Auto-Update: 2024-12-20T09:00:21.630639+00:00

This commit is contained in:
cad-safe-bot 2024-12-20 09:03:45 +00:00
parent 2d1ff61816
commit 7ea9285b87
19 changed files with 1050 additions and 19 deletions

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-11297",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-20T07:15:09.350",
"lastModified": "2024-12-20T07:15:09.350",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Page Restriction WordPress (WP) \u2013 Protect WP Pages/Post plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.3.6 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://wordpress.org/plugins/page-and-post-restriction/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6d12ab8c-d5d0-4e02-986e-e894fae073e5?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-11331",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-20T07:15:10.007",
"lastModified": "2024-12-20T07:15:10.007",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The \u0627\u0633\u062a\u062e\u0631\u0627\u062c \u0645\u062d\u0635\u0648\u0644\u0627\u062a \u0648\u0648\u06a9\u0627\u0645\u0631\u0633 \u0628\u0631\u0627\u06cc \u0622\u06cc\u0633\u06cc plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.1.3. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/isee-products-extractor/tags/2.1.2/admin/pages/products_list.php#L105",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/isee-products-extractor/tags/2.1.2/admin/pages/products_list.php#L92",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/isee-products-extractor/tags/2.1.2/admin/pages/products_list.php#L99",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/af0cc02a-b6dd-4058-b686-9c9a3a4a5962?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-11411",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-20T07:15:10.187",
"lastModified": "2024-12-20T07:15:10.187",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Spotlightr plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'spotlightr-v' shortcode in all versions up to, and including, 0.1.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/spotlightr/trunk/spotlightr.php",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/spotlightr/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/475f2758-27a5-4a36-8085-576ee341938b?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-11774",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-20T07:15:10.393",
"lastModified": "2024-12-20T07:15:10.393",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Outdooractive Embed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'list2go' shortcode in all versions up to, and including, 1.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/outdooractive-embed/trunk/shortcodes.php#L49",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/outdooractive-embed/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d152271f-af5c-4faf-9945-483b69b716f2?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-11775",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-20T07:15:10.597",
"lastModified": "2024-12-20T07:15:10.597",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Particle Background plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'particleground' shortcode in all versions up to, and including, 1.0.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/particle-background/trunk/particleground.php#L59",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/particle-background/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/42cf84d1-37f5-41c1-838d-67244f17c55d?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-11783",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-20T07:15:10.777",
