mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-12-30T23:00:20.050896+00:00
This commit is contained in:
parent
2c5db5e52b
commit
86647941cd
60
CVE-2024/CVE-2024-119xx/CVE-2024-11944.json
Normal file
60
CVE-2024/CVE-2024-119xx/CVE-2024-11944.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-11944",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-12-30T21:15:05.493",
|
||||
"lastModified": "2024-12-30T21:15:05.493",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "iXsystems TrueNAS CORE tarfile.extractall Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of iXsystems TrueNAS devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the tarfile.extractall method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-25626."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.truenas.com/docs/core/13.0/gettingstarted/corereleasenotes/#130-u63",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1643/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-119xx/CVE-2024-11946.json
Normal file
60
CVE-2024/CVE-2024-119xx/CVE-2024-11946.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-11946",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-12-30T21:15:05.920",
|
||||
"lastModified": "2024-12-30T21:15:05.920",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "iXsystems TrueNAS CORE fetch_plugin_packagesites tar Cleartext Transmission of Sensitive Information Vulnerability. This vulnerability allows network-adjacent attackers to tamper with firmware update files on affected installations of iXsystems TrueNAS devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of firmware updates. The issue results from the use of an insecure protocol to deliver updates. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-25668."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.1,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-319"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.truenas.com/docs/core/13.0/gettingstarted/corereleasenotes/#130-u63",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1644/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-127xx/CVE-2024-12751.json
Normal file
60
CVE-2024/CVE-2024-127xx/CVE-2024-12751.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-12751",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-12-30T21:15:06.130",
|
||||
"lastModified": "2024-12-30T21:15:06.130",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Foxit PDF Reader AcroForm Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of AcroForms. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25344."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.foxit.com/support/security-bulletins.html",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1737/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-127xx/CVE-2024-12752.json
Normal file
60
CVE-2024/CVE-2024-127xx/CVE-2024-12752.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-12752",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-12-30T21:15:06.260",
|
||||
"lastModified": "2024-12-30T21:15:06.260",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Foxit PDF Reader AcroForm Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of AcroForms. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25345."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.foxit.com/support/security-bulletins.html",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1738/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-127xx/CVE-2024-12753.json
Normal file
60
CVE-2024/CVE-2024-127xx/CVE-2024-12753.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-12753",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-12-30T21:15:06.400",
|
||||
"lastModified": "2024-12-30T21:15:06.400",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Foxit PDF Reader Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Foxit PDF Reader. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the product installer. By creating a junction, an attacker can abuse the installer process to create an arbitrary file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-25408."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-59"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.foxit.com/support/security-bulletins.html",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1739/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2024/CVE-2024-130xx/CVE-2024-13042.json
Normal file
145
CVE-2024/CVE-2024-130xx/CVE-2024-13042.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2024-13042",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-30T21:15:06.523",
|
||||
"lastModified": "2024-12-30T21:15:06.523",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Tsinghua Unigroup Electronic Archives Management System 3.2.210802(62532). It has been classified as problematic. Affected is the function download of the file SubjectController.class.php. The manipulation of the argument path leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
||||
"baseScore": 4.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/BxYQ/zg_fileread",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/BxYQ/zg_fileread/blob/main/poc.py",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.289788",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.289788",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.472068",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-130xx/CVE-2024-13043.json
Normal file
56
CVE-2024/CVE-2024-130xx/CVE-2024-13043.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-13043",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-12-30T21:15:06.713",
|
||||
