Auto-Update: 2024-12-18T05:00:35.012375+00:00

This commit is contained in:
cad-safe-bot 2024-12-18 05:03:59 +00:00
parent 91e09c4268
commit a228854c4f
18 changed files with 950 additions and 15 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-11079",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-11-12T00:15:15.543",
"lastModified": "2024-12-04T02:15:04.100",
"lastModified": "2024-12-18T04:15:06.310",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -56,6 +56,10 @@
"url": "https://access.redhat.com/errata/RHSA-2024:10770",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:11145",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-11079",
"source": "secalert@redhat.com"

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-11254",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-18T04:15:07.053",
"lastModified": "2024-12-18T04:15:07.053",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The AMP for WP \u2013 Accelerated Mobile Pages plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the disqus_name parameter in all versions up to, and including, 1.1.1 due to insufficient input validation. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/accelerated-mobile-pages/tags/1.0.93/includes/disqus.html?rev=3024147#L34",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5da82149-c827-4574-8269-b2b798edca59?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-11439",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-18T03:15:24.583",
"lastModified": "2024-12-18T03:15:24.583",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The ScanCircle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'scancircle' shortcode in all versions up to, and including, 2.9.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/scancircle/trunk/scancircle.php",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3202428%40scancircle&new=3202428%40scancircle&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/scancircle/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/27cc6931-086c-43a5-965b-2a19f15bb356?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-11483",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-11-25T04:15:03.683",
"lastModified": "2024-11-25T04:15:03.683",
"lastModified": "2024-12-18T04:15:07.210",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -52,6 +52,10 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:11145",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-11483",
"source": "secalert@redhat.com"

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-11748",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-18T03:15:25.943",
"lastModified": "2024-12-18T03:15:25.943",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Taeggie Feed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'taeggie-feed' shortcode in all versions up to, and including, 0.1.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/taeggie-feed/trunk/taeggie_feed.php#L40",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3207857%40taeggie-feed&new=3207857%40taeggie-feed&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/taeggie-feed/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/65d11459-5cad-4d8b-a81d-7f0dd4342a52?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-11881",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-18T03:15:26.103",
"lastModified": "2024-12-18T03:15:26.103",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Easy Waveform Player plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'easywaveformplayer' shortcode in all versions up to, and including, 1.2.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/easy-waveform-player/trunk/includes/class-easywaveformplayer.php#L263",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3208124/easy-waveform-player/trunk/includes/class-easywaveformplayer.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/17a0d8b3-e54d-4af4-8915-e8b192cc138b?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-12025",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-18T04:15:07.347",