"lastModified": "2024-12-20T07:15:10.777",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Financial Calculator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'finance_calculator' shortcode in all versions up to, and including, 2.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/finance-calculator-with-application-form/tags/2.2.1/finance-calculator-with-aplication-form.php#L604",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c9314970-1030-4488-8147-05ba1453182c?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-11784",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-20T07:15:11.003",
"lastModified": "2024-12-20T07:15:11.003",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Sell Tickets Online \u2013 TicketSource Ticket Shop for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ticketshop' shortcode in all versions up to, and including, 3.0.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/ticketsource-events/trunk/includes/ticketsource-events-build.php#L37",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/ticketsource-events/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/970826cf-316d-4fce-ac90-bf338c5ef3e4?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-11806",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-20T07:15:11.177",
"lastModified": "2024-12-20T07:15:11.177",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The PKT1 Centro de envios plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'success' and 'error' parameters in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/pkt1-centro-de-envios/trunk/views/admin/settings_page.php#L8",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c924b317-97ec-43b8-9bf3-ed7618743de7?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-11812",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-20T07:15:11.373",
"lastModified": "2024-12-20T07:15:11.373",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Wtyczka SeoPilot dla WP plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.3.091. This is due to missing or incorrect nonce validation on the SeoPilot_Admin_Options() function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wtyczka-seopilot-dla-wp/trunk/seopilot.php#L88",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5efb2fbe-d839-4fb1-80bb-91adf0d39a2b?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-11878",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-20T07:15:11.577",
"lastModified": "2024-12-20T07:15:11.577",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Category Post Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'category-post-slider' shortcode in all versions up to, and including, 1.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/category-post-slider/tags/1.4/category-post-slider.php#L189",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e312e3eb-0da9-4ecf-aec6-86bfe08417f5?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-11893",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-20T07:15:11.747",
"lastModified": "2024-12-20T07:15:11.747",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Spoki \u2013 Chat Buttons and WooCommerce Notifications plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'spoki_button' shortcode in all versions up to, and including, 2.15.14 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/spoki/trunk/spoki.php#L1256",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/spoki/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ba965a6a-68ed-4383-93a7-593418df34a5?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1135",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-04-16T00:15:07.797",
"lastModified": "2024-11-21T08:49:52.457",
"lastModified": "2024-12-20T07:15:12.590",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -67,6 +67,10 @@
{
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00027.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/12/msg00018.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2024-12506",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-20T07:15:11.940",
