2024-12753](CVE-2024/CVE-2024-127xx/CVE-2024-12753.json) (`2024-12-30T21:15:06.400`) +- [CVE-2024-13042](CVE-2024/CVE-2024-130xx/CVE-2024-13042.json) (`2024-12-30T21:15:06.523`) +- [CVE-2024-13043](CVE-2024/CVE-2024-130xx/CVE-2024-13043.json) (`2024-12-30T21:15:06.713`) +- [CVE-2024-13044](CVE-2024/CVE-2024-130xx/CVE-2024-13044.json) (`2024-12-30T21:15:06.840`) +- [CVE-2024-13045](CVE-2024/CVE-2024-130xx/CVE-2024-13045.json) (`2024-12-30T21:15:06.963`) +- [CVE-2024-13046](CVE-2024/CVE-2024-130xx/CVE-2024-13046.json) (`2024-12-30T21:15:07.097`) +- [CVE-2024-13047](CVE-2024/CVE-2024-130xx/CVE-2024-13047.json) (`2024-12-30T21:15:07.220`) +- [CVE-2024-13048](CVE-2024/CVE-2024-130xx/CVE-2024-13048.json) (`2024-12-30T21:15:07.347`) +- [CVE-2024-13049](CVE-2024/CVE-2024-130xx/CVE-2024-13049.json) (`2024-12-30T21:15:07.470`) +- [CVE-2024-13050](CVE-2024/CVE-2024-130xx/CVE-2024-13050.json) (`2024-12-30T21:15:07.593`) +- [CVE-2024-13051](CVE-2024/CVE-2024-130xx/CVE-2024-13051.json) (`2024-12-30T21:15:07.717`) +- [CVE-2024-13058](CVE-2024/CVE-2024-130xx/CVE-2024-13058.json) (`2024-12-30T22:15:05.957`) ### CVEs modified in the last Commit -Recently modified CVEs: `35` +Recently modified CVEs: `0` -- [CVE-2021-47254](CVE-2021/CVE-2021-472xx/CVE-2021-47254.json) (`2024-12-30T19:50:58.543`) -- [CVE-2021-47388](CVE-2021/CVE-2021-473xx/CVE-2021-47388.json) (`2024-12-30T20:05:07.740`) -- [CVE-2021-47390](CVE-2021/CVE-2021-473xx/CVE-2021-47390.json) (`2024-12-30T20:01:12.947`) -- [CVE-2021-47409](CVE-2021/CVE-2021-474xx/CVE-2021-47409.json) (`2024-12-30T20:00:41.677`) -- [CVE-2021-47413](CVE-2021/CVE-2021-474xx/CVE-2021-47413.json) (`2024-12-30T20:00:33.497`) -- [CVE-2021-47420](CVE-2021/CVE-2021-474xx/CVE-2021-47420.json) (`2024-12-30T19:37:04.973`) -- [CVE-2021-47422](CVE-2021/CVE-2021-474xx/CVE-2021-47422.json) (`2024-12-30T19:36:28.193`) -- [CVE-2021-47423](CVE-2021/CVE-2021-474xx/CVE-2021-47423.json) (`2024-12-30T19:36:10.670`) -- [CVE-2023-52812](CVE-2023/CVE-2023-528xx/CVE-2023-52812.json) (`2024-12-30T20:09:10.617`) -- [CVE-2023-52818](CVE-2023/CVE-2023-528xx/CVE-2023-52818.json) (`2024-12-30T20:08:57.877`) -- [CVE-2023-52826](CVE-2023/CVE-2023-528xx/CVE-2023-52826.json) (`2024-12-30T20:08:33.040`) -- [CVE-2023-52849](CVE-2023/CVE-2023-528xx/CVE-2023-52849.json) (`2024-12-30T20:09:41.537`) -- [CVE-2023-52850](CVE-2023/CVE-2023-528xx/CVE-2023-52850.json) (`2024-12-30T20:09:31.393`) -- [CVE-2023-52852](CVE-2023/CVE-2023-528xx/CVE-2023-52852.json) (`2024-12-30T20:09:19.563`) -- [CVE-2024-13019](CVE-2024/CVE-2024-130xx/CVE-2024-13019.json) (`2024-12-30T19:15:06.847`) -- [CVE-2024-13020](CVE-2024/CVE-2024-130xx/CVE-2024-13020.json) (`2024-12-30T19:15:07.537`) -- [CVE-2024-35902](CVE-2024/CVE-2024-359xx/CVE-2024-35902.json) (`2024-12-30T19:47:46.853`) -- [CVE-2024-35905](CVE-2024/CVE-2024-359xx/CVE-2024-35905.json) (`2024-12-30T19:47:30.700`) -- [CVE-2024-35907](CVE-2024/CVE-2024-359xx/CVE-2024-35907.json) (`2024-12-30T19:35:53.437`) -- [CVE-2024-35921](CVE-2024/CVE-2024-359xx/CVE-2024-35921.json) (`2024-12-30T19:35:04.897`) -- [CVE-2024-35922](CVE-2024/CVE-2024-359xx/CVE-2024-35922.json) (`2024-12-30T19:27:42.720`) -- [CVE-2024-35929](CVE-2024/CVE-2024-359xx/CVE-2024-35929.json) (`2024-12-30T19:56:30.927`) -- [CVE-2024-35930](CVE-2024/CVE-2024-359xx/CVE-2024-35930.json) (`2024-12-30T19:52:55.313`) -- [CVE-2024-35933](CVE-2024/CVE-2024-359xx/CVE-2024-35933.json) (`2024-12-30T19:51:27.687`) -- [CVE-2024-3596](CVE-2024/CVE-2024-35xx/CVE-2024-3596.json) (`2024-12-30T19:23:20.437`) ## Download and Usage diff --git a/_state.csv b/_state.csv index eec1e1b0b24..301446d1279 100644 --- a/_state.csv +++ b/_state.csv @@ -187420,28 +187420,28 @@ CVE-2021-47229,0,0,7eaf4c4dfd8a0b01ff059e9e140d1f30b6435b38480e86920eedf73b5f29c CVE-2021-47230,0,0,9617dea962ae526cc57e3344dadddf0ce492d4dd862e205112638780de1d75fd,2024-11-21T06:35:40.480000 CVE-2021-47231,0,0,fe02362946c9b3cfaf3a64994b44f8b9d73df65115a2eb261246bd28b6bc8925,2024-11-21T06:35:40.683000 CVE-2021-47232,0,0,24ca5d35ff26d1803c655d5dd07b9040f95874dd3a1b7eb44bb77884c953b1a2,2024-11-21T06:35:40.883000 -CVE-2021-47233,0,1,49bd84981d757bdeb030b5d808f06c049b1dc1bf9565f1010d44de6f30baa449,2024-12-30T19:51:12.613000 +CVE-2021-47233,0,0,49bd84981d757bdeb030b5d808f06c049b1dc1bf9565f1010d44de6f30baa449,2024-12-30T19:51:12.613000 CVE-2021-47234,0,0,273d7ee3f66e04272422c623c3f10a6131b83f867533db8cd4feea3001cff253,2024-11-21T06:35:41.203000 -CVE-2021-47235,0,1,8b53251b18ef7a00638c8566452347f25d3f12a1756e9c95ca2b9ee9d09320d4,2024-12-30T19:06:05.170000 +CVE-2021-47235,0,0,8b53251b18ef7a00638c8566452347f25d3f12a1756e9c95ca2b9ee9d09320d4,2024-12-30T19:06:05.170000 CVE-2021-47236,0,0,b87ff6e7bbebf51be21d4b4f1bddb0b9e9f26bf1b1f348eef469192eeef1e5fe,2024-11-21T06:35:41.480000 -CVE-2021-47237,0,1,21a5b46828785b47344dfa5d33d76cb4f95f34c264877088c08c9f3183bb0375,2024-12-30T19:05:28.320000 +CVE-2021-47237,0,0,21a5b46828785b47344dfa5d33d76cb4f95f34c264877088c08c9f3183bb0375,2024-12-30T19:05:28.320000 CVE-2021-47238,0,0,b41f2250ae1e52d3fe19a4a1a3f096f7b6ff7daceb9aaf3a7950aecde0975b5e,2024-11-21T06:35:41.743000 -CVE-2021-47239,0,1,426aab874d3868aa4677b22537307b93d5214463451278a00c2a583e2a8b5c7b,2024-12-30T19:05:15.167000 -CVE-2021-47240,0,1,7d569215feef44a17dae0b0b3463f2bc32c191ad3939d0983404aab4d26d862a,2024-12-30T19:04:58.760000 +CVE-2021-47239,0,0,426aab874d3868aa4677b22537307b93d5214463451278a00c2a583e2a8b5c7b,2024-12-30T19:05:15.167000 +CVE-2021-47240,0,0,7d569215feef44a17dae0b0b3463f2bc32c191ad3939d0983404aab4d26d862a,2024-12-30T19:04:58.760000 CVE-2021-47241,0,0,a0218b63a37a83cd88010171c29ce1ae8094e5b2a4be5c22a8819de8551be48e,2024-11-21T06:35:42.163000 CVE-2021-47242,0,0,9e2ec51f01fe9a8aad67669f97a4ff925113d9d899dff1b65690d8eceeb8de62,2024-11-21T06:35:42.343000 -CVE-2021-47243,0,1,f3ce19b96978056d91cf0a2bc489aea47b0aa209106c9ae341645d6e0a65d4c0,2024-12-30T19:04:26.770000 +CVE-2021-47243,0,0,f3ce19b96978056d91cf0a2bc489aea47b0aa209106c9ae341645d6e0a65d4c0,2024-12-30T19:04:26.770000 CVE-2021-47244,0,0,ca6b3b87479e59071b8004632c8d4b6f1e9d11643d6de68216b8ad6a0872acb6,2024-11-21T06:35:42.640000 -CVE-2021-47245,0,1,4b0fd78442e693c8c9ad1c36bf34d80eb49c87d890eb02e4e5da728a0703b468,2024-12-30T19:03:58.273000 +CVE-2021-47245,0,0,4b0fd78442e693c8c9ad1c36bf34d80eb49c87d890eb02e4e5da728a0703b468,2024-12-30T19:03:58.273000 CVE-2021-47246,0,0,9f782402bd919affe114e8e45d84ed93cdf78270af91f3168742be0308c7f0f6,2024-11-21T06:35:42.950000 -CVE-2021-47247,0,1,cf90397ea9a0d803e299cc12d5f4b86d634ea5464c7c4e150ba6bab1f935c450,2024-12-30T19:03:42.583000 +CVE-2021-47247,0,0,cf90397ea9a0d803e299cc12d5f4b86d634ea5464c7c4e150ba6bab1f935c450,2024-12-30T19:03:42.583000 CVE-2021-47248,0,0,6815ade5961ff0ed77e72f0840fb9b58804880066f8794fef7922658c81186c7,2024-11-21T06:35:43.190000 -CVE-2021-47249,0,1,9df064926874e19baf591bf7503852913c51ff093c8d41822dae8720c5b2ce56,2024-12-30T19:01:43.417000 -CVE-2021-47250,0,1,3895234a4bca9fd42201e364d83eda41b7862d08052563ff8d97516234423938,2024-12-30T19:00:27.217000 +CVE-2021-47249,0,0,9df064926874e19baf591bf7503852913c51ff093c8d41822dae8720c5b2ce56,2024-12-30T19:01:43.417000 +CVE-2021-47250,0,0,3895234a4bca9fd42201e364d83eda41b7862d08052563ff8d97516234423938,2024-12-30T19:00:27.217000 CVE-2021-47251,0,0,910383b3bb8c00e34855fcda8c3ec1d6bd52252a19036ebff555cedb288a9861,2024-11-21T06:35:43.570000 CVE-2021-47252,0,0,8f2ae53195e1d344dcddbea9cafebc6f137c371b83b1765850464be0bba730c1,2024-11-21T06:35:43.683000 