From a228854c4f1482066c09fbbe69cc1e6f7324e1f7 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 18 Dec 2024 05:03:59 +0000 Subject: [PATCH] Auto-Update: 2024-12-18T05:00:35.012375+00:00 --- CVE-2024/CVE-2024-110xx/CVE-2024-11079.json | 6 +- CVE-2024/CVE-2024-112xx/CVE-2024-11254.json | 60 ++++++++++++++ CVE-2024/CVE-2024-114xx/CVE-2024-11439.json | 68 +++++++++++++++ CVE-2024/CVE-2024-114xx/CVE-2024-11483.json | 6 +- CVE-2024/CVE-2024-117xx/CVE-2024-11748.json | 68 +++++++++++++++ CVE-2024/CVE-2024-118xx/CVE-2024-11881.json | 64 ++++++++++++++ CVE-2024/CVE-2024-120xx/CVE-2024-12025.json | 60 ++++++++++++++ CVE-2024/CVE-2024-120xx/CVE-2024-12061.json | 60 ++++++++++++++ CVE-2024/CVE-2024-122xx/CVE-2024-12250.json | 60 ++++++++++++++ CVE-2024/CVE-2024-122xx/CVE-2024-12259.json | 68 +++++++++++++++ CVE-2024/CVE-2024-124xx/CVE-2024-12432.json | 60 ++++++++++++++ CVE-2024/CVE-2024-124xx/CVE-2024-12449.json | 60 ++++++++++++++ CVE-2024/CVE-2024-125xx/CVE-2024-12500.json | 92 +++++++++++++++++++++ CVE-2024/CVE-2024-125xx/CVE-2024-12513.json | 60 ++++++++++++++ CVE-2024/CVE-2024-125xx/CVE-2024-12596.json | 64 ++++++++++++++ CVE-2024/CVE-2024-474xx/CVE-2024-47480.json | 56 +++++++++++++ README.md | 29 +++++-- _state.csv | 24 ++++-- 18 files changed, 950 insertions(+), 15 deletions(-) create mode 100644 CVE-2024/CVE-2024-112xx/CVE-2024-11254.json create mode 100644 CVE-2024/CVE-2024-114xx/CVE-2024-11439.json create mode 100644 CVE-2024/CVE-2024-117xx/CVE-2024-11748.json create mode 100644 CVE-2024/CVE-2024-118xx/CVE-2024-11881.json create mode 100644 CVE-2024/CVE-2024-120xx/CVE-2024-12025.json create mode 100644 CVE-2024/CVE-2024-120xx/CVE-2024-12061.json create mode 100644 CVE-2024/CVE-2024-122xx/CVE-2024-12250.json create mode 100644 CVE-2024/CVE-2024-122xx/CVE-2024-12259.json create mode 100644 CVE-2024/CVE-2024-124xx/CVE-2024-12432.json create mode 100644 CVE-2024/CVE-2024-124xx/CVE-2024-12449.json create mode 100644 CVE-2024/CVE-2024-125xx/CVE-2024-12500.json create mode 100644 CVE-2024/CVE-2024-125xx/CVE-2024-12513.json create mode 100644 CVE-2024/CVE-2024-125xx/CVE-2024-12596.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47480.json diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11079.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11079.json index 249a784388f..42c58e3967e 100644 --- a/CVE-2024/CVE-2024-110xx/CVE-2024-11079.json +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11079.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11079", "sourceIdentifier": "secalert@redhat.com", "published": "2024-11-12T00:15:15.543", - "lastModified": "2024-12-04T02:15:04.100", + "lastModified": "2024-12-18T04:15:06.310", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -56,6 +56,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:10770", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:11145", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-11079", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11254.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11254.json new file mode 100644 index 00000000000..62bb52e63e5 --- /dev/null +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11254.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-11254", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-18T04:15:07.053", + "lastModified": "2024-12-18T04:15:07.053", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The AMP for WP \u2013 Accelerated Mobile Pages plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the disqus_name parameter in all versions up to, and including, 1.1.1 due to insufficient input validation. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/accelerated-mobile-pages/tags/1.0.93/includes/disqus.html?rev=3024147#L34", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5da82149-c827-4574-8269-b2b798edca59?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-114xx/CVE-2024-11439.json b/CVE-2024/CVE-2024-114xx/CVE-2024-11439.json new file mode 100644 index 00000000000..20c5a3ce497 --- /dev/null +++ b/CVE-2024/CVE-2024-114xx/CVE-2024-11439.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-11439", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-18T03:15:24.583", + "lastModified": "2024-12-18T03:15:24.583", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The ScanCircle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'scancircle' shortcode in all versions up to, and including, 2.9.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/scancircle/trunk/scancircle.php", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3202428%40scancircle&new=3202428%40scancircle&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/scancircle/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/27cc6931-086c-43a5-965b-2a19f15bb356?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-114xx/CVE-2024-11483.json b/CVE-2024/CVE-2024-114xx/CVE-2024-11483.json index 88ba68fb2d8..e546d36933a 100644 --- a/CVE-2024/CVE-2024-114xx/CVE-2024-11483.json +++ b/CVE-2024/CVE-2024-114xx/CVE-2024-11483.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11483", "sourceIdentifier": "secalert@redhat.com", "published": "2024-11-25T04:15:03.683", - "lastModified": "2024-11-25T04:15:03.683", + "lastModified": "2024-12-18T04:15:07.210", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -52,6 +52,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:11145", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-11483", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11748.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11748.json new file mode 100644 index 00000000000..704ebe4815c --- /dev/null +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11748.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-11748", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-18T03:15:25.943", + "lastModified": "2024-12-18T03:15:25.943", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Taeggie Feed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'taeggie-feed' shortcode in all versions up to, and including, 0.1.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/taeggie-feed/trunk/taeggie_feed.php#L40", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3207857%40taeggie-feed&new=3207857%40taeggie-feed&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/taeggie-feed/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/65d11459-5cad-4d8b-a81d-7f0dd4342a52?