From 7ea9285b87c5f37ba54d3b8f7a1b321178383b35 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 20 Dec 2024 09:03:45 +0000 Subject: [PATCH] Auto-Update: 2024-12-20T09:00:21.630639+00:00 --- CVE-2024/CVE-2024-112xx/CVE-2024-11297.json | 60 +++++++++++++++++ CVE-2024/CVE-2024-113xx/CVE-2024-11331.json | 68 +++++++++++++++++++ CVE-2024/CVE-2024-114xx/CVE-2024-11411.json | 64 ++++++++++++++++++ CVE-2024/CVE-2024-117xx/CVE-2024-11774.json | 64 ++++++++++++++++++ CVE-2024/CVE-2024-117xx/CVE-2024-11775.json | 64 ++++++++++++++++++ CVE-2024/CVE-2024-117xx/CVE-2024-11783.json | 60 +++++++++++++++++ CVE-2024/CVE-2024-117xx/CVE-2024-11784.json | 64 ++++++++++++++++++ CVE-2024/CVE-2024-118xx/CVE-2024-11806.json | 60 +++++++++++++++++ CVE-2024/CVE-2024-118xx/CVE-2024-11812.json | 60 +++++++++++++++++ CVE-2024/CVE-2024-118xx/CVE-2024-11878.json | 60 +++++++++++++++++ CVE-2024/CVE-2024-118xx/CVE-2024-11893.json | 64 ++++++++++++++++++ CVE-2024/CVE-2024-11xx/CVE-2024-1135.json | 6 +- CVE-2024/CVE-2024-125xx/CVE-2024-12506.json | 72 +++++++++++++++++++++ CVE-2024/CVE-2024-125xx/CVE-2024-12509.json | 60 +++++++++++++++++ CVE-2024/CVE-2024-125xx/CVE-2024-12571.json | 60 +++++++++++++++++ CVE-2024/CVE-2024-95xx/CVE-2024-9503.json | 60 +++++++++++++++++ CVE-2024/CVE-2024-96xx/CVE-2024-9619.json | 60 +++++++++++++++++ README.md | 33 ++++++---- _state.csv | 30 +++++++-- 19 files changed, 1050 insertions(+), 19 deletions(-) create mode 100644 CVE-2024/CVE-2024-112xx/CVE-2024-11297.json create mode 100644 CVE-2024/CVE-2024-113xx/CVE-2024-11331.json create mode 100644 CVE-2024/CVE-2024-114xx/CVE-2024-11411.json create mode 100644 CVE-2024/CVE-2024-117xx/CVE-2024-11774.json create mode 100644 CVE-2024/CVE-2024-117xx/CVE-2024-11775.json create mode 100644 CVE-2024/CVE-2024-117xx/CVE-2024-11783.json create mode 100644 CVE-2024/CVE-2024-117xx/CVE-2024-11784.json create mode 100644 CVE-2024/CVE-2024-118xx/CVE-2024-11806.json create mode 100644 CVE-2024/CVE-2024-118xx/CVE-2024-11812.json create mode 100644 CVE-2024/CVE-2024-118xx/CVE-2024-11878.json create mode 100644 CVE-2024/CVE-2024-118xx/CVE-2024-11893.json create mode 100644 CVE-2024/CVE-2024-125xx/CVE-2024-12506.json create mode 100644 CVE-2024/CVE-2024-125xx/CVE-2024-12509.json create mode 100644 CVE-2024/CVE-2024-125xx/CVE-2024-12571.json create mode 100644 CVE-2024/CVE-2024-95xx/CVE-2024-9503.json create mode 100644 CVE-2024/CVE-2024-96xx/CVE-2024-9619.json diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11297.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11297.json new file mode 100644 index 00000000000..d3274ec91b9 --- /dev/null +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11297.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-11297", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-20T07:15:09.350", + "lastModified": "2024-12-20T07:15:09.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Page Restriction WordPress (WP) \u2013 Protect WP Pages/Post plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.3.6 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://wordpress.org/plugins/page-and-post-restriction/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6d12ab8c-d5d0-4e02-986e-e894fae073e5?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11331.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11331.json new file mode 100644 index 00000000000..a7db550b205 --- /dev/null +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11331.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-11331", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-20T07:15:10.007", + "lastModified": "2024-12-20T07:15:10.007", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The \u0627\u0633\u062a\u062e\u0631\u0627\u062c \u0645\u062d\u0635\u0648\u0644\u0627\u062a \u0648\u0648\u06a9\u0627\u0645\u0631\u0633 \u0628\u0631\u0627\u06cc \u0622\u06cc\u0633\u06cc plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.1.3. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/isee-products-extractor/tags/2.1.2/admin/pages/products_list.php#L105", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/isee-products-extractor/tags/2.1.2/admin/pages/products_list.php#L92", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/isee-products-extractor/tags/2.1.2/admin/pages/products_list.php#L99", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/af0cc02a-b6dd-4058-b686-9c9a3a4a5962?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-114xx/CVE-2024-11411.json b/CVE-2024/CVE-2024-114xx/CVE-2024-11411.json new file mode 100644 index 00000000000..896d3b3abad --- /dev/null +++ b/CVE-2024/CVE-2024-114xx/CVE-2024-11411.