"lastModified": "2024-12-30T21:15:06.713",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Panda Security Dome Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Panda Security Dome. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the Hotspot Shield. By creating a junction, an attacker can abuse the application to delete arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-23478."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-59"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1727/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-130xx/CVE-2024-13044.json
Normal file
56
CVE-2024/CVE-2024-130xx/CVE-2024-13044.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-13044",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-12-30T21:15:06.840",
|
||||
"lastModified": "2024-12-30T21:15:06.840",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Ashlar-Vellum Cobalt AR File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of AR files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24870."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1728/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-130xx/CVE-2024-13045.json
Normal file
56
CVE-2024/CVE-2024-130xx/CVE-2024-13045.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-13045",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-12-30T21:15:06.963",
|
||||
"lastModified": "2024-12-30T21:15:06.963",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Ashlar-Vellum Cobalt AR File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of AR files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24848."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1729/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-130xx/CVE-2024-13046.json
Normal file
56
CVE-2024/CVE-2024-130xx/CVE-2024-13046.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-13046",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-12-30T21:15:07.097",
|
||||
"lastModified": "2024-12-30T21:15:07.097",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Ashlar-Vellum Cobalt CO File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of CO files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24867."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1730/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-130xx/CVE-2024-13047.json
Normal file
56
CVE-2024/CVE-2024-130xx/CVE-2024-13047.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-13047",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-12-30T21:15:07.220",
|
||||
"lastModified": "2024-12-30T21:15:07.220",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Ashlar-Vellum Cobalt CO File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of CO files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24843."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-843"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1731/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-130xx/CVE-2024-13048.json
Normal file
56
CVE-2024/CVE-2024-130xx/CVE-2024-13048.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-13048",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-12-30T21:15:07.347",
|
||||
"lastModified": "2024-12-30T21:15:07.347",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Ashlar-Vellum Cobalt XE File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of XE files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24844."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1732/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-130xx/CVE-2024-13049.json
Normal file
56
CVE-2024/CVE-2024-130xx/CVE-2024-13049.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-13049",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-12-30T21:15:07.470",
|
||||
"lastModified": "2024-12-30T21:15:07.470",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Ashlar-Vellum Cobalt XE File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of XE files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24847."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-843"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1733/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-130xx/CVE-2024-13050.json
Normal file
56
CVE-2024/CVE-2024-130xx/CVE-2024-13050.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-13050",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-12-30T21:15:07.593",
|
||||
"lastModified": "2024-12-30T21:15:07.593",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Ashlar-Vellum Graphite VC6 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Graphite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of VC6 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24976."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1734/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-130xx/CVE-2024-13051.json
Normal file
56
CVE-2024/CVE-2024-130xx/CVE-2024-13051.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-13051",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-12-30T21:15:07.717",
|
||||
"lastModified": "2024-12-30T21:15:07.717",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Ashlar-Vellum Graphite VC6 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Graphite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of VC6 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24977."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1735/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2024/CVE-2024-130xx/CVE-2024-13058.json
Normal file
82
CVE-2024/CVE-2024-130xx/CVE-2024-13058.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2024-13058",
|
||||
"sourceIdentifier": "0a72a055-908d-47f5-a16a-1f09049c16c6",
