Auto-Update: 2024-12-30T23:00:20.050896+00:00

This commit is contained in:
cad-safe-bot 2024-12-30 23:03:43 +00:00
parent 2c5db5e52b
commit 86647941cd
18 changed files with 1106 additions and 71 deletions

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-11944",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-30T21:15:05.493",
"lastModified": "2024-12-30T21:15:05.493",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "iXsystems TrueNAS CORE tarfile.extractall Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of iXsystems TrueNAS devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the tarfile.extractall method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-25626."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://www.truenas.com/docs/core/13.0/gettingstarted/corereleasenotes/#130-u63",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1643/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-11946",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-30T21:15:05.920",
"lastModified": "2024-12-30T21:15:05.920",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "iXsystems TrueNAS CORE fetch_plugin_packagesites tar Cleartext Transmission of Sensitive Information Vulnerability. This vulnerability allows network-adjacent attackers to tamper with firmware update files on affected installations of iXsystems TrueNAS devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of firmware updates. The issue results from the use of an insecure protocol to deliver updates. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-25668."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 3.1,
"baseSeverity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-319"
}
]
}
],
"references": [
{
"url": "https://www.truenas.com/docs/core/13.0/gettingstarted/corereleasenotes/#130-u63",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1644/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-12751",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-30T21:15:06.130",
"lastModified": "2024-12-30T21:15:06.130",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Reader AcroForm Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of AcroForms. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25344."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.foxit.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1737/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-12752",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-30T21:15:06.260",
"lastModified": "2024-12-30T21:15:06.260",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Reader AcroForm Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of AcroForms. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25345."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://www.foxit.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1738/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-12753",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-30T21:15:06.400",
"lastModified": "2024-12-30T21:15:06.400",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Foxit PDF Reader Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Foxit PDF Reader. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the product installer. By creating a junction, an attacker can abuse the installer process to create an arbitrary file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-25408."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
}
],
"references": [
{
"url": "https://www.foxit.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1739/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2024-13042",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-30T21:15:06.523",
"lastModified": "2024-12-30T21:15:06.523",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Tsinghua Unigroup Electronic Archives Management System 3.2.210802(62532). It has been classified as problematic. Affected is the function download of the file SubjectController.class.php. The manipulation of the argument path leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
},
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/BxYQ/zg_fileread",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/BxYQ/zg_fileread/blob/main/poc.py",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.289788",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.289788",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.472068",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-13043",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-30T21:15:06.713",
"lastModified": "2024-12-30T21:15:06.713",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Panda Security Dome Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Panda Security Dome. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the Hotspot Shield. By creating a junction, an attacker can abuse the application to delete arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-23478."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1727/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-13044",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-30T21:15:06.840",
"lastModified": "2024-12-30T21:15:06.840",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ashlar-Vellum Cobalt AR File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of AR files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24870."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1728/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-13045",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-30T21:15:06.963",
"lastModified": "2024-12-30T21:15:06.963",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ashlar-Vellum Cobalt AR File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of AR files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24848."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1729/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-13046",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-30T21:15:07.097",
"lastModified": "2024-12-30T21:15:07.097",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ashlar-Vellum Cobalt CO File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of CO files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24867."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1730/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-13047",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-30T21:15:07.220",
"lastModified": "2024-12-30T21:15:07.220",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ashlar-Vellum Cobalt CO File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of CO files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24843."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1731/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-13048",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-30T21:15:07.347",