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-11411", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-20T07:15:10.187", + "lastModified": "2024-12-20T07:15:10.187", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Spotlightr plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'spotlightr-v' shortcode in all versions up to, and including, 0.1.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/spotlightr/trunk/spotlightr.php", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/spotlightr/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/475f2758-27a5-4a36-8085-576ee341938b?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11774.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11774.json new file mode 100644 index 00000000000..65bfa50e67d --- /dev/null +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11774.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-11774", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-20T07:15:10.393", + "lastModified": "2024-12-20T07:15:10.393", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Outdooractive Embed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'list2go' shortcode in all versions up to, and including, 1.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/outdooractive-embed/trunk/shortcodes.php#L49", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/outdooractive-embed/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d152271f-af5c-4faf-9945-483b69b716f2?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11775.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11775.json new file mode 100644 index 00000000000..46f864ba73c --- /dev/null +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11775.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-11775", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-20T07:15:10.597", + "lastModified": "2024-12-20T07:15:10.597", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Particle Background plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'particleground' shortcode in all versions up to, and including, 1.0.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/particle-background/trunk/particleground.php#L59", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/particle-background/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/42cf84d1-37f5-41c1-838d-67244f17c55d?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11783.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11783.json new file mode 100644 index 00000000000..41fc7571776 --- /dev/null +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11783.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-11783", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-20T07:15:10.777", + "lastModified": "2024-12-20T07:15:10.777", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Financial Calculator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'finance_calculator' shortcode in all versions up to, and including, 2.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/finance-calculator-with-application-form/tags/2.2.1/finance-calculator-with-aplication-form.php#L604", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c9314970-1030-4488-8147-05ba1453182c?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11784.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11784.json new file mode 100644 index 00000000000..9280341d025 --- /dev/null +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11784.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-11784", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-20T07:15:11.003", + "lastModified": "2024-12-20T07:15:11.003", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Sell Tickets Online \u2013 TicketSource Ticket Shop for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ticketshop' shortcode in all versions up to, and including, 3.0.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/ticketsource-events/trunk/includes/ticketsource-events-build.php#L37", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/ticketsource-events/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/970826cf-316d-4fce-ac90-bf338c5ef3e4?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11806.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11806.json new file mode 100644 index 00000000000..dff7becb220 --- /dev/null +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11806.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-11806", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-20T07:15:11.177", + "lastModified": "2024-12-20T07:15:11.177", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The PKT1 Centro de envios plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'success' and 'error' parameters in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/pkt1-centro-de-envios/trunk/views/admin/settings_page.php#L8", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c924b317-97ec-43b8-9bf3-ed7618743de7?