|
||||
"published": "2024-12-30T22:15:05.957",
|
||||
"lastModified": "2024-12-30T22:15:05.957",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue exists in SoftIron HyperCloud\n where authenticated, but non-admin users can create data pools, which could potentially impact the performance and availability of the backend software-defined storage subsystem.\n\nThis issue only impacts SoftIron HyperCloud and related software products (such as VM Squared) software versions 2.3.0 to before 2.5.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "0a72a055-908d-47f5-a16a-1f09049c16c6",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:U/V:D/RE:M/U:Green",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "LOW",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NEGLIGIBLE",
|
||||
"automatable": "YES",
|
||||
"recovery": "USER",
|
||||
"valueDensity": "DIFFUSE",
|
||||
"vulnerabilityResponseEffort": "MODERATE",
|
||||
"providerUrgency": "GREEN"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "0a72a055-908d-47f5-a16a-1f09049c16c6",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisories.softiron.cloud/",
|
||||
"source": "0a72a055-908d-47f5-a16a-1f09049c16c6"
|
||||
}
|
||||
]
|
||||
}
|
54
README.md
54
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-12-30T21:00:20.105512+00:00
|
||||
2024-12-30T23:00:20.050896+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-12-30T20:09:41.537000+00:00
|
||||
2024-12-30T22:15:05.957000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,47 +33,35 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
275186
|
||||
275202
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `3`
|
||||
Recently added CVEs: `16`
|
||||
|
||||
- [CVE-2024-56799](CVE-2024/CVE-2024-567xx/CVE-2024-56799.json) (`2024-12-30T19:15:08.160`)
|
||||
- [CVE-2024-56800](CVE-2024/CVE-2024-568xx/CVE-2024-56800.json) (`2024-12-30T19:15:08.333`)
|
||||
- [CVE-2024-56801](CVE-2024/CVE-2024-568xx/CVE-2024-56801.json) (`2024-12-30T19:15:08.483`)
|
||||
- [CVE-2024-11944](CVE-2024/CVE-2024-119xx/CVE-2024-11944.json) (`2024-12-30T21:15:05.493`)
|
||||
- [CVE-2024-11946](CVE-2024/CVE-2024-119xx/CVE-2024-11946.json) (`2024-12-30T21:15:05.920`)
|
||||
- [CVE-2024-12751](CVE-2024/CVE-2024-127xx/CVE-2024-12751.json) (`2024-12-30T21:15:06.130`)
|
||||
- [CVE-2024-12752](CVE-2024/CVE-2024-127xx/CVE-2024-12752.json) (`2024-12-30T21:15:06.260`)
|
||||
- [CVE-2024-12753](CVE-2024/CVE-2024-127xx/CVE-2024-12753.json) (`2024-12-30T21:15:06.400`)
|
||||
- [CVE-2024-13042](CVE-2024/CVE-2024-130xx/CVE-2024-13042.json) (`2024-12-30T21:15:06.523`)
|
||||
- [CVE-2024-13043](CVE-2024/CVE-2024-130xx/CVE-2024-13043.json) (`2024-12-30T21:15:06.713`)
|
||||
- [CVE-2024-13044](CVE-2024/CVE-2024-130xx/CVE-2024-13044.json) (`2024-12-30T21:15:06.840`)
|
||||
- [CVE-2024-13045](CVE-2024/CVE-2024-130xx/CVE-2024-13045.json) (`2024-12-30T21:15:06.963`)
|
||||
- [CVE-2024-13046](CVE-2024/CVE-2024-130xx/CVE-2024-13046.json) (`2024-12-30T21:15:07.097`)
|
||||
- [CVE-2024-13047](CVE-2024/CVE-2024-130xx/CVE-2024-13047.json) (`2024-12-30T21:15:07.220`)
|
||||
- [CVE-2024-13048](CVE-2024/CVE-2024-130xx/CVE-2024-13048.json) (`2024-12-30T21:15:07.347`)
|
||||
- [CVE-2024-13049](CVE-2024/CVE-2024-130xx/CVE-2024-13049.json) (`2024-12-30T21:15:07.470`)
|
||||
- [CVE-2024-13050](CVE-2024/CVE-2024-130xx/CVE-2024-13050.json) (`2024-12-30T21:15:07.593`)
|
||||
- [CVE-2024-13051](CVE-2024/CVE-2024-130xx/CVE-2024-13051.json) (`2024-12-30T21:15:07.717`)
|
||||
- [CVE-2024-13058](CVE-2024/CVE-2024-130xx/CVE-2024-13058.json) (`2024-12-30T22:15:05.957`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `35`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2021-47254](CVE-2021/CVE-2021-472xx/CVE-2021-47254.json) (`2024-12-30T19:50:58.543`)
|
||||
- [CVE-2021-47388](CVE-2021/CVE-2021-473xx/CVE-2021-47388.json) (`2024-12-30T20:05:07.740`)
|
||||
- [CVE-2021-47390](CVE-2021/CVE-2021-473xx/CVE-2021-47390.json) (`2024-12-30T20:01:12.947`)
|
||||
- [CVE-2021-47409](CVE-2021/CVE-2021-474xx/CVE-2021-47409.json) (`2024-12-30T20:00:41.677`)
|
||||
- [CVE-2021-47413](CVE-2021/CVE-2021-474xx/CVE-2021-47413.json) (`2024-12-30T20:00:33.497`)
|
||||
- [CVE-2021-47420](CVE-2021/CVE-2021-474xx/CVE-2021-47420.json) (`2024-12-30T19:37:04.973`)
|
||||
- [CVE-2021-47422](CVE-2021/CVE-2021-474xx/CVE-2021-47422.json) (`2024-12-30T19:36:28.193`)
|
||||
- [CVE-2021-47423](CVE-2021/CVE-2021-474xx/CVE-2021-47423.json) (`2024-12-30T19:36:10.670`)
|
||||
- [CVE-2023-52812](CVE-2023/CVE-2023-528xx/CVE-2023-52812.json) (`2024-12-30T20:09:10.617`)
|
||||
- [CVE-2023-52818](CVE-2023/CVE-2023-528xx/CVE-2023-52818.json) (`2024-12-30T20:08:57.877`)
|
||||
- [CVE-2023-52826](CVE-2023/CVE-2023-528xx/CVE-2023-52826.json) (`2024-12-30T20:08:33.040`)
|
||||
- [CVE-2023-52849](CVE-2023/CVE-2023-528xx/CVE-2023-52849.json) (`2024-12-30T20:09:41.537`)
|
||||
- [CVE-2023-52850](CVE-2023/CVE-2023-528xx/CVE-2023-52850.json) (`2024-12-30T20:09:31.393`)
|
||||
- [CVE-2023-52852](CVE-2023/CVE-2023-528xx/CVE-2023-52852.json) (`2024-12-30T20:09:19.563`)
|
||||
- [CVE-2024-13019](CVE-2024/CVE-2024-130xx/CVE-2024-13019.json) (`2024-12-30T19:15:06.847`)
|
||||
- [CVE-2024-13020](CVE-2024/CVE-2024-130xx/CVE-2024-13020.json) (`2024-12-30T19:15:07.537`)
|
||||
- [CVE-2024-35902](CVE-2024/CVE-2024-359xx/CVE-2024-35902.json) (`2024-12-30T19:47:46.853`)
|
||||
- [CVE-2024-35905](CVE-2024/CVE-2024-359xx/CVE-2024-35905.json) (`2024-12-30T19:47:30.700`)
|
||||
- [CVE-2024-35907](CVE-2024/CVE-2024-359xx/CVE-2024-35907.json) (`2024-12-30T19:35:53.437`)
|
||||
- [CVE-2024-35921](CVE-2024/CVE-2024-359xx/CVE-2024-35921.json) (`2024-12-30T19:35:04.897`)