"lastModified": "2024-12-18T04:15:07.347",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Collapsing Categories plugin for WordPress is vulnerable to SQL Injection via the 'taxonomy' parameter of the /wp-json/collapsing-categories/v1/get REST API in all versions up to, and including, 3.0.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3201979%40collapsing-categories&new=3201979%40collapsing-categories&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/05153b11-2f26-425e-99ab-93216861802b?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-12061",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-18T04:15:07.500",
"lastModified": "2024-12-18T04:15:07.500",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Events Addon for Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.2.3 via the naevents_elementor_template shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created by Elementor that they should not have access to."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3208546%40events-addon-for-elementor&new=3208546%40events-addon-for-elementor&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f59d9d8a-467a-4920-963a-da45f1f4462f?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-12250",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-18T04:15:07.657",
"lastModified": "2024-12-18T04:15:07.657",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Accept Authorize.NET Payments Using Contact Form 7 plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.2 via the cf7adn-info.php file. This makes it possible for unauthenticated attackers to extract configuration data which can be used to aid in other attacks."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3208517%40accept-authorize-net-payments-using-contact-form-7&new=3208517%40accept-authorize-net-payments-using-contact-form-7&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d8801b9a-afcb-483b-a018-4f68448e96de?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-12259",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-18T04:15:07.803",
"lastModified": "2024-12-18T04:15:07.803",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The CRM WordPress Plugin \u2013 RepairBuddy plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.8120. This is due to the plugin not properly validating a user's identity prior to updating their email through the wc_update_user_data AJAX action. This makes it possible for authenticated attackers, with subscriber-level access and above, to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3204501%40computer-repair-shop&new=3204501%40computer-repair-shop&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3206568%40computer-repair-shop&new=3206568%40computer-repair-shop&sfp_email=&sfph_mail=#file548",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3208270%40computer-repair-shop&new=3208270%40computer-repair-shop&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/80997d2f-3e16-48f6-969b-58844cb83d53?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-12432",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-18T04:15:07.947",
"lastModified": "2024-12-18T04:15:07.947",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WPC Shop as a Customer for WooCommerce plugin for WordPress is vulnerable to account takeover and privilege escalation in all versions up to, and including, 1.2.8. This is due to the 'generate_key' function not producing a sufficiently random value. This makes it possible for authenticated attackers, with Subscriber-level access and above, to log in as site administrators, granted they have triggered the ajax_login() function which generates a unique key that can be used to log in."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-330"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3208130%40wpc-shop-as-customer&new=3208130%40wpc-shop-as-customer&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/048625e8-10b7-418d-a13b-329f1d7e0171?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-12449",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-18T04:15:08.103",