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11812.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11812.json new file mode 100644 index 00000000000..e715000badc --- /dev/null +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11812.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-11812", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-20T07:15:11.373", + "lastModified": "2024-12-20T07:15:11.373", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Wtyczka SeoPilot dla WP plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.3.091. This is due to missing or incorrect nonce validation on the SeoPilot_Admin_Options() function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/wtyczka-seopilot-dla-wp/trunk/seopilot.php#L88", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5efb2fbe-d839-4fb1-80bb-91adf0d39a2b?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11878.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11878.json new file mode 100644 index 00000000000..f50715e6b22 --- /dev/null +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11878.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-11878", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-20T07:15:11.577", + "lastModified": "2024-12-20T07:15:11.577", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Category Post Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'category-post-slider' shortcode in all versions up to, and including, 1.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/category-post-slider/tags/1.4/category-post-slider.php#L189", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e312e3eb-0da9-4ecf-aec6-86bfe08417f5?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11893.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11893.json new file mode 100644 index 00000000000..263e84fc719 --- /dev/null +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11893.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-11893", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-20T07:15:11.747", + "lastModified": "2024-12-20T07:15:11.747", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Spoki \u2013 Chat Buttons and WooCommerce Notifications plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'spoki_button' shortcode in all versions up to, and including, 2.15.14 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/spoki/trunk/spoki.php#L1256", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/spoki/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ba965a6a-68ed-4383-93a7-593418df34a5?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1135.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1135.json index b4ead396d76..e646c7a10d3 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1135.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1135.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1135", "sourceIdentifier": "security@huntr.dev", "published": "2024-04-16T00:15:07.797", - "lastModified": "2024-11-21T08:49:52.457", + "lastModified": "2024-12-20T07:15:12.590", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -67,6 +67,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00027.html", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/12/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12506.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12506.json new file mode 100644 index 00000000000..d709461a5a2 --- /dev/null +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12506.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2024-12506", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-20T07:15:11.940", + "lastModified": "2024-12-20T07:15:11.940", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The NACC WordPress Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'nacc' shortcode in all versions up to, and including, 4.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/nacc-wordpress-plugin/tags/4.1.0/nacc-wordpress-plugin.php#L135", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/nacc-wordpress-plugin/tags/4.1.0/nacc-wordpress-plugin.php#L68", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/nacc-wordpress-plugin/tags/4.1.0/nacc-wordpress-plugin.php#L85", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/nacc-wordpress-plugin/tags/4.1.0/nacc-wordpress-plugin.php#L98", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d992b9dd-dfd1-497c-b09f-cca02dc87e34?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12509.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12509.json new file mode 100644 index 00000000000..2cc2c0fe6fe --- /dev/null +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12509.