"lastModified": "2024-12-20T07:15:11.940",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The NACC WordPress Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'nacc' shortcode in all versions up to, and including, 4.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/nacc-wordpress-plugin/tags/4.1.0/nacc-wordpress-plugin.php#L135",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/nacc-wordpress-plugin/tags/4.1.0/nacc-wordpress-plugin.php#L68",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/nacc-wordpress-plugin/tags/4.1.0/nacc-wordpress-plugin.php#L85",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/nacc-wordpress-plugin/tags/4.1.0/nacc-wordpress-plugin.php#L98",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d992b9dd-dfd1-497c-b09f-cca02dc87e34?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-12509",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-20T07:15:12.177",
"lastModified": "2024-12-20T07:15:12.177",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Embed Twine plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'embed_twine' shortcode in all versions up to, and including, 0.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wordpress.org/plugins/embed-twine/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/647f0b46-ac12-445b-9d41-66eba3eb2b1a?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-12571",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-20T07:15:12.380",
"lastModified": "2024-12-20T07:15:12.380",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Store Locator for WordPress with Google Maps \u2013 LotsOfLocales plugin for WordPress is vulnerable to Local File Inclusion in version 3.98.9 via the 'sl_engine' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-98"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/store-locator/trunk/sl-functions.php#L1919",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4ea89a6e-e089-4e8d-afd8-2a217f6910a6?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-9503",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-20T07:15:12.797",
"lastModified": "2024-12-20T07:15:12.797",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Maintenance & Coming Soon Redirect Animation plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wploti_add_whitelisted_roles_option', 'wploti_remove_whitelisted_roles_option', 'wploti_add_whitelisted_users_option', 'wploti_remove_whitelisted_users_option', and 'wploti_uploaded_animation_save_option' functions in all versions up to, and including, 2.1.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify certain plugin settings."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/maintenance-coming-soon-redirect-animation/trunk/wploti_maintenance_redirect.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1e716cf9-198c-4a32-883d-3f90dd399aee?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-9619",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-20T07:15:12.977",
"lastModified": "2024-12-20T07:15:12.977",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WP SHAPES plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wordpress.org/plugins/wp-shapes/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8207ae15-b6ae-4b58-8877-1f87c12dbe7c?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-12-20T07:00:19.952937+00:00
2024-12-20T09:00:21.630639+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-12-20T06:15:23.110000+00:00
2024-12-20T07:15:12.977000+00:00
```
### Last Data Feed Release
@ -33,25 +33,36 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
274449
274465
```
### CVEs added in the last Commit
Recently added CVEs: `6`
Recently added CVEs: `16`
- [CVE-2024-10555](CVE-2024/CVE-2024-105xx/CVE-2024-10555.json) (`2024-12-20T06:15:22.450`)
- [CVE-2024-10706](CVE-2024/CVE-2024-107xx/CVE-2024-10706.json) (`2024-12-20T06:15:22.710`)
- [CVE-2024-11108](CVE-2024/CVE-2024-111xx/CVE-2024-11108.json) (`2024-12-20T06:15:22.827`)
- [CVE-2024-21549](CVE-2024/CVE-2024-215xx/CVE-2024-21549.json) (`2024-12-20T05:15:06.780`)
- [CVE-2024-5955](CVE-2024/CVE-2024-59xx/CVE-2024-5955.json) (`2024-12-20T06:15:22.943`)