"lastModified": "2024-12-18T04:15:08.103",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Video Share VOD \u2013 Turnkey Video Site Builder Script plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'videowhisper_player_html' shortcode in all versions up to, and including, 2.6.30 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3208668/video-share-vod/trunk/video-share-vod.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b857e64c-a345-4ed3-b690-5b9d1a0cae15?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-12500",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-18T03:15:26.257",
"lastModified": "2024-12-18T03:15:26.257",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Philantro \u2013 Donations and Donor Management plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes like 'donate' in all versions up to, and including, 5.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/philantro/tags/5.13/philantro.php#L107",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/philantro/tags/5.13/philantro.php#L140",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/philantro/tags/5.13/philantro.php#L167",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/philantro/tags/5.13/philantro.php#L203",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/philantro/tags/5.13/philantro.php#L229",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/philantro/tags/5.13/philantro.php#L398",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/philantro/tags/5.13/philantro.php#L75",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3207274%40philantro&new=3207274%40philantro&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3207777%40philantro&new=3207777%40philantro&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0cd2ad77-c5de-470d-bc17-729233e4ab92?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-12513",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-18T03:15:26.427",
"lastModified": "2024-12-18T03:15:26.427",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Contests by Rewards Fuel plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'RF_CONTEST' shortcode in all versions up to, and including, 2.0.65 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3208765%40contests-from-rewards-fuel&new=3208765%40contests-from-rewards-fuel&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c89934b1-5e3c-4bf2-8d36-17c4268ccd4e?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-12596",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-18T04:15:08.253",
"lastModified": "2024-12-18T04:15:08.253",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The LifterLMS \u2013 WP LMS for eLearning, Online Courses, & Quizzes plugin for WordPress is vulnerable to arbitrary post deletion due to a missing capability check on the 'llms_delete_cert' action in all versions up to, and including, 7.8.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary posts."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3208662/lifterlms/trunk/includes/abstracts/llms-abstract-controller-user-engagements.php",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3208662/lifterlms/trunk/includes/controllers/class.llms.controller.certificates.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8e75a03b-7552-4228-a4d0-13c78d20f6d5?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-47480",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-12-18T03:15:26.583",