"lastModified": "2024-12-30T21:15:07.347",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ashlar-Vellum Cobalt XE File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of XE files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24844."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1732/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-13049",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-30T21:15:07.470",
"lastModified": "2024-12-30T21:15:07.470",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ashlar-Vellum Cobalt XE File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of XE files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24847."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1733/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-13050",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-30T21:15:07.593",
"lastModified": "2024-12-30T21:15:07.593",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ashlar-Vellum Graphite VC6 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Graphite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of VC6 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24976."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1734/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-13051",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-30T21:15:07.717",
"lastModified": "2024-12-30T21:15:07.717",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ashlar-Vellum Graphite VC6 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Graphite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of VC6 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24977."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1735/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2024-13058",
"sourceIdentifier": "0a72a055-908d-47f5-a16a-1f09049c16c6",
"published": "2024-12-30T22:15:05.957",
"lastModified": "2024-12-30T22:15:05.957",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue exists in SoftIron HyperCloud\n where authenticated, but non-admin users can create data pools, which could potentially impact the performance and availability of the backend software-defined storage subsystem.\n\nThis issue only impacts SoftIron HyperCloud and related software products (such as VM Squared) software versions 2.3.0 to before 2.5.0."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "0a72a055-908d-47f5-a16a-1f09049c16c6",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:U/V:D/RE:M/U:Green",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "LOW",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NEGLIGIBLE",
"automatable": "YES",
"recovery": "USER",
"valueDensity": "DIFFUSE",
"vulnerabilityResponseEffort": "MODERATE",
"providerUrgency": "GREEN"
}
}
]
},
"weaknesses": [
{
"source": "0a72a055-908d-47f5-a16a-1f09049c16c6",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
},
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://advisories.softiron.cloud/",
"source": "0a72a055-908d-47f5-a16a-1f09049c16c6"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2024-12-30T21:00:20.105512+00:00 2024-12-30T23:00:20.050896+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2024-12-30T20:09:41.537000+00:00 2024-12-30T22:15:05.957000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,47 +33,35 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
275186 275202
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `3` Recently added CVEs: `16`
- [CVE-2024-56799](CVE-2024/CVE-2024-567xx/CVE-2024-56799.json) (`2024-12-30T19:15:08.160`) - [CVE-2024-11944](CVE-2024/CVE-2024-119xx/CVE-2024-11944.json) (`2024-12-30T21:15:05.493`)
- [CVE-2024-56800](CVE-2024/CVE-2024-568xx/CVE-2024-56800.json) (`2024-12-30T19:15:08.333`) - [CVE-2024-11946](CVE-2024/CVE-2024-119xx/CVE-2024-11946.json) (`2024-12-30T21:15:05.920`)
- [CVE-2024-56801](CVE-2024/CVE-2024-568xx/CVE-2024-56801.json) (`2024-12-30T19:15:08.483`) - [CVE-2024-12751](CVE-2024/CVE-2024-127xx/CVE-2024-12751.json) (`2024-12-30T21:15:06.130`)
- [CVE-2024-12752](CVE-2024/CVE-2024-127xx/CVE-2024-12752.json) (`2024-12-30T21:15:06.260`)
- [CVE-2024-12753](CVE-2024/CVE-2024-127xx/CVE-2024-12753.json) (`2024-12-30T21:15:06.400`)
- [CVE-2024-13042](CVE-2024/CVE-2024-130xx/CVE-2024-13042.json) (`2024-12-30T21:15:06.523`)
- [CVE-2024-13043](CVE-2024/CVE-2024-130xx/CVE-2024-13043.json) (`2024-12-30T21:15:06.713`)
- [CVE-2024-13044](CVE-2024/CVE-2024-130xx/CVE-2024-13044.json) (`2024-12-30T21:15:06.840`)
- [CVE-2024-13045](CVE-2024/CVE-2024-130xx/CVE-2024-13045.json) (`2024-12-30T21:15:06.963`)
- [CVE-2024-13046](CVE-2024/CVE-2024-130xx/CVE-2024-13046.json) (`2024-12-30T21:15:07.097`)
- [CVE-2024-13047](CVE-2024/CVE-2024-130xx/CVE-2024-13047.json) (`2024-12-30T21:15:07.220`)
- [CVE-2024-13048](CVE-2024/CVE-2024-130xx/CVE-2024-13048.json) (`2024-12-30T21:15:07.347`)
- [CVE-2024-13049](CVE-2024/CVE-2024-130xx/CVE-2024-13049.json) (`2024-12-30T21:15:07.470`)
- [CVE-2024-13050](CVE-2024/CVE-2024-130xx/CVE-2024-13050.json) (`2024-12-30T21:15:07.593`)
- [CVE-2024-13051](CVE-2024/CVE-2024-130xx/CVE-2024-13051.json) (`2024-12-30T21:15:07.717`)
- [CVE-2024-13058](CVE-2024/CVE-2024-130xx/CVE-2024-13058.json) (`2024-12-30T22:15:05.957`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `35` Recently modified CVEs: `0`
- [CVE-2021-47254](CVE-2021/CVE-2021-472xx/CVE-2021-47254.json) (`2024-12-30T19:50:58.543`)
- [CVE-2021-47388](CVE-2021/CVE-2021-473xx/CVE-2021-47388.json) (`2024-12-30T20:05:07.740`)
- [CVE-2021-47390](CVE-2021/CVE-2021-473xx/CVE-2021-47390.json) (`2024-12-30T20:01:12.947`)
- [CVE-2021-47409](CVE-2021/CVE-2021-474xx/CVE-2021-47409.json) (`2024-12-30T20:00:41.677`)
- [CVE-2021-47413](CVE-2021/CVE-2021-474xx/CVE-2021-47413.json) (`2024-12-30T20:00:33.497`)
- [CVE-2021-47420](CVE-2021/CVE-2021-474xx/CVE-2021-47420.json) (`2024-12-30T19:37:04.973`)
- [CVE-2021-47422](CVE-2021/CVE-2021-474xx/CVE-2021-47422.json) (`2024-12-30T19:36:28.193`)
- [CVE-2021-47423](CVE-2021/CVE-2021-474xx/CVE-2021-47423.json) (`2024-12-30T19:36:10.670`)
- [CVE-2023-52812](CVE-2023/CVE-2023-528xx/CVE-2023-52812.json) (`2024-12-30T20:09:10.617`)
- [CVE-2023-52818](CVE-2023/CVE-2023-528xx/CVE-2023-52818.json) (`2024-12-30T20:08:57.877`)
- [CVE-2023-52826](CVE-2023/CVE-2023-528xx/CVE-2023-52826.json) (`2024-12-30T20:08:33.040`)
- [CVE-2023-52849](CVE-2023/CVE-2023-528xx/CVE-2023-52849.json) (`2024-12-30T20:09:41.537`)
- [CVE-2023-52850](CVE-2023/CVE-2023-528xx/CVE-2023-52850.json) (`2024-12-30T20:09:31.393`)
- [CVE-2023-52852](CVE-2023/CVE-2023-528xx/CVE-2023-52852.json) (`2024-12-30T20:09:19.563`)
- [CVE-2024-13019](CVE-2024/CVE-2024-130xx/CVE-2024-13019.json) (`2024-12-30T19:15:06.847`)
- [CVE-2024-13020](CVE-2024/CVE-2024-130xx/CVE-2024-13020.json) (`2024-12-30T19:15:07.537`)