|
||||
- [CVE-2024-35922](CVE-2024/CVE-2024-359xx/CVE-2024-35922.json) (`2024-12-30T19:27:42.720`)
|
||||
- [CVE-2024-35929](CVE-2024/CVE-2024-359xx/CVE-2024-35929.json) (`2024-12-30T19:56:30.927`)
|
||||
- [CVE-2024-35930](CVE-2024/CVE-2024-359xx/CVE-2024-35930.json) (`2024-12-30T19:52:55.313`)
|
||||
- [CVE-2024-35933](CVE-2024/CVE-2024-359xx/CVE-2024-35933.json) (`2024-12-30T19:51:27.687`)
|
||||
- [CVE-2024-3596](CVE-2024/CVE-2024-35xx/CVE-2024-3596.json) (`2024-12-30T19:23:20.437`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
92
_state.csv
92
_state.csv
@ -187420,28 +187420,28 @@ CVE-2021-47229,0,0,7eaf4c4dfd8a0b01ff059e9e140d1f30b6435b38480e86920eedf73b5f29c
|
||||
CVE-2021-47230,0,0,9617dea962ae526cc57e3344dadddf0ce492d4dd862e205112638780de1d75fd,2024-11-21T06:35:40.480000
|
||||
CVE-2021-47231,0,0,fe02362946c9b3cfaf3a64994b44f8b9d73df65115a2eb261246bd28b6bc8925,2024-11-21T06:35:40.683000
|
||||
CVE-2021-47232,0,0,24ca5d35ff26d1803c655d5dd07b9040f95874dd3a1b7eb44bb77884c953b1a2,2024-11-21T06:35:40.883000
|
||||
CVE-2021-47233,0,1,49bd84981d757bdeb030b5d808f06c049b1dc1bf9565f1010d44de6f30baa449,2024-12-30T19:51:12.613000
|
||||
CVE-2021-47233,0,0,49bd84981d757bdeb030b5d808f06c049b1dc1bf9565f1010d44de6f30baa449,2024-12-30T19:51:12.613000
|
||||
CVE-2021-47234,0,0,273d7ee3f66e04272422c623c3f10a6131b83f867533db8cd4feea3001cff253,2024-11-21T06:35:41.203000
|
||||
CVE-2021-47235,0,1,8b53251b18ef7a00638c8566452347f25d3f12a1756e9c95ca2b9ee9d09320d4,2024-12-30T19:06:05.170000
|
||||
CVE-2021-47235,0,0,8b53251b18ef7a00638c8566452347f25d3f12a1756e9c95ca2b9ee9d09320d4,2024-12-30T19:06:05.170000
|
||||
CVE-2021-47236,0,0,b87ff6e7bbebf51be21d4b4f1bddb0b9e9f26bf1b1f348eef469192eeef1e5fe,2024-11-21T06:35:41.480000
|
||||
CVE-2021-47237,0,1,21a5b46828785b47344dfa5d33d76cb4f95f34c264877088c08c9f3183bb0375,2024-12-30T19:05:28.320000
|
||||
CVE-2021-47237,0,0,21a5b46828785b47344dfa5d33d76cb4f95f34c264877088c08c9f3183bb0375,2024-12-30T19:05:28.320000
|
||||
CVE-2021-47238,0,0,b41f2250ae1e52d3fe19a4a1a3f096f7b6ff7daceb9aaf3a7950aecde0975b5e,2024-11-21T06:35:41.743000
|
||||
CVE-2021-47239,0,1,426aab874d3868aa4677b22537307b93d5214463451278a00c2a583e2a8b5c7b,2024-12-30T19:05:15.167000
|
||||
CVE-2021-47240,0,1,7d569215feef44a17dae0b0b3463f2bc32c191ad3939d0983404aab4d26d862a,2024-12-30T19:04:58.760000
|
||||
CVE-2021-47239,0,0,426aab874d3868aa4677b22537307b93d5214463451278a00c2a583e2a8b5c7b,2024-12-30T19:05:15.167000
|
||||
CVE-2021-47240,0,0,7d569215feef44a17dae0b0b3463f2bc32c191ad3939d0983404aab4d26d862a,2024-12-30T19:04:58.760000
|
||||
CVE-2021-47241,0,0,a0218b63a37a83cd88010171c29ce1ae8094e5b2a4be5c22a8819de8551be48e,2024-11-21T06:35:42.163000
|
||||
CVE-2021-47242,0,0,9e2ec51f01fe9a8aad67669f97a4ff925113d9d899dff1b65690d8eceeb8de62,2024-11-21T06:35:42.343000
|
||||
CVE-2021-47243,0,1,f3ce19b96978056d91cf0a2bc489aea47b0aa209106c9ae341645d6e0a65d4c0,2024-12-30T19:04:26.770000
|
||||
CVE-2021-47243,0,0,f3ce19b96978056d91cf0a2bc489aea47b0aa209106c9ae341645d6e0a65d4c0,2024-12-30T19:04:26.770000
|
||||
CVE-2021-47244,0,0,ca6b3b87479e59071b8004632c8d4b6f1e9d11643d6de68216b8ad6a0872acb6,2024-11-21T06:35:42.640000
|
||||
CVE-2021-47245,0,1,4b0fd78442e693c8c9ad1c36bf34d80eb49c87d890eb02e4e5da728a0703b468,2024-12-30T19:03:58.273000
|
||||
CVE-2021-47245,0,0,4b0fd78442e693c8c9ad1c36bf34d80eb49c87d890eb02e4e5da728a0703b468,2024-12-30T19:03:58.273000
|
||||
CVE-2021-47246,0,0,9f782402bd919affe114e8e45d84ed93cdf78270af91f3168742be0308c7f0f6,2024-11-21T06:35:42.950000
|
||||
CVE-2021-47247,0,1,cf90397ea9a0d803e299cc12d5f4b86d634ea5464c7c4e150ba6bab1f935c450,2024-12-30T19:03:42.583000
|
||||
CVE-2021-47247,0,0,cf90397ea9a0d803e299cc12d5f4b86d634ea5464c7c4e150ba6bab1f935c450,2024-12-30T19:03:42.583000
|
||||
CVE-2021-47248,0,0,6815ade5961ff0ed77e72f0840fb9b58804880066f8794fef7922658c81186c7,2024-11-21T06:35:43.190000
|
||||
CVE-2021-47249,0,1,9df064926874e19baf591bf7503852913c51ff093c8d41822dae8720c5b2ce56,2024-12-30T19:01:43.417000
|
||||
CVE-2021-47250,0,1,3895234a4bca9fd42201e364d83eda41b7862d08052563ff8d97516234423938,2024-12-30T19:00:27.217000
|
||||
CVE-2021-47249,0,0,9df064926874e19baf591bf7503852913c51ff093c8d41822dae8720c5b2ce56,2024-12-30T19:01:43.417000
|
||||
CVE-2021-47250,0,0,3895234a4bca9fd42201e364d83eda41b7862d08052563ff8d97516234423938,2024-12-30T19:00:27.217000
|
||||
CVE-2021-47251,0,0,910383b3bb8c00e34855fcda8c3ec1d6bd52252a19036ebff555cedb288a9861,2024-11-21T06:35:43.570000
|
||||
CVE-2021-47252,0,0,8f2ae53195e1d344dcddbea9cafebc6f137c371b83b1765850464be0bba730c1,2024-11-21T06:35:43.683000
|
||||
CVE-2021-47253,0,0,9bc677a4b5d13cd8fd06f4b9374a9aa62a3778e7b12c1d5302b8dc1a583e0856,2024-12-30T18:59:10.807000
|
||||
CVE-2021-47254,0,1,8ad5e1955743b8c3f06c84a200072a25601d6c4b3267d5b5db59a4daa0deeb02,2024-12-30T19:50:58.543000
|
||||
CVE-2021-47254,0,0,8ad5e1955743b8c3f06c84a200072a25601d6c4b3267d5b5db59a4daa0deeb02,2024-12-30T19:50:58.543000
|
||||
CVE-2021-47255,0,0,ab70f22d16c8786e854f11454b2eea8afe54254c834b2d2bd6063c66081a9479,2024-11-21T06:35:44.037000
|
||||
CVE-2021-47256,0,0,0f51de379b692c2d0a857a25782e52c1e5499b2d759e9b9b493c9ede6fbb425a,2024-11-21T06:35:44.143000
|
||||
CVE-2021-47257,0,0,56979cfa19b4e765d1c353c91739346331d68d4f631479f694c06bdaf5dfe282,2024-11-21T06:35:44.263000
|
||||
@ -187575,9 +187575,9 @@ CVE-2021-47384,0,0,bb89862113d2a6336d33a29fcea8543dd2e3a5aaa8344e5d7c7ced6e0e1c1
|
||||
CVE-2021-47385,0,0,c6a82e7a12e897338326b0272d766105a2467dab6588deae93331929ba6df3aa,2024-12-23T21:01:31.227000
|
||||
CVE-2021-47386,0,0,e2c2600fd20b80e34f73e540ac913f3f01a2782eb98515ebb9fa3047ce7b2d75,2024-11-21T06:36:02.267000
|
||||