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-12509", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-20T07:15:12.177", + "lastModified": "2024-12-20T07:15:12.177", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Embed Twine plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'embed_twine' shortcode in all versions up to, and including, 0.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://wordpress.org/plugins/embed-twine/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/647f0b46-ac12-445b-9d41-66eba3eb2b1a?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12571.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12571.json new file mode 100644 index 00000000000..17658299f4c --- /dev/null +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12571.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-12571", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-20T07:15:12.380", + "lastModified": "2024-12-20T07:15:12.380", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Store Locator for WordPress with Google Maps \u2013 LotsOfLocales plugin for WordPress is vulnerable to Local File Inclusion in version 3.98.9 via the 'sl_engine' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/store-locator/trunk/sl-functions.php#L1919", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4ea89a6e-e089-4e8d-afd8-2a217f6910a6?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9503.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9503.json new file mode 100644 index 00000000000..fa6e9a13b09 --- /dev/null +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9503.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-9503", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-20T07:15:12.797", + "lastModified": "2024-12-20T07:15:12.797", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Maintenance & Coming Soon Redirect Animation plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wploti_add_whitelisted_roles_option', 'wploti_remove_whitelisted_roles_option', 'wploti_add_whitelisted_users_option', 'wploti_remove_whitelisted_users_option', and 'wploti_uploaded_animation_save_option' functions in all versions up to, and including, 2.1.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify certain plugin settings." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/maintenance-coming-soon-redirect-animation/trunk/wploti_maintenance_redirect.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1e716cf9-198c-4a32-883d-3f90dd399aee?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9619.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9619.json new file mode 100644 index 00000000000..1c8f24a9f77 --- /dev/null +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9619.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-9619", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-20T07:15:12.977", + "lastModified": "2024-12-20T07:15:12.977", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The WP SHAPES plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://wordpress.org/plugins/wp-shapes/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8207ae15-b6ae-4b58-8877-1f87c12dbe7c?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 83e2595777b..3eddb9ae3ae 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-20T07:00:19.952937+00:00 +2024-12-20T09:00:21.630639+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-20T06:15:23.110000+00:00 +2024-12-20T07:15:12.977000+00:00 ``` ### Last Data Feed Release @@ -33,25 +33,36 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -274449 +274465 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `16` -- [CVE-2024-10555](CVE-2024/CVE-2024-105xx/CVE-2024-10555.json) (`2024-12-20T06:15:22.450`) -- [CVE-2024-10706](CVE-2024/CVE-2024-107xx/CVE-2024-10706.json) (`2024-12-20T06:15:22.710`) -- [CVE-2024-11108](CVE-2024/CVE-2024-111xx/CVE-2024-11108.json) (`2024-12-20T06:15:22.827`) -- [CVE-2024-21549](CVE-2024/CVE-2024-215xx/CVE-2024-21549.json) (`2024-12-20T05:15:06.780`) -- [CVE-2024-5955](CVE-2024/CVE-2024-59xx/CVE-2024-5955.json) (`2024-12-20T06:15:22.943`) -- [CVE-2024-8968](CVE-2024/CVE-2024-89xx/CVE-2024-8968.json) (`2024-12-20T06:15:23.110`) +- [CVE-2024-11297](CVE-2024/CVE-2024-112xx/CVE-2024-11297.json) (`2024-12-20T07:15:09.350`) +- [CVE-2024-11331](CVE-2024/CVE-2024-113xx/CVE-2024-11331.json) (`2024-12-20T07:15:10.007`) +- [CVE-2024-11411](CVE-2024/CVE-2024-114xx/CVE-2024-11411.json) (`2024-12-20T07:15:10.187`) +- [CVE-2024-11774](CVE-2024/CVE-2024-117xx/CVE-2024-11774.json) (`2024-12-20T07:15:10.393`) +- [CVE-2024-11775](CVE-2024/CVE-2024-117xx/CVE-2024-11775.json) (`2024-12-20T07:15:10.597`) +- [CVE-2024-11783](CVE-2024/CVE-2024-117xx/CVE-2024-11783.json) (`2024-12-20T07:15:10.777`) +- [CVE-2024-11784](CVE-2024/CVE-2024-117xx/CVE-2024-11784.json) (`2024-12-20T07:15:11.003`) +- [CVE-2024-11806](CVE-