- [CVE-2024-8968](CVE-2024/CVE-2024-89xx/CVE-2024-8968.json) (`2024-12-20T06:15:23.110`)
- [CVE-2024-11297](CVE-2024/CVE-2024-112xx/CVE-2024-11297.json) (`2024-12-20T07:15:09.350`)
- [CVE-2024-11331](CVE-2024/CVE-2024-113xx/CVE-2024-11331.json) (`2024-12-20T07:15:10.007`)
- [CVE-2024-11411](CVE-2024/CVE-2024-114xx/CVE-2024-11411.json) (`2024-12-20T07:15:10.187`)
- [CVE-2024-11774](CVE-2024/CVE-2024-117xx/CVE-2024-11774.json) (`2024-12-20T07:15:10.393`)
- [CVE-2024-11775](CVE-2024/CVE-2024-117xx/CVE-2024-11775.json) (`2024-12-20T07:15:10.597`)
- [CVE-2024-11783](CVE-2024/CVE-2024-117xx/CVE-2024-11783.json) (`2024-12-20T07:15:10.777`)
- [CVE-2024-11784](CVE-2024/CVE-2024-117xx/CVE-2024-11784.json) (`2024-12-20T07:15:11.003`)
- [CVE-2024-11806](CVE-2024/CVE-2024-118xx/CVE-2024-11806.json) (`2024-12-20T07:15:11.177`)
- [CVE-2024-11812](CVE-2024/CVE-2024-118xx/CVE-2024-11812.json) (`2024-12-20T07:15:11.373`)
- [CVE-2024-11878](CVE-2024/CVE-2024-118xx/CVE-2024-11878.json) (`2024-12-20T07:15:11.577`)
- [CVE-2024-11893](CVE-2024/CVE-2024-118xx/CVE-2024-11893.json) (`2024-12-20T07:15:11.747`)
- [CVE-2024-12506](CVE-2024/CVE-2024-125xx/CVE-2024-12506.json) (`2024-12-20T07:15:11.940`)
- [CVE-2024-12509](CVE-2024/CVE-2024-125xx/CVE-2024-12509.json) (`2024-12-20T07:15:12.177`)
- [CVE-2024-12571](CVE-2024/CVE-2024-125xx/CVE-2024-12571.json) (`2024-12-20T07:15:12.380`)
- [CVE-2024-9503](CVE-2024/CVE-2024-95xx/CVE-2024-9503.json) (`2024-12-20T07:15:12.797`)
- [CVE-2024-9619](CVE-2024/CVE-2024-96xx/CVE-2024-9619.json) (`2024-12-20T07:15:12.977`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `1`
- [CVE-2024-1135](CVE-2024/CVE-2024-11xx/CVE-2024-1135.json) (`2024-12-20T07:15:12.590`)
## Download and Usage

View File

@ -243508,7 +243508,7 @@ CVE-2024-10547,0,0,b023c976bb6d488185fa01d9371074d053ec54a35f2b498daa31d6bb09884
CVE-2024-10548,0,0,387eea2f214d486d1c28afc0bdd6a3cbda871b2748526e8919d00671b70f55b1,2024-12-19T02:15:22.420000
CVE-2024-1055,0,0,399a6bc3324e5a5ab60feee10ef9f668300825e29ef0f6a3f63048abb22d1f67,2024-11-21T08:49:41.683000
CVE-2024-10551,0,0,399c3b50116ab12fecb385939dfbc291c08c34ee1143fded03cc056aa8d168fc,2024-12-06T16:15:20.160000
CVE-2024-10555,1,1,554f3a35edc31885c63cdb5a9029d786cc47cad0c097b2babddbd6303acf3649,2024-12-20T06:15:22.450000
CVE-2024-10555,0,0,554f3a35edc31885c63cdb5a9029d786cc47cad0c097b2babddbd6303acf3649,2024-12-20T06:15:22.450000
CVE-2024-10556,0,0,718a43e4ad6bf4f3f07d592398a4916e1e5afe3b7fda2ab7a1b90e0c73118264,2024-11-01T20:51:35.617000
CVE-2024-10557,0,0,e65f5d89b91c24f295e5cbd0f813e2ad8ed04df13cf96a919800b770566f37fc,2024-11-01T20:48:56.980000
CVE-2024-10559,0,0,16e3eab9e781d1e16f0d045b8d1d79bfb09e11f3fa816a22b4936c2b8431f9e3,2024-11-01T20:43:41.070000
@ -243634,7 +243634,7 @@ CVE-2024-10700,0,0,47463adc515feae701fdd6df43b426f169c9e406b10e3ad8dd4832a0c6070
CVE-2024-10701,0,0,0e6acb5db36bb65b2a9a78f5a1eb22e27b99e8cd35851fc25db7c90c627071bd,2024-11-05T16:52:44.937000
CVE-2024-10702,0,0,3259585053a84cb9e4f20d6c03e98232b3f699485fefb085dfa1033c1b54da99,2024-11-05T16:52:11.193000
CVE-2024-10704,0,0,ba32dc9400bcf601c7de3ed1f96e389b9876b8709121dc8baeae8e0502050909,2024-11-29T15:15:15.777000
CVE-2024-10706,1,1,e61b32cc5553d00e0f7f872b5d719e44eb2608b60448b5c82ea3bc34ed625b29,2024-12-20T06:15:22.710000
CVE-2024-10706,0,0,e61b32cc5553d00e0f7f872b5d719e44eb2608b60448b5c82ea3bc34ed625b29,2024-12-20T06:15:22.710000
CVE-2024-10708,0,0,eea3aeda96ee17aa2e34b8299f4fa63911654caae1b5976f2282c61fc39e2c7d,2024-12-10T16:15:22.327000
CVE-2024-10709,0,0,41eadf98fd4f942149bd2d66f39b1d32e2fbc20d0415ec457a4d209de40f95b0,2024-11-25T21:15:08.837000
CVE-2024-1071,0,0,511789b6fa5ad5f82a1b86953aeffe2ca3b5c7e6b5a99f94e7636c9edfe8a8b3,2024-11-21T08:49:43.920000
@ -243959,7 +243959,7 @@ CVE-2024-11103,0,0,525c56d7b3f8fec3123e98bad3867c199a9a90e84f6b6962f9d506a460e46
CVE-2024-11104,0,0,b75d8ded53ff668230e72c743fffcbea02289181c30609ae66856a5e9653031c,2024-11-22T06:15:19.093000