- [CVE-2024-35902](CVE-2024/CVE-2024-359xx/CVE-2024-35902.json) (`2024-12-30T19:47:46.853`)
- [CVE-2024-35905](CVE-2024/CVE-2024-359xx/CVE-2024-35905.json) (`2024-12-30T19:47:30.700`)
- [CVE-2024-35907](CVE-2024/CVE-2024-359xx/CVE-2024-35907.json) (`2024-12-30T19:35:53.437`)
- [CVE-2024-35921](CVE-2024/CVE-2024-359xx/CVE-2024-35921.json) (`2024-12-30T19:35:04.897`)
- [CVE-2024-35922](CVE-2024/CVE-2024-359xx/CVE-2024-35922.json) (`2024-12-30T19:27:42.720`)
- [CVE-2024-35929](CVE-2024/CVE-2024-359xx/CVE-2024-35929.json) (`2024-12-30T19:56:30.927`)
- [CVE-2024-35930](CVE-2024/CVE-2024-359xx/CVE-2024-35930.json) (`2024-12-30T19:52:55.313`)
- [CVE-2024-35933](CVE-2024/CVE-2024-359xx/CVE-2024-35933.json) (`2024-12-30T19:51:27.687`)
- [CVE-2024-3596](CVE-2024/CVE-2024-35xx/CVE-2024-3596.json) (`2024-12-30T19:23:20.437`)
## Download and Usage ## Download and Usage

View File

@ -187420,28 +187420,28 @@ CVE-2021-47229,0,0,7eaf4c4dfd8a0b01ff059e9e140d1f30b6435b38480e86920eedf73b5f29c
CVE-2021-47230,0,0,9617dea962ae526cc57e3344dadddf0ce492d4dd862e205112638780de1d75fd,2024-11-21T06:35:40.480000 CVE-2021-47230,0,0,9617dea962ae526cc57e3344dadddf0ce492d4dd862e205112638780de1d75fd,2024-11-21T06:35:40.480000
CVE-2021-47231,0,0,fe02362946c9b3cfaf3a64994b44f8b9d73df65115a2eb261246bd28b6bc8925,2024-11-21T06:35:40.683000 CVE-2021-47231,0,0,fe02362946c9b3cfaf3a64994b44f8b9d73df65115a2eb261246bd28b6bc8925,2024-11-21T06:35:40.683000
CVE-2021-47232,0,0,24ca5d35ff26d1803c655d5dd07b9040f95874dd3a1b7eb44bb77884c953b1a2,2024-11-21T06:35:40.883000 CVE-2021-47232,0,0,24ca5d35ff26d1803c655d5dd07b9040f95874dd3a1b7eb44bb77884c953b1a2,2024-11-21T06:35:40.883000
CVE-2021-47233,0,1,49bd84981d757bdeb030b5d808f06c049b1dc1bf9565f1010d44de6f30baa449,2024-12-30T19:51:12.613000 CVE-2021-47233,0,0,49bd84981d757bdeb030b5d808f06c049b1dc1bf9565f1010d44de6f30baa449,2024-12-30T19:51:12.613000
CVE-2021-47234,0,0,273d7ee3f66e04272422c623c3f10a6131b83f867533db8cd4feea3001cff253,2024-11-21T06:35:41.203000 CVE-2021-47234,0,0,273d7ee3f66e04272422c623c3f10a6131b83f867533db8cd4feea3001cff253,2024-11-21T06:35:41.203000
CVE-2021-47235,0,1,8b53251b18ef7a00638c8566452347f25d3f12a1756e9c95ca2b9ee9d09320d4,2024-12-30T19:06:05.170000 CVE-2021-47235,0,0,8b53251b18ef7a00638c8566452347f25d3f12a1756e9c95ca2b9ee9d09320d4,2024-12-30T19:06:05.170000
CVE-2021-47236,0,0,b87ff6e7bbebf51be21d4b4f1bddb0b9e9f26bf1b1f348eef469192eeef1e5fe,2024-11-21T06:35:41.480000 CVE-2021-47236,0,0,b87ff6e7bbebf51be21d4b4f1bddb0b9e9f26bf1b1f348eef469192eeef1e5fe,2024-11-21T06:35:41.480000
CVE-2021-47237,0,1,21a5b46828785b47344dfa5d33d76cb4f95f34c264877088c08c9f3183bb0375,2024-12-30T19:05:28.320000 CVE-2021-47237,0,0,21a5b46828785b47344dfa5d33d76cb4f95f34c264877088c08c9f3183bb0375,2024-12-30T19:05:28.320000
CVE-2021-47238,0,0,b41f2250ae1e52d3fe19a4a1a3f096f7b6ff7daceb9aaf3a7950aecde0975b5e,2024-11-21T06:35:41.743000 CVE-2021-47238,0,0,b41f2250ae1e52d3fe19a4a1a3f096f7b6ff7daceb9aaf3a7950aecde0975b5e,2024-11-21T06:35:41.743000
CVE-2021-47239,0,1,426aab874d3868aa4677b22537307b93d5214463451278a00c2a583e2a8b5c7b,2024-12-30T19:05:15.167000 CVE-2021-47239,0,0,426aab874d3868aa4677b22537307b93d5214463451278a00c2a583e2a8b5c7b,2024-12-30T19:05:15.167000
CVE-2021-47240,0,1,7d569215feef44a17dae0b0b3463f2bc32c191ad3939d0983404aab4d26d862a,2024-12-30T19:04:58.760000 CVE-2021-47240,0,0,7d569215feef44a17dae0b0b3463f2bc32c191ad3939d0983404aab4d26d862a,2024-12-30T19:04:58.760000
CVE-2021-47241,0,0,a0218b63a37a83cd88010171c29ce1ae8094e5b2a4be5c22a8819de8551be48e,2024-11-21T06:35:42.163000 CVE-2021-47241,0,0,a0218b63a37a83cd88010171c29ce1ae8094e5b2a4be5c22a8819de8551be48e,2024-11-21T06:35:42.163000
CVE-2021-47242,0,0,9e2ec51f01fe9a8aad67669f97a4ff925113d9d899dff1b65690d8eceeb8de62,2024-11-21T06:35:42.343000 CVE-2021-47242,0,0,9e2ec51f01fe9a8aad67669f97a4ff925113d9d899dff1b65690d8eceeb8de62,2024-11-21T06:35:42.343000
CVE-2021-47243,0,1,f3ce19b96978056d91cf0a2bc489aea47b0aa209106c9ae341645d6e0a65d4c0,2024-12-30T19:04:26.770000 CVE-2021-47243,0,0,f3ce19b96978056d91cf0a2bc489aea47b0aa209106c9ae341645d6e0a65d4c0,2024-12-30T19:04:26.770000
CVE-2021-47244,0,0,ca6b3b87479e59071b8004632c8d4b6f1e9d11643d6de68216b8ad6a0872acb6,2024-11-21T06:35:42.640000 CVE-2021-47244,0,0,ca6b3b87479e59071b8004632c8d4b6f1e9d11643d6de68216b8ad6a0872acb6,2024-11-21T06:35:42.640000
CVE-2021-47245,0,1,4b0fd78442e693c8c9ad1c36bf34d80eb49c87d890eb02e4e5da728a0703b468,2024-12-30T19:03:58.273000 CVE-2021-47245,0,0,4b0fd78442e693c8c9ad1c36bf34d80eb49c87d890eb02e4e5da728a0703b468,2024-12-30T19:03:58.273000
CVE-2021-47246,0,0,9f782402bd919affe114e8e45d84ed93cdf78270af91f3168742be0308c7f0f6,2024-11-21T06:35:42.950000 CVE-2021-47246,0,0,9f782402bd919affe114e8e45d84ed93cdf78270af91f3168742be0308c7f0f6,2024-11-21T06:35:42.950000
CVE-2021-47247,0,1,cf90397ea9a0d803e299cc12d5f4b86d634ea5464c7c4e150ba6bab1f935c450,2024-12-30T19:03:42.583000 CVE-2021-47247,0,0,cf90397ea9a0d803e299cc12d5f4b86d634ea5464c7c4e150ba6bab1f935c450,2024-12-30T19:03:42.583000
CVE-2021-47248,0,0,6815ade5961ff0ed77e72f0840fb9b58804880066f8794fef7922658c81186c7,2024-11-21T06:35:43.190000 CVE-2021-47248,0,0,6815ade5961ff0ed77e72f0840fb9b58804880066f8794fef7922658c81186c7,2024-11-21T06:35:43.190000
CVE-2021-47249,0,1,9df064926874e19baf591bf7503852913c51ff093c8d41822dae8720c5b2ce56,2024-12-30T19:01:43.417000 CVE-2021-47249,0,0,9df064926874e19baf591bf7503852913c51ff093c8d41822dae8720c5b2ce56,2024-12-30T19:01:43.417000
CVE-2021-47250,0,1,3895234a4bca9fd42201e364d83eda41b7862d08052563ff8d97516234423938,2024-12-30T19:00:27.217000 CVE-2021-47250,0,0,3895234a4bca9fd42201e364d83eda41b7862d08052563ff8d97516234423938,2024-12-30T19:00:27.217000
CVE-2021-47251,0,0,910383b3bb8c00e34855fcda8c3ec1d6bd52252a19036ebff555cedb288a9861,2024-11-21T06:35:43.570000 CVE-2021-47251,0,0,910383b3bb8c00e34855fcda8c3ec1d6bd52252a19036ebff555cedb288a9861,2024-11-21T06:35:43.570000
CVE-2021-47252,0,0,8f2ae53195e1d344dcddbea9cafebc6f137c371b83b1765850464be0bba730c1,2024-11-21T06:35:43.683000 CVE-2021-47252,0,0,8f2ae53195e1d344dcddbea9cafebc6f137c371b83b1765850464be0bba730c1,2024-11-21T06:35:43.683000
CVE-2021-47253,0,0,9bc677a4b5d13cd8fd06f4b9374a9aa62a3778e7b12c1d5302b8dc1a583e0856,2024-12-30T18:59:10.807000 CVE-2021-47253,0,0,9bc677a4b5d13cd8fd06f4b9374a9aa62a3778e7b12c1d5302b8dc1a583e0856,2024-12-30T18:59:10.807000
CVE-2021-47254,0,1,8ad5e1955743b8c3f06c84a200072a25601d6c4b3267d5b5db59a4daa0deeb02,2024-12-30T19:50:58.543000 CVE-2021-47254,0,0,8ad5e1955743b8c3f06c84a200072a25601d6c4b3267d5b5db59a4daa0deeb02,2024-12-30T19:50:58.543000
CVE-2021-47255,0,0,ab70f22d16c8786e854f11454b2eea8afe54254c834b2d2bd6063c66081a9479,2024-11-21T06:35:44.037000 CVE-2021-47255,0,0,ab70f22d16c8786e854f11454b2eea8afe54254c834b2d2bd6063c66081a9479,2024-11-21T06:35:44.037000
CVE-2021-47256,0,0,0f51de379b692c2d0a857a25782e52c1e5499b2d759e9b9b493c9ede6fbb425a,2024-11-21T06:35:44.143000 CVE-2021-47256,0,0,0f51de379b692c2d0a857a25782e52c1e5499b2d759e9b9b493c9ede6fbb425a,2024-11-21T06:35:44.143000