2024/CVE-2024-118xx/CVE-2024-11806.json) (`2024-12-20T07:15:11.177`) +- [CVE-2024-11812](CVE-2024/CVE-2024-118xx/CVE-2024-11812.json) (`2024-12-20T07:15:11.373`) +- [CVE-2024-11878](CVE-2024/CVE-2024-118xx/CVE-2024-11878.json) (`2024-12-20T07:15:11.577`) +- [CVE-2024-11893](CVE-2024/CVE-2024-118xx/CVE-2024-11893.json) (`2024-12-20T07:15:11.747`) +- [CVE-2024-12506](CVE-2024/CVE-2024-125xx/CVE-2024-12506.json) (`2024-12-20T07:15:11.940`) +- [CVE-2024-12509](CVE-2024/CVE-2024-125xx/CVE-2024-12509.json) (`2024-12-20T07:15:12.177`) +- [CVE-2024-12571](CVE-2024/CVE-2024-125xx/CVE-2024-12571.json) (`2024-12-20T07:15:12.380`) +- [CVE-2024-9503](CVE-2024/CVE-2024-95xx/CVE-2024-9503.json) (`2024-12-20T07:15:12.797`) +- [CVE-2024-9619](CVE-2024/CVE-2024-96xx/CVE-2024-9619.json) (`2024-12-20T07:15:12.977`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `1` +- [CVE-2024-1135](CVE-2024/CVE-2024-11xx/CVE-2024-1135.json) (`2024-12-20T07:15:12.590`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 03ef6f04d47..df99d746b95 100644 --- a/_state.csv +++ b/_state.csv @@ -243508,7 +243508,7 @@ CVE-2024-10547,0,0,b023c976bb6d488185fa01d9371074d053ec54a35f2b498daa31d6bb09884 CVE-2024-10548,0,0,387eea2f214d486d1c28afc0bdd6a3cbda871b2748526e8919d00671b70f55b1,2024-12-19T02:15:22.420000 CVE-2024-1055,0,0,399a6bc3324e5a5ab60feee10ef9f668300825e29ef0f6a3f63048abb22d1f67,2024-11-21T08:49:41.683000 CVE-2024-10551,0,0,399c3b50116ab12fecb385939dfbc291c08c34ee1143fded03cc056aa8d168fc,2024-12-06T16:15:20.160000 -CVE-2024-10555,1,1,554f3a35edc31885c63cdb5a9029d786cc47cad0c097b2babddbd6303acf3649,2024-12-20T06:15:22.450000 +CVE-2024-10555,0,0,554f3a35edc31885c63cdb5a9029d786cc47cad0c097b2babddbd6303acf3649,2024-12-20T06:15:22.450000 CVE-2024-10556,0,0,718a43e4ad6bf4f3f07d592398a4916e1e5afe3b7fda2ab7a1b90e0c73118264,2024-11-01T20:51:35.617000 CVE-2024-10557,0,0,e65f5d89b91c24f295e5cbd0f813e2ad8ed04df13cf96a919800b770566f37fc,2024-11-01T20:48:56.980000 CVE-2024-10559,0,0,16e3eab9e781d1e16f0d045b8d1d79bfb09e11f3fa816a22b4936c2b8431f9e3,2024-11-01T20:43:41.070000 @@ -243634,7 +243634,7 @@ CVE-2024-10700,0,0,47463adc515feae701fdd6df43b426f169c9e406b10e3ad8dd4832a0c6070 CVE-2024-10701,0,0,0e6acb5db36bb65b2a9a78f5a1eb22e27b99e8cd35851fc25db7c90c627071bd,2024-11-05T16:52:44.937000 CVE-2024-10702,0,0,3259585053a84cb9e4f20d6c03e98232b3f699485fefb085dfa1033c1b54da99,2024-11-05T16:52:11.193000 CVE-2024-10704,0,0,ba32dc9400bcf601c7de3ed1f96e389b9876b8709121dc8baeae8e0502050909,2024-11-29T15:15:15.777000 -CVE-2024-10706,1,1,e61b32cc5553d00e0f7f872b5d719e44eb2608b60448b5c82ea3bc34ed625b29,2024-12-20T06:15:22.710000 +CVE-2024-10706,0,0,e61b32cc5553d00e0f7f872b5d719e44eb2608b60448b5c82ea3bc34ed625b29,2024-12-20T06:15:22.710000 CVE-2024-10708,0,0,eea3aeda96ee17aa2e34b8299f4fa63911654caae1b5976f2282c61fc39e2c7d,2024-12-10T16:15:22.327000 CVE-2024-10709,0,0,41eadf98fd4f942149bd2d66f39b1d32e2fbc20d0415ec457a4d209de40f95b0,2024-11-25T21:15:08.837000 CVE-2024-1071,0,0,511789b6fa5ad5f82a1b86953aeffe2ca3b5c7e6b5a99f94e7636c9edfe8a8b3,2024-11-21T08:49:43.920000 @@ -243959,7 +243959,7 @@ CVE-2024-11103,0,0,525c56d7b3f8fec3123e98bad3867c199a9a90e84f6b6962f9d506a460e46 CVE-2024-11104,0,0,b75d8ded53ff668230e72c743fffcbea02289181c30609ae66856a5e9653031c,2024-11-22T06:15:19.093000 CVE-2024-11106,0,0,4f7fe956431776c4fe3e507a22b518efb5f390b9e8eff5421b62ca54ec32b13a,2024-12-10T11:15:07.030000 CVE-2024-11107,0,0,9acfc58960fd056b26158a4898d3cab204ba2e238bb413c388c6122ce49a79e3,2024-12-10T16:15:22.450000 -CVE-2024-11108,1,1,c1be6b34c7d61522c6a05f2a8110ded17dd42c6e68c9945ca15a84f9c2fbd097,2024-12-20T06:15:22.827000 +CVE-2024-11108,0,0,c1be6b34c7d61522c6a05f2a8110ded17dd42c6e68c9945ca15a84f9c2fbd097,2024-12-20T06:15:22.827000 CVE-2024-1111,0,0,1e2a4c53f023bbf8c3b556fe6d8a896ca169d10bbf6dcef8f8f730e5e086694a,2024-11-21T08:49:49.257000 CVE-2024-11110,0,0,d490bd60a369a1b46dbdb1050197f0676234294cb261b9f35d39066213c16bbc,2024-11-13T17:01:16.850000 CVE-2024-11111,0,0,da9ee8d75f19a39df28c4985a5537997054eaf20345ca454e34c488f64fe6a62,2024-11-13T17:01:16.850000 @@ -244098,6 +244098,7 @@ CVE-2024-11293,0,0,963e5cd86fd8964150efb764dabf7f60f1898cb3eb1113839b414494aefc5 CVE-2024-11294,0,0,2eb006c700872e4221a5d65f1f84540c18c42b5a19bdffcef60597b889db391d,2024-12-17T09:15:05.193000 CVE-2024-11295,0,0,33f60bf01a9cdc709e5955974a036a6d640572051acba82f69d600e268adeb3e,2024-12-18T07:15:06.737000 CVE-2024-11296,0,0,fb7d94da02b5205207d7d82f7728d17cf0d45360472acb20ff8132fc89a748af,2024-11-22T23:15:04.507000 +CVE-2024-11297,1,1,effd0c524156f686ff8114158c7be34b290a65be769194d151de349957b742c3,2024-12-20T07:15:09.350000 CVE-2024-11298,0,0,cd8027ff7c1e39b70cf43f7d5a6cec3a72565a042c79fb93ed3ff58ccba5dece,2024-11-22T23:15:04.983000 CVE-2024-1130,0,0,a3e19aef9eb3382013136f74a42e19afeb0e606b8f2206b5fca2ea0a53428b21,2024-11-21T08:49:51.890000 