CVE-2024-11106,0,0,4f7fe956431776c4fe3e507a22b518efb5f390b9e8eff5421b62ca54ec32b13a,2024-12-10T11:15:07.030000
CVE-2024-11107,0,0,9acfc58960fd056b26158a4898d3cab204ba2e238bb413c388c6122ce49a79e3,2024-12-10T16:15:22.450000
CVE-2024-11108,1,1,c1be6b34c7d61522c6a05f2a8110ded17dd42c6e68c9945ca15a84f9c2fbd097,2024-12-20T06:15:22.827000
CVE-2024-11108,0,0,c1be6b34c7d61522c6a05f2a8110ded17dd42c6e68c9945ca15a84f9c2fbd097,2024-12-20T06:15:22.827000
CVE-2024-1111,0,0,1e2a4c53f023bbf8c3b556fe6d8a896ca169d10bbf6dcef8f8f730e5e086694a,2024-11-21T08:49:49.257000
CVE-2024-11110,0,0,d490bd60a369a1b46dbdb1050197f0676234294cb261b9f35d39066213c16bbc,2024-11-13T17:01:16.850000
CVE-2024-11111,0,0,da9ee8d75f19a39df28c4985a5537997054eaf20345ca454e34c488f64fe6a62,2024-11-13T17:01:16.850000
@ -244098,6 +244098,7 @@ CVE-2024-11293,0,0,963e5cd86fd8964150efb764dabf7f60f1898cb3eb1113839b414494aefc5
CVE-2024-11294,0,0,2eb006c700872e4221a5d65f1f84540c18c42b5a19bdffcef60597b889db391d,2024-12-17T09:15:05.193000
CVE-2024-11295,0,0,33f60bf01a9cdc709e5955974a036a6d640572051acba82f69d600e268adeb3e,2024-12-18T07:15:06.737000
CVE-2024-11296,0,0,fb7d94da02b5205207d7d82f7728d17cf0d45360472acb20ff8132fc89a748af,2024-11-22T23:15:04.507000
CVE-2024-11297,1,1,effd0c524156f686ff8114158c7be34b290a65be769194d151de349957b742c3,2024-12-20T07:15:09.350000
CVE-2024-11298,0,0,cd8027ff7c1e39b70cf43f7d5a6cec3a72565a042c79fb93ed3ff58ccba5dece,2024-11-22T23:15:04.983000
CVE-2024-1130,0,0,a3e19aef9eb3382013136f74a42e19afeb0e606b8f2206b5fca2ea0a53428b21,2024-11-21T08:49:51.890000
CVE-2024-11303,0,0,ad607bb34f4cabffd121b35b6cb4bdf73670583d2b4d1068bee702934c5fa785,2024-11-21T22:15:07.213000
@ -244126,6 +244127,7 @@ CVE-2024-11326,0,0,9d10d6c9af70a4b37660df9be6daba459c823e11b8e9209053dea842d431f
CVE-2024-11329,0,0,b8078055ea1294f92cc83861c7101c3b3e6c5146a8621a33052ed2acc467efe1,2024-12-07T02:15:17.707000
CVE-2024-1133,0,0,4ebc6a2651d5348692c359f9763049862ae951f3b0834af00edeaa957870768c,2024-11-21T08:49:52.210000
CVE-2024-11330,0,0,18ebd923deefc9a9bb5d0708c49f6927dd28806fb2a49775faee5c7db402775d,2024-11-23T07:15:03.737000
CVE-2024-11331,1,1,8dd305ba4ab2e8f366f8800ddc47a87530efb2062d468b8fa56af1e3d96b5072,2024-12-20T07:15:10.007000
CVE-2024-11332,0,0,36669df4e93715465b64ec1799e55f470058053e193a811269619d8d50b4e0c9,2024-11-23T05:15:06.520000
CVE-2024-11333,0,0,00c71a7929b275d875b9539b6f0a2f4cc66b516eced93f3c2cfad9bb181a4a5b,2024-11-28T09:15:04.170000
CVE-2024-11334,0,0,f7fc893b8a37cca506fd20fe68edd8509ed855f99666ff9db346702f3632cf66,2024-11-26T17:33:49.477000
@ -244134,7 +244136,7 @@ CVE-2024-11339,0,0,79f980d1c213f37a017402750a78ab5a89012c4a7d884549e17aee2fe1c2f
CVE-2024-1134,0,0,3b9e316f9f09adef1cfd4f6b3383505dbc9180172570e63197eb1d9f1f72ee08,2024-11-21T08:49:52.330000
CVE-2024-11341,0,0,fe8cd85d684fa85647e91e6c807d0d3948596661a708a57f08c30a79715842f3,2024-12-05T10:31:39.520000
CVE-2024-11342,0,0,e5c7c30c6a212e83bae351facc5b11e3c8030751d949156ac2c5ae223532d502,2024-11-26T04:15:04.030000
CVE-2024-1135,0,0,68c50f9eb4591d8bb506721809b1f0298841fc2528944ed9529aba74567efa11,2024-11-21T08:49:52.457000
CVE-2024-1135,0,1,3aff273363b92899a6e2ea5d9bfb0816a0d4bc7746e2c028bcee049e0905b123,2024-12-20T07:15:12.590000
CVE-2024-11351,0,0,bc05ae182e8cb110bde703a3706bb1fc3289062cde7a0dbafe7f85cee2bc2c16,2024-12-11T13:15:06.350000
CVE-2024-11352,0,0,de3582e15d7397e011d69382c9fedc502b246facf9b57003a974bb327fc47480,2024-12-06T09:15:06.650000
CVE-2024-11353,0,0,9cdabea534e964700c7cde9ffd2f1a82245a0291b01694ff89cf8e86136ee6b3,2024-12-07T02:15:17.850000
@ -244182,6 +244184,7 @@ CVE-2024-11408,0,0,93b8e8e7d0af9941374609aaf88c4a7d797ff8538fcfe7107694f32484594
CVE-2024-11409,0,0,d22b70a73591203fcc84336e42771bb0323eb0f50b18a06b9611e73b816bbb63,2024-11-21T13:57:24.187000
CVE-2024-1141,0,0,b961e74d0ebe9d7d8329aa6364f69fe88660525f77fc34d7b8c7a2c1807fbb46,2024-11-21T08:49:53.540000
CVE-2024-11410,0,0,3feaa5e35282ec74e24733cc488fef2714878cec0e52382238ef568e6cd60caa,2024-12-12T05:15:07.943000