CVE-2021-47257,0,0,56979cfa19b4e765d1c353c91739346331d68d4f631479f694c06bdaf5dfe282,2024-11-21T06:35:44.263000 CVE-2021-47257,0,0,56979cfa19b4e765d1c353c91739346331d68d4f631479f694c06bdaf5dfe282,2024-11-21T06:35:44.263000
@ -187575,9 +187575,9 @@ CVE-2021-47384,0,0,bb89862113d2a6336d33a29fcea8543dd2e3a5aaa8344e5d7c7ced6e0e1c1
CVE-2021-47385,0,0,c6a82e7a12e897338326b0272d766105a2467dab6588deae93331929ba6df3aa,2024-12-23T21:01:31.227000 CVE-2021-47385,0,0,c6a82e7a12e897338326b0272d766105a2467dab6588deae93331929ba6df3aa,2024-12-23T21:01:31.227000
CVE-2021-47386,0,0,e2c2600fd20b80e34f73e540ac913f3f01a2782eb98515ebb9fa3047ce7b2d75,2024-11-21T06:36:02.267000 CVE-2021-47386,0,0,e2c2600fd20b80e34f73e540ac913f3f01a2782eb98515ebb9fa3047ce7b2d75,2024-11-21T06:36:02.267000
CVE-2021-47387,0,0,f9abbc75a71e5f75679f53162608a51731e5b30a945f073035121479b6bfac5c,2024-11-21T06:36:02.443000 CVE-2021-47387,0,0,f9abbc75a71e5f75679f53162608a51731e5b30a945f073035121479b6bfac5c,2024-11-21T06:36:02.443000
CVE-2021-47388,0,1,5a99c0375f375933a2ee3ed84e78b90361dbfbf675205e3e3fce5b62f99bd86e,2024-12-30T20:05:07.740000 CVE-2021-47388,0,0,5a99c0375f375933a2ee3ed84e78b90361dbfbf675205e3e3fce5b62f99bd86e,2024-12-30T20:05:07.740000
CVE-2021-47389,0,0,a22c8848716a5fab6e02d5133120c67e86b798dc6ef581a21bef1750e67cc07a,2024-11-21T06:36:02.683000 CVE-2021-47389,0,0,a22c8848716a5fab6e02d5133120c67e86b798dc6ef581a21bef1750e67cc07a,2024-11-21T06:36:02.683000
CVE-2021-47390,0,1,76b23b24c5c2d0ae53e9c1096f39d0e46b517e03d31e39981405101939ea2a5e,2024-12-30T20:01:12.947000 CVE-2021-47390,0,0,76b23b24c5c2d0ae53e9c1096f39d0e46b517e03d31e39981405101939ea2a5e,2024-12-30T20:01:12.947000
CVE-2021-47391,0,0,f4d175a858a736db63367addd002e1ba9b1dcfb405e34dc62cdb19aff0fd59b2,2024-11-21T06:36:02.967000 CVE-2021-47391,0,0,f4d175a858a736db63367addd002e1ba9b1dcfb405e34dc62cdb19aff0fd59b2,2024-11-21T06:36:02.967000
CVE-2021-47392,0,0,3f96e381be60800107bbde2dc3edea028b592fe3ad227fb19a1c81e6c3642f9c,2024-11-21T06:36:03.080000 CVE-2021-47392,0,0,3f96e381be60800107bbde2dc3edea028b592fe3ad227fb19a1c81e6c3642f9c,2024-11-21T06:36:03.080000
CVE-2021-47393,0,0,cb8604c1f678df5603c14287ccd222cdf9bee87fd56ca2dc7d6971ba3d537ad9,2024-11-21T06:36:03.193000 CVE-2021-47393,0,0,cb8604c1f678df5603c14287ccd222cdf9bee87fd56ca2dc7d6971ba3d537ad9,2024-11-21T06:36:03.193000
@ -187596,21 +187596,21 @@ CVE-2021-47405,0,0,89d57154146c49bfe9495517a8aa4581b03bbe87f488a973134e87054c50f
CVE-2021-47406,0,0,29847dbf301ed41a53321d345125f661ba83b5bdb100a716152af1df0991e844,2024-11-21T06:36:04.807000 CVE-2021-47406,0,0,29847dbf301ed41a53321d345125f661ba83b5bdb100a716152af1df0991e844,2024-11-21T06:36:04.807000
CVE-2021-47407,0,0,99d0a8ae031df6e833de865dd6448cf1a9c23ee872668167073223966e2f1959,2024-11-21T06:36:04.980000 CVE-2021-47407,0,0,99d0a8ae031df6e833de865dd6448cf1a9c23ee872668167073223966e2f1959,2024-11-21T06:36:04.980000
CVE-2021-47408,0,0,1bb9de9f9fb0c138f101bdd077c488720764253896933e9ddd90af986223f012,2024-11-21T06:36:05.087000 CVE-2021-47408,0,0,1bb9de9f9fb0c138f101bdd077c488720764253896933e9ddd90af986223f012,2024-11-21T06:36:05.087000
CVE-2021-47409,0,1,4409848935610c806a916f78420b16db2a2ab2efcb7ac8dd99c83d5249f8b960,2024-12-30T20:00:41.677000 CVE-2021-47409,0,0,4409848935610c806a916f78420b16db2a2ab2efcb7ac8dd99c83d5249f8b960,2024-12-30T20:00:41.677000
CVE-2021-47410,0,0,4075c00f9d5ffd89b59e95e73a9e5fa86e05d5bb14ffa8d2023787fcb8cce122,2024-11-21T06:36:05.360000 CVE-2021-47410,0,0,4075c00f9d5ffd89b59e95e73a9e5fa86e05d5bb14ffa8d2023787fcb8cce122,2024-11-21T06:36:05.360000
CVE-2021-47411,0,0,d0414849cfb396e83266669cd4701dbb6a1022ea5a51c35023bb94eb4cfc8a37,2024-05-25T14:15:50.770000 CVE-2021-47411,0,0,d0414849cfb396e83266669cd4701dbb6a1022ea5a51c35023bb94eb4cfc8a37,2024-05-25T14:15:50.770000
CVE-2021-47412,0,0,af5c4c1fde936342c029e1565c710bac695bfb5efd8710ea589f197b466eba8a,2024-11-21T06:36:05.480000 CVE-2021-47412,0,0,af5c4c1fde936342c029e1565c710bac695bfb5efd8710ea589f197b466eba8a,2024-11-21T06:36:05.480000
CVE-2021-47413,0,1,269d04830df035e17e52fb59428cdae6c99bbe3c5236fc44bbeb5952e9d53939,2024-12-30T20:00:33.497000 CVE-2021-47413,0,0,269d04830df035e17e52fb59428cdae6c99bbe3c5236fc44bbeb5952e9d53939,2024-12-30T20:00:33.497000
CVE-2021-47414,0,0,a83b6ed138679e0a43562ce58d15e7d1f7e5382db9d90a7386573fd9d8fa4042,2024-11-21T06:36:05.703000 CVE-2021-47414,0,0,a83b6ed138679e0a43562ce58d15e7d1f7e5382db9d90a7386573fd9d8fa4042,2024-11-21T06:36:05.703000
CVE-2021-47415,0,0,dc3acb10fb2f650ccb4aeb9f23bddae7fbe6e40ab8bea8780dde5bc4fdccf5e4,2024-11-21T06:36:05.823000 CVE-2021-47415,0,0,dc3acb10fb2f650ccb4aeb9f23bddae7fbe6e40ab8bea8780dde5bc4fdccf5e4,2024-11-21T06:36:05.823000
CVE-2021-47416,0,0,562046249992ab3df84dbdde2ab890f105644babba8615b4902e2b57236f0090,2024-11-21T06:36:05.920000 CVE-2021-47416,0,0,562046249992ab3df84dbdde2ab890f105644babba8615b4902e2b57236f0090,2024-11-21T06:36:05.920000
CVE-2021-47417,0,0,ef21ffbd1d0dcc69c944405c3efcd8ac7dd51ac01c5d60bc09bf913df733ed89,2024-11-21T06:36:06.070000 CVE-2021-47417,0,0,ef21ffbd1d0dcc69c944405c3efcd8ac7dd51ac01c5d60bc09bf913df733ed89,2024-11-21T06:36:06.070000
CVE-2021-47418,0,0,6899899fab7502122cb0d0c6605217d6cf7dea34523bfc84e2e3729ce30f6da9,2024-11-21T06:36:06.193000 CVE-2021-47418,0,0,6899899fab7502122cb0d0c6605217d6cf7dea34523bfc84e2e3729ce30f6da9,2024-11-21T06:36:06.193000
CVE-2021-47419,0,0,b982e6e4a9c1837e4bd26bb12e302c41eb5725451cbe81290498c856c22cca0d,2024-11-21T06:36:06.323000 CVE-2021-47419,0,0,b982e6e4a9c1837e4bd26bb12e302c41eb5725451cbe81290498c856c22cca0d,2024-11-21T06:36:06.323000
CVE-2021-47420,0,1,00afc3432a4f0c3aee8977e415c889a3d8886055a9490eac336ef9b40a80b4d4,2024-12-30T19:37:04.973000 CVE-2021-47420,0,0,00afc3432a4f0c3aee8977e415c889a3d8886055a9490eac336ef9b40a80b4d4,2024-12-30T19:37:04.973000
CVE-2021-47421,0,0,0a40ba093314e9e6469359d21a45f9f0d40d5425308999e0d98a4f7123360a17,2024-11-21T06:36:06.613000 CVE-2021-47421,0,0,0a40ba093314e9e6469359d21a45f9f0d40d5425308999e0d98a4f7123360a17,2024-11-21T06:36:06.613000
CVE-2021-47422,0,1,dc3123e6db84d59806cae4c311d5662de81263eadfad4838d331b275a8dfec7e,2024-12-30T19:36:28.193000 CVE-2021-47422,0,0,dc3123e6db84d59806cae4c311d5662de81263eadfad4838d331b275a8dfec7e,2024-12-30T19:36:28.193000
CVE-2021-47423,0,1,12196f2af306d0a79235a9a7ad0c2f133ac495899947bc147939c1ec99649cea,2024-12-30T19:36:10.670000 CVE-2021-47423,0,0,12196f2af306d0a79235a9a7ad0c2f133ac495899947bc147939c1ec99649cea,2024-12-30T19:36:10.670000
CVE-2021-47424,0,0,4189ff43dc60d9554241d2c4440ad32e804985d54f34f55be1f82bcc2cd87d99,2024-11-21T06:36:06.987000 CVE-2021-47424,0,0,4189ff43dc60d9554241d2c4440ad32e804985d54f34f55be1f82bcc2cd87d99,2024-11-21T06:36:06.987000
CVE-2021-47425,0,0,e2b5aa50172001766bba9e788a9bbaed4a647c805f4b3c14b325213525f5549f,2024-11-21T06:36:07.100000 CVE-2021-47425,0,0,e2b5aa50172001766bba9e788a9bbaed4a647c805f4b3c14b325213525f5549f,2024-11-21T06:36:07.100000