CVE-2021-47253,0,0,9bc677a4b5d13cd8fd06f4b9374a9aa62a3778e7b12c1d5302b8dc1a583e0856,2024-12-30T18:59:10.807000 -CVE-2021-47254,0,1,8ad5e1955743b8c3f06c84a200072a25601d6c4b3267d5b5db59a4daa0deeb02,2024-12-30T19:50:58.543000 +CVE-2021-47254,0,0,8ad5e1955743b8c3f06c84a200072a25601d6c4b3267d5b5db59a4daa0deeb02,2024-12-30T19:50:58.543000 CVE-2021-47255,0,0,ab70f22d16c8786e854f11454b2eea8afe54254c834b2d2bd6063c66081a9479,2024-11-21T06:35:44.037000 CVE-2021-47256,0,0,0f51de379b692c2d0a857a25782e52c1e5499b2d759e9b9b493c9ede6fbb425a,2024-11-21T06:35:44.143000 CVE-2021-47257,0,0,56979cfa19b4e765d1c353c91739346331d68d4f631479f694c06bdaf5dfe282,2024-11-21T06:35:44.263000 @@ -187575,9 +187575,9 @@ CVE-2021-47384,0,0,bb89862113d2a6336d33a29fcea8543dd2e3a5aaa8344e5d7c7ced6e0e1c1 CVE-2021-47385,0,0,c6a82e7a12e897338326b0272d766105a2467dab6588deae93331929ba6df3aa,2024-12-23T21:01:31.227000 CVE-2021-47386,0,0,e2c2600fd20b80e34f73e540ac913f3f01a2782eb98515ebb9fa3047ce7b2d75,2024-11-21T06:36:02.267000 CVE-2021-47387,0,0,f9abbc75a71e5f75679f53162608a51731e5b30a945f073035121479b6bfac5c,2024-11-21T06:36:02.443000 -CVE-2021-47388,0,1,5a99c0375f375933a2ee3ed84e78b90361dbfbf675205e3e3fce5b62f99bd86e,2024-12-30T20:05:07.740000 +CVE-2021-47388,0,0,5a99c0375f375933a2ee3ed84e78b90361dbfbf675205e3e3fce5b62f99bd86e,2024-12-30T20:05:07.740000 CVE-2021-47389,0,0,a22c8848716a5fab6e02d5133120c67e86b798dc6ef581a21bef1750e67cc07a,2024-11-21T06:36:02.683000 -CVE-2021-47390,0,1,76b23b24c5c2d0ae53e9c1096f39d0e46b517e03d31e39981405101939ea2a5e,2024-12-30T20:01:12.947000 +CVE-2021-47390,0,0,76b23b24c5c2d0ae53e9c1096f39d0e46b517e03d31e39981405101939ea2a5e,2024-12-30T20:01:12.947000 CVE-2021-47391,0,0,f4d175a858a736db63367addd002e1ba9b1dcfb405e34dc62cdb19aff0fd59b2,2024-11-21T06:36:02.967000 CVE-2021-47392,0,0,3f96e381be60800107bbde2dc3edea028b592fe3ad227fb19a1c81e6c3642f9c,2024-11-21T06:36:03.080000 CVE-2021-47393,0,0,cb8604c1f678df5603c14287ccd222cdf9bee87fd56ca2dc7d6971ba3d537ad9,2024-11-21T06:36:03.193000 @@ -187596,21 +187596,21 @@ CVE-2021-47405,0,0,89d57154146c49bfe9495517a8aa4581b03bbe87f488a973134e87054c50f CVE-2021-47406,0,0,29847dbf301ed41a53321d345125f661ba83b5bdb100a716152af1df0991e844,2024-11-21T06:36:04.807000 CVE-2021-47407,0,0,99d0a8ae031df6e833de865dd6448cf1a9c23ee872668167073223966e2f1959,2024-11-21T06:36:04.980000 CVE-2021-47408,0,0,1bb9de9f9fb0c138f101bdd077c488720764253896933e9ddd90af986223f012,2024-11-21T06:36:05.087000 -CVE-2021-47409,0,1,4409848935610c806a916f78420b16db2a2ab2efcb7ac8dd99c83d5249f8b960,2024-12-30T20:00:41.677000 +CVE-2021-47409,0,0,4409848935610c806a916f78420b16db2a2ab2efcb7ac8dd99c83d5249f8b960,2024-12-30T20:00:41.677000 CVE-2021-47410,0,0,4075c00f9d5ffd89b59e95e73a9e5fa86e05d5bb14ffa8d2023787fcb8cce122,2024-11-21T06:36:05.360000 CVE-2021-47411,0,0,d0414849cfb396e83266669cd4701dbb6a1022ea5a51c35023bb94eb4cfc8a37,2024-05-25T14:15:50.770000 CVE-2021-47412,0,0,af5c4c1fde936342c029e1565c710bac695bfb5efd8710ea589f197b466eba8a,2024-11-21T06:36:05.480000 -CVE-2021-47413,0,1,269d04830df035e17e52fb59428cdae6c99bbe3c5236fc44bbeb5952e9d53939,2024-12-30T20:00:33.497000 +CVE-2021-47413,0,0,269d04830df035e17e52fb59428cdae6c99bbe3c5236fc44bbeb5952e9d53939,2024-12-30T20:00:33.497000 CVE-2021-47414,0,0,a83b6ed138679e0a43562ce58d15e7d1f7e5382db9d90a7386573fd9d8fa4042,2024-11-21T06:36:05.703000 CVE-2021-47415,0,0,dc3acb10fb2f650ccb4aeb9f23bddae7fbe6e40ab8bea8780dde5bc4fdccf5e4,2024-11-21T06:36:05.823000 CVE-2021-47416,0,0,562046249992ab3df84dbdde2ab890f105644babba8615b4902e2b57236f0090,2024-11-21T06:36:05.920000 CVE-2021-47417,0,0,ef21ffbd1d0dcc69c944405c3efcd8ac7dd51ac01c5d60bc09bf913df733ed89,2024-11-21T06:36:06.070000 