"lastModified": "2024-12-18T03:15:26.583",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell Inventory Collector Client, versions prior to 12.7.0, contains an Improper Link Resolution Before File Access vulnerability. A low-privilege attacker with local access may exploit this vulnerability, potentially resulting in Elevation of Privileges and unauthorized file system access."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-61"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000255700/dsa-2024-475",
"source": "security_alert@emc.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-12-18T03:00:26.206255+00:00
2024-12-18T05:00:35.012375+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-12-18T02:00:02.997000+00:00
2024-12-18T04:15:08.253000+00:00
```
### Last Data Feed Release
@ -33,22 +33,35 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
274179
274193
```
### CVEs added in the last Commit
Recently added CVEs: `0`
Recently added CVEs: `14`
- [CVE-2024-11254](CVE-2024/CVE-2024-112xx/CVE-2024-11254.json) (`2024-12-18T04:15:07.053`)
- [CVE-2024-11439](CVE-2024/CVE-2024-114xx/CVE-2024-11439.json) (`2024-12-18T03:15:24.583`)
- [CVE-2024-11748](CVE-2024/CVE-2024-117xx/CVE-2024-11748.json) (`2024-12-18T03:15:25.943`)
- [CVE-2024-11881](CVE-2024/CVE-2024-118xx/CVE-2024-11881.json) (`2024-12-18T03:15:26.103`)
- [CVE-2024-12025](CVE-2024/CVE-2024-120xx/CVE-2024-12025.json) (`2024-12-18T04:15:07.347`)
- [CVE-2024-12061](CVE-2024/CVE-2024-120xx/CVE-2024-12061.json) (`2024-12-18T04:15:07.500`)
- [CVE-2024-12250](CVE-2024/CVE-2024-122xx/CVE-2024-12250.json) (`2024-12-18T04:15:07.657`)
- [CVE-2024-12259](CVE-2024/CVE-2024-122xx/CVE-2024-12259.json) (`2024-12-18T04:15:07.803`)
- [CVE-2024-12432](CVE-2024/CVE-2024-124xx/CVE-2024-12432.json) (`2024-12-18T04:15:07.947`)
- [CVE-2024-12449](CVE-2024/CVE-2024-124xx/CVE-2024-12449.json) (`2024-12-18T04:15:08.103`)
- [CVE-2024-12500](CVE-2024/CVE-2024-125xx/CVE-2024-12500.json) (`2024-12-18T03:15:26.257`)
- [CVE-2024-12513](CVE-2024/CVE-2024-125xx/CVE-2024-12513.json) (`2024-12-18T03:15:26.427`)
- [CVE-2024-12596](CVE-2024/CVE-2024-125xx/CVE-2024-12596.json) (`2024-12-18T04:15:08.253`)
- [CVE-2024-47480](CVE-2024/CVE-2024-474xx/CVE-2024-47480.json) (`2024-12-18T03:15:26.583`)
### CVEs modified in the last Commit
Recently modified CVEs: `3`
Recently modified CVEs: `2`
- [CVE-2023-46846](CVE-2023/CVE-2023-468xx/CVE-2023-46846.json) (`2024-12-18T01:15:06.010`)
- [CVE-2024-53677](CVE-2024/CVE-2024-536xx/CVE-2024-53677.json) (`2024-12-18T01:15:06.237`)
- [CVE-2024-55956](CVE-2024/CVE-2024-559xx/CVE-2024-55956.json) (`2024-12-18T02:00:02.997`)
- [CVE-2024-11079](CVE-2024/CVE-2024-110xx/CVE-2024-11079.json) (`2024-12-18T04:15:06.310`)
- [CVE-2024-11483](CVE-2024/CVE-2024-114xx/CVE-2024-11483.json) (`2024-12-18T04:15:07.210`)
## Download and Usage

View File

@ -235831,7 +235831,7 @@ CVE-2023-46840,0,0,35101892971cbf6355ae8df6a82236e4f3dffa9cecb80f1c3349b445a8ac7
CVE-2023-46841,0,0,71e9de96ddef1ab2841aa33002d01f31cc3ab11cd177eac4236ba25c36b232a4,2024-11-21T08:29:24.397000
CVE-2023-46842,0,0,79191b4d36ae3903ee5a7b9711e63bf5596944942e06d8c4bd75cd870ab3491c,2024-12-04T17:15:11.343000
CVE-2023-46845,0,0,8cca69f35c18b37d1e400c1780d51f45ac93f2d00dcfe2123c24403e52459030,2024-11-21T08:29:24.673000
CVE-2023-46846,0,1,b73bc8a6a9a81e5c869755df7f9ec3e498228884dcb6e74b5679aa1ec816512a,2024-12-18T01:15:06.010000
CVE-2023-46846,0,0,b73bc8a6a9a81e5c869755df7f9ec3e498228884dcb6e74b5679aa1ec816512a,2024-12-18T01:15:06.010000
CVE-2023-46847,0,0,25226d6c3ea5f3ae387efea28db924389911d043f96c3ee615accfee7a912619,2024-11-21T08:29:25
CVE-2023-46848,0,0,fc1a3cbe733e7d75d5767c3bf972500d8208d1d249d69703d688044c0e53a543,2024-11-21T08:29:25.190000
CVE-2023-46849,0,0,d939db9ad23b15e2c76e72ad352b3bf6d630c9fe03bd4a9ee0d93213deca79b3,2024-11-21T08:29:25.337000
@ -243886,7 +243886,7 @@ CVE-2024-11075,0,0,1453691218eaa30381e9b896380b7d3816e51e01355ecf6bb51d349da772d