CVE-2021-47387,0,0,f9abbc75a71e5f75679f53162608a51731e5b30a945f073035121479b6bfac5c,2024-11-21T06:36:02.443000
|
||||
CVE-2021-47388,0,1,5a99c0375f375933a2ee3ed84e78b90361dbfbf675205e3e3fce5b62f99bd86e,2024-12-30T20:05:07.740000
|
||||
CVE-2021-47388,0,0,5a99c0375f375933a2ee3ed84e78b90361dbfbf675205e3e3fce5b62f99bd86e,2024-12-30T20:05:07.740000
|
||||
CVE-2021-47389,0,0,a22c8848716a5fab6e02d5133120c67e86b798dc6ef581a21bef1750e67cc07a,2024-11-21T06:36:02.683000
|
||||
CVE-2021-47390,0,1,76b23b24c5c2d0ae53e9c1096f39d0e46b517e03d31e39981405101939ea2a5e,2024-12-30T20:01:12.947000
|
||||
CVE-2021-47390,0,0,76b23b24c5c2d0ae53e9c1096f39d0e46b517e03d31e39981405101939ea2a5e,2024-12-30T20:01:12.947000
|
||||
CVE-2021-47391,0,0,f4d175a858a736db63367addd002e1ba9b1dcfb405e34dc62cdb19aff0fd59b2,2024-11-21T06:36:02.967000
|
||||
CVE-2021-47392,0,0,3f96e381be60800107bbde2dc3edea028b592fe3ad227fb19a1c81e6c3642f9c,2024-11-21T06:36:03.080000
|
||||
CVE-2021-47393,0,0,cb8604c1f678df5603c14287ccd222cdf9bee87fd56ca2dc7d6971ba3d537ad9,2024-11-21T06:36:03.193000
|
||||
@ -187596,21 +187596,21 @@ CVE-2021-47405,0,0,89d57154146c49bfe9495517a8aa4581b03bbe87f488a973134e87054c50f
|
||||
CVE-2021-47406,0,0,29847dbf301ed41a53321d345125f661ba83b5bdb100a716152af1df0991e844,2024-11-21T06:36:04.807000
|
||||
CVE-2021-47407,0,0,99d0a8ae031df6e833de865dd6448cf1a9c23ee872668167073223966e2f1959,2024-11-21T06:36:04.980000
|
||||
CVE-2021-47408,0,0,1bb9de9f9fb0c138f101bdd077c488720764253896933e9ddd90af986223f012,2024-11-21T06:36:05.087000
|
||||
CVE-2021-47409,0,1,4409848935610c806a916f78420b16db2a2ab2efcb7ac8dd99c83d5249f8b960,2024-12-30T20:00:41.677000
|
||||
CVE-2021-47409,0,0,4409848935610c806a916f78420b16db2a2ab2efcb7ac8dd99c83d5249f8b960,2024-12-30T20:00:41.677000
|
||||
CVE-2021-47410,0,0,4075c00f9d5ffd89b59e95e73a9e5fa86e05d5bb14ffa8d2023787fcb8cce122,2024-11-21T06:36:05.360000
|
||||
CVE-2021-47411,0,0,d0414849cfb396e83266669cd4701dbb6a1022ea5a51c35023bb94eb4cfc8a37,2024-05-25T14:15:50.770000
|
||||
CVE-2021-47412,0,0,af5c4c1fde936342c029e1565c710bac695bfb5efd8710ea589f197b466eba8a,2024-11-21T06:36:05.480000
|
||||
CVE-2021-47413,0,1,269d04830df035e17e52fb59428cdae6c99bbe3c5236fc44bbeb5952e9d53939,2024-12-30T20:00:33.497000
|
||||
CVE-2021-47413,0,0,269d04830df035e17e52fb59428cdae6c99bbe3c5236fc44bbeb5952e9d53939,2024-12-30T20:00:33.497000
|
||||
CVE-2021-47414,0,0,a83b6ed138679e0a43562ce58d15e7d1f7e5382db9d90a7386573fd9d8fa4042,2024-11-21T06:36:05.703000
|
||||
CVE-2021-47415,0,0,dc3acb10fb2f650ccb4aeb9f23bddae7fbe6e40ab8bea8780dde5bc4fdccf5e4,2024-11-21T06:36:05.823000
|
||||
CVE-2021-47416,0,0,562046249992ab3df84dbdde2ab890f105644babba8615b4902e2b57236f0090,2024-11-21T06:36:05.920000
|
||||
CVE-2021-47417,0,0,ef21ffbd1d0dcc69c944405c3efcd8ac7dd51ac01c5d60bc09bf913df733ed89,2024-11-21T06:36:06.070000
|
||||
CVE-2021-47418,0,0,6899899fab7502122cb0d0c6605217d6cf7dea34523bfc84e2e3729ce30f6da9,2024-11-21T06:36:06.193000
|
||||
CVE-2021-47419,0,0,b982e6e4a9c1837e4bd26bb12e302c41eb5725451cbe81290498c856c22cca0d,2024-11-21T06:36:06.323000
|
||||
CVE-2021-47420,0,1,00afc3432a4f0c3aee8977e415c889a3d8886055a9490eac336ef9b40a80b4d4,2024-12-30T19:37:04.973000
|
||||
CVE-2021-47420,0,0,00afc3432a4f0c3aee8977e415c889a3d8886055a9490eac336ef9b40a80b4d4,2024-12-30T19:37:04.973000
|
||||
CVE-2021-47421,0,0,0a40ba093314e9e6469359d21a45f9f0d40d5425308999e0d98a4f7123360a17,2024-11-21T06:36:06.613000
|
||||
CVE-2021-47422,0,1,dc3123e6db84d59806cae4c311d5662de81263eadfad4838d331b275a8dfec7e,2024-12-30T19:36:28.193000
|
||||
CVE-2021-47423,0,1,12196f2af306d0a79235a9a7ad0c2f133ac495899947bc147939c1ec99649cea,2024-12-30T19:36:10.670000
|
||||
CVE-2021-47422,0,0,dc3123e6db84d59806cae4c311d5662de81263eadfad4838d331b275a8dfec7e,2024-12-30T19:36:28.193000
|
||||
CVE-2021-47423,0,0,12196f2af306d0a79235a9a7ad0c2f133ac495899947bc147939c1ec99649cea,2024-12-30T19:36:10.670000
|
||||
CVE-2021-47424,0,0,4189ff43dc60d9554241d2c4440ad32e804985d54f34f55be1f82bcc2cd87d99,2024-11-21T06:36:06.987000
|
||||
CVE-2021-47425,0,0,e2b5aa50172001766bba9e788a9bbaed4a647c805f4b3c14b325213525f5549f,2024-11-21T06:36:07.100000
|
||||
CVE-2021-47426,0,0,2989407fa517372e9bf01c80af57d6ddef49052db8615ac698619e5b677bfbb2,2024-11-21T06:36:07.227000
|
||||
@ -240244,13 +240244,13 @@ CVE-2023-52809,0,0,06fb50dbad98d780f58c95c2791d1c3f12990ff40b05f531900523b7250be
|
||||
CVE-2023-5281,0,0,0dde3d47be17b2e8c89e29d997d88d34ff2d1fb77efff2971add322c1411cd86,2024-11-21T08:41:26.610000
|
||||
CVE-2023-52810,0,0,033e202b1b964254c835a600951f39154677f181fd64fb65ba86c78b507462ab,2024-11-21T08:40:38.193000
|
||||
CVE-2023-52811,0,0,6fdf1ae36bbdb81962026ac9ebba5264232faf33780b5e5f3c66be7583e2123c,2024-11-21T08:40:38.407000
|
||||
CVE-2023-52812,0,1,29ae65b672d446eaba78c5d133c587913587b8743f8010a5f01fbaedd5e1c51a,2024-12-30T20:09:10.617000
|
||||
CVE-2023-52812,0,0,29ae65b672d446eaba78c5d133c587913587b8743f8010a5f01fbaedd5e1c51a,2024-12-30T20:09:10.617000
|
||||
CVE-2023-52813,0,0,8bb52da0dbdd61653b93b1afd030ae1f5a08c060ed89db967b31f8f0a0970c37,2024-11-21T08:40:38.687000
|
||||
CVE-2023-52814,0,0,830f385e469f6ffe6e68841284fe631ce857af0bbb2762e1d231569f00870fc8,2024-11-21T08:40:38.810000
|
||||
CVE-2023-52815,0,0,eba5e163497404c554cd332b709abdb9a171e906ea3b7ec2abe2060b2f441f9b,2024-11-21T08:40:39.020000
|
||||
CVE-2023-52816,0,0,9a0a74d8664865f0e0bb0f116931b35d5d03409bf5c25f7a6061234fd638f707,2024-11-21T08:40:39.150000
|
||||
CVE-2023-52817,0,0,b5060cef143e775e53bbfdee136aa7f53eaa21f086cca6ff62fdbcd7b7ff64a7,2024-11-21T08:40:39.267000
|
||||
CVE-2023-52818,0,1,8d862ce39250d59b027ef9571ebf92c690255c750be947bdfdada81197754ff0,2024-12-30T20:08:57.877000
|
||||