CVE-2021-47418,0,0,6899899fab7502122cb0d0c6605217d6cf7dea34523bfc84e2e3729ce30f6da9,2024-11-21T06:36:06.193000 CVE-2021-47419,0,0,b982e6e4a9c1837e4bd26bb12e302c41eb5725451cbe81290498c856c22cca0d,2024-11-21T06:36:06.323000 -CVE-2021-47420,0,1,00afc3432a4f0c3aee8977e415c889a3d8886055a9490eac336ef9b40a80b4d4,2024-12-30T19:37:04.973000 +CVE-2021-47420,0,0,00afc3432a4f0c3aee8977e415c889a3d8886055a9490eac336ef9b40a80b4d4,2024-12-30T19:37:04.973000 CVE-2021-47421,0,0,0a40ba093314e9e6469359d21a45f9f0d40d5425308999e0d98a4f7123360a17,2024-11-21T06:36:06.613000 -CVE-2021-47422,0,1,dc3123e6db84d59806cae4c311d5662de81263eadfad4838d331b275a8dfec7e,2024-12-30T19:36:28.193000 -CVE-2021-47423,0,1,12196f2af306d0a79235a9a7ad0c2f133ac495899947bc147939c1ec99649cea,2024-12-30T19:36:10.670000 +CVE-2021-47422,0,0,dc3123e6db84d59806cae4c311d5662de81263eadfad4838d331b275a8dfec7e,2024-12-30T19:36:28.193000 +CVE-2021-47423,0,0,12196f2af306d0a79235a9a7ad0c2f133ac495899947bc147939c1ec99649cea,2024-12-30T19:36:10.670000 CVE-2021-47424,0,0,4189ff43dc60d9554241d2c4440ad32e804985d54f34f55be1f82bcc2cd87d99,2024-11-21T06:36:06.987000 CVE-2021-47425,0,0,e2b5aa50172001766bba9e788a9bbaed4a647c805f4b3c14b325213525f5549f,2024-11-21T06:36:07.100000 CVE-2021-47426,0,0,2989407fa517372e9bf01c80af57d6ddef49052db8615ac698619e5b677bfbb2,2024-11-21T06:36:07.227000 @@ -240244,13 +240244,13 @@ CVE-2023-52809,0,0,06fb50dbad98d780f58c95c2791d1c3f12990ff40b05f531900523b7250be CVE-2023-5281,0,0,0dde3d47be17b2e8c89e29d997d88d34ff2d1fb77efff2971add322c1411cd86,2024-11-21T08:41:26.610000 CVE-2023-52810,0,0,033e202b1b964254c835a600951f39154677f181fd64fb65ba86c78b507462ab,2024-11-21T08:40:38.193000 CVE-2023-52811,0,0,6fdf1ae36bbdb81962026ac9ebba5264232faf33780b5e5f3c66be7583e2123c,2024-11-21T08:40:38.407000 -CVE-2023-52812,0,1,29ae65b672d446eaba78c5d133c587913587b8743f8010a5f01fbaedd5e1c51a,2024-12-30T20:09:10.617000 +CVE-2023-52812,0,0,29ae65b672d446eaba78c5d133c587913587b8743f8010a5f01fbaedd5e1c51a,2024-12-30T20:09:10.617000 CVE-2023-52813,0,0,8bb52da0dbdd61653b93b1afd030ae1f5a08c060ed89db967b31f8f0a0970c37,2024-11-21T08:40:38.687000 CVE-2023-52814,0,0,830f385e469f6ffe6e68841284fe631ce857af0bbb2762e1d231569f00870fc8,2024-11-21T08:40:38.810000 CVE-2023-52815,0,0,eba5e163497404c554cd332b709abdb9a171e906ea3b7ec2abe2060b2f441f9b,2024-11-21T08:40:39.020000 CVE-2023-52816,0,0,9a0a74d8664865f0e0bb0f116931b35d5d03409bf5c25f7a6061234fd638f707,2024-11-21T08:40:39.150000 CVE-2023-52817,0,0,b5060cef143e775e53bbfdee136aa7f53eaa21f086cca6ff62fdbcd7b7ff64a7,2024-11-21T08:40:39.267000 -CVE-2023-52818,0,1,8d862ce39250d59b027ef9571ebf92c690255c750be947bdfdada81197754ff0,2024-12-30T20:08:57.877000 +CVE-2023-52818,0,0,8d862ce39250d59b027ef9571ebf92c690255c750be947bdfdada81197754ff0,2024-12-30T20:08:57.877000 CVE-2023-52819,0,0,48cddf6448d32c2a1ec97c9c5728d4b7bb305534785e1ac963cb6a5f64346f51,2024-11-21T08:40:39.620000 CVE-2023-5282,0,0,f07e37baff0e63cc749ec7f71e21860f35e668717bdaaacfad36980ef0fc48b2,2024-11-21T08:41:26.737000 CVE-2023-52820,0,0,7b049c5fb4ec6057c00414a07ea263a069fc43603dbf16ccc3b91309982944d6,2024-05-24T16:15:09.313000 @@ -240259,7 +240259,7 @@ CVE-2023-52822,0,0,54640bd0e26163fd48ceee5b222b2b51878103ab2e09d2e9082e078e10e4f CVE-2023-52823,0,0,365706db1426da8a360d5c4a5d6e4e80add016a67d8a72c25123ad52152b123d,2024-05-24T11:15:09.367000 CVE-2023-52824,0,0,58849bdf8b7c9d9f7a6f0f83e4cf0467639c25e06971d60aecad6c886ee28255,2024-05-24T16:15:09.777000 CVE-2023-52825,0,0,e7b7702f2cc7ed84bf0e0f9f8e3877f1b1c0e191fbf2064a0fb697b01f131a2c,2024-11-21T08:40:39.997000 -CVE-2023-52826,0,1,93c3777132f6f809db8434b53ccec4473148479dd75f9b54635ec0f454099ac8,2024-12-30T20:08:33.040000 +CVE-2023-52826,0,0,93c3777132f6f809db8434b53ccec4473148479dd75f9b54635ec0f454099ac8,2024-12-30T20:08:33.040000 