CVE-2024-11076,0,0,82524b74886a82ba09f33edf13fd9a8f5f86e092e9bbf909a4e53028c97856fb,2024-11-14T19:14:26.717000
CVE-2024-11077,0,0,a548949903d5d799c3512cf90a23f879ee8299884e96a824994982a4f1a0ff5f,2024-11-14T18:57:17.743000
CVE-2024-11078,0,0,0bd64d79edb4bca6b6662894de14196529e42eaf34f19ad82faa60601adf2c0a,2024-11-23T01:26:39.680000
CVE-2024-11079,0,0,87360400b05f65e57c76d4f1cf85630018b92cfd2e2d149a775a69b292e0c722,2024-12-04T02:15:04.100000
CVE-2024-11079,0,1,4429678b1338007ef95bc9554c7c9cf15512d4d01927364e7ca6363e4b71338b,2024-12-18T04:15:06.310000
CVE-2024-1108,0,0,3c3223886b933a1311ef33eade22c9c98c307e25133c1194aafbd11353968069,2024-11-21T08:49:48.850000
CVE-2024-11081,0,0,868ddada0bf262c198b91d0f6dc5cc082627c1fafb1bc6c0669f2cc02fb00c28,2024-11-20T18:15:22.340000
CVE-2024-11082,0,0,2068f4ddbc0d21e33db6ba3989176bd5aedcb5da6f30a07d96e2944d8ba88bcb,2024-11-28T10:15:05.973000
@ -244022,6 +244022,7 @@ CVE-2024-1125,0,0,dc5b54d054e72b77ddaac01d062bdb38da667c754da803a72000bba0d9623c
CVE-2024-11250,0,0,30ad3d0d58cc914838a0c9f0ed52ca375c320917547ffc5deccabf737c546160,2024-12-10T17:22:10.547000
CVE-2024-11251,0,0,a5e300dd05d8f2142172ae8a0de73066b49d6ea2d842d19c278f24903bcb19d9,2024-11-18T17:11:56.587000
CVE-2024-11252,0,0,e3a49be80375d7d6eb07a5b8ea5fe1ead6b27bf2476ff0719e421b392fb0b61d,2024-11-30T06:15:17.580000
CVE-2024-11254,1,1,b65034987757b0efed5e98a306995ce44a949cd249a52219eb2ca987aaaaba11,2024-12-18T04:15:07.053000
CVE-2024-11256,0,0,30f7d19719f67ba63c2030d41b8ecbc41608177c8376a62edfd9dc345be8acd5,2024-11-19T21:49:04.790000
CVE-2024-11257,0,0,b96233e0d3ce67cf21f4e9f7807a6a1ab2c5647b6c783486e6d663acf9a8bbd9,2024-11-19T21:24:40.443000
CVE-2024-11258,0,0,b92dad8d1bb6f081dbd92f3c42d86d75296924d80ba167376d7d843bce1f48d5,2024-11-19T21:24:27.473000
@ -244154,6 +244155,7 @@ CVE-2024-11433,0,0,d7d2b17ecf1f1820c7a169038fcd2102a16fa9aa18d9b8e0d8b10a268cadf
CVE-2024-11435,0,0,1380b27cd2035f7566d8c3a22d2255debbb483bdbc16e31011480f4da4fce733,2024-11-21T13:57:24.187000
CVE-2024-11436,0,0,d9ba482fa12f5a77f1e6d71752538b4ac13c80723176e1f973fa002876475cf9,2024-12-07T02:15:17.980000
CVE-2024-11438,0,0,f8be712e8ca0c6e2e4ec7ab8e5edf4587d3042f01694165651aa92a3bd58aa58,2024-11-21T13:57:24.187000
CVE-2024-11439,1,1,809535394f731209f6d3cb5bf4ce7d64bdcd112a2b72128d2b460d6fa248397a,2024-12-18T03:15:24.583000
CVE-2024-1144,0,0,abce3af1982b67316bbd44c97fc519435f8a2ffe156205161918695ae799390d,2024-11-21T08:49:53.953000
CVE-2024-11440,0,0,f7fa3eb74eeaf205f9272a5dd5c90b4e40423e1f48cb0e4f0c2b5ed6bd6788ad,2024-11-21T13:57:24.187000
CVE-2024-11442,0,0,3be9d0f63b7eda8d31b9090ec24b06639190cf0bc4f30335348dc6f41a62dbe4,2024-12-12T04:15:06.157000
@ -244184,7 +244186,7 @@ CVE-2024-11479,0,0,e45a25bfdd55a73dd4f84ed406864a56b4c33194e1807e98971c4aae47176
CVE-2024-1148,0,0,42f8b4a331499e416da7e39ecb917cc148de70355c01e7459a0ecc809b95c273,2024-11-21T08:49:54.507000
CVE-2024-11481,0,0,43aefde0b60b7bb2c03e6e9073efa36888743c80ea5c30a176dc892fe3500a31,2024-11-29T08:15:04.270000
CVE-2024-11482,0,0,4a494a040c0c12a4aaccef44b799c17acca5321d5d56618a638640183e9fb1c6,2024-11-29T08:15:04.437000
CVE-2024-11483,0,0,c24beeba1a184509d8d782bce9b08d1bd8d30020f315920929dc043669d1a6d3,2024-11-25T04:15:03.683000
CVE-2024-11483,0,1,32b38db9518e8939d03a454ab14c476cd7f841536222995cb659679bfca30e6e,2024-12-18T04:15:07.210000
CVE-2024-11484,0,0,874751733a81b1e93607d69587bc16a71e3355c7d5478fd9bd33309669fc9c42,2024-11-23T01:07:09.537000
CVE-2024-11485,0,0,7f196ff2bde9d043f76118fba25993af5a8ff5df60e850d7e15381d52ed8a7d7,2024-11-23T01:12:38.790000
CVE-2024-11486,0,0,cb450883271b451ba42f46731588c9b30bec79658013ea8ae18f18f9f0220058,2024-11-22T21:43:34.230000
@ -244406,6 +244408,7 @@ CVE-2024-11743,0,0,f820c67dcaaaf23a6b1da5f22e8dfaf3af6e92af3da2964cdf1cbb12adde8
CVE-2024-11744,0,0,d39b5f592014fd4a2278c647fc2411f75d3865150415b86b86bc4d90ea41f3d3,2024-12-03T15:30:32.153000