CVE-2024-11303,0,0,ad607bb34f4cabffd121b35b6cb4bdf73670583d2b4d1068bee702934c5fa785,2024-11-21T22:15:07.213000 @@ -244126,6 +244127,7 @@ CVE-2024-11326,0,0,9d10d6c9af70a4b37660df9be6daba459c823e11b8e9209053dea842d431f CVE-2024-11329,0,0,b8078055ea1294f92cc83861c7101c3b3e6c5146a8621a33052ed2acc467efe1,2024-12-07T02:15:17.707000 CVE-2024-1133,0,0,4ebc6a2651d5348692c359f9763049862ae951f3b0834af00edeaa957870768c,2024-11-21T08:49:52.210000 CVE-2024-11330,0,0,18ebd923deefc9a9bb5d0708c49f6927dd28806fb2a49775faee5c7db402775d,2024-11-23T07:15:03.737000 +CVE-2024-11331,1,1,8dd305ba4ab2e8f366f8800ddc47a87530efb2062d468b8fa56af1e3d96b5072,2024-12-20T07:15:10.007000 CVE-2024-11332,0,0,36669df4e93715465b64ec1799e55f470058053e193a811269619d8d50b4e0c9,2024-11-23T05:15:06.520000 CVE-2024-11333,0,0,00c71a7929b275d875b9539b6f0a2f4cc66b516eced93f3c2cfad9bb181a4a5b,2024-11-28T09:15:04.170000 CVE-2024-11334,0,0,f7fc893b8a37cca506fd20fe68edd8509ed855f99666ff9db346702f3632cf66,2024-11-26T17:33:49.477000 @@ -244134,7 +244136,7 @@ CVE-2024-11339,0,0,79f980d1c213f37a017402750a78ab5a89012c4a7d884549e17aee2fe1c2f CVE-2024-1134,0,0,3b9e316f9f09adef1cfd4f6b3383505dbc9180172570e63197eb1d9f1f72ee08,2024-11-21T08:49:52.330000 CVE-2024-11341,0,0,fe8cd85d684fa85647e91e6c807d0d3948596661a708a57f08c30a79715842f3,2024-12-05T10:31:39.520000 CVE-2024-11342,0,0,e5c7c30c6a212e83bae351facc5b11e3c8030751d949156ac2c5ae223532d502,2024-11-26T04:15:04.030000 -CVE-2024-1135,0,0,68c50f9eb4591d8bb506721809b1f0298841fc2528944ed9529aba74567efa11,2024-11-21T08:49:52.457000 +CVE-2024-1135,0,1,3aff273363b92899a6e2ea5d9bfb0816a0d4bc7746e2c028bcee049e0905b123,2024-12-20T07:15:12.590000 CVE-2024-11351,0,0,bc05ae182e8cb110bde703a3706bb1fc3289062cde7a0dbafe7f85cee2bc2c16,2024-12-11T13:15:06.350000 CVE-2024-11352,0,0,de3582e15d7397e011d69382c9fedc502b246facf9b57003a974bb327fc47480,2024-12-06T09:15:06.650000 CVE-2024-11353,0,0,9cdabea534e964700c7cde9ffd2f1a82245a0291b01694ff89cf8e86136ee6b3,2024-12-07T02:15:17.850000 @@ -244182,6 +244184,7 @@ CVE-2024-11408,0,0,93b8e8e7d0af9941374609aaf88c4a7d797ff8538fcfe7107694f32484594 CVE-2024-11409,0,0,d22b70a73591203fcc84336e42771bb0323eb0f50b18a06b9611e73b816bbb63,2024-11-21T13:57:24.187000 CVE-2024-1141,0,0,b961e74d0ebe9d7d8329aa6364f69fe88660525f77fc34d7b8c7a2c1807fbb46,2024-11-21T08:49:53.540000 CVE-2024-11410,0,0,3feaa5e35282ec74e24733cc488fef2714878cec0e52382238ef568e6cd60caa,2024-12-12T05:15:07.943000 +CVE-2024-11411,1,1,45fd05e0003c102438328031f3a8db9c5eb4c7e8e99486bef58b429ef646805b,2024-12-20T07:15:10.187000 CVE-2024-11412,0,0,d55ab555d21669b2d25c80968963a90a886283290bae53ef9f01c04e93067fd4,2024-11-21T13:57:24.187000 CVE-2024-11413,0,0,b5d749dc409c3d02803970a40929c4a301d3fca06ced23d0d9fb741e390df687,2024-12-12T04:15:05.137000 CVE-2024-11414,0,0,3d656b82d829d8f181db1dcba01bc392ebe4c5c3cb43c19e946de5a3793b7933,2024-11-21T13:57:24.187000 @@ -244484,11 +244487,15 @@ CVE-2024-1177,0,0,50204f0e1e82280f8898460ad80abf26f09df69c8b4bae2f8e7f259925f880 CVE-2024-11770,0,0,be8f578c9f82931df9c3ede6728bb383379d1438331426ab12c908c3c55de158,2024-12-14T05:15:07.627000 CVE-2024-11772,0,0,e4065c1a87a840626901473fbfd1c3a172d915dd88fc522553dcc32cffa89a83,2024-12-10T19:15:19.817000 CVE-2024-11773,0,0,8f508701342909bb3125bf0e1fc423b8efe31d0b55b4e2a3bdbbc0d7a1ff1d40,2024-12-10T19:15:19.943000 +CVE-2024-11774,1,1,8c52544effe985c7ba196587a266250e647defe01baa7995490d4c6fe0f2c79d,2024-12-20T07:15:10.393000 +CVE-2024-11775,1,1,7b6745dd412f8e744fe64a53924ca8c890c1a6db8e482cec67477290bf013e98,2024-12-20T07:15:10.597000 CVE-2024-11776,0,0,02af28bf5261dd0614205fe5525cdc72943859876957f078edb8600c70f8f4f5,2024-12-20T03:15:06.420000 CVE-2024-11779,0,0,66ab9533cf27509ff85b54c7dc6f857efc44402b9c1a2b7fc4f1c1fbd8a0b4e7,2024-12-05T10:31:39.980000 CVE-2024-1178,0,0,e86847946e473364610b445d63c15ed4c6d00a61287bc755b3617494adb6266f,2024-11-21T08:49:58.357000 CVE-2024-11781,0,0,c0e6be58a4f2f20ed752d41934ec31e6ef434c9b40a727cf73a45e49f6a0c1d4,2024-12-12T06:15:21.940000 CVE-2024-11782,0,0,80e41e72f948036c8856df6deb0c7080f3de56cbdfa10b8def2e5b899b6badbf,2024-12-03T10:15:05.320000 +CVE-2024-11783,1,1,dd5c6c90f58cf9817a453ae1bac83a2fea362b7e5f8601de8d84e49118c2c582,2024-12-20T07:15:10.777000 +CVE-2024-11784,1,1,3d3abc5b7e29fcdf3b5ffb8113ba01b7949f72837f7959e6ef4ab1d36c077252,2024-12-20T07:15:11.003000 CVE-2024-11785,0,0,e137309a78ebd499bbb351f0ee1628f33b9b5ce6a6ab6cc6dc744ed5f5a172d0,2024-12-12T06:15:22.137000 CVE-2024-11786,0,0,d6ea53802d23ffec1cd11dafa6bf43f0a9c3890d418ba558b1736085da34fb25,2024-11-28T09:15:05.243000 CVE-2024-11787,0,0,0fc43ca7c27cfe9e876d4315d9f5ebd6d728a646aa64b73ef36d749ae3468d41,2024-12-03T16:09:14.300000 @@ -244512,9 +244519,11 @@ CVE-2024-11802,0,0,1ee509be931681d4c5a8d73b57a93991c64ec42b7974530a22aeb2c892a29 