CVE-2021-47426,0,0,2989407fa517372e9bf01c80af57d6ddef49052db8615ac698619e5b677bfbb2,2024-11-21T06:36:07.227000 CVE-2021-47426,0,0,2989407fa517372e9bf01c80af57d6ddef49052db8615ac698619e5b677bfbb2,2024-11-21T06:36:07.227000
@ -240244,13 +240244,13 @@ CVE-2023-52809,0,0,06fb50dbad98d780f58c95c2791d1c3f12990ff40b05f531900523b7250be
CVE-2023-5281,0,0,0dde3d47be17b2e8c89e29d997d88d34ff2d1fb77efff2971add322c1411cd86,2024-11-21T08:41:26.610000 CVE-2023-5281,0,0,0dde3d47be17b2e8c89e29d997d88d34ff2d1fb77efff2971add322c1411cd86,2024-11-21T08:41:26.610000
CVE-2023-52810,0,0,033e202b1b964254c835a600951f39154677f181fd64fb65ba86c78b507462ab,2024-11-21T08:40:38.193000 CVE-2023-52810,0,0,033e202b1b964254c835a600951f39154677f181fd64fb65ba86c78b507462ab,2024-11-21T08:40:38.193000
CVE-2023-52811,0,0,6fdf1ae36bbdb81962026ac9ebba5264232faf33780b5e5f3c66be7583e2123c,2024-11-21T08:40:38.407000 CVE-2023-52811,0,0,6fdf1ae36bbdb81962026ac9ebba5264232faf33780b5e5f3c66be7583e2123c,2024-11-21T08:40:38.407000
CVE-2023-52812,0,1,29ae65b672d446eaba78c5d133c587913587b8743f8010a5f01fbaedd5e1c51a,2024-12-30T20:09:10.617000 CVE-2023-52812,0,0,29ae65b672d446eaba78c5d133c587913587b8743f8010a5f01fbaedd5e1c51a,2024-12-30T20:09:10.617000
CVE-2023-52813,0,0,8bb52da0dbdd61653b93b1afd030ae1f5a08c060ed89db967b31f8f0a0970c37,2024-11-21T08:40:38.687000 CVE-2023-52813,0,0,8bb52da0dbdd61653b93b1afd030ae1f5a08c060ed89db967b31f8f0a0970c37,2024-11-21T08:40:38.687000
CVE-2023-52814,0,0,830f385e469f6ffe6e68841284fe631ce857af0bbb2762e1d231569f00870fc8,2024-11-21T08:40:38.810000 CVE-2023-52814,0,0,830f385e469f6ffe6e68841284fe631ce857af0bbb2762e1d231569f00870fc8,2024-11-21T08:40:38.810000
CVE-2023-52815,0,0,eba5e163497404c554cd332b709abdb9a171e906ea3b7ec2abe2060b2f441f9b,2024-11-21T08:40:39.020000 CVE-2023-52815,0,0,eba5e163497404c554cd332b709abdb9a171e906ea3b7ec2abe2060b2f441f9b,2024-11-21T08:40:39.020000
CVE-2023-52816,0,0,9a0a74d8664865f0e0bb0f116931b35d5d03409bf5c25f7a6061234fd638f707,2024-11-21T08:40:39.150000 CVE-2023-52816,0,0,9a0a74d8664865f0e0bb0f116931b35d5d03409bf5c25f7a6061234fd638f707,2024-11-21T08:40:39.150000
CVE-2023-52817,0,0,b5060cef143e775e53bbfdee136aa7f53eaa21f086cca6ff62fdbcd7b7ff64a7,2024-11-21T08:40:39.267000 CVE-2023-52817,0,0,b5060cef143e775e53bbfdee136aa7f53eaa21f086cca6ff62fdbcd7b7ff64a7,2024-11-21T08:40:39.267000
CVE-2023-52818,0,1,8d862ce39250d59b027ef9571ebf92c690255c750be947bdfdada81197754ff0,2024-12-30T20:08:57.877000 CVE-2023-52818,0,0,8d862ce39250d59b027ef9571ebf92c690255c750be947bdfdada81197754ff0,2024-12-30T20:08:57.877000
CVE-2023-52819,0,0,48cddf6448d32c2a1ec97c9c5728d4b7bb305534785e1ac963cb6a5f64346f51,2024-11-21T08:40:39.620000 CVE-2023-52819,0,0,48cddf6448d32c2a1ec97c9c5728d4b7bb305534785e1ac963cb6a5f64346f51,2024-11-21T08:40:39.620000
CVE-2023-5282,0,0,f07e37baff0e63cc749ec7f71e21860f35e668717bdaaacfad36980ef0fc48b2,2024-11-21T08:41:26.737000 CVE-2023-5282,0,0,f07e37baff0e63cc749ec7f71e21860f35e668717bdaaacfad36980ef0fc48b2,2024-11-21T08:41:26.737000
CVE-2023-52820,0,0,7b049c5fb4ec6057c00414a07ea263a069fc43603dbf16ccc3b91309982944d6,2024-05-24T16:15:09.313000 CVE-2023-52820,0,0,7b049c5fb4ec6057c00414a07ea263a069fc43603dbf16ccc3b91309982944d6,2024-05-24T16:15:09.313000
@ -240259,7 +240259,7 @@ CVE-2023-52822,0,0,54640bd0e26163fd48ceee5b222b2b51878103ab2e09d2e9082e078e10e4f
CVE-2023-52823,0,0,365706db1426da8a360d5c4a5d6e4e80add016a67d8a72c25123ad52152b123d,2024-05-24T11:15:09.367000 CVE-2023-52823,0,0,365706db1426da8a360d5c4a5d6e4e80add016a67d8a72c25123ad52152b123d,2024-05-24T11:15:09.367000
CVE-2023-52824,0,0,58849bdf8b7c9d9f7a6f0f83e4cf0467639c25e06971d60aecad6c886ee28255,2024-05-24T16:15:09.777000 CVE-2023-52824,0,0,58849bdf8b7c9d9f7a6f0f83e4cf0467639c25e06971d60aecad6c886ee28255,2024-05-24T16:15:09.777000
CVE-2023-52825,0,0,e7b7702f2cc7ed84bf0e0f9f8e3877f1b1c0e191fbf2064a0fb697b01f131a2c,2024-11-21T08:40:39.997000 CVE-2023-52825,0,0,e7b7702f2cc7ed84bf0e0f9f8e3877f1b1c0e191fbf2064a0fb697b01f131a2c,2024-11-21T08:40:39.997000
CVE-2023-52826,0,1,93c3777132f6f809db8434b53ccec4473148479dd75f9b54635ec0f454099ac8,2024-12-30T20:08:33.040000 CVE-2023-52826,0,0,93c3777132f6f809db8434b53ccec4473148479dd75f9b54635ec0f454099ac8,2024-12-30T20:08:33.040000
CVE-2023-52827,0,0,d47b608f5ab430a0594861c22553453691e94d4b3b3045af43ae10820dc28549,2024-11-21T08:40:40.303000 CVE-2023-52827,0,0,d47b608f5ab430a0594861c22553453691e94d4b3b3045af43ae10820dc28549,2024-11-21T08:40:40.303000
CVE-2023-52828,0,0,5f2dd0feef02aa3514ddb029f4a2a290346e0237ddb1f2f0873fdf7b02d9ebc4,2024-11-21T08:40:40.430000 CVE-2023-52828,0,0,5f2dd0feef02aa3514ddb029f4a2a290346e0237ddb1f2f0873fdf7b02d9ebc4,2024-11-21T08:40:40.430000
CVE-2023-52829,0,0,411a0ce7532cfe1210c0999ae4b6a679f98c4d1ae9f3d811a60990427b0bad12,2024-12-04T21:15:20.377000 CVE-2023-52829,0,0,411a0ce7532cfe1210c0999ae4b6a679f98c4d1ae9f3d811a60990427b0bad12,2024-12-04T21:15:20.377000
@ -240284,11 +240284,11 @@ CVE-2023-52845,0,0,bcb26e737dc4f3baf2d24ecd49e9efae880cfdcf8864ebe288815eafff3e8
CVE-2023-52846,0,0,01c42a6b8e7be25d575b319f42737d3ecdca641a56e94f022df4a7164eb6f02c,2024-11-21T08:40:42.700000 CVE-2023-52846,0,0,01c42a6b8e7be25d575b319f42737d3ecdca641a56e94f022df4a7164eb6f02c,2024-11-21T08:40:42.700000
CVE-2023-52847,0,0,6304dbc304f676ebb867c7a55ce40656720c1406d9bed9bac29a8b368f29bd19,2024-11-21T08:40:42.820000 CVE-2023-52847,0,0,6304dbc304f676ebb867c7a55ce40656720c1406d9bed9bac29a8b368f29bd19,2024-11-21T08:40:42.820000
CVE-2023-52848,0,0,b83baba516532b1010d7c66d73abfe92a1b9c878ad414616a7feb31a5f084310,2024-11-21T08:40:42.947000 CVE-2023-52848,0,0,b83baba516532b1010d7c66d73abfe92a1b9c878ad414616a7feb31a5f084310,2024-11-21T08:40:42.947000
CVE-2023-52849,0,1,f6ddd31d6e2b7b97c260676cfb8b85b07561190bd66bad001b32fe754a29cfca,2024-12-30T20:09:41.537000 CVE-2023-52849,0,0,f6ddd31d6e2b7b97c260676cfb8b85b07561190bd66bad001b32fe754a29cfca,2024-12-30T20:09:41.537000
CVE-2023-5285,0,0,8e1cd37b97e33f0f0685b14f4312036f59f160d705ec149a6ef0ac0f38fce8bc,2024-11-21T08:41:27.130000 CVE-2023-5285,0,0,8e1cd37b97e33f0f0685b14f4312036f59f160d705ec149a6ef0ac0f38fce8bc,2024-11-21T08:41:27.130000
CVE-2023-52850,0,1,b48747e9fef3d05f3a3f87733c20b6b6c87bf8863b4830cf8b2416b04cab3e39,2024-12-30T20:09:31.393000 CVE-2023-52850,0,0,b48747e9fef3d05f3a3f87733c20b6b6c87bf8863b4830cf8b2416b04cab3e39,2024-12-30T20:09:31.393000
CVE-2023-52851,0,0,31bace3bc49e77cdc3e77d0890b11d567f07b4d68474bfec4e20aab64829efd4,2024-11-21T08:40:43.290000 CVE-2023-52851,0,0,31bace3bc49e77cdc3e77d0890b11d567f07b4d68474bfec4e20aab64829efd4,2024-11-21T08:40:43.290000
CVE-2023-52852,0,1,56c0e6b2ce3e3baf070288075905fde5a1f96329a996ea3ff2ad9456eb26c5f5,2024-12-30T20:09:19.563000 CVE-2023-52852,0,0,56c0e6b2ce3e3baf070288075905fde5a1f96329a996ea3ff2ad9456eb26c5f5,2024-12-30T20:09:19.563000