CVE-2024-11745,0,0,96069305de6ef8812783ef245e2f61d86d985db42c36cad22c8d389adbd7e8c1,2024-12-03T15:25:28.847000
CVE-2024-11747,0,0,3759ff4fc6bacdbc93b41c30e49e712686d53794386a1c516e9d37a83c4db995,2024-12-04T03:15:04.933000
CVE-2024-11748,1,1,d30259db6a36f0e465c5fe0dea33ed3a5fb546a0dc57006bbf05ca5acb70f2b3,2024-12-18T03:15:25.943000
CVE-2024-1175,0,0,f997875411f4ee3836569f05e6ded063f5984d7986ed98f909a5423e1a302ce0,2024-11-21T08:49:58
CVE-2024-11750,0,0,7ad8eba5e612b45089b0006a10c8f5004dc37025f0797564ad303213ba0cd10f,2024-12-12T05:15:09.577000
CVE-2024-11751,0,0,67dbb8797b0431ee7206db6e4550daf24d2677d7c3589966da6466cb099d5323,2024-12-14T05:15:06.923000
@ -244503,6 +244506,7 @@ CVE-2024-11877,0,0,0b34673f01d0d1e7e6d2a67dc1819f1f33a60d34a4311d2b4c1472795752b
CVE-2024-11879,0,0,8b1fe425c329588ef1ebe3acf2d107f6c7ec5bd8a31ce8d8d2ecd6a4e6c522e2,2024-12-14T05:15:09.257000
CVE-2024-1188,0,0,a65e9144328c7bf88ed9510065b2567c80bec907fa15019254b44a904bcf4c98,2024-11-21T08:49:59.690000
CVE-2024-11880,0,0,bc08b419001e69ecc8df6960919cacc77cc712a48473883e8526af3cf15bbb8b,2024-12-04T09:15:04.470000
CVE-2024-11881,1,1,2cbebd6bb092280b1d4c9bd0ca8f6c37e50b5d3b4a507a5e6c7e95320ce54fd6,2024-12-18T03:15:26.103000
CVE-2024-11882,0,0,c14c2af9493e334fe3da2508e7ca83b6d319f8d382e00a76baaf2e7e94429e52,2024-12-12T06:15:22.543000
CVE-2024-11883,0,0,43e4f153757375016f31f50ea51681bab5f5a66bc81238b0aaac8f3120da073c,2024-12-14T05:15:09.440000
CVE-2024-11884,0,0,55fb2df52f83e40f0fc8b2f5e152d287536f634f475dce9208a6bcb3453005b7,2024-12-14T05:15:09.640000
@ -244591,6 +244595,7 @@ CVE-2024-12015,0,0,d5a693fd232b1e3fbc53d72a834e39c83a435aa6e5ae231752c351acc22ca
CVE-2024-12018,0,0,593c05ac2f3dac4339301164983c309f8de674e944577becd0f305b7e0d23ef0,2024-12-12T06:15:22.737000
CVE-2024-1202,0,0,a098cbd545693e5d361995e28174ffa246c4ae019a07a45a38ebe2abdfe163e3,2024-11-21T08:50:01.790000
CVE-2024-12024,0,0,5a3106bf981113dfa4ff23e5cefbf63a1c0b56982c8dec2c76da492a62325ef2,2024-12-17T10:15:05.643000
CVE-2024-12025,1,1,8ae98f3affa2449fdaa85e27cccf4272ff03bb1aa127ab1a3298ec6a700c18b7,2024-12-18T04:15:07.347000
CVE-2024-12026,0,0,cbdee4f4d341b218f2a9910c9db7c968e1470cd32e93684865d3bd2934d626d1,2024-12-07T02:15:18.520000
CVE-2024-12027,0,0,37ec4b44c0b83690aba6eca2d38a4a49f2c2ce6081a618c323d63a584206d2b7,2024-12-06T09:15:07.803000
CVE-2024-12028,0,0,1e73c6e2445828811f3920b16dca38e7a1768853994affcbd716568d4e1eb5f0,2024-12-06T09:15:07.957000
@ -244605,6 +244610,7 @@ CVE-2024-12057,0,0,bd805d2c90bd77944ba46eb8c9dc7c23cbacd60316de3cfa41d8ef3c61043
CVE-2024-12059,0,0,9c6b9e40ba3530efc99fd3b20a62c2d64e18bfab9b7e6210831ac824ade4b6d9,2024-12-12T06:15:23.167000
CVE-2024-1206,0,0,e6f906610cc8644e5dec32911bcdfaec3d978e30884ee402a8df2dfa2fabd584,2024-11-21T08:50:02.327000
CVE-2024-12060,0,0,00194c71df08040c99f5a5536b3c32fccdf95c506294b164954268126957b170,2024-12-06T09:15:08.117000
CVE-2024-12061,1,1,bc00fe28c495570b252586e8c7544d20f1fc0d8fe14476b03d25c05f9c7d077d,2024-12-18T04:15:07.500000
CVE-2024-12062,0,0,72735736917491b453ec9a8b66f16471859e8308b17c93b657198e604c611c2f,2024-12-03T10:15:05.493000
CVE-2024-12064,0,0,5bbffd5016c2c66c65f1cad07469a2c9304ddde32e6765225186e453c653a401,2024-12-05T22:15:20.080000
CVE-2024-1207,0,0,7ca2a33c54192dfcfa7fe7f99bed16fbfa1215b4ac8ba5de485b890ce26af06c,2024-11-21T08:50:02.457000
@ -244691,11 +244697,13 @@ CVE-2024-12239,0,0,7e14d3325d4b147176649ece8dc2b0064f40f6c3be58ca9c730b210c8ac8e
CVE-2024-1224,0,0,cbfbaa5b4f0e1c410530412d727d5bf58dfe126bd3d740f330bf5c6e93a0658e,2024-11-21T08:50:05.487000
CVE-2024-12247,0,0,ad117a7da5529073984608210b9ebf0c8357341e47d0f7a47c01f4275cf4ac25,2024-12-05T16:15:25.243000
CVE-2024-1225,0,0,1335eabc5dc5752fbd7f31a11bdeda2f1be9be2c21abaca809140eabb8940f2a,2024-11-21T08:50:05.673000
CVE-2024-12250,1,1,198dd6a1889258f19819a814aec5366cd4009bbe44cdaf84f941a92ddcdf9780,2024-12-18T04:15:07.657000