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11881.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11881.json new file mode 100644 index 00000000000..e430df56d9e --- /dev/null +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11881.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-11881", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-18T03:15:26.103", + "lastModified": "2024-12-18T03:15:26.103", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Easy Waveform Player plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'easywaveformplayer' shortcode in all versions up to, and including, 1.2.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/easy-waveform-player/trunk/includes/class-easywaveformplayer.php#L263", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3208124/easy-waveform-player/trunk/includes/class-easywaveformplayer.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/17a0d8b3-e54d-4af4-8915-e8b192cc138b?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12025.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12025.json new file mode 100644 index 00000000000..3268e2bed58 --- /dev/null +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12025.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-12025", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-18T04:15:07.347", + "lastModified": "2024-12-18T04:15:07.347", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Collapsing Categories plugin for WordPress is vulnerable to SQL Injection via the 'taxonomy' parameter of the /wp-json/collapsing-categories/v1/get REST API in all versions up to, and including, 3.0.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3201979%40collapsing-categories&new=3201979%40collapsing-categories&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/05153b11-2f26-425e-99ab-93216861802b?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12061.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12061.json new file mode 100644 index 00000000000..9d6d1c93c25 --- /dev/null +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12061.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-12061", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-18T04:15:07.500", + "lastModified": "2024-12-18T04:15:07.500", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Events Addon for Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.2.3 via the naevents_elementor_template shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created by Elementor that they should not have access to." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3208546%40events-addon-for-elementor&new=3208546%40events-addon-for-elementor&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f59d9d8a-467a-4920-963a-da45f1f4462f?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12250.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12250.json new file mode 100644 index 00000000000..402681aedd3 --- /dev/null +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12250.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-12250", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-18T04:15:07.657", + "lastModified": "2024-12-18T04:15:07.657", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Accept Authorize.NET Payments Using Contact Form 7 plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.2 via the cf7adn-info.php file. This makes it possible for unauthenticated attackers to extract configuration data which can be used to aid in other attacks." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3208517%40accept-authorize-net-payments-using-contact-form-7&new=3208517%40accept-authorize-net-payments-using-contact-form-7&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d8801b9a-afcb-483b-a018-4f68448e96de?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12259.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12259.json new file mode 100644 index 00000000000..f550400295e --- /dev/null +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12259.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-12259", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-18T04:15:07.803", + "lastModified": "2024-12-18T04:15:07.803", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The CRM WordPress Plugin \u2013 RepairBuddy plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.8120. This is due to the plugin not properly validating a user's identity prior to updating their email through the wc_update_user_data AJAX action. This makes it possible for authenticated attackers, with subscriber-level access and above, to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3204501%40computer-repair-shop&new=3204501%40computer-repair-shop&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3206568%40computer-repair-shop&new=3206568%40computer-repair-shop&sfp_email=&sfph_mail=#file548", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3208270%40computer-repair-shop&new=3208270%40computer-repair-shop&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/80997d2f-3e16-48f6-969b-58844cb83d53?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12432.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12432.json new file mode 100644 index 00000000000..c67559d78f6 --- /dev/null +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12432.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-12432", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-18T04:15:07.947", + "lastModified": "2024-12-18T04:15:07.947", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The WPC Shop as a Customer for WooCommerce plugin for WordPress is vulnerable to account takeover and privilege escalation in all versions up to, and including, 1.2.8. This is due to the 'generate_key' function not producing a sufficiently random value. This makes it possible for authenticated attackers, with Subscriber-level access and above, to log in as site administrators, granted they have triggered the ajax_login() function which generates a unique key that can be used to log in." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-330" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3208130%40wpc-shop-as-customer&new=3208130%40wpc-shop-as-customer&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/048625e8-10b7-418d-a13b-329f1d7e0171?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12449.