CVE-2023-52853,0,0,32c4f67493ddd24d490332b3435324973b5881d501d41ef50aa43506d33b569d,2024-11-21T08:40:43.527000 CVE-2023-52853,0,0,32c4f67493ddd24d490332b3435324973b5881d501d41ef50aa43506d33b569d,2024-11-21T08:40:43.527000
CVE-2023-52854,0,0,9f48ddf6cf641b50de9ded856ef6355837062d853a3b3d9d622b9fb3fb40325c,2024-11-21T08:40:43.647000 CVE-2023-52854,0,0,9f48ddf6cf641b50de9ded856ef6355837062d853a3b3d9d622b9fb3fb40325c,2024-11-21T08:40:43.647000
CVE-2023-52855,0,0,fefd8691b2ed782148f182e3b7ecd154c88289d5d9aed5fb9541a88d6e6f2d63,2024-11-21T08:40:43.770000 CVE-2023-52855,0,0,fefd8691b2ed782148f182e3b7ecd154c88289d5d9aed5fb9541a88d6e6f2d63,2024-11-21T08:40:43.770000
@ -244676,7 +244676,9 @@ CVE-2024-11940,0,0,01a3f490196796516894d51522c528bc6c3ce1fe45bff9fda5a3ce37bc326
CVE-2024-11941,0,0,45c946faed9eb1ec18b9452e07479f063cfb793c63899cab9a102bedb1be5328,2024-12-05T16:15:23.893000 CVE-2024-11941,0,0,45c946faed9eb1ec18b9452e07479f063cfb793c63899cab9a102bedb1be5328,2024-12-05T16:15:23.893000
CVE-2024-11942,0,0,55526aafa6b479f8732b6654f613495eb95fa16f8129024967b3914532d074f0,2024-12-05T16:15:24.033000 CVE-2024-11942,0,0,55526aafa6b479f8732b6654f613495eb95fa16f8129024967b3914532d074f0,2024-12-05T16:15:24.033000
CVE-2024-11943,0,0,5db2b5cec073953e68197fa73fddd59bb82bf096d7a8174dee13bdb32f9486e1,2024-12-07T02:15:18.393000 CVE-2024-11943,0,0,5db2b5cec073953e68197fa73fddd59bb82bf096d7a8174dee13bdb32f9486e1,2024-12-07T02:15:18.393000
CVE-2024-11944,1,1,b634172a3925b100e35875fcdb68c272c3b5ca712036d9b14bc3c274d75de098,2024-12-30T21:15:05.493000
CVE-2024-11945,0,0,d5529e16b2c34f9b5e6b9ddc5a03f73ebf6c118ac10e072ab626561b83cdfe71,2024-12-10T10:15:04.810000 CVE-2024-11945,0,0,d5529e16b2c34f9b5e6b9ddc5a03f73ebf6c118ac10e072ab626561b83cdfe71,2024-12-10T10:15:04.810000
CVE-2024-11946,1,1,9bb9e62cef0f7be1b4ba198de6929920aa5b1c620ccfeccadc62834476767120,2024-12-30T21:15:05.920000
CVE-2024-11947,0,0,76594c096f66db4264ce24827f38ddba1b904bd8285bdd79729a6ff69e4900e9,2024-12-13T19:33:07.497000 CVE-2024-11947,0,0,76594c096f66db4264ce24827f38ddba1b904bd8285bdd79729a6ff69e4900e9,2024-12-13T19:33:07.497000
CVE-2024-11948,0,0,63c29d57ca2d54a9012c75c22d15bb5abf864d6477c7fa55fde21714e103ae6a,2024-12-13T19:32:21.150000 CVE-2024-11948,0,0,63c29d57ca2d54a9012c75c22d15bb5abf864d6477c7fa55fde21714e103ae6a,2024-12-13T19:32:21.150000
CVE-2024-11949,0,0,8c8ca0b9d255f5a6445ed2a115142b5d13432f7081db7ee9affe350ed098a50e,2024-12-13T19:28:30.873000 CVE-2024-11949,0,0,8c8ca0b9d255f5a6445ed2a115142b5d13432f7081db7ee9affe350ed098a50e,2024-12-13T19:28:30.873000
@ -245096,6 +245098,9 @@ CVE-2024-12744,0,0,db2cef6174f0f203336fd1a602951ac160bef125d0730a8230a23f49ec8a8
CVE-2024-12745,0,0,d39132eefd07723f30fb227ef12fb8aaf3a83b250d0f3b28d89ab1e076f94541,2024-12-26T15:15:06.527000 CVE-2024-12745,0,0,d39132eefd07723f30fb227ef12fb8aaf3a83b250d0f3b28d89ab1e076f94541,2024-12-26T15:15:06.527000
CVE-2024-12746,0,0,df5c191123ddac7611e41b52ec167446638f37d1f7bfb5919f7163608ca92308,2024-12-26T15:15:06.650000 CVE-2024-12746,0,0,df5c191123ddac7611e41b52ec167446638f37d1f7bfb5919f7163608ca92308,2024-12-26T15:15:06.650000
CVE-2024-1275,0,0,55e303d499b7cd70146b064f11442ebd0ad45cafbb26b305d69871c04faa255a,2024-11-21T08:50:12.913000 CVE-2024-1275,0,0,55e303d499b7cd70146b064f11442ebd0ad45cafbb26b305d69871c04faa255a,2024-11-21T08:50:12.913000
CVE-2024-12751,1,1,c021fa6050fdcc7d460a13e6fbbdc375489db9f83ffb1d4962a94fd17a310ee0,2024-12-30T21:15:06.130000
CVE-2024-12752,1,1,aceb91b13a48ab0b91f2671dfccf956bcd438f2d51f93df4dee52b510998e9fe,2024-12-30T21:15:06.260000
CVE-2024-12753,1,1,e4ba0db71191a4ffaab183a2c11034bf6d7abf0b7b96de04fec1007267c8b1fd,2024-12-30T21:15:06.400000
CVE-2024-12754,0,0,cc49a740b9b02282be04809e0ec9e9f9181e846c2c42209dd24ca5d17558bc72,2024-12-30T17:15:07.127000 CVE-2024-12754,0,0,cc49a740b9b02282be04809e0ec9e9f9181e846c2c42209dd24ca5d17558bc72,2024-12-30T17:15:07.127000
CVE-2024-1276,0,0,342e07ea1475f57185158b84be14279572eebbc1b91e4c07c491730599e6701d,2024-11-21T08:50:13.050000 CVE-2024-1276,0,0,342e07ea1475f57185158b84be14279572eebbc1b91e4c07c491730599e6701d,2024-11-21T08:50:13.050000
CVE-2024-1277,0,0,fdccc6e1d66b4b759fea691d8a9a7ad4f8cc0afd5b2fb224e654b3bd9de12942,2024-11-21T08:50:13.170000 CVE-2024-1277,0,0,fdccc6e1d66b4b759fea691d8a9a7ad4f8cc0afd5b2fb224e654b3bd9de12942,2024-11-21T08:50:13.170000
@ -245255,9 +245260,9 @@ CVE-2024-13015,0,0,3dcd014dbef30b2e70ec20ccecdaaf615115de618369fe62c340a42e4d8d8
CVE-2024-13016,0,0,b67ea70e64cef9d4f2f5d631157f934916ce9c950363c714e96ab8c161eaacc5,2024-12-29T16:15:05.300000 CVE-2024-13016,0,0,b67ea70e64cef9d4f2f5d631157f934916ce9c950363c714e96ab8c161eaacc5,2024-12-29T16:15:05.300000
CVE-2024-13017,0,0,406d1ed5cbe2575a1a54010aafe73d57848810b7f6f5e6c2e0a9b1cec549270f,2024-12-29T17:15:05.873000 CVE-2024-13017,0,0,406d1ed5cbe2575a1a54010aafe73d57848810b7f6f5e6c2e0a9b1cec549270f,2024-12-29T17:15:05.873000
CVE-2024-13018,0,0,083b5e4e2fa86246983f0fd476b84784f9dac25dcba6ed963c92124634ebb897,2024-12-29T18:15:05.027000 CVE-2024-13018,0,0,083b5e4e2fa86246983f0fd476b84784f9dac25dcba6ed963c92124634ebb897,2024-12-29T18:15:05.027000
CVE-2024-13019,0,1,72a1973cf4f4a77621dcfa6c2ee34bdcf9f28c12b7f488cb496979d278302450,2024-12-30T19:15:06.847000 CVE-2024-13019,0,0,72a1973cf4f4a77621dcfa6c2ee34bdcf9f28c12b7f488cb496979d278302450,2024-12-30T19:15:06.847000
CVE-2024-1302,0,0,50e21539c22b43b4db748f33a4680786d0cd3b39c9a7a5fc858bc75c33660782,2024-11-21T08:50:16.467000 CVE-2024-1302,0,0,50e21539c22b43b4db748f33a4680786d0cd3b39c9a7a5fc858bc75c33660782,2024-11-21T08:50:16.467000
CVE-2024-13020,0,1,59c12b2192e99fc7791f2432b5fbc4c1305151c3f5328f38436d2f225c41c63a,2024-12-30T19:15:07.537000 CVE-2024-13020,0,0,59c12b2192e99fc7791f2432b5fbc4c1305151c3f5328f38436d2f225c41c63a,2024-12-30T19:15:07.537000
CVE-2024-13021,0,0,db94a67fd5023220dfcd097aa849d00631aaccd25e2ab01bcc8f620ec54fee4a,2024-12-30T18:15:08.877000 CVE-2024-13021,0,0,db94a67fd5023220dfcd097aa849d00631aaccd25e2ab01bcc8f620ec54fee4a,2024-12-30T18:15:08.877000
CVE-2024-13022,0,0,31946f46234a2f885529fc55fb9df522feaa7112e2244bd255db91f99134c814,2024-12-29T20:15:05.980000 CVE-2024-13022,0,0,31946f46234a2f885529fc55fb9df522feaa7112e2244bd255db91f99134c814,2024-12-29T20:15:05.980000
CVE-2024-13023,0,0,a6002ae756a126843e0244f11dec8062c69ff459b14d4771d8dead00e17d6b47,2024-12-29T21:15:06.020000 CVE-2024-13023,0,0,a6002ae756a126843e0244f11dec8062c69ff459b14d4771d8dead00e17d6b47,2024-12-29T21:15:06.020000
@ -245277,7 +245282,18 @@ CVE-2024-13037,0,0,ad1a2687fd8ca034a4ba7eb450dd7b7cb6ce76af79e47f53a4dcc006981f2
CVE-2024-13038,0,0,4583c4724ce1695329d04a091cf334038675ae1fc4b89e1e9c52332e7b115d63,2024-12-30T17:15:08.473000 CVE-2024-13038,0,0,4583c4724ce1695329d04a091cf334038675ae1fc4b89e1e9c52332e7b115d63,2024-12-30T17:15:08.473000
CVE-2024-13039,0,0,5fcf5529e0f60e939c342e8ff9bcb8e9371ea109f210669df3b0c791fd94ef0a,2024-12-30T17:15:08.597000 CVE-2024-13039,0,0,5fcf5529e0f60e939c342e8ff9bcb8e9371ea109f210669df3b0c791fd94ef0a,2024-12-30T17:15:08.597000