CVE-2024-11411,1,1,45fd05e0003c102438328031f3a8db9c5eb4c7e8e99486bef58b429ef646805b,2024-12-20T07:15:10.187000
CVE-2024-11412,0,0,d55ab555d21669b2d25c80968963a90a886283290bae53ef9f01c04e93067fd4,2024-11-21T13:57:24.187000
CVE-2024-11413,0,0,b5d749dc409c3d02803970a40929c4a301d3fca06ced23d0d9fb741e390df687,2024-12-12T04:15:05.137000
CVE-2024-11414,0,0,3d656b82d829d8f181db1dcba01bc392ebe4c5c3cb43c19e946de5a3793b7933,2024-11-21T13:57:24.187000
@ -244484,11 +244487,15 @@ CVE-2024-1177,0,0,50204f0e1e82280f8898460ad80abf26f09df69c8b4bae2f8e7f259925f880
CVE-2024-11770,0,0,be8f578c9f82931df9c3ede6728bb383379d1438331426ab12c908c3c55de158,2024-12-14T05:15:07.627000
CVE-2024-11772,0,0,e4065c1a87a840626901473fbfd1c3a172d915dd88fc522553dcc32cffa89a83,2024-12-10T19:15:19.817000
CVE-2024-11773,0,0,8f508701342909bb3125bf0e1fc423b8efe31d0b55b4e2a3bdbbc0d7a1ff1d40,2024-12-10T19:15:19.943000
CVE-2024-11774,1,1,8c52544effe985c7ba196587a266250e647defe01baa7995490d4c6fe0f2c79d,2024-12-20T07:15:10.393000
CVE-2024-11775,1,1,7b6745dd412f8e744fe64a53924ca8c890c1a6db8e482cec67477290bf013e98,2024-12-20T07:15:10.597000
CVE-2024-11776,0,0,02af28bf5261dd0614205fe5525cdc72943859876957f078edb8600c70f8f4f5,2024-12-20T03:15:06.420000
CVE-2024-11779,0,0,66ab9533cf27509ff85b54c7dc6f857efc44402b9c1a2b7fc4f1c1fbd8a0b4e7,2024-12-05T10:31:39.980000
CVE-2024-1178,0,0,e86847946e473364610b445d63c15ed4c6d00a61287bc755b3617494adb6266f,2024-11-21T08:49:58.357000
CVE-2024-11781,0,0,c0e6be58a4f2f20ed752d41934ec31e6ef434c9b40a727cf73a45e49f6a0c1d4,2024-12-12T06:15:21.940000
CVE-2024-11782,0,0,80e41e72f948036c8856df6deb0c7080f3de56cbdfa10b8def2e5b899b6badbf,2024-12-03T10:15:05.320000
CVE-2024-11783,1,1,dd5c6c90f58cf9817a453ae1bac83a2fea362b7e5f8601de8d84e49118c2c582,2024-12-20T07:15:10.777000
CVE-2024-11784,1,1,3d3abc5b7e29fcdf3b5ffb8113ba01b7949f72837f7959e6ef4ab1d36c077252,2024-12-20T07:15:11.003000
CVE-2024-11785,0,0,e137309a78ebd499bbb351f0ee1628f33b9b5ce6a6ab6cc6dc744ed5f5a172d0,2024-12-12T06:15:22.137000
CVE-2024-11786,0,0,d6ea53802d23ffec1cd11dafa6bf43f0a9c3890d418ba558b1736085da34fb25,2024-11-28T09:15:05.243000
CVE-2024-11787,0,0,0fc43ca7c27cfe9e876d4315d9f5ebd6d728a646aa64b73ef36d749ae3468d41,2024-12-03T16:09:14.300000
@ -244512,9 +244519,11 @@ CVE-2024-11802,0,0,1ee509be931681d4c5a8d73b57a93991c64ec42b7974530a22aeb2c892a29
CVE-2024-11803,0,0,c30267488200ebbececbde46f03f5202aa25bb82f36f5a64a8764d0144f29f7c,2024-12-03T16:16:42.027000
CVE-2024-11804,0,0,f9087d17b26e590b19e8a1c6dd65a13e121078cedf86731b21d1d672c10cbe6a,2024-12-12T05:15:09.910000
CVE-2024-11805,0,0,a5f68fcc3ec71060a3e1fcbfe1152276ddf9a9708302280ee1d096e56cb69ebb,2024-12-03T08:15:06.553000
CVE-2024-11806,1,1,147dff27e860ef00933a7776022304ba661d66287c508be135dead181fe58fd3,2024-12-20T07:15:11.177000
CVE-2024-11807,0,0,5b0564826b05464c314eefc84d6d7fdc2dbd57c9a7cdeff75f8e6a6bda0d85b9,2024-12-04T03:15:05.083000
CVE-2024-11809,0,0,1f74a5fd4084e6ffe9713972c542683f1719819d3bb81586e87aada1d25da361,2024-12-13T05:15:07.127000
CVE-2024-1181,0,0,75e84367823a14869b96be5d2a44185a42194134ed6d728c2cc873c3b47fce46,2024-11-21T08:49:58.703000
CVE-2024-11812,1,1,fe2cea9a899f10de25589db8f2a6adff05b98dce0a47e91d0bbfbcfbf92fc5d1,2024-12-20T07:15:11.373000
CVE-2024-11813,0,0,47a3a35561cd3c4cfbe2425cc2aa9f8596afbe4dae47aa0811b6748805370891,2024-12-04T03:15:05.227000
CVE-2024-11814,0,0,2a13f9fe8be8eabbe1cb3354ac6af91e2a65c049708e435975b8ce27567d551d,2024-12-04T10:15:05.007000
CVE-2024-11817,0,0,9a66a0fca3306ba25f6938738b8c35626d89b0596c6acf3b5c6bd12c17a8843e,2024-12-03T15:15:41.753000
@ -244559,6 +244568,7 @@ CVE-2024-11873,0,0,43fe50fba07be54821bde88d28e9848023239a3818ded353df905e4be8923
CVE-2024-11875,0,0,2fce0016aa8c6a027c95eca97da341c6f52b04c99e151a803448f2d92e035de0,2024-12-12T05:15:10.317000
CVE-2024-11876,0,0,7dca70b5f035733977196a213c5fb6af280ec15c1e4f28c6b52544d4e4abf16e,2024-12-14T05:15:08.890000
CVE-2024-11877,0,0,0b34673f01d0d1e7e6d2a67dc1819f1f33a60d34a4311d2b4c1472795752b73d,2024-12-14T05:15:09.060000