CVE-2023-52818,0,0,8d862ce39250d59b027ef9571ebf92c690255c750be947bdfdada81197754ff0,2024-12-30T20:08:57.877000
|
||||
CVE-2023-52819,0,0,48cddf6448d32c2a1ec97c9c5728d4b7bb305534785e1ac963cb6a5f64346f51,2024-11-21T08:40:39.620000
|
||||
CVE-2023-5282,0,0,f07e37baff0e63cc749ec7f71e21860f35e668717bdaaacfad36980ef0fc48b2,2024-11-21T08:41:26.737000
|
||||
CVE-2023-52820,0,0,7b049c5fb4ec6057c00414a07ea263a069fc43603dbf16ccc3b91309982944d6,2024-05-24T16:15:09.313000
|
||||
@ -240259,7 +240259,7 @@ CVE-2023-52822,0,0,54640bd0e26163fd48ceee5b222b2b51878103ab2e09d2e9082e078e10e4f
|
||||
CVE-2023-52823,0,0,365706db1426da8a360d5c4a5d6e4e80add016a67d8a72c25123ad52152b123d,2024-05-24T11:15:09.367000
|
||||
CVE-2023-52824,0,0,58849bdf8b7c9d9f7a6f0f83e4cf0467639c25e06971d60aecad6c886ee28255,2024-05-24T16:15:09.777000
|
||||
CVE-2023-52825,0,0,e7b7702f2cc7ed84bf0e0f9f8e3877f1b1c0e191fbf2064a0fb697b01f131a2c,2024-11-21T08:40:39.997000
|
||||
CVE-2023-52826,0,1,93c3777132f6f809db8434b53ccec4473148479dd75f9b54635ec0f454099ac8,2024-12-30T20:08:33.040000
|
||||
CVE-2023-52826,0,0,93c3777132f6f809db8434b53ccec4473148479dd75f9b54635ec0f454099ac8,2024-12-30T20:08:33.040000
|
||||
CVE-2023-52827,0,0,d47b608f5ab430a0594861c22553453691e94d4b3b3045af43ae10820dc28549,2024-11-21T08:40:40.303000
|
||||
CVE-2023-52828,0,0,5f2dd0feef02aa3514ddb029f4a2a290346e0237ddb1f2f0873fdf7b02d9ebc4,2024-11-21T08:40:40.430000
|
||||
CVE-2023-52829,0,0,411a0ce7532cfe1210c0999ae4b6a679f98c4d1ae9f3d811a60990427b0bad12,2024-12-04T21:15:20.377000
|
||||
@ -240284,11 +240284,11 @@ CVE-2023-52845,0,0,bcb26e737dc4f3baf2d24ecd49e9efae880cfdcf8864ebe288815eafff3e8
|
||||
CVE-2023-52846,0,0,01c42a6b8e7be25d575b319f42737d3ecdca641a56e94f022df4a7164eb6f02c,2024-11-21T08:40:42.700000
|
||||
CVE-2023-52847,0,0,6304dbc304f676ebb867c7a55ce40656720c1406d9bed9bac29a8b368f29bd19,2024-11-21T08:40:42.820000
|
||||
CVE-2023-52848,0,0,b83baba516532b1010d7c66d73abfe92a1b9c878ad414616a7feb31a5f084310,2024-11-21T08:40:42.947000
|
||||
CVE-2023-52849,0,1,f6ddd31d6e2b7b97c260676cfb8b85b07561190bd66bad001b32fe754a29cfca,2024-12-30T20:09:41.537000
|
||||
CVE-2023-52849,0,0,f6ddd31d6e2b7b97c260676cfb8b85b07561190bd66bad001b32fe754a29cfca,2024-12-30T20:09:41.537000
|
||||
CVE-2023-5285,0,0,8e1cd37b97e33f0f0685b14f4312036f59f160d705ec149a6ef0ac0f38fce8bc,2024-11-21T08:41:27.130000
|
||||
CVE-2023-52850,0,1,b48747e9fef3d05f3a3f87733c20b6b6c87bf8863b4830cf8b2416b04cab3e39,2024-12-30T20:09:31.393000
|
||||
CVE-2023-52850,0,0,b48747e9fef3d05f3a3f87733c20b6b6c87bf8863b4830cf8b2416b04cab3e39,2024-12-30T20:09:31.393000
|
||||
CVE-2023-52851,0,0,31bace3bc49e77cdc3e77d0890b11d567f07b4d68474bfec4e20aab64829efd4,2024-11-21T08:40:43.290000
|
||||
CVE-2023-52852,0,1,56c0e6b2ce3e3baf070288075905fde5a1f96329a996ea3ff2ad9456eb26c5f5,2024-12-30T20:09:19.563000
|
||||
CVE-2023-52852,0,0,56c0e6b2ce3e3baf070288075905fde5a1f96329a996ea3ff2ad9456eb26c5f5,2024-12-30T20:09:19.563000
|
||||
CVE-2023-52853,0,0,32c4f67493ddd24d490332b3435324973b5881d501d41ef50aa43506d33b569d,2024-11-21T08:40:43.527000
|
||||
CVE-2023-52854,0,0,9f48ddf6cf641b50de9ded856ef6355837062d853a3b3d9d622b9fb3fb40325c,2024-11-21T08:40:43.647000
|
||||
CVE-2023-52855,0,0,fefd8691b2ed782148f182e3b7ecd154c88289d5d9aed5fb9541a88d6e6f2d63,2024-11-21T08:40:43.770000
|
||||
@ -244676,7 +244676,9 @@ CVE-2024-11940,0,0,01a3f490196796516894d51522c528bc6c3ce1fe45bff9fda5a3ce37bc326
|
||||
CVE-2024-11941,0,0,45c946faed9eb1ec18b9452e07479f063cfb793c63899cab9a102bedb1be5328,2024-12-05T16:15:23.893000
|
||||
CVE-2024-11942,0,0,55526aafa6b479f8732b6654f613495eb95fa16f8129024967b3914532d074f0,2024-12-05T16:15:24.033000
|
||||
CVE-2024-11943,0,0,5db2b5cec073953e68197fa73fddd59bb82bf096d7a8174dee13bdb32f9486e1,2024-12-07T02:15:18.393000
|
||||
CVE-2024-11944,1,1,b634172a3925b100e35875fcdb68c272c3b5ca712036d9b14bc3c274d75de098,2024-12-30T21:15:05.493000
|
||||
CVE-2024-11945,0,0,d5529e16b2c34f9b5e6b9ddc5a03f73ebf6c118ac10e072ab626561b83cdfe71,2024-12-10T10:15:04.810000
|
||||
CVE-2024-11946,1,1,9bb9e62cef0f7be1b4ba198de6929920aa5b1c620ccfeccadc62834476767120,2024-12-30T21:15:05.920000
|
||||
CVE-2024-11947,0,0,76594c096f66db4264ce24827f38ddba1b904bd8285bdd79729a6ff69e4900e9,2024-12-13T19:33:07.497000
|
||||
CVE-2024-11948,0,0,63c29d57ca2d54a9012c75c22d15bb5abf864d6477c7fa55fde21714e103ae6a,2024-12-13T19:32:21.150000
|
||||
CVE-2024-11949,0,0,8c8ca0b9d255f5a6445ed2a115142b5d13432f7081db7ee9affe350ed098a50e,2024-12-13T19:28:30.873000
|
||||
@ -245096,6 +245098,9 @@ CVE-2024-12744,0,0,db2cef6174f0f203336fd1a602951ac160bef125d0730a8230a23f49ec8a8
|
||||
CVE-2024-12745,0,0,d39132eefd07723f30fb227ef12fb8aaf3a83b250d0f3b28d89ab1e076f94541,2024-12-26T15:15:06.527000
|
||||
CVE-2024-12746,0,0,df5c191123ddac7611e41b52ec167446638f37d1f7bfb5919f7163608ca92308,2024-12-26T15:15:06.650000
|
||||
CVE-2024-1275,0,0,55e303d499b7cd70146b064f11442ebd0ad45cafbb26b305d69871c04faa255a,2024-11-21T08:50:12.913000
|
||||
CVE-2024-12751,1,1,c021fa6050fdcc7d460a13e6fbbdc375489db9f83ffb1d4962a94fd17a310ee0,2024-12-30T21:15:06.130000
|
||||
CVE-2024-12752,1,1,aceb91b13a48ab0b91f2671dfccf956bcd438f2d51f93df4dee52b510998e9fe,2024-12-30T21:15:06.260000
|
||||
CVE-2024-12753,1,1,e4ba0db71191a4ffaab183a2c11034bf6d7abf0b7b96de04fec1007267c8b1fd,2024-12-30T21:15:06.400000
|
||||
CVE-2024-12754,0,0,cc49a740b9b02282be04809e0ec9e9f9181e846c2c42209dd24ca5d17558bc72,2024-12-30T17:15:07.127000
|
||||
CVE-2024-1276,0,0,342e07ea1475f57185158b84be14279572eebbc1b91e4c07c491730599e6701d,2024-11-21T08:50:13.050000
|
||||
CVE-2024-1277,0,0,fdccc6e1d66b4b759fea691d8a9a7ad4f8cc0afd5b2fb224e654b3bd9de12942,2024-11-21T08:50:13.170000
|
||||