CVE-2024-1304,0,0,7f3d377d10786bd7b29e3437adfa1f791151a43db698785def3901d685804d14,2024-11-21T08:50:16.717000 CVE-2024-1304,0,0,7f3d377d10786bd7b29e3437adfa1f791151a43db698785def3901d685804d14,2024-11-21T08:50:16.717000
CVE-2024-13042,1,1,79d3038a3776ed8900f4502faeed80d95c375db4f2c3ae792b7f1b6168d6c4e8,2024-12-30T21:15:06.523000
CVE-2024-13043,1,1,a57d8becfe9ca92a82190ea64963a694c6040f83cb00135ce055f57002bf8d4c,2024-12-30T21:15:06.713000
CVE-2024-13044,1,1,6d3c3cdcc975fb5586b26099e393540139d286d458e4c5db4ccad7a86d240708,2024-12-30T21:15:06.840000
CVE-2024-13045,1,1,b32d594c46ea0f4c48c42384ee94c921a68ba0cc53643756bb2b38fcd53b620a,2024-12-30T21:15:06.963000
CVE-2024-13046,1,1,c23d299c3b59ae6bc264c7b5c5d03889b2a4f3b7dfc1a98cde8f678439be865b,2024-12-30T21:15:07.097000
CVE-2024-13047,1,1,dc7aafd74287433931ab2a00582ad328a0bfc903e0fe51d5645e7afe6ca004bd,2024-12-30T21:15:07.220000
CVE-2024-13048,1,1,67adbf23fa9118f8304c09b8b6e3ff63b96c91828b41fba5df352ed6981833f4,2024-12-30T21:15:07.347000
CVE-2024-13049,1,1,f591721723d514d93b81ea9ce6a3f8016e8d2fa1c15ed626bcbaa083ac3ec9cd,2024-12-30T21:15:07.470000
CVE-2024-1305,0,0,61bd2e20ff0aa394ece1e84d5d848dafdcba1e6f1c6375393ac194bd0f52a153,2024-11-21T08:50:16.840000 CVE-2024-1305,0,0,61bd2e20ff0aa394ece1e84d5d848dafdcba1e6f1c6375393ac194bd0f52a153,2024-11-21T08:50:16.840000
CVE-2024-13050,1,1,84109de165147e4a5232ee1fdc9c6d22162f7758c34e8757df3c209c53af5194,2024-12-30T21:15:07.593000
CVE-2024-13051,1,1,1be1ae94a61dba469e5e49f0e3a210eb507d631c9c82589acffd3c63211509af,2024-12-30T21:15:07.717000
CVE-2024-13058,1,1,91396049ed5baf4a6f156f57d5990485463c9e52e997b4c7fdc31249002c7bf7,2024-12-30T22:15:05.957000
CVE-2024-1306,0,0,0542247252f536db3d3f5f372f6b06cf8f9322e7de2b3d2f5040c13d3f80547b,2024-11-21T08:50:17.053000 CVE-2024-1306,0,0,0542247252f536db3d3f5f372f6b06cf8f9322e7de2b3d2f5040c13d3f80547b,2024-11-21T08:50:17.053000
CVE-2024-1307,0,0,791d403fd6ce043b636953425f5891ef42986249387c4cd3003ec2c058fbc715,2024-11-21T08:50:17.233000 CVE-2024-1307,0,0,791d403fd6ce043b636953425f5891ef42986249387c4cd3003ec2c058fbc715,2024-11-21T08:50:17.233000
CVE-2024-1308,0,0,b2bb733c7402260f9ace902e9d676967e691f690d52b513a8afbdef713b7d4c5,2024-11-21T08:50:17.413000 CVE-2024-1308,0,0,b2bb733c7402260f9ace902e9d676967e691f690d52b513a8afbdef713b7d4c5,2024-11-21T08:50:17.413000
@ -257933,12 +257949,12 @@ CVE-2024-35899,0,0,11a2b23cf941f9839b39efc317ac13f10c84ba39dab1cd8d40a7557ebbc83
CVE-2024-3590,0,0,d22476fa387864e078186d0e7523ee0ad7036681a9b2a59859776de3e93311e6,2024-11-21T09:29:56.237000 CVE-2024-3590,0,0,d22476fa387864e078186d0e7523ee0ad7036681a9b2a59859776de3e93311e6,2024-11-21T09:29:56.237000
CVE-2024-35900,0,0,50e870acb72fb71c84dc7dff1cb78cd820e12556e9b4f3f5b0b8691544c6253e,2024-11-21T09:21:09.730000 CVE-2024-35900,0,0,50e870acb72fb71c84dc7dff1cb78cd820e12556e9b4f3f5b0b8691544c6253e,2024-11-21T09:21:09.730000
CVE-2024-35901,0,0,cd3edf70ee28e7cbd408545a03be56c550e1844b8b07be05abd5f15de057a4a1,2024-11-21T09:21:09.867000 CVE-2024-35901,0,0,cd3edf70ee28e7cbd408545a03be56c550e1844b8b07be05abd5f15de057a4a1,2024-11-21T09:21:09.867000
CVE-2024-35902,0,1,d96a0ab7e74ae781082c74956ec3689f5500ab1ae77b1478881cc822cd8de55a,2024-12-30T19:47:46.853000 CVE-2024-35902,0,0,d96a0ab7e74ae781082c74956ec3689f5500ab1ae77b1478881cc822cd8de55a,2024-12-30T19:47:46.853000
CVE-2024-35903,0,0,b0a58707169cb46f406dc8821e52458e0f21e86329172db70bd8d6d3fc236b53,2024-11-21T09:21:10.117000 CVE-2024-35903,0,0,b0a58707169cb46f406dc8821e52458e0f21e86329172db70bd8d6d3fc236b53,2024-11-21T09:21:10.117000
CVE-2024-35904,0,0,6a8a43a00a33be7e600d0f99425837d586e2af006bd244b99f0bb205e27e9e6d,2024-11-21T09:21:10.303000 CVE-2024-35904,0,0,6a8a43a00a33be7e600d0f99425837d586e2af006bd244b99f0bb205e27e9e6d,2024-11-21T09:21:10.303000
CVE-2024-35905,0,1,2e853f5ed500836fa8d6b9061945a68ee5b2669edf25898295696baf9e37a1f0,2024-12-30T19:47:30.700000 CVE-2024-35905,0,0,2e853f5ed500836fa8d6b9061945a68ee5b2669edf25898295696baf9e37a1f0,2024-12-30T19:47:30.700000
CVE-2024-35906,0,0,70641f3710ab7a414753b1ae812647e2cbc2c61278b599a8ddd224db78108501,2024-05-23T14:15:10.010000 CVE-2024-35906,0,0,70641f3710ab7a414753b1ae812647e2cbc2c61278b599a8ddd224db78108501,2024-05-23T14:15:10.010000
CVE-2024-35907,0,1,dc58b910ee9f37226f3c1c8277b48e81a4767166656743ae592d874b9cfc4a3b,2024-12-30T19:35:53.437000 CVE-2024-35907,0,0,dc58b910ee9f37226f3c1c8277b48e81a4767166656743ae592d874b9cfc4a3b,2024-12-30T19:35:53.437000
CVE-2024-35908,0,0,9a3127fc2dcc56fa3ef0510f5888d8233de37b1948ac31e2d9fa490a31721ab0,2024-11-21T09:21:10.690000 CVE-2024-35908,0,0,9a3127fc2dcc56fa3ef0510f5888d8233de37b1948ac31e2d9fa490a31721ab0,2024-11-21T09:21:10.690000
CVE-2024-35909,0,0,554c220395a9f5a1375258e018f8ed986d0caa4f773d6b01782597a19e34fda4,2024-11-21T09:21:10.813000 CVE-2024-35909,0,0,554c220395a9f5a1375258e018f8ed986d0caa4f773d6b01782597a19e34fda4,2024-11-21T09:21:10.813000
CVE-2024-3591,0,0,e422baa207375a68d2a2fad897f062ac1001b3182aef2bc5608dbc800290852d,2024-11-21T09:29:56.423000 CVE-2024-3591,0,0,e422baa207375a68d2a2fad897f062ac1001b3182aef2bc5608dbc800290852d,2024-11-21T09:29:56.423000
@ -257954,20 +257970,20 @@ CVE-2024-35918,0,0,b84a4a8eaff0e9aa0772539706471f0485db8b7ae1e504faf03291dd1bedb
CVE-2024-35919,0,0,e631246407300ae6e30d83cedcbee4935288a2744219786e10d196588f3f5df9,2024-11-21T09:21:12.250000 CVE-2024-35919,0,0,e631246407300ae6e30d83cedcbee4935288a2744219786e10d196588f3f5df9,2024-11-21T09:21:12.250000
CVE-2024-3592,0,0,ff5147fd52698b783751119964844ea2247003cb656728005bbdc75700fd6e1d,2024-11-21T09:29:56.610000 CVE-2024-3592,0,0,ff5147fd52698b783751119964844ea2247003cb656728005bbdc75700fd6e1d,2024-11-21T09:29:56.610000
CVE-2024-35920,0,0,d5937bd2774497f79326452f53ec5c30b02bc25bf82e6f9690d0e6395feac28d,2024-11-21T09:21:12.443000 CVE-2024-35920,0,0,d5937bd2774497f79326452f53ec5c30b02bc25bf82e6f9690d0e6395feac28d,2024-11-21T09:21:12.443000
CVE-2024-35921,0,1,4526cc1ba7186dbcecaca88016f42ddd8138d3cd50124e674014b54b22fb74d3,2024-12-30T19:35:04.897000 CVE-2024-35921,0,0,4526cc1ba7186dbcecaca88016f42ddd8138d3cd50124e674014b54b22fb74d3,2024-12-30T19:35:04.897000
CVE-2024-35922,0,1,0c88e554ffaa341ceefcaf9be80ad5df621b046da9f94425d0c621a8e53f1e17,2024-12-30T19:27:42.720000 CVE-2024-35922,0,0,0c88e554ffaa341ceefcaf9be80ad5df621b046da9f94425d0c621a8e53f1e17,2024-12-30T19:27:42.720000
CVE-2024-35923,0,0,e200bbefa4260a7322c5705e6c101e370170f714b6cca2259ba31c94a243aae4,2024-05-25T14:15:53.013000 CVE-2024-35923,0,0,e200bbefa4260a7322c5705e6c101e370170f714b6cca2259ba31c94a243aae4,2024-05-25T14:15:53.013000
CVE-2024-35924,0,0,51a8e81a5087f6b00f86aef3df30b13903521527bd7c24804424b3f4f88b017b,2024-11-21T09:21:12.833000 CVE-2024-35924,0,0,51a8e81a5087f6b00f86aef3df30b13903521527bd7c24804424b3f4f88b017b,2024-11-21T09:21:12.833000