CVE-2024-11878,1,1,af02f09df2301122f2a28b4167310ef306fbd62d98fd8bae9f3d97fee8eeeac8,2024-12-20T07:15:11.577000
CVE-2024-11879,0,0,8b1fe425c329588ef1ebe3acf2d107f6c7ec5bd8a31ce8d8d2ecd6a4e6c522e2,2024-12-14T05:15:09.257000
CVE-2024-1188,0,0,a65e9144328c7bf88ed9510065b2567c80bec907fa15019254b44a904bcf4c98,2024-11-21T08:49:59.690000
CVE-2024-11880,0,0,bc08b419001e69ecc8df6960919cacc77cc712a48473883e8526af3cf15bbb8b,2024-12-04T09:15:04.470000
@ -244570,6 +244580,7 @@ CVE-2024-11888,0,0,cf1efece56f5c2bebdcf90e50a83aeb70349857636d7051726174c5db5e8f
CVE-2024-11889,0,0,3fc539f68ff9b477e6f4cef1e3e238111b97bac54b77c7c8d1194c7f132e59a4,2024-12-14T05:15:10.030000
CVE-2024-1189,0,0,3e2c1a3fc9f24eb6eaedd5adba4b6f521645b93b8971a5e9477fe83a4ee5ef97,2024-11-21T08:49:59.850000
CVE-2024-11891,0,0,f8a38032fa61b45ae7f4fd61d15412795ca770178ff882a3a6fac619a51ce045,2024-12-12T05:15:10.670000
CVE-2024-11893,1,1,c62163c48ee35e299b71936d209d9441db563d33661eb5d071dc1058fa6edb4a,2024-12-20T07:15:11.747000
CVE-2024-11894,0,0,0c2059044c45af848fff3dd9292eb7e51685f6c7fbb508ad9b4173a086520faf,2024-12-14T05:15:10.227000
CVE-2024-11897,0,0,63c2369fafd5da048dd57864988be95602290ce10df0f51d423ab54c866c15e0,2024-12-04T03:15:05.380000
CVE-2024-11898,0,0,e843212abf00805a20f8b4b65b36c01f75cc2096cf65f2d0e7899f11eb517a82,2024-12-03T08:15:06.857000
@ -244886,6 +244897,8 @@ CVE-2024-12500,0,0,91a78173a00b8923c6065fae142a28107d51dd137f72c2dcd125d694804a0
CVE-2024-12501,0,0,5cbd9f9a342d7bd3b80b0e76e0f5058fb53e053502f02c282879631f5e242603,2024-12-14T06:15:19.770000
CVE-2024-12502,0,0,9df1e99058de0594df9a1e119549359f5b02524e122b46846c6476ea29e82157,2024-12-14T05:15:11.260000
CVE-2024-12503,0,0,e53e761e34d39e4e7df36516ec31d7b0a69f9ff2ae79d7b9e9b3c291572b84d0,2024-12-13T17:13:37.483000
CVE-2024-12506,1,1,f5970974940384143e4bac0efb2a799b5e7e33bfe270b45789573e25acce94da,2024-12-20T07:15:11.940000
CVE-2024-12509,1,1,dab32c4d0c7b908dd7c763fa37236c702db014098016fc1cda3fdb142e7ed5aa,2024-12-20T07:15:12.177000
CVE-2024-1251,0,0,8c0214d9f05a1f50e84514dc27e8bafe56d249b59ef6b0b677b5e947e572faed,2024-11-21T08:50:09.497000
CVE-2024-12513,0,0,dca945128b57953412f66421e839e160ec8ed8fa444319b37f70dd69033190d5,2024-12-18T03:15:26.427000
CVE-2024-12517,0,0,468899f199d602580a1bce011d5d81c6e61db10c42b8285d87bc20145862442b,2024-12-14T05:15:11.453000
@ -244907,6 +244920,7 @@ CVE-2024-12564,0,0,0abcb221861e5fc99f1edf43c59fea9ce50a3b4bd68b4b9a5961d76741772
CVE-2024-12569,0,0,85ba460436494f476697b315ff16d44cb76ffc76b518eda7d927b0e3a48ad1e9,2024-12-19T09:16:13.830000
CVE-2024-1257,0,0,7cc030c8f0ebfb33a80da788a5513945114551aaaa2999db4fa614a5f6b08a9b,2024-11-21T08:50:10.443000
CVE-2024-12570,0,0,be94920192af405ec932f38181a462713be2ef7292a21e90f93bf4238cc63d84,2024-12-12T12:15:22.660000
CVE-2024-12571,1,1,64d88bdf40a9886ffb28abd6d1e741e65a8db2fb01deaadc842b0be03349fe2e,2024-12-20T07:15:12.380000
CVE-2024-12572,0,0,b5830ae1a3c6182c738f484a7555b2d49502aecd75946e90268f33cb1f4e6fca,2024-12-13T04:15:05.233000
CVE-2024-12574,0,0,22d90c2cfc66a6e55649293fae24817d92e89a03bfa8e0d56af714629ad6f2a8,2024-12-13T05:15:07.310000
CVE-2024-12578,0,0,6076f52af563970ec8a3bc8e5f14a4b4d6997e85c1163c0f2b2e584e97943a1e,2024-12-14T05:15:12
@ -247068,7 +247082,7 @@ CVE-2024-21545,0,0,12417d057214273e4a76243ffeaf97d513746844d668a1420616fa022f5af
CVE-2024-21546,0,0,374b959b014e67074043123d4e408037a721391ba09f30f003dba89985567839,2024-12-18T06:15:22.850000
CVE-2024-21547,0,0,9490da4e046bfe0261ead89061dc5ab090fcc33b7491f225d76294d9a91f7dfa,2024-12-18T06:15:23.187000
CVE-2024-21548,0,0,1234240944f7ab37f9588d239ecac84e4a1f43ed5a4b8fa4e08658630e5fe2ba,2024-12-18T15:15:09.947000
CVE-2024-21549,1,1,dc243ef0e42daf7dcd8db82f6f1c86a16547df01e3cb286c549c98c29096c4c9,2024-12-20T05:15:06.780000
CVE-2024-21549,0,0,dc243ef0e42daf7dcd8db82f6f1c86a16547df01e3cb286c549c98c29096c4c9,2024-12-20T05:15:06.780000
CVE-2024-2155,0,0,1def2d989b10107bcc4deca9404884628c1ba17bdc1993a4df13bb309b4ac8eb,2024-11-21T09:09:09.070000