@ -245255,9 +245260,9 @@ CVE-2024-13015,0,0,3dcd014dbef30b2e70ec20ccecdaaf615115de618369fe62c340a42e4d8d8
|
||||
CVE-2024-13016,0,0,b67ea70e64cef9d4f2f5d631157f934916ce9c950363c714e96ab8c161eaacc5,2024-12-29T16:15:05.300000
|
||||
CVE-2024-13017,0,0,406d1ed5cbe2575a1a54010aafe73d57848810b7f6f5e6c2e0a9b1cec549270f,2024-12-29T17:15:05.873000
|
||||
CVE-2024-13018,0,0,083b5e4e2fa86246983f0fd476b84784f9dac25dcba6ed963c92124634ebb897,2024-12-29T18:15:05.027000
|
||||
CVE-2024-13019,0,1,72a1973cf4f4a77621dcfa6c2ee34bdcf9f28c12b7f488cb496979d278302450,2024-12-30T19:15:06.847000
|
||||
CVE-2024-13019,0,0,72a1973cf4f4a77621dcfa6c2ee34bdcf9f28c12b7f488cb496979d278302450,2024-12-30T19:15:06.847000
|
||||
CVE-2024-1302,0,0,50e21539c22b43b4db748f33a4680786d0cd3b39c9a7a5fc858bc75c33660782,2024-11-21T08:50:16.467000
|
||||
CVE-2024-13020,0,1,59c12b2192e99fc7791f2432b5fbc4c1305151c3f5328f38436d2f225c41c63a,2024-12-30T19:15:07.537000
|
||||
CVE-2024-13020,0,0,59c12b2192e99fc7791f2432b5fbc4c1305151c3f5328f38436d2f225c41c63a,2024-12-30T19:15:07.537000
|
||||
CVE-2024-13021,0,0,db94a67fd5023220dfcd097aa849d00631aaccd25e2ab01bcc8f620ec54fee4a,2024-12-30T18:15:08.877000
|
||||
CVE-2024-13022,0,0,31946f46234a2f885529fc55fb9df522feaa7112e2244bd255db91f99134c814,2024-12-29T20:15:05.980000
|
||||
CVE-2024-13023,0,0,a6002ae756a126843e0244f11dec8062c69ff459b14d4771d8dead00e17d6b47,2024-12-29T21:15:06.020000
|
||||
@ -245277,7 +245282,18 @@ CVE-2024-13037,0,0,ad1a2687fd8ca034a4ba7eb450dd7b7cb6ce76af79e47f53a4dcc006981f2
|
||||
CVE-2024-13038,0,0,4583c4724ce1695329d04a091cf334038675ae1fc4b89e1e9c52332e7b115d63,2024-12-30T17:15:08.473000
|
||||
CVE-2024-13039,0,0,5fcf5529e0f60e939c342e8ff9bcb8e9371ea109f210669df3b0c791fd94ef0a,2024-12-30T17:15:08.597000
|
||||
CVE-2024-1304,0,0,7f3d377d10786bd7b29e3437adfa1f791151a43db698785def3901d685804d14,2024-11-21T08:50:16.717000
|
||||
CVE-2024-13042,1,1,79d3038a3776ed8900f4502faeed80d95c375db4f2c3ae792b7f1b6168d6c4e8,2024-12-30T21:15:06.523000
|
||||
CVE-2024-13043,1,1,a57d8becfe9ca92a82190ea64963a694c6040f83cb00135ce055f57002bf8d4c,2024-12-30T21:15:06.713000
|
||||
CVE-2024-13044,1,1,6d3c3cdcc975fb5586b26099e393540139d286d458e4c5db4ccad7a86d240708,2024-12-30T21:15:06.840000
|
||||
CVE-2024-13045,1,1,b32d594c46ea0f4c48c42384ee94c921a68ba0cc53643756bb2b38fcd53b620a,2024-12-30T21:15:06.963000
|
||||
CVE-2024-13046,1,1,c23d299c3b59ae6bc264c7b5c5d03889b2a4f3b7dfc1a98cde8f678439be865b,2024-12-30T21:15:07.097000
|
||||
CVE-2024-13047,1,1,dc7aafd74287433931ab2a00582ad328a0bfc903e0fe51d5645e7afe6ca004bd,2024-12-30T21:15:07.220000
|
||||
CVE-2024-13048,1,1,67adbf23fa9118f8304c09b8b6e3ff63b96c91828b41fba5df352ed6981833f4,2024-12-30T21:15:07.347000
|
||||
CVE-2024-13049,1,1,f591721723d514d93b81ea9ce6a3f8016e8d2fa1c15ed626bcbaa083ac3ec9cd,2024-12-30T21:15:07.470000
|
||||
CVE-2024-1305,0,0,61bd2e20ff0aa394ece1e84d5d848dafdcba1e6f1c6375393ac194bd0f52a153,2024-11-21T08:50:16.840000
|
||||
CVE-2024-13050,1,1,84109de165147e4a5232ee1fdc9c6d22162f7758c34e8757df3c209c53af5194,2024-12-30T21:15:07.593000
|
||||
CVE-2024-13051,1,1,1be1ae94a61dba469e5e49f0e3a210eb507d631c9c82589acffd3c63211509af,2024-12-30T21:15:07.717000
|
||||
CVE-2024-13058,1,1,91396049ed5baf4a6f156f57d5990485463c9e52e997b4c7fdc31249002c7bf7,2024-12-30T22:15:05.957000
|
||||
CVE-2024-1306,0,0,0542247252f536db3d3f5f372f6b06cf8f9322e7de2b3d2f5040c13d3f80547b,2024-11-21T08:50:17.053000
|
||||
CVE-2024-1307,0,0,791d403fd6ce043b636953425f5891ef42986249387c4cd3003ec2c058fbc715,2024-11-21T08:50:17.233000
|
||||
CVE-2024-1308,0,0,b2bb733c7402260f9ace902e9d676967e691f690d52b513a8afbdef713b7d4c5,2024-11-21T08:50:17.413000
|
||||
@ -257933,12 +257949,12 @@ CVE-2024-35899,0,0,11a2b23cf941f9839b39efc317ac13f10c84ba39dab1cd8d40a7557ebbc83
|
||||
CVE-2024-3590,0,0,d22476fa387864e078186d0e7523ee0ad7036681a9b2a59859776de3e93311e6,2024-11-21T09:29:56.237000
|
||||
CVE-2024-35900,0,0,50e870acb72fb71c84dc7dff1cb78cd820e12556e9b4f3f5b0b8691544c6253e,2024-11-21T09:21:09.730000
|
||||
CVE-2024-35901,0,0,cd3edf70ee28e7cbd408545a03be56c550e1844b8b07be05abd5f15de057a4a1,2024-11-21T09:21:09.867000
|
||||
CVE-2024-35902,0,1,d96a0ab7e74ae781082c74956ec3689f5500ab1ae77b1478881cc822cd8de55a,2024-12-30T19:47:46.853000
|
||||
CVE-2024-35902,0,0,d96a0ab7e74ae781082c74956ec3689f5500ab1ae77b1478881cc822cd8de55a,2024-12-30T19:47:46.853000
|
||||
CVE-2024-35903,0,0,b0a58707169cb46f406dc8821e52458e0f21e86329172db70bd8d6d3fc236b53,2024-11-21T09:21:10.117000
|
||||
CVE-2024-35904,0,0,6a8a43a00a33be7e600d0f99425837d586e2af006bd244b99f0bb205e27e9e6d,2024-11-21T09:21:10.303000
|
||||
CVE-2024-35905,0,1,2e853f5ed500836fa8d6b9061945a68ee5b2669edf25898295696baf9e37a1f0,2024-12-30T19:47:30.700000
|
||||
CVE-2024-35905,0,0,2e853f5ed500836fa8d6b9061945a68ee5b2669edf25898295696baf9e37a1f0,2024-12-30T19:47:30.700000
|
||||
CVE-2024-35906,0,0,70641f3710ab7a414753b1ae812647e2cbc2c61278b599a8ddd224db78108501,2024-05-23T14:15:10.010000
|
||||
CVE-2024-35907,0,1,dc58b910ee9f37226f3c1c8277b48e81a4767166656743ae592d874b9cfc4a3b,2024-12-30T19:35:53.437000
|
||||
CVE-2024-35907,0,0,dc58b910ee9f37226f3c1c8277b48e81a4767166656743ae592d874b9cfc4a3b,2024-12-30T19:35:53.437000
|
||||
CVE-2024-35908,0,0,9a3127fc2dcc56fa3ef0510f5888d8233de37b1948ac31e2d9fa490a31721ab0,2024-11-21T09:21:10.690000
|
||||
CVE-2024-35909,0,0,554c220395a9f5a1375258e018f8ed986d0caa4f773d6b01782597a19e34fda4,2024-11-21T09:21:10.813000
|
||||
CVE-2024-3591,0,0,e422baa207375a68d2a2fad897f062ac1001b3182aef2bc5608dbc800290852d,2024-11-21T09:29:56.423000
|
||||
@ -257954,20 +257970,20 @@ CVE-2024-35918,0,0,b84a4a8eaff0e9aa0772539706471f0485db8b7ae1e504faf03291dd1bedb
|
||||