CVE-2024-35925,0,0,527fefad4777ff7cb6251a7bffe472b80d43edd30c48c261e4833904b72dcd03,2024-11-21T09:21:12.953000 CVE-2024-35925,0,0,527fefad4777ff7cb6251a7bffe472b80d43edd30c48c261e4833904b72dcd03,2024-11-21T09:21:12.953000
CVE-2024-35926,0,0,c1b13d208fac57fe78f6933a263aa2f330043107ad1ad5de4da551ecec504628,2024-11-21T09:21:13.097000 CVE-2024-35926,0,0,c1b13d208fac57fe78f6933a263aa2f330043107ad1ad5de4da551ecec504628,2024-11-21T09:21:13.097000
CVE-2024-35927,0,0,278ce2f015c27adcc7ff8c3c6be22b3e8c5bb291856afb164b072d0d8d61b636,2024-11-21T09:21:13.223000 CVE-2024-35927,0,0,278ce2f015c27adcc7ff8c3c6be22b3e8c5bb291856afb164b072d0d8d61b636,2024-11-21T09:21:13.223000
CVE-2024-35928,0,0,1c31dc8c665b8952880067e761bee324da2eee6fa320ed892680e88b3dd7b63e,2024-12-19T12:15:06.590000 CVE-2024-35928,0,0,1c31dc8c665b8952880067e761bee324da2eee6fa320ed892680e88b3dd7b63e,2024-12-19T12:15:06.590000
CVE-2024-35929,0,1,7da540c66ffc823238b17395ecbf47d1012e0cd64e229ac26e5cc7bd9ae7f5a8,2024-12-30T19:56:30.927000 CVE-2024-35929,0,0,7da540c66ffc823238b17395ecbf47d1012e0cd64e229ac26e5cc7bd9ae7f5a8,2024-12-30T19:56:30.927000
CVE-2024-3593,0,0,7dfe1a06ca99b709e0966f80e5fa7243762a8725a5825da6ebc20a944f2ce167,2024-11-21T09:29:56.757000 CVE-2024-3593,0,0,7dfe1a06ca99b709e0966f80e5fa7243762a8725a5825da6ebc20a944f2ce167,2024-11-21T09:29:56.757000
CVE-2024-35930,0,1,5013df0e99717b1ece542581ca441e3bc2ac723ea4bcaf3c94a778bd9158d242,2024-12-30T19:52:55.313000 CVE-2024-35930,0,0,5013df0e99717b1ece542581ca441e3bc2ac723ea4bcaf3c94a778bd9158d242,2024-12-30T19:52:55.313000
CVE-2024-35931,0,0,82567fcbead3c5129937032b3ec99d3e2b49554c36aa4a0599fa7a1399168c13,2024-11-21T09:21:13.837000 CVE-2024-35931,0,0,82567fcbead3c5129937032b3ec99d3e2b49554c36aa4a0599fa7a1399168c13,2024-11-21T09:21:13.837000
CVE-2024-35932,0,0,793922418147ab2c922ff7f32e99bfc27b35844d6861bc041d1cc83782b09a20,2024-11-21T09:21:13.957000 CVE-2024-35932,0,0,793922418147ab2c922ff7f32e99bfc27b35844d6861bc041d1cc83782b09a20,2024-11-21T09:21:13.957000
CVE-2024-35933,0,1,0325908b6390f4a1c9c15094b5dc41c2e597d6d95f2ad6932f319d5dab89c0d2,2024-12-30T19:51:27.687000 CVE-2024-35933,0,0,0325908b6390f4a1c9c15094b5dc41c2e597d6d95f2ad6932f319d5dab89c0d2,2024-12-30T19:51:27.687000
CVE-2024-35934,0,0,361be744c073c07234d0642797a28f51b9670336f6d7218b1ba2a8dcda01d171,2024-11-21T09:21:14.217000 CVE-2024-35934,0,0,361be744c073c07234d0642797a28f51b9670336f6d7218b1ba2a8dcda01d171,2024-11-21T09:21:14.217000
CVE-2024-35935,0,0,082a285269746fc3fb873203b6e873841d4b83b7804fa4f36094730041c93f93,2024-11-21T09:21:14.350000 CVE-2024-35935,0,0,082a285269746fc3fb873203b6e873841d4b83b7804fa4f36094730041c93f93,2024-11-21T09:21:14.350000
CVE-2024-35936,0,0,c01c5dac7b5e0bd9601007610c8046f83929460d70171551603976f6ee883491,2024-11-21T09:21:14.507000 CVE-2024-35936,0,0,c01c5dac7b5e0bd9601007610c8046f83929460d70171551603976f6ee883491,2024-11-21T09:21:14.507000
@ -257996,7 +258012,7 @@ CVE-2024-35956,0,0,a2df20ee828a684480220f597be9391b4a50d33880f1470bf6aeca6acac4f
CVE-2024-35957,0,0,63f1ef216f981899f739038c72e590e5dc7a92a6cab95efc5de09be8bad6816d,2024-11-21T09:21:17.513000 CVE-2024-35957,0,0,63f1ef216f981899f739038c72e590e5dc7a92a6cab95efc5de09be8bad6816d,2024-11-21T09:21:17.513000
CVE-2024-35958,0,0,dea59fdb3b17c08467afba7fa0588c1d2e5cd5eb65fea4ada743f1bfb3c216a3,2024-11-21T09:21:17.707000 CVE-2024-35958,0,0,dea59fdb3b17c08467afba7fa0588c1d2e5cd5eb65fea4ada743f1bfb3c216a3,2024-11-21T09:21:17.707000
CVE-2024-35959,0,0,53f6e1bb6d9d49084925276b5c45c193850da3a7ac9cb385334abc5f14e36dbd,2024-11-21T09:21:17.913000 CVE-2024-35959,0,0,53f6e1bb6d9d49084925276b5c45c193850da3a7ac9cb385334abc5f14e36dbd,2024-11-21T09:21:17.913000
CVE-2024-3596,0,1,a73be4dbd1ba2f2be100ff8602358c44e097c68e335a7e6fccfaec4ec8e338cc,2024-12-30T19:23:20.437000 CVE-2024-3596,0,0,a73be4dbd1ba2f2be100ff8602358c44e097c68e335a7e6fccfaec4ec8e338cc,2024-12-30T19:23:20.437000
CVE-2024-35960,0,0,85a643c1126146028b0f246face42ec63a48e10da60dacaff32d51eebc9fc072,2024-11-21T09:21:18.037000 CVE-2024-35960,0,0,85a643c1126146028b0f246face42ec63a48e10da60dacaff32d51eebc9fc072,2024-11-21T09:21:18.037000
CVE-2024-35961,0,0,d8bede3118f3213f6531e3d4764ee351899ee3c652f6f84602e33285303dd68f,2024-11-21T09:21:18.270000 CVE-2024-35961,0,0,d8bede3118f3213f6531e3d4764ee351899ee3c652f6f84602e33285303dd68f,2024-11-21T09:21:18.270000
CVE-2024-35962,0,0,f360f85bc8ef52af04a2c558b97f52575478fb0db43fb8c16bc09d6f51c8dcff,2024-11-21T09:21:18.400000 CVE-2024-35962,0,0,f360f85bc8ef52af04a2c558b97f52575478fb0db43fb8c16bc09d6f51c8dcff,2024-11-21T09:21:18.400000
@ -271521,10 +271537,10 @@ CVE-2024-5676,0,0,42e21ca7cdab0bdccf25cf6637d45fef7f036494b6d014c88b5835e6e48473
CVE-2024-5677,0,0,1c94c489b32a2f3740f8b8867e0aff380d1e56445098bb97785a4bdba0037977,2024-11-21T09:48:08.540000 CVE-2024-5677,0,0,1c94c489b32a2f3740f8b8867e0aff380d1e56445098bb97785a4bdba0037977,2024-11-21T09:48:08.540000
CVE-2024-5678,0,0,bb4133b16eab99226f567cd512e0bec4d1a7175fc845cb5a8a3e18dcdbfd75d7,2024-08-15T18:05:54.847000 CVE-2024-5678,0,0,bb4133b16eab99226f567cd512e0bec4d1a7175fc845cb5a8a3e18dcdbfd75d7,2024-08-15T18:05:54.847000
CVE-2024-5679,0,0,dc654eef86d673e662acc6dfc1ecb27b2f541880d76227d1d93861f825adc641,2024-11-21T09:48:08.710000 CVE-2024-5679,0,0,dc654eef86d673e662acc6dfc1ecb27b2f541880d76227d1d93861f825adc641,2024-11-21T09:48:08.710000
CVE-2024-56799,1,1,0dd8de9f29ee83d8d3d1718949c04ffed21addd8ed96891a089cf418021b9018,2024-12-30T19:15:08.160000 CVE-2024-56799,0,0,0dd8de9f29ee83d8d3d1718949c04ffed21addd8ed96891a089cf418021b9018,2024-12-30T19:15:08.160000
CVE-2024-5680,0,0,926c5c2f45d297ec0fa81be8768753266fc85d73f972d4984111118e8fceffa2,2024-11-21T09:48:08.837000 CVE-2024-5680,0,0,926c5c2f45d297ec0fa81be8768753266fc85d73f972d4984111118e8fceffa2,2024-11-21T09:48:08.837000
CVE-2024-56800,1,1,2d9ccaf12da8a18d45c48258f139cc5fdee9e79e0e5d7096bfd7de919c9c0c9a,2024-12-30T19:15:08.333000 CVE-2024-56800,0,0,2d9ccaf12da8a18d45c48258f139cc5fdee9e79e0e5d7096bfd7de919c9c0c9a,2024-12-30T19:15:08.333000
CVE-2024-56801,1,1,ceaecdb1b2443408b3d440c831110179f2ea438cecab41e9ec9b39e4392684c3,2024-12-30T19:15:08.483000 CVE-2024-56801,0,0,ceaecdb1b2443408b3d440c831110179f2ea438cecab41e9ec9b39e4392684c3,2024-12-30T19:15:08.483000
CVE-2024-5681,0,0,25a463be80d3bb29af40554a62ba0e4276aefee689d98e36dee0bcfe769073f6,2024-11-21T09:48:08.953000 CVE-2024-5681,0,0,25a463be80d3bb29af40554a62ba0e4276aefee689d98e36dee0bcfe769073f6,2024-11-21T09:48:08.953000
CVE-2024-5682,0,0,61babb4b22790f05b1e6fb044157f817a85668af929c91e823c0d3ae99b2f335,2024-09-20T12:30:51.220000 CVE-2024-5682,0,0,61babb4b22790f05b1e6fb044157f817a85668af929c91e823c0d3ae99b2f335,2024-09-20T12:30:51.220000
CVE-2024-5683,0,0,881352e7cddbf9570cae104e43894ad6185c01dcb07cd1be33b2f8fea4b1c33b,2024-11-21T09:48:09.327000 CVE-2024-5683,0,0,881352e7cddbf9570cae104e43894ad6185c01dcb07cd1be33b2f8fea4b1c33b,2024-11-21T09:48:09.327000

Can't render this file because it is too large.