CVE-2024-11803,0,0,c30267488200ebbececbde46f03f5202aa25bb82f36f5a64a8764d0144f29f7c,2024-12-03T16:16:42.027000 CVE-2024-11804,0,0,f9087d17b26e590b19e8a1c6dd65a13e121078cedf86731b21d1d672c10cbe6a,2024-12-12T05:15:09.910000 CVE-2024-11805,0,0,a5f68fcc3ec71060a3e1fcbfe1152276ddf9a9708302280ee1d096e56cb69ebb,2024-12-03T08:15:06.553000 +CVE-2024-11806,1,1,147dff27e860ef00933a7776022304ba661d66287c508be135dead181fe58fd3,2024-12-20T07:15:11.177000 CVE-2024-11807,0,0,5b0564826b05464c314eefc84d6d7fdc2dbd57c9a7cdeff75f8e6a6bda0d85b9,2024-12-04T03:15:05.083000 CVE-2024-11809,0,0,1f74a5fd4084e6ffe9713972c542683f1719819d3bb81586e87aada1d25da361,2024-12-13T05:15:07.127000 CVE-2024-1181,0,0,75e84367823a14869b96be5d2a44185a42194134ed6d728c2cc873c3b47fce46,2024-11-21T08:49:58.703000 +CVE-2024-11812,1,1,fe2cea9a899f10de25589db8f2a6adff05b98dce0a47e91d0bbfbcfbf92fc5d1,2024-12-20T07:15:11.373000 CVE-2024-11813,0,0,47a3a35561cd3c4cfbe2425cc2aa9f8596afbe4dae47aa0811b6748805370891,2024-12-04T03:15:05.227000 CVE-2024-11814,0,0,2a13f9fe8be8eabbe1cb3354ac6af91e2a65c049708e435975b8ce27567d551d,2024-12-04T10:15:05.007000 CVE-2024-11817,0,0,9a66a0fca3306ba25f6938738b8c35626d89b0596c6acf3b5c6bd12c17a8843e,2024-12-03T15:15:41.753000 @@ -244559,6 +244568,7 @@ CVE-2024-11873,0,0,43fe50fba07be54821bde88d28e9848023239a3818ded353df905e4be8923 CVE-2024-11875,0,0,2fce0016aa8c6a027c95eca97da341c6f52b04c99e151a803448f2d92e035de0,2024-12-12T05:15:10.317000 CVE-2024-11876,0,0,7dca70b5f035733977196a213c5fb6af280ec15c1e4f28c6b52544d4e4abf16e,2024-12-14T05:15:08.890000 CVE-2024-11877,0,0,0b34673f01d0d1e7e6d2a67dc1819f1f33a60d34a4311d2b4c1472795752b73d,2024-12-14T05:15:09.060000 +CVE-2024-11878,1,1,af02f09df2301122f2a28b4167310ef306fbd62d98fd8bae9f3d97fee8eeeac8,2024-12-20T07:15:11.577000 CVE-2024-11879,0,0,8b1fe425c329588ef1ebe3acf2d107f6c7ec5bd8a31ce8d8d2ecd6a4e6c522e2,2024-12-14T05:15:09.257000 CVE-2024-1188,0,0,a65e9144328c7bf88ed9510065b2567c80bec907fa15019254b44a904bcf4c98,2024-11-21T08:49:59.690000 CVE-2024-11880,0,0,bc08b419001e69ecc8df6960919cacc77cc712a48473883e8526af3cf15bbb8b,2024-12-04T09:15:04.470000 @@ -244570,6 +244580,7 @@ CVE-2024-11888,0,0,cf1efece56f5c2bebdcf90e50a83aeb70349857636d7051726174c5db5e8f CVE-2024-11889,0,0,3fc539f68ff9b477e6f4cef1e3e238111b97bac54b77c7c8d1194c7f132e59a4,2024-12-14T05:15:10.030000 CVE-2024-1189,0,0,3e2c1a3fc9f24eb6eaedd5adba4b6f521645b93b8971a5e9477fe83a4ee5ef97,2024-11-21T08:49:59.850000 CVE-2024-11891,0,0,f8a38032fa61b45ae7f4fd61d15412795ca770178ff882a3a6fac619a51ce045,2024-12-12T05:15:10.670000 +CVE-2024-11893,1,1,c62163c48ee35e299b71936d209d9441db563d33661eb5d071dc1058fa6edb4a,2024-12-20T07:15:11.747000 CVE-2024-11894,0,0,0c2059044c45af848fff3dd9292eb7e51685f6c7fbb508ad9b4173a086520faf,2024-12-14T05:15:10.227000 CVE-2024-11897,0,0,63c2369fafd5da048dd57864988be95602290ce10df0f51d423ab54c866c15e0,2024-12-04T03:15:05.380000 CVE-2024-11898,0,0,e843212abf00805a20f8b4b65b36c01f75cc2096cf65f2d0e7899f11eb517a82,2024-12-03T08:15:06.857000 @@ -244886,6 +244897,8 @@ CVE-2024-12500,0,0,91a78173a00b8923c6065fae142a28107d51dd137f72c2dcd125d694804a0 CVE-2024-12501,0,0,5cbd9f9a342d7bd3b80b0e76e0f5058fb53e053502f02c282879631f5e242603,2024-12-14T06:15:19.770000 CVE-2024-12502,0,0,9df1e99058de0594df9a1e119549359f5b02524e122b46846c6476ea29e82157,2024-12-14T05:15:11.260000 CVE-2024-12503,0,0,e53e761e34d39e4e7df36516ec31d7b0a69f9ff2ae79d7b9e9b3c291572b84d0,2024-12-13T17:13:37.483000 +CVE-2024-12506,1,1,f5970974940384143e4bac0efb2a799b5e7e33bfe270b45789573e25acce94da,2024-12-20T07:15:11.940000 +CVE-2024-12509,1,1,dab32c4d0c7b908dd7c763fa37236c702db014098016fc1cda3fdb142e7ed5aa,2024-12-20T07:15:12.177000 CVE-2024-1251,0,0,8c0214d9f05a1f50e84514dc27e8bafe56d249b59ef6b0b677b5e947e572faed,2024-11-21T08:50:09.497000 CVE-2024-12513,0,0,dca945128b57953412f66421e839e160ec8ed8fa444319b37f70dd69033190d5,2024-12-18T03:15:26.427000 CVE-2024-12517,0,0,468899f199d602580a1bce011d5d81c6e61db10c42b8285d87bc20145862442b,2024-12-14T05:15:11.453000 @@ -244907,6 +244920,7 @@ CVE-2024-12564,0,0,0abcb221861e5fc99f1edf43c59fea9ce50a3b4bd68b4b9a5961d76741772 CVE-2024-12569,0,0,85ba460436494f476697b315ff16d44cb76ffc76b518eda7d927b0e3a48ad1e9,2024-12-19T09:16:13.830000 CVE-2024-1257,0,0,7cc030c8f0ebfb33a80da788a5513945114551aaaa2999db4fa614a5f6b08a9b,2024-11-21T08:50:10.443000 CVE-2024-12570,0,0,be94920192af405ec932f38181a462713be2ef7292a21e90f93bf4238cc63d84,2024-12-12T12:15:22.660000 +CVE-2024-12571,1,1,64d88bdf40a9886ffb28abd6d1e741e65a8db2fb01deaadc842b0be03349fe2e,2024-12-20T07:15:12.380000 CVE-2024-12572,0,0,b5830ae1a3c6182c738f484a7555b2d49502aecd75946e90268f33cb1f4e6fca,2024-12-13T04:15:05.233000 CVE-2024-12574,0,0,22d90c2cfc66a6e55649293fae24817d92e89a03bfa8e0d56af714629ad6f2a8,2024-12-13T05:15:07.310000 