CVE-2024-12253,0,0,ddc85ae180bc30a65db67a43f7fe8d6c4299882333782166c00f6946fb3a98d4,2024-12-07T10:15:06.030000
CVE-2024-12254,0,0,a10252fca25a6d0cb79d12c00246cbbc9e593a3c9c199cebcc7f84ee54eefcf8,2024-12-06T19:15:10.983000
CVE-2024-12255,0,0,3e6ee7ef8ecf957b3c9750bb4e9452362942858fad7f6d35e3c4d339eaa5898b,2024-12-12T15:15:09.967000
CVE-2024-12257,0,0,51052901a7cca4cc3e08f8db1db23715b8800d7e5a86753505efbff635c332e0,2024-12-07T02:15:19.187000
CVE-2024-12258,0,0,3eb19625a1330fc72081e9c0b05d899d6c52aedf5334c3f98a645064595ca085,2024-12-12T04:15:07.160000
CVE-2024-12259,1,1,bea52da34c85acd5565b88f0d965cee7216916867a752217c1ee1168ca550f6b,2024-12-18T04:15:07.803000
CVE-2024-1226,0,0,b8e723228c95f73a75e74922943d4c7b5983bd824925379e4a1dadf0498e92dc,2024-11-21T08:50:05.893000
CVE-2024-12260,0,0,6279b3003f5c04cde3aca10d6cb551198f7d4f49319583b742575d1bffcdfccd,2024-12-12T04:15:07.330000
CVE-2024-12263,0,0,183574df079ffbee27d57051711c108d812463b16a94004cdf52784fa08d4f65,2024-12-12T06:15:23.960000
@ -244771,11 +244779,13 @@ CVE-2024-1242,0,0,d730388eb7530fa29fb11ce649456e01cfb020c8a1d70e87c977d44dc13140
CVE-2024-12420,0,0,ae8d110f5efef295dc5d542d71461638a083f9c010e00a24758178ab1b247bfd,2024-12-13T09:15:08.627000
CVE-2024-12421,0,0,d0800edd844bf37ccee00fc76da3ec64bb2b51e717430e725122892ee39e78eb,2024-12-13T09:15:08.870000
CVE-2024-12422,0,0,05369736cfa99e7a93f623e0bf231830f42417dd4b9e28a7ca0096ebfd842f0b,2024-12-14T06:15:19.357000
CVE-2024-12432,1,1,3f31304e6415ca6c0e09025ff8706e9fa7079fa53f71acd2187be9cf72e41b72,2024-12-18T04:15:07.947000
CVE-2024-12441,0,0,60177bfa0d9dcd79729d5ab6a51352067dd3b55deb7861fd956eb7f2cdfb3058,2024-12-12T05:15:12.703000
CVE-2024-12443,0,0,b39fd2946c2fbefa55158bd864172df98a06d98976b732fc4c22eac806259995,2024-12-16T23:15:06.097000
CVE-2024-12446,0,0,bc4dc12729ac5f85e4be698a629e224d6f337e87d1b81d5042c0eddb71088b1a,2024-12-14T07:15:07.040000
CVE-2024-12447,0,0,c7d237797e5045bf7231fd7a8dd02f5534e2ad794fcb81ab9e39a8e990833ac6,2024-12-14T05:15:10.670000
CVE-2024-12448,0,0,11e50dbe77a1a32d7920e9e6082c85f472336b04f5fe27094dc25dc5df597595,2024-12-14T05:15:10.873000
CVE-2024-12449,1,1,cc5a471cbb81d8238c3d9f1680145c72ae8c0bd44f99f5f3dc86949ac489bcc7,2024-12-18T04:15:08.103000
CVE-2024-1245,0,0,95e8542ba13fb11ab7fe96b21acceb5168a3d85655e46eadbf4243e255ea26c4,2024-11-21T08:50:08.740000
CVE-2024-12458,0,0,2dff647285f20b176250357c056fba4cfb4d59ea24572e2cfd9d5f5ecb43bfcb,2024-12-14T05:15:11.060000
CVE-2024-12459,0,0,afa492c736eca842cbfac1bae4af71a966055505fb77debb49ea61411a663e1d,2024-12-14T06:15:19.487000
@ -244803,10 +244813,12 @@ CVE-2024-12490,0,0,1555e4125b1bbd18e44ad154504a390e80c730aff0638a2c04280c85da66d
CVE-2024-12492,0,0,d916ae3db37806ef5451c78588e17d1a804f7c9a228c6c5f62bb3eeb89f366ac,2024-12-13T17:12:51.283000
CVE-2024-12497,0,0,2fa5c57c56d5261d14e7efca34ea444e21df46aee84c2eede506aff4e7856847,2024-12-13T17:13:18.457000
CVE-2024-1250,0,0,c54b18c5c3077dc882ddb080c03b243e2860ef906533ea0af6c558156b694109,2024-11-21T08:50:09.347000
CVE-2024-12500,1,1,91a78173a00b8923c6065fae142a28107d51dd137f72c2dcd125d694804a0480,2024-12-18T03:15:26.257000
CVE-2024-12501,0,0,5cbd9f9a342d7bd3b80b0e76e0f5058fb53e053502f02c282879631f5e242603,2024-12-14T06:15:19.770000
CVE-2024-12502,0,0,9df1e99058de0594df9a1e119549359f5b02524e122b46846c6476ea29e82157,2024-12-14T05:15:11.260000
CVE-2024-12503,0,0,e53e761e34d39e4e7df36516ec31d7b0a69f9ff2ae79d7b9e9b3c291572b84d0,2024-12-13T17:13:37.483000
CVE-2024-1251,0,0,8c0214d9f05a1f50e84514dc27e8bafe56d249b59ef6b0b677b5e947e572faed,2024-11-21T08:50:09.497000
CVE-2024-12513,1,1,dca945128b57953412f66421e839e160ec8ed8fa444319b37f70dd69033190d5,2024-12-18T03:15:26.427000
CVE-2024-12517,0,0,468899f199d602580a1bce011d5d81c6e61db10c42b8285d87bc20145862442b,2024-12-14T05:15:11.453000
CVE-2024-1252,0,0,d03beb126367df5b21be601ec7e2ecf5f48cece91d0754af14f589827736f3cf,2024-11-21T08:50:09.700000