CVE-2024-21550,0,0,6b574e14ae55a92be9fd93a1bb9ebb56cb79876aa6e47f41fbbb48bbd5163e82,2024-08-13T17:33:13.537000
CVE-2024-21552,0,0,3511199af539fa92e1c2d7637f006a31f2e0de3850c5a9391f1377c23517a9d0,2024-11-21T08:54:39.323000
@ -271049,7 +271063,7 @@ CVE-2024-5950,0,0,a78d500e380a8683be6de1b6ede7696fb96614af4e886c1082dc67edbebdb1
CVE-2024-5951,0,0,6ca5ff3cd42fd08fff399488183cbf1951f9079ffd4d29e5f2b6b2af828d5de9,2024-11-21T09:48:38.163000
CVE-2024-5952,0,0,a190c9a9018a1f2ab58177f40637c06f330e66f62b7b6378f23916dd2d1714f0,2024-11-21T09:48:38.283000
CVE-2024-5953,0,0,4dcc64e3efdf9631a9f9731d0b86a1779eaa66766e5e010ea8ad27ad8753ac75,2024-11-21T09:48:38.403000
CVE-2024-5955,1,1,c5630fac867a44557612ac4d8d684e24335cbfc306cc0ed1b33653b41f74d51d,2024-12-20T06:15:22.943000
CVE-2024-5955,0,0,c5630fac867a44557612ac4d8d684e24335cbfc306cc0ed1b33653b41f74d51d,2024-12-20T06:15:22.943000
CVE-2024-5956,0,0,e9563f3d433df5f631aaa571a1b9eb69e01bff299de8e6814f8c22eb94c0eed5,2024-09-06T16:25:19.253000
CVE-2024-5957,0,0,0c96b582bddb8809e949513e2b3e6545ad729973e5974f8b12406a050d04a9ee,2024-09-06T16:24:23.317000
CVE-2024-5958,0,0,226ea565269d7d6c4cfc028fa9d5174e58a9d30f205eb3929eb0cbcbf47d1d28,2024-09-26T15:35:51.207000
@ -273637,7 +273651,7 @@ CVE-2024-8963,0,0,581521bb2c8b1b5f22bc02521a37b1605cb082ee4bc9fbe4e287e83cb93654
CVE-2024-8964,0,0,c3c0787fe6644e5ecb28ab585ed80f03eded601812c8114e1e7b6807baaa0335,2024-10-10T12:56:30.817000
CVE-2024-8965,0,0,f8e90b5b67b70a8381e6e9eacdc79df30f60298bdd1400482e72c97cbc06eff9,2024-10-04T19:04:03.157000
CVE-2024-8967,0,0,7898714718fda7e623053515c819c9ef828b8e1f849f0008b801f032918cd46a,2024-10-08T18:47:12.110000
CVE-2024-8968,1,1,c7a16d386151e00dcac012f34369d8416279fb51787e8aeab959c965eeccc8e5,2024-12-20T06:15:23.110000
CVE-2024-8968,0,0,c7a16d386151e00dcac012f34369d8416279fb51787e8aeab959c965eeccc8e5,2024-12-20T06:15:23.110000
CVE-2024-8969,0,0,e0103db8ff55ccbf745d9bad3dc6e3e89e30b3ef3eab823189cb0a38ab304109,2024-09-20T12:30:51.220000
CVE-2024-8970,0,0,32d2ab1ad1bb8df91d143f8ca284d1a616bc1563b70e0f2f9520d488fbae118b,2024-12-13T01:20:14.813000
CVE-2024-8972,0,0,8803923f1a932fca7afceec67344751a4aa4dcbfcccd96d5452861e7faadd73d,2024-12-17T14:15:20.110000
@ -274038,6 +274052,7 @@ CVE-2024-9488,0,0,24a104ee042d409dac1b47e91dfe4fa3675de573a6d9c7b27917f050255558
CVE-2024-9489,0,0,9258045c083103dfa924748299ab5c4dd4ec8da1f0d3cf12ca2c7454235f3440,2024-11-01T16:27:25.937000
CVE-2024-9500,0,0,d281910094387755c33adda8658eb046790675cd4af5161b6589be051fe5cd55,2024-11-18T17:11:17.393000
CVE-2024-9501,0,0,6a54c1f4c2f1d131dc91aaf803ea2d16e3173972cc5357c7b11859daf18eeb84,2024-10-28T13:58:09.230000
CVE-2024-9503,1,1,d9626fae18356155d789eb5c817d922d3ab72a7734ed3357d821dcbf1ead4623,2024-12-20T07:15:12.797000
CVE-2024-9504,0,0,d5582483784d6c852a9dbcff40d18eb6f930294575e0934168018fc044a9db21,2024-11-26T08:15:08.180000
CVE-2024-9505,0,0,9fa554b249edec9f6f3c55fd2b3a6ab6df16ec28919e88fec8b5527ce060489f,2024-10-31T16:39:41.193000
CVE-2024-9506,0,0,6ad65fd4baa9e3c79b9232fb23977d41e699e9932b5a5c0be78eb7aa0a0de386,2024-10-16T16:38:43.170000
@ -274130,6 +274145,7 @@ CVE-2024-9613,0,0,f7f019a18c9e01f36efde66dfbb10d6eba11ff87ade2b8efd8a79811ebe631
CVE-2024-9614,0,0,89d6ad4791713c9131b15fd858d4bd9404ef7090c81b08570775178f0867f84e,2024-11-13T17:01:16.850000
CVE-2024-9615,0,0,c9468917c9754e631849fcee424e37c3bdfdc0ce7baf1874e3cbc9e2bb677dcd,2024-11-18T17:11:17.393000
CVE-2024-9616,0,0,6ef77d38c3e8284229b9cc30b59e98636261a63c660e6b9ccf97deb77695f71d,2024-10-15T12:58:51.050000
CVE-2024-9619,1,1,7c3317793ad46a4e9890a6173bdc5d67cc479b9d8b0099182e002c0f2b568a1c,2024-12-20T07:15:12.977000
CVE-2024-9620,0,0,08cbdfb167bd5abb993a662a73c0230e86eadf10fb1a3369f9a28670f9e1b938,2024-10-10T12:56:30.817000
CVE-2024-9621,0,0,d01febf4917d7e254a80be80939f9dbe78ca0c8507d48f25eb8390335c29a3af,2024-12-06T10:15:06.327000
CVE-2024-9622,0,0,251c9c2f9ba8699fdab8c22e456db9ec67e578807b450704b6decdcb8f4fc3a8,2024-10-10T12:56:30.817000

Can't render this file because it is too large.