CVE-2024-12578,0,0,6076f52af563970ec8a3bc8e5f14a4b4d6997e85c1163c0f2b2e584e97943a1e,2024-12-14T05:15:12 @@ -247068,7 +247082,7 @@ CVE-2024-21545,0,0,12417d057214273e4a76243ffeaf97d513746844d668a1420616fa022f5af CVE-2024-21546,0,0,374b959b014e67074043123d4e408037a721391ba09f30f003dba89985567839,2024-12-18T06:15:22.850000 CVE-2024-21547,0,0,9490da4e046bfe0261ead89061dc5ab090fcc33b7491f225d76294d9a91f7dfa,2024-12-18T06:15:23.187000 CVE-2024-21548,0,0,1234240944f7ab37f9588d239ecac84e4a1f43ed5a4b8fa4e08658630e5fe2ba,2024-12-18T15:15:09.947000 -CVE-2024-21549,1,1,dc243ef0e42daf7dcd8db82f6f1c86a16547df01e3cb286c549c98c29096c4c9,2024-12-20T05:15:06.780000 +CVE-2024-21549,0,0,dc243ef0e42daf7dcd8db82f6f1c86a16547df01e3cb286c549c98c29096c4c9,2024-12-20T05:15:06.780000 CVE-2024-2155,0,0,1def2d989b10107bcc4deca9404884628c1ba17bdc1993a4df13bb309b4ac8eb,2024-11-21T09:09:09.070000 CVE-2024-21550,0,0,6b574e14ae55a92be9fd93a1bb9ebb56cb79876aa6e47f41fbbb48bbd5163e82,2024-08-13T17:33:13.537000 CVE-2024-21552,0,0,3511199af539fa92e1c2d7637f006a31f2e0de3850c5a9391f1377c23517a9d0,2024-11-21T08:54:39.323000 @@ -271049,7 +271063,7 @@ CVE-2024-5950,0,0,a78d500e380a8683be6de1b6ede7696fb96614af4e886c1082dc67edbebdb1 CVE-2024-5951,0,0,6ca5ff3cd42fd08fff399488183cbf1951f9079ffd4d29e5f2b6b2af828d5de9,2024-11-21T09:48:38.163000 CVE-2024-5952,0,0,a190c9a9018a1f2ab58177f40637c06f330e66f62b7b6378f23916dd2d1714f0,2024-11-21T09:48:38.283000 CVE-2024-5953,0,0,4dcc64e3efdf9631a9f9731d0b86a1779eaa66766e5e010ea8ad27ad8753ac75,2024-11-21T09:48:38.403000 -CVE-2024-5955,1,1,c5630fac867a44557612ac4d8d684e24335cbfc306cc0ed1b33653b41f74d51d,2024-12-20T06:15:22.943000 +CVE-2024-5955,0,0,c5630fac867a44557612ac4d8d684e24335cbfc306cc0ed1b33653b41f74d51d,2024-12-20T06:15:22.943000 CVE-2024-5956,0,0,e9563f3d433df5f631aaa571a1b9eb69e01bff299de8e6814f8c22eb94c0eed5,2024-09-06T16:25:19.253000 CVE-2024-5957,0,0,0c96b582bddb8809e949513e2b3e6545ad729973e5974f8b12406a050d04a9ee,2024-09-06T16:24:23.317000 CVE-2024-5958,0,0,226ea565269d7d6c4cfc028fa9d5174e58a9d30f205eb3929eb0cbcbf47d1d28,2024-09-26T15:35:51.207000 @@ -273637,7 +273651,7 @@ CVE-2024-8963,0,0,581521bb2c8b1b5f22bc02521a37b1605cb082ee4bc9fbe4e287e83cb93654 CVE-2024-8964,0,0,c3c0787fe6644e5ecb28ab585ed80f03eded601812c8114e1e7b6807baaa0335,2024-10-10T12:56:30.817000 CVE-2024-8965,0,0,f8e90b5b67b70a8381e6e9eacdc79df30f60298bdd1400482e72c97cbc06eff9,2024-10-04T19:04:03.157000 CVE-2024-8967,0,0,7898714718fda7e623053515c819c9ef828b8e1f849f0008b801f032918cd46a,2024-10-08T18:47:12.110000 -CVE-2024-8968,1,1,c7a16d386151e00dcac012f34369d8416279fb51787e8aeab959c965eeccc8e5,2024-12-20T06:15:23.110000 +CVE-2024-8968,0,0,c7a16d386151e00dcac012f34369d8416279fb51787e8aeab959c965eeccc8e5,2024-12-20T06:15:23.110000 CVE-2024-8969,0,0,e0103db8ff55ccbf745d9bad3dc6e3e89e30b3ef3eab823189cb0a38ab304109,2024-09-20T12:30:51.220000 CVE-2024-8970,0,0,32d2ab1ad1bb8df91d143f8ca284d1a616bc1563b70e0f2f9520d488fbae118b,2024-12-13T01:20:14.813000 CVE-2024-8972,0,0,8803923f1a932fca7afceec67344751a4aa4dcbfcccd96d5452861e7faadd73d,2024-12-17T14:15:20.110000 @@ -274038,6 +274052,7 @@ CVE-2024-9488,0,0,24a104ee042d409dac1b47e91dfe4fa3675de573a6d9c7b27917f050255558 CVE-2024-9489,0,0,9258045c083103dfa924748299ab5c4dd4ec8da1f0d3cf12ca2c7454235f3440,2024-11-01T16:27:25.937000 CVE-2024-9500,0,0,d281910094387755c33adda8658eb046790675cd4af5161b6589be051fe5cd55,2024-11-18T17:11:17.393000 CVE-2024-9501,0,0,6a54c1f4c2f1d131dc91aaf803ea2d16e3173972cc5357c7b11859daf18eeb84,2024-10-28T13:58:09.230000 +CVE-2024-9503,1,1,d9626fae18356155d789eb5c817d922d3ab72a7734ed3357d821dcbf1ead4623,2024-12-20T07:15:12.797000 CVE-2024-9504,0,0,d5582483784d6c852a9dbcff40d18eb6f930294575e0934168018fc044a9db21,2024-11-26T08:15:08.180000 CVE-2024-9505,0,0,9fa554b249edec9f6f3c55fd2b3a6ab6df16ec28919e88fec8b5527ce060489f,2024-10-31T16:39:41.193000 CVE-2024-9506,0,0,6ad65fd4baa9e3c79b9232fb23977d41e699e9932b5a5c0be78eb7aa0a0de386,2024-10-16T16:38:43.170000 @@ -274130,6 +274145,7 @@ CVE-2024-9613,0,0,f7f019a18c9e01f36efde66dfbb10d6eba11ff87ade2b8efd8a79811ebe631 CVE-2024-9614,0,0,89d6ad4791713c9131b15fd858d4bd9404ef7090c81b08570775178f0867f84e,2024-11-13T17:01:16.850000 CVE-2024-9615,0,0,c9468917c9754e631849fcee424e37c3bdfdc0ce7baf1874e3cbc9e2bb677dcd,2024-11-18T17:11:17.393000 CVE-2024-9616,0,0,6ef77d38c3e8284229b9cc30b59e98636261a63c660e6b9ccf97deb77695f71d,2024-10-15T12:58:51.050000 +CVE-2024-9619,1,1,7c3317793ad46a4e9890a6173bdc5d67cc479b9d8b0099182e002c0f2b568a1c,2024-12-20T07:15:12.977000 CVE-2024-9620,0,0,08cbdfb167bd5abb993a662a73c0230e86eadf10fb1a3369f9a28670f9e1b938,2024-10-10T12:56:30.817000 CVE-2024-9621,0,0,d01febf4917d7e254a80be80939f9dbe78ca0c8507d48f25eb8390335c29a3af,2024-12-06T10:15:06.327000 CVE-2024-9622,0,0,251c9c2f9ba8699fdab8c22e456db9ec67e578807b450704b6decdcb8f4fc3a8,2024-10-10T12:56:30.817000