CVE-2024-12523,0,0,4d11c79c0a7bbf59aef6883f50a68fa29b12db1595dcca5fbdbdf864ec9292c7,2024-12-14T05:15:11.640000
@ -244830,6 +244842,7 @@ CVE-2024-12579,0,0,6b066a632ed42755872bfe12897131044e41b00627589546ab36be31d813b
CVE-2024-1258,0,0,36d421eec5fc7cce6382fad9fd3a9a8780da80fcb6e09fc8e5e480709b2e6caa,2024-11-21T08:50:10.573000
CVE-2024-12581,0,0,899275a869b7c967a158446f680d5b1e6ee7fb8c13fa325a1164dc54186bea7f,2024-12-13T06:15:26.433000
CVE-2024-1259,0,0,1c6bb100fc9cba505c4d696801bfd3102c508e530bb2e36c86a6685675278bd7,2024-11-21T08:50:10.730000
CVE-2024-12596,1,1,e90ded9007b974bbde2cfd1ae98f2588ae4014955a30c3526b941fc61c029c03,2024-12-18T04:15:08.253000
CVE-2024-1260,0,0,237fdcd6650ec6f817190c6cbe0c450181ce5f478e263f9f314859cdec5f8244,2024-11-21T08:50:10.880000
CVE-2024-12601,0,0,2ca4ea21e5bfaf124d19bbe4bee1a196aca18d8d864e8b042ec1fe94e0d48399,2024-12-17T12:15:20.543000
CVE-2024-12603,0,0,b77b6c9527bd0798c4124cb6a67b3eb0384daf1c81bc149052bbc09ab0e74875,2024-12-13T03:15:05.187000
@ -265696,6 +265709,7 @@ CVE-2024-47464,0,0,547614204d1f6cfc29d3faea8ceb0db89983ab29949fcfd3f158bcfa0ee8d
CVE-2024-4747,0,0,dc86c3306ee43b541fd6b01412a7d057d47b79f0d0be13cb5d0ca8e311f58a48,2024-11-21T09:43:30.670000
CVE-2024-47476,0,0,7fbeddc8b679c54b9a8d16b073a75eec4d455c0be7f1e02e1d7d8aa5633f37d1,2024-12-03T10:15:05.883000
CVE-2024-4748,0,0,0e1bf604cc16c6bb1a8683ee11cfaa8201b2be0b492e06be1984933dd6cedb52,2024-11-21T09:43:30.787000
CVE-2024-47480,1,1,2cddd0b4bc015141f6da9bb59c9de300db15fba61ab887a41114c6e2e009ab72,2024-12-18T03:15:26.583000
CVE-2024-47481,0,0,71ea09e89917de5bc1b44200d74f1ffc8698bb7da082bd763134d649f33a6380,2024-10-31T00:01:40.487000
CVE-2024-47483,0,0,f01599a6880bac8eacea8814fc1f580c96bada992530caa76be5bdf38bc089f7,2024-10-31T00:01:05.127000
CVE-2024-47484,0,0,a43113a3b51493d7032edb4af2e9799b9e3c0a4d5ceb50c5dbfba812996f3a8c,2024-12-16T11:15:06.110000
@ -269547,7 +269561,7 @@ CVE-2024-53673,0,0,998c285a4fe0e35cbecbdb698279013b408c1bb4163a1e69369fac314d145
CVE-2024-53674,0,0,f555b7f03d33cd061d1493d8fc99309d52915e66d5ae0672802dcf1d36a50f32,2024-12-12T19:49:49.800000
CVE-2024-53675,0,0,1183b1bd94841ad73311a268c8a0b2c37f3657514fc74825a9481690ca681ab0,2024-12-12T19:48:48.443000
CVE-2024-53676,0,0,9e5335d7636e62fb7cc2e79040736f3f5e3856b52ef7bfb0006141b3e5724acd,2024-12-11T16:49:45.783000
CVE-2024-53677,0,1,b20f80da36871f8fb5324e3fc1c5ec83c8e6575f3a46d6f78ed41ab00c5aabf8,2024-12-18T01:15:06.237000
CVE-2024-53677,0,0,b20f80da36871f8fb5324e3fc1c5ec83c8e6575f3a46d6f78ed41ab00c5aabf8,2024-12-18T01:15:06.237000
CVE-2024-5368,0,0,0267b73ce86fd5c42a4c0cf503f4bdead8427924f402a3554f435c1bc916f416,2024-11-21T09:47:30.877000
CVE-2024-5369,0,0,14abdfed4d5003ff16a96b2708e00658833baa1f8166ee56f5ba2dba896b20f5,2024-11-21T09:47:31.020000
CVE-2024-53691,0,0,09846e368cf7a07a1d919202728e77d0589572ed56c2c2f1bb03db07c3ec7fb0,2024-12-06T17:15:10.520000
@ -270412,7 +270426,7 @@ CVE-2024-55946,0,0,fc4f0ce08741733d6f453b541d54aef404252708bb0bc4e901bbe32fa2942
CVE-2024-55949,0,0,fec4714a7969da92415b3b75b53f65d595fb44a2f90ba2d94f1f93dfae92a1f1,2024-12-16T20:15:13.683000
CVE-2024-5595,0,0,5c3da38e1b5f1812e17cdadfa64cfac3c13c5342e8821d9036b7da1dd32b505d,2024-08-02T17:35:43.927000
CVE-2024-55951,0,0,0f2ba68ba5d937d3f08ffc28ee064a50ef5129020d2db58a508d614718a5fb19,2024-12-16T20:15:13.823000
CVE-2024-55956,0,1,4dbbe7b27f9e49431f04e908bb363b692252b89466a6d6e1764b8f489f042f8d,2024-12-18T02:00:02.997000
CVE-2024-55956,0,0,4dbbe7b27f9e49431f04e908bb363b692252b89466a6d6e1764b8f489f042f8d,2024-12-18T02:00:02.997000
CVE-2024-5596,0,0,eb53dbc41b5b12ac359e7b7f77cdb6558119327982ea8ec36e1ee0087b4d4e06,2024-11-21T09:47:59.330000
CVE-2024-55969,0,0,9c57b4a45308acc7d73a4bbfc26f9862d4b6f355188666b7df28aa8e0565bef6,2024-12-16T17:15:12.337000
CVE-2024-5597,0,0,c028f291e4b563828a2ebebe088654ce56adccaea078f8905bc0de855460aa3c,2024-11-21T09:47:59.443000

Can't render this file because it is too large.