CVE-2024-35919,0,0,e631246407300ae6e30d83cedcbee4935288a2744219786e10d196588f3f5df9,2024-11-21T09:21:12.250000
|
||||
CVE-2024-3592,0,0,ff5147fd52698b783751119964844ea2247003cb656728005bbdc75700fd6e1d,2024-11-21T09:29:56.610000
|
||||
CVE-2024-35920,0,0,d5937bd2774497f79326452f53ec5c30b02bc25bf82e6f9690d0e6395feac28d,2024-11-21T09:21:12.443000
|
||||
CVE-2024-35921,0,1,4526cc1ba7186dbcecaca88016f42ddd8138d3cd50124e674014b54b22fb74d3,2024-12-30T19:35:04.897000
|
||||
CVE-2024-35922,0,1,0c88e554ffaa341ceefcaf9be80ad5df621b046da9f94425d0c621a8e53f1e17,2024-12-30T19:27:42.720000
|
||||
CVE-2024-35921,0,0,4526cc1ba7186dbcecaca88016f42ddd8138d3cd50124e674014b54b22fb74d3,2024-12-30T19:35:04.897000
|
||||
CVE-2024-35922,0,0,0c88e554ffaa341ceefcaf9be80ad5df621b046da9f94425d0c621a8e53f1e17,2024-12-30T19:27:42.720000
|
||||
CVE-2024-35923,0,0,e200bbefa4260a7322c5705e6c101e370170f714b6cca2259ba31c94a243aae4,2024-05-25T14:15:53.013000
|
||||
CVE-2024-35924,0,0,51a8e81a5087f6b00f86aef3df30b13903521527bd7c24804424b3f4f88b017b,2024-11-21T09:21:12.833000
|
||||
CVE-2024-35925,0,0,527fefad4777ff7cb6251a7bffe472b80d43edd30c48c261e4833904b72dcd03,2024-11-21T09:21:12.953000
|
||||
CVE-2024-35926,0,0,c1b13d208fac57fe78f6933a263aa2f330043107ad1ad5de4da551ecec504628,2024-11-21T09:21:13.097000
|
||||
CVE-2024-35927,0,0,278ce2f015c27adcc7ff8c3c6be22b3e8c5bb291856afb164b072d0d8d61b636,2024-11-21T09:21:13.223000
|
||||
CVE-2024-35928,0,0,1c31dc8c665b8952880067e761bee324da2eee6fa320ed892680e88b3dd7b63e,2024-12-19T12:15:06.590000
|
||||
CVE-2024-35929,0,1,7da540c66ffc823238b17395ecbf47d1012e0cd64e229ac26e5cc7bd9ae7f5a8,2024-12-30T19:56:30.927000
|
||||
CVE-2024-35929,0,0,7da540c66ffc823238b17395ecbf47d1012e0cd64e229ac26e5cc7bd9ae7f5a8,2024-12-30T19:56:30.927000
|
||||
CVE-2024-3593,0,0,7dfe1a06ca99b709e0966f80e5fa7243762a8725a5825da6ebc20a944f2ce167,2024-11-21T09:29:56.757000
|
||||
CVE-2024-35930,0,1,5013df0e99717b1ece542581ca441e3bc2ac723ea4bcaf3c94a778bd9158d242,2024-12-30T19:52:55.313000
|
||||
CVE-2024-35930,0,0,5013df0e99717b1ece542581ca441e3bc2ac723ea4bcaf3c94a778bd9158d242,2024-12-30T19:52:55.313000
|
||||
CVE-2024-35931,0,0,82567fcbead3c5129937032b3ec99d3e2b49554c36aa4a0599fa7a1399168c13,2024-11-21T09:21:13.837000
|
||||
CVE-2024-35932,0,0,793922418147ab2c922ff7f32e99bfc27b35844d6861bc041d1cc83782b09a20,2024-11-21T09:21:13.957000
|
||||
CVE-2024-35933,0,1,0325908b6390f4a1c9c15094b5dc41c2e597d6d95f2ad6932f319d5dab89c0d2,2024-12-30T19:51:27.687000
|
||||
CVE-2024-35933,0,0,0325908b6390f4a1c9c15094b5dc41c2e597d6d95f2ad6932f319d5dab89c0d2,2024-12-30T19:51:27.687000
|
||||
CVE-2024-35934,0,0,361be744c073c07234d0642797a28f51b9670336f6d7218b1ba2a8dcda01d171,2024-11-21T09:21:14.217000
|
||||
CVE-2024-35935,0,0,082a285269746fc3fb873203b6e873841d4b83b7804fa4f36094730041c93f93,2024-11-21T09:21:14.350000
|
||||
CVE-2024-35936,0,0,c01c5dac7b5e0bd9601007610c8046f83929460d70171551603976f6ee883491,2024-11-21T09:21:14.507000
|
||||
@ -257996,7 +258012,7 @@ CVE-2024-35956,0,0,a2df20ee828a684480220f597be9391b4a50d33880f1470bf6aeca6acac4f
|
||||
CVE-2024-35957,0,0,63f1ef216f981899f739038c72e590e5dc7a92a6cab95efc5de09be8bad6816d,2024-11-21T09:21:17.513000
|
||||
CVE-2024-35958,0,0,dea59fdb3b17c08467afba7fa0588c1d2e5cd5eb65fea4ada743f1bfb3c216a3,2024-11-21T09:21:17.707000
|
||||
CVE-2024-35959,0,0,53f6e1bb6d9d49084925276b5c45c193850da3a7ac9cb385334abc5f14e36dbd,2024-11-21T09:21:17.913000
|
||||
CVE-2024-3596,0,1,a73be4dbd1ba2f2be100ff8602358c44e097c68e335a7e6fccfaec4ec8e338cc,2024-12-30T19:23:20.437000
|
||||
CVE-2024-3596,0,0,a73be4dbd1ba2f2be100ff8602358c44e097c68e335a7e6fccfaec4ec8e338cc,2024-12-30T19:23:20.437000
|
||||
CVE-2024-35960,0,0,85a643c1126146028b0f246face42ec63a48e10da60dacaff32d51eebc9fc072,2024-11-21T09:21:18.037000
|
||||
CVE-2024-35961,0,0,d8bede3118f3213f6531e3d4764ee351899ee3c652f6f84602e33285303dd68f,2024-11-21T09:21:18.270000
|
||||
CVE-2024-35962,0,0,f360f85bc8ef52af04a2c558b97f52575478fb0db43fb8c16bc09d6f51c8dcff,2024-11-21T09:21:18.400000
|
||||
@ -271521,10 +271537,10 @@ CVE-2024-5676,0,0,42e21ca7cdab0bdccf25cf6637d45fef7f036494b6d014c88b5835e6e48473
|
||||
CVE-2024-5677,0,0,1c94c489b32a2f3740f8b8867e0aff380d1e56445098bb97785a4bdba0037977,2024-11-21T09:48:08.540000
|
||||
CVE-2024-5678,0,0,bb4133b16eab99226f567cd512e0bec4d1a7175fc845cb5a8a3e18dcdbfd75d7,2024-08-15T18:05:54.847000
|
||||
CVE-2024-5679,0,0,dc654eef86d673e662acc6dfc1ecb27b2f541880d76227d1d93861f825adc641,2024-11-21T09:48:08.710000
|
||||
CVE-2024-56799,1,1,0dd8de9f29ee83d8d3d1718949c04ffed21addd8ed96891a089cf418021b9018,2024-12-30T19:15:08.160000
|
||||
CVE-2024-56799,0,0,0dd8de9f29ee83d8d3d1718949c04ffed21addd8ed96891a089cf418021b9018,2024-12-30T19:15:08.160000
|
||||
CVE-2024-5680,0,0,926c5c2f45d297ec0fa81be8768753266fc85d73f972d4984111118e8fceffa2,2024-11-21T09:48:08.837000
|
||||
CVE-2024-56800,1,1,2d9ccaf12da8a18d45c48258f139cc5fdee9e79e0e5d7096bfd7de919c9c0c9a,2024-12-30T19:15:08.333000
|
||||
CVE-2024-56801,1,1,ceaecdb1b2443408b3d440c831110179f2ea438cecab41e9ec9b39e4392684c3,2024-12-30T19:15:08.483000
|
||||
CVE-2024-56800,0,0,2d9ccaf12da8a18d45c48258f139cc5fdee9e79e0e5d7096bfd7de919c9c0c9a,2024-12-30T19:15:08.333000
|
||||
CVE-2024-56801,0,0,ceaecdb1b2443408b3d440c831110179f2ea438cecab41e9ec9b39e4392684c3,2024-12-30T19:15:08.483000
|
||||
CVE-2024-5681,0,0,25a463be80d3bb29af40554a62ba0e4276aefee689d98e36dee0bcfe769073f6,2024-11-21T09:48:08.953000
|
||||
CVE-2024-5682,0,0,61babb4b22790f05b1e6fb044157f817a85668af929c91e823c0d3ae99b2f335,2024-09-20T12:30:51.220000
|
||||
CVE-2024-5683,0,0,881352e7cddbf9570cae104e43894ad6185c01dcb07cd1be33b2f8fea4b1c33b,2024-11-21T09:48:09.327000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user