CVE-2023-52827,0,0,d47b608f5ab430a0594861c22553453691e94d4b3b3045af43ae10820dc28549,2024-11-21T08:40:40.303000 CVE-2023-52828,0,0,5f2dd0feef02aa3514ddb029f4a2a290346e0237ddb1f2f0873fdf7b02d9ebc4,2024-11-21T08:40:40.430000 CVE-2023-52829,0,0,411a0ce7532cfe1210c0999ae4b6a679f98c4d1ae9f3d811a60990427b0bad12,2024-12-04T21:15:20.377000 @@ -240284,11 +240284,11 @@ CVE-2023-52845,0,0,bcb26e737dc4f3baf2d24ecd49e9efae880cfdcf8864ebe288815eafff3e8 CVE-2023-52846,0,0,01c42a6b8e7be25d575b319f42737d3ecdca641a56e94f022df4a7164eb6f02c,2024-11-21T08:40:42.700000 CVE-2023-52847,0,0,6304dbc304f676ebb867c7a55ce40656720c1406d9bed9bac29a8b368f29bd19,2024-11-21T08:40:42.820000 CVE-2023-52848,0,0,b83baba516532b1010d7c66d73abfe92a1b9c878ad414616a7feb31a5f084310,2024-11-21T08:40:42.947000 -CVE-2023-52849,0,1,f6ddd31d6e2b7b97c260676cfb8b85b07561190bd66bad001b32fe754a29cfca,2024-12-30T20:09:41.537000 +CVE-2023-52849,0,0,f6ddd31d6e2b7b97c260676cfb8b85b07561190bd66bad001b32fe754a29cfca,2024-12-30T20:09:41.537000 CVE-2023-5285,0,0,8e1cd37b97e33f0f0685b14f4312036f59f160d705ec149a6ef0ac0f38fce8bc,2024-11-21T08:41:27.130000 -CVE-2023-52850,0,1,b48747e9fef3d05f3a3f87733c20b6b6c87bf8863b4830cf8b2416b04cab3e39,2024-12-30T20:09:31.393000 +CVE-2023-52850,0,0,b48747e9fef3d05f3a3f87733c20b6b6c87bf8863b4830cf8b2416b04cab3e39,2024-12-30T20:09:31.393000 CVE-2023-52851,0,0,31bace3bc49e77cdc3e77d0890b11d567f07b4d68474bfec4e20aab64829efd4,2024-11-21T08:40:43.290000 -CVE-2023-52852,0,1,56c0e6b2ce3e3baf070288075905fde5a1f96329a996ea3ff2ad9456eb26c5f5,2024-12-30T20:09:19.563000 +CVE-2023-52852,0,0,56c0e6b2ce3e3baf070288075905fde5a1f96329a996ea3ff2ad9456eb26c5f5,2024-12-30T20:09:19.563000 CVE-2023-52853,0,0,32c4f67493ddd24d490332b3435324973b5881d501d41ef50aa43506d33b569d,2024-11-21T08:40:43.527000 CVE-2023-52854,0,0,9f48ddf6cf641b50de9ded856ef6355837062d853a3b3d9d622b9fb3fb40325c,2024-11-21T08:40:43.647000 CVE-2023-52855,0,0,fefd8691b2ed782148f182e3b7ecd154c88289d5d9aed5fb9541a88d6e6f2d63,2024-11-21T08:40:43.770000 @@ -244676,7 +244676,9 @@ CVE-2024-11940,0,0,01a3f490196796516894d51522c528bc6c3ce1fe45bff9fda5a3ce37bc326 CVE-2024-11941,0,0,45c946faed9eb1ec18b9452e07479f063cfb793c63899cab9a102bedb1be5328,2024-12-05T16:15:23.893000 CVE-2024-11942,0,0,55526aafa6b479f8732b6654f613495eb95fa16f8129024967b3914532d074f0,2024-12-05T16:15:24.033000 CVE-2024-11943,0,0,5db2b5cec073953e68197fa73fddd59bb82bf096d7a8174dee13bdb32f9486e1,2024-12-07T02:15:18.393000 +CVE-2024-11944,1,1,b634172a3925b100e35875fcdb68c272c3b5ca712036d9b14bc3c274d75de098,2024-12-30T21:15:05.493000 CVE-2024-11945,0,0,d5529e16b2c34f9b5e6b9ddc5a03f73ebf6c118ac10e072ab626561b83cdfe71,2024-12-10T10:15:04.810000 +CVE-2024-11946,1,1,9bb9e62cef0f7be1b4ba198de6929920aa5b1c620ccfeccadc62834476767120,2024-12-30T21:15:05.920000 CVE-2024-11947,0,0,76594c096f66db4264ce24827f38ddba1b904bd8285bdd79729a6ff69e4900e9,2024-12-13T19:33:07.497000 CVE-2024-11948,0,0,63c29d57ca2d54a9012c75c22d15bb5abf864d6477c7fa55fde21714e103ae6a,2024-12-13T19:32:21.150000 CVE-2024-11949,0,0,8c8ca0b9d255f5a6445ed2a115142b5d13432f7081db7ee9affe350ed098a50e,2024-12-13T19:28:30.873000 @@ -245096,6 +245098,9 @@ CVE-2024-12744,0,0,db2cef6174f0f203336fd1a602951ac160bef125d0730a8230a23f49ec8a8 CVE-2024-12745,0,0,d39132eefd07723f30fb227ef12fb8aaf3a83b250d0f3b28d89ab1e076f94541,2024-12-26T15:15:06.527000 CVE-2024-12746,0,0,df5c191123ddac7611e41b52ec167446638f37d1f7bfb5919f7163608ca92308,2024-12-26T15:15:06.650000 CVE-2024-1275,0,0,55e303d499b7cd70146b064f11442ebd0ad45cafbb26b305d69871c04faa255a,2024-11-21T08:50:12.913000 +CVE-2024-12751,1,1,c021fa6050fdcc7d460a13e6fbbdc375489db9f83ffb1d4962a94fd17a310ee0,2024-12-30T21:15:06.130000 +CVE-2024-12752,1,1,aceb91b13a48ab0b91f2671dfccf956bcd438f2d51f93df4dee52b510998e9fe,2024-12-30T21:15:06.260000 +CVE-2024-12753,1,1,e4ba0db71191a4ffaab183a2c11034bf6d7abf0b7b96de04fec1007267c8b1fd,2024-12-30T21:15:06.400000 CVE-2024-12754,0,0,cc49a740b9b02282be04809e0ec9e9f9181e846c2c42209dd24ca5d17558bc72,2024-12-30T17:15:07.127000 CVE-2024-1276,0,0,342e07ea1475f57185158b84be14279572eebbc1b91e4c07c491730599e6701d,2024-11-21T08:50:13.050000 CVE-2024-1277,0,0,fdccc6e1d66b4b759fea691d8a9a7ad4f8cc0afd5b2fb224e654b3bd9de12942,2024-11-21T08:50:13.170000 @@ -245255,9 +245260,9 @@ CVE-2024-13015,0,0,3dcd014dbef30b2e70ec20ccecdaaf615115de618369fe62c340a42e4d8d8 CVE-2024-13016,0,0,b67ea70e64cef9d4f2f5d631157f934916ce9c950363c714e96ab8c161eaacc5,2024-12-29T16:15:05.300000 CVE-2024-13017,0,0,406d1ed5cbe2575a1a54010aafe73d57848810b7f6f5e6c2e0a9b1cec549270f,2024-12-29T17:15:05.873000 CVE-2024-13018,0,0,083b5e4e2fa86246983f0fd476b84784f9dac25dcba6ed963c92124634ebb897,2024-12-29T18:15:05.027000 -CVE-2024-13019,0,1,72a1973cf4f4a77621dcfa6c2ee34bdcf9f28c12b7f488cb496979d278302450,2024-12-30T19:15:06.847000 +CVE-2024-13019,0,0,72a1973cf4f4a77621dcfa6c2ee34bdcf9f28c12b7f488cb496979d278302450,2024-12-30T19:15:06.847000 CVE-2024-1302,0,0,50e21539c22b43b4db748f33a4680786d0cd3b39c9a7a5fc858bc75c33660782,2024-11-21T08:50:16.467000 -CVE-2024-13020,0,1,59c12b2192e99fc7791f2432b5fbc4c1305151c3f5328f38436d2f225c41c63a,2024-12-30T19:15:07.537000 +CVE-2024-13020,0,0,59c12b2192e99fc7791f2432b5fbc4c1305151c3f5328f38436d2f225c41c63a,2024-12-30T19:15:07.537000 CVE-2024-13021,0,0,db94a67fd5023220dfcd097aa849d00631aaccd25e2ab01bcc8f620ec54fee4a,2024-12-30T18:15:08.877000 CVE-2024-13022,0,0,31946f46234a2f885529fc55fb9df522feaa7112e2244bd255db91f99134c814,2024-12-29T20:15:05.980000 CVE-2024-13023,0,0,a6002ae756a126843e0244f11dec8062c69ff459b14d4771d8dead00e17d6b47,2024-12-29T21:15:06.020000 @@ -245277,7 +245282,18 @@ CVE-2024-13037,0,0,ad1a2687fd8ca034a4ba7eb450dd7b7cb6ce76af79e47f53a4dcc006981f2 CVE-2024-13038,0,0,4583c4724ce1695329d04a091cf334038675ae1fc4b89e1e9c52332e7b115d63,2024-12-30T17:15:08.473000 CVE-2024-13039,0,0,5fcf5529e0f60e939c342e8ff9bcb8e9371ea109f210669df3b0c791fd94ef0a,2024-12-30T17:15:08.597000 CVE-2024-1304,0,0,7f3d377d10786bd7b29e3437adfa1f791151a43db698785def3901d685804d14,2024-11-21T08:50:16.717000 +CVE-2024-13042,1,1,79d3038a3776ed8900f4502faeed80d95c375db4f2c3ae792b7f1b6168d6c4e8,2024-12-30T21:15:06.523000 +CVE-2024-13043,1,1,a57d8becfe9ca92a82190ea64963a694c6040f83cb00135ce055f57002bf8d4c,2024-12-30T21:15:06.713000 +CVE-2024-13044,1,1,6d3c3cdcc975fb5586b26099e393540139d286d458e4c5db4ccad7a86d240708,2024-12-30T21:15:06.840000 +CVE-2024-13045,1,1,b32d594c46ea0f4c48c42384ee94c921a68ba0cc53643756bb2b38fcd53b620a,2024-12-30T21:15:06.963000 +CVE-2024-13046,1,1,c23d299c3b59ae6bc264c7b5c5d03889b2a4f3b7dfc1a98cde8f678439be865b,2024-12-30T21:15:07.097000 +CVE-2024-13047,1,1,dc7aafd74287433931ab2a00582ad328a0bfc903e0fe51d5645e7afe6ca004bd,2024-12-30T21:15:07.220000 +CVE-2024-13048,1,1,67adbf23fa9118f8304c09b8b6e3ff63b96c91828b41fba5df352ed6981833f4,2024-12-30T21:15:07.347000 +CVE-2024-13049,1,1,f591721723d514d93b81ea9ce6a3f8016e8d2fa1c15ed626bcbaa083ac3ec9cd,2024-12-30T21:15:07.470000 CVE-2024-1305,0,0,61bd2e20ff0aa394ece1e84d5d848dafdcba1e6f1c6375393ac194bd0f52a153,2024-11-21T08:50:16.840000 +CVE-2024-13050,1,1,84109de165147e4a5232ee1fdc9c6d22162f7758c34e8757df3c209c53af5194,2024-12-30T21:15:07.593000 +CVE-2024-13051,1,1,1be1ae94a61dba469e5e49f0e3a210eb507d631c9c82589acffd3c63211509af,2024-12-30T21:15:07.717000 +CVE-2024-13058,1,1,91396049ed5baf4a6f156f57d5990485463c9e52e997b4c7fdc31249002c7bf7,2024-12-30T22:15:05.957000 CVE-2024-1306,0,0,0542247252f536db3d3f5f372f6b06cf8f9322e7de2b3d2f5040c13d3f80547b,2024-11-21T08:50:17.053000 CVE-2024-1307,0,0,791d403fd6ce043b636953425f5891ef42986249387c4cd3003ec2c058fbc715,2024-11-21T08:50:17.233000 CVE-2024-1308,0,0,b2bb733c7402260f9ace902e9d676967e691f690d52b513a8afbdef713b7d4c5,2024-11-21T08:50:17.413000 @@ -257933,12 +257949,12 @@ CVE-2024-35899,0,0,11a2b23cf941f9839b39efc317ac13f10c84ba39dab1cd8d40a7557ebbc83 CVE-2024-3590,0,0,d22476fa387864e078186d0e7523ee0ad7036681a9b2a59859776de3e93311e6,2024-11-21T09:29:56.237000 CVE-2024-35900,0,0,50e870acb72fb71c84dc7dff1cb78cd820e12556e9b4f3f5b0b8691544c6253e,2024-11-21T09:21:09.730000 CVE-2024-35901,0,0,cd3edf70ee28e7cbd408545a03be56c550e1844b8b07be05abd5f15de057a4a1,2024-11-21T09:21:09.867000 -CVE-2024-35902,0,1,d96a0ab7e74ae781082c74956ec3689f5500ab1ae77b1478881cc822cd8de55a,2024-12-30T19:47:46.853000 +CVE-2024-35902,0,0,d96a0ab7e74ae781082c74956ec3689f5500ab1ae77b1478881cc822cd8de55a,2024-12-30T19:47:46.853000 CVE-2024-35903,0,0,b0a58707169cb46f406dc8821e52458e0f21e86329172db70bd8d6d3fc236b53,2024-11-21T09:21:10.117000 CVE-2024-35904,0,0,6a8a43a00a33be7e600d0f99425837d586e2af006bd244b99f0bb205e27e9e6d,2024-11-21T09:21:10.303000 -CVE-2024-35905,0,1,2e853f5ed500836fa8d6b9061945a68ee5b2669edf25898295696baf9e37a1f0,2024-12-30T19:47:30.700000 +CVE-2024-35905,0,0,2e853f5ed500836fa8d6b9061945a68ee5b2669edf25898295696baf9e37a1f0,2024-12-30T19:47:30.700000 CVE-2024-35906,0,0,70641f3710ab7a414753b1ae812647e2cbc2c61278b599a8ddd224db78108501,2024-05-23T14:15:10.010000 -CVE-2024-35907,0,1,dc58b910ee9f37226f3c1c8277b48e81a4767166656743ae592d874b9cfc4a3b,2024-12-30T19:35:53.437000 +CVE-2024-35907,0,0,dc58b910ee9f37226f3c1c8277b48e81a4767166656743ae592d874b9cfc4a3b,2024-12-30T19:35:53.437000 CVE-2024-35908,0,0,9a3127fc2dcc56fa3ef0510f5888d8233de37b1948ac31e2d9fa490a31721ab0,2024-11-21T09:21:10.690000 CVE-2024-35909,0,0,554c220395a9f5a1375258e018f8ed986d0caa4f773d6b01782597a19e34fda4,2024-11-21T09:21:10.813000 CVE-2024-3591,0,0,e422baa207375a68d2a2fad897f062ac1001b3182aef2bc5608dbc800290852d,2024-11-21T09:29:56.423000 @@ -257954,20 +257970,20 @@ CVE-2024-35918,0,0,b84a4a8eaff0e9aa0772539706471f0485db8b7ae1e504faf03291dd1bedb CVE-2024-35919,0,0,e631246407300ae6e30d83cedcbee4935288a2744219786e10d196588f3f5df9,2024-11-21T09:21:12.250000 CVE-2024-3592,0,0,ff5147fd52698b783751119964844ea2247003cb656728005bbdc75700fd6e1d,2024-11-21T09:29:56.610000 CVE-2024-35920,0,0,d5937bd2774497f79326452f53ec5c30b02bc25bf82e6f9690d0e6395feac28d,2024-11-21T09:21:12.443000 -CVE-2024-35921,0,1,4526cc1ba7186dbcecaca88016f42ddd8138d3cd50124e674014b54b22fb74d3,2024-12-30T19:35:04.897000 -CVE-2024-35922,0,1,0c88e554ffaa341ceefcaf9be80ad5df621b046da9f94425d0c621a8e53f1e17,2024-12-30T19:27:42.720000 +CVE-2024-35921,0,0,4526cc1ba7186dbcecaca88016f42ddd8138d3cd50124e674014b54b22fb74d3,2024-12-30T19:35:04.897000 +CVE-2024-35922,0,0,0c88e554ffaa341ceefcaf9be80ad5df621b046da9f94425d0c621a8e53f1e17,2024-12-30T19:27:42.720000 CVE-2024-35923,0,0,e200bbefa4260a7322c5705e6c101e370170f714b6cca2259ba31c94a243aae4,2024-05-25T14:15:53.013000 CVE-2024-35924,0,0,51a8e81a5087f6b00f86aef3df30b13903521527bd7c24804424b3f4f88b017b,2024-11-21T09:21:12.833000 CVE-2024-35925,0,0,527fefad4777ff7cb6251a7bffe472b80d43edd30c48c261e4833904b72dcd03,2024-11-21T09:21:12.953000 CVE-2024-35926,0,0,c1b13d208fac57fe78f6933a263aa2f330043107ad1ad5de4da551ecec504628,2024-11-21T09:21:13.097000 CVE-2024-35927,0,0,278ce2f015c27adcc7ff8c3c6be22b3e8c5bb291856afb164b072d0d8d61b636,2024-11-21T09:21:13.223000 CVE-2024-35928,0,0,1c31dc8c665b8952880067e761bee324da2eee6fa320ed892680e88b3dd7b63e,2024-12-19T12:15:06.590000 -CVE-2024-35929,0,1,7da540c66ffc823238b17395ecbf47d1012e0cd64e229ac26e5cc7bd9ae7f5a8,2024-12-30T19:56:30.927000 +CVE-2024-35929,0,0,7da540c66ffc823238b17395ecbf47d1012e0cd64e229ac26e5cc7bd9ae7f5a8,2024-12-30T19:56:30.927000 CVE-2024-3593,0,0,7dfe1a06ca99b709e0966f80e5fa7243762a8725a5825da6ebc20a944f2ce167,2024-11-21T09:29:56.757000 -CVE-2024-35930,0,1,5013df0e99717b1ece542581ca441e3bc2ac723ea4bcaf3c94a778bd9158d242,2024-12-30T19:52:55.313000 +CVE-2024-35930,0,0,5013df0e99717b1ece542581ca441e3bc2ac723ea4bcaf3c94a778bd9158d242,2024-12-30T19:52:55.313000 CVE-2024-35931,0,0,82567fcbead3c5129937032b3ec99d3e2b49554c36aa4a0599fa7a1399168c13,2024-11-21T09:21:13.837000 CVE-2024-35932,0,0,793922418147ab2c922ff7f32e99bfc27b35844d6861bc041d1cc83782b09a20,2024-11-21T09:21:13.957000 -CVE-2024-35933,0,1,0325908b6390f4a1c9c15094b5dc41c2e597d6d95f2ad6932f319d5dab89c0d2,2024-12-30T19:51:27.687000 +CVE-2024-35933,0,0,0325908b6390f4a1c9c15094b5dc41c2e597d6d95f2ad6932f319d5dab89c0d2,2024-12-30T19:51:27.687000 CVE-2024-35934,0,0,361be744c073c07234d0642797a28f51b9670336f6d7218b1ba2a8dcda01d171,2024-11-21T09:21:14.217000 CVE-2024-35935,0,0,082a285269746fc3fb873203b6e873841d4b83b7804fa4f36094730041c93f93,2024-11-21T09:21:14.350000 CVE-2024-35936,0,0,c01c5dac7b5e0bd9601007610c8046f83929460d70171551603976f6ee883491,2024-11-21T09:21:14.507000 @@ -257996,7 +258012,7 @@ CVE-2024-35956,0,0,a2df20ee828a684480220f597be9391b4a50d33880f1470bf6aeca6acac4f CVE-2024-35957,0,0,63f1ef216f981899f739038c72e590e5dc7a92a6cab95efc5de09be8bad6816d,2024-11-21T09:21:17.513000 CVE-2024-35958,0,0,dea59fdb3b17c08467afba7fa0588c1d2e5cd5eb65fea4ada743f1bfb3c216a3,2024-11-21T09:21:17.707000 CVE-2024-35959,0,0,53f6e1bb6d9d49084925276b5c45c193850da3a7ac9cb385334abc5f14e36dbd,2024-11-21T09:21:17.913000 -CVE-2024-3596,0,1,a73be4dbd1ba2f2be100ff8602358c44e097c68e335a7e6fccfaec4ec8e338cc,2024-12-30T19:23:20.437000 +CVE-2024-3596,0,0,a73be4dbd1ba2f2be100ff8602358c44e097c68e335a7e6fccfaec4ec8e338cc,2024-12-30T19:23:20.437000 CVE-2024-35960,0,0,85a643c1126146028b0f246face42ec63a48e10da60dacaff32d51eebc9fc072,2024-11-21T09:21:18.037000 CVE-2024-35961,0,0,d8bede3118f3213f6531e3d4764ee351899ee3c652f6f84602e33285303dd68f,2024-11-21T09:21:18.270000 CVE-2024-35962,0,0,f360f85bc8ef52af04a2c558b97f52575478fb0db43fb8c16bc09d6f51c8dcff,2024-11-21T09:21:18.400000 @@ -271521,10 +271537,10 @@ CVE-2024-5676,0,0,42e21ca7cdab0bdccf25cf6637d45fef7f036494b6d014c88b5835e6e48473 CVE-2024-5677,0,0,1c94c489b32a2f3740f8b8867e0aff380d1e56445098bb97785a4bdba0037977,2024-11-21T09:48:08.540000 CVE-2024-5678,0,0,bb4133b16eab99226f567cd512e0bec4d1a7175fc845cb5a8a3e18dcdbfd75d7,2024-08-15T18:05:54.847000 CVE-2024-5679,0,0,dc654eef86d673e662acc6dfc1ecb27b2f541880d76227d1d93861f825adc641,2024-11-21T09:48:08.710000 -CVE-2024-56799,1,1,0dd8de9f29ee83d8d3d1718949c04ffed21addd8ed96891a089cf418021b9018,2024-12-30T19:15:08.160000 +CVE-2024-56799,0,0,0dd8de9f29ee83d8d3d1718949c04ffed21addd8ed96891a089cf418021b9018,2024-12-30T19:15:08.160000 CVE-2024-5680,0,0,926c5c2f45d297ec0fa81be8768753266fc85d73f972d4984111118e8fceffa2,2024-11-21T09:48:08.837000 -CVE-2024-56800,1,1,2d9ccaf12da8a18d45c48258f139cc5fdee9e79e0e5d7096bfd7de919c9c0c9a,2024-12-30T19:15:08.333000 -CVE-2024-56801,1,1,ceaecdb1b2443408b3d440c831110179f2ea438cecab41e9ec9b39e4392684c3,2024-12-30T19:15:08.483000 +CVE-2024-56800,0,0,2d9ccaf12da8a18d45c48258f139cc5fdee9e79e0e5d7096bfd7de919c9c0c9a,2024-12-30T19:15:08.333000 +CVE-2024-56801,0,0,ceaecdb1b2443408b3d440c831110179f2ea438cecab41e9ec9b39e4392684c3,2024-12-30T19:15:08.483000 CVE-2024-5681,0,0,25a463be80d3bb29af40554a62ba0e4276aefee689d98e36dee0bcfe769073f6,2024-11-21T09:48:08.953000 CVE-2024-5682,0,0,61babb4b22790f05b1e6fb044157f817a85668af929c91e823c0d3ae99b2f335,2024-09-20T12:30:51.220000 CVE-2024-5683,0,0,881352e7cddbf9570cae104e43894ad6185c01dcb07cd1be33b2f8fea4b1c33b,2024-11-21T09:48:09.327000