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12449.json new file mode 100644 index 00000000000..0a23bf9ccd9 --- /dev/null +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12449.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-12449", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-18T04:15:08.103", + "lastModified": "2024-12-18T04:15:08.103", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Video Share VOD \u2013 Turnkey Video Site Builder Script plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'videowhisper_player_html' shortcode in all versions up to, and including, 2.6.30 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3208668/video-share-vod/trunk/video-share-vod.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b857e64c-a345-4ed3-b690-5b9d1a0cae15?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12500.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12500.json new file mode 100644 index 00000000000..b739a33339f --- /dev/null +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12500.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-12500", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-18T03:15:26.257", + "lastModified": "2024-12-18T03:15:26.257", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Philantro \u2013 Donations and Donor Management plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes like 'donate' in all versions up to, and including, 5.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/philantro/tags/5.13/philantro.php#L107", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/philantro/tags/5.13/philantro.php#L140", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/philantro/tags/5.13/philantro.php#L167", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/philantro/tags/5.13/philantro.php#L203", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/philantro/tags/5.13/philantro.php#L229", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/philantro/tags/5.13/philantro.php#L398", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/philantro/tags/5.13/philantro.php#L75", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3207274%40philantro&new=3207274%40philantro&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3207777%40philantro&new=3207777%40philantro&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0cd2ad77-c5de-470d-bc17-729233e4ab92?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12513.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12513.json new file mode 100644 index 00000000000..e94cd28c71c --- /dev/null +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12513.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-12513", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-18T03:15:26.427", + "lastModified": "2024-12-18T03:15:26.427", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Contests by Rewards Fuel plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'RF_CONTEST' shortcode in all versions up to, and including, 2.0.65 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3208765%40contests-from-rewards-fuel&new=3208765%40contests-from-rewards-fuel&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c89934b1-5e3c-4bf2-8d36-17c4268ccd4e?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12596.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12596.json new file mode 100644 index 00000000000..a5f5cb6190b --- /dev/null +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12596.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-12596", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-18T04:15:08.253", + "lastModified": "2024-12-18T04:15:08.253", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The LifterLMS \u2013 WP LMS for eLearning, Online Courses, & Quizzes plugin for WordPress is vulnerable to arbitrary post deletion due to a missing capability check on the 'llms_delete_cert' action in all versions up to, and including, 7.8.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary posts." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3208662/lifterlms/trunk/includes/abstracts/llms-abstract-controller-user-engagements.php", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3208662/lifterlms/trunk/includes/controllers/class.llms.controller.certificates.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8e75a03b-7552-4228-a4d0-13c78d20f6d5?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47480.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47480.json new file mode 100644 index 00000000000..4644b04187f --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47480.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47480", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-12-18T03:15:26.583", + "lastModified": "2024-12-18T03:15:26.583", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell Inventory Collector Client, versions prior to 12.7.0, contains an Improper Link Resolution Before File Access vulnerability. A low-privilege attacker with local access may exploit this vulnerability, potentially resulting in Elevation of Privileges and unauthorized file system access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-61" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000255700/dsa-2024-475", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 4fb8de35476..69629ee867d 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-18T03:00:26.206255+00:00 +2024-12-18T05:00:35.012375+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-18T02:00:02.997000+00:00 +2024-12-18T04:15:08.253000+00:00 ``` ### Last Data Feed Release @@ -33,22 +33,35 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -274179 +274193 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `14` +- [CVE-2024-11254](CVE-2024/CVE-2024-112xx/CVE-2024-11254.json) (`2024-12-18T04:15:07.053`) +- [CVE-2024-11439](CVE-2024/CVE-2024-114xx/CVE-2024-11439.json) (`2024-12-18T03:15:24.583`) +- [CVE-2024-11748](CVE-2024/CVE-2024-117xx/CVE-2024-11748.json) (`2024-12-18T03:15:25.943`) +- [CVE-2024-11881](CVE-2024/CVE-2024-118xx/CVE-2024-11881.json) (`2024-12-18T03:15:26.103`) +- [CVE-2024-12025](CVE-2024/CVE-2024-120xx/CVE-2024-12025.json) (`2024-12-18T04:15:07.347`) +- [CVE-2024-12061](CVE-2024/CVE-2024-120xx/CVE-2024-12061.json) (`2024-12-18T04:15:07.500`) +- [CVE-2024-12250](CVE-2024/CVE-2024-122xx/CVE-2024-12250.json) (`2024-12-18T04:15:07.657`) +- [CVE-2024-12259](CVE-2024/CVE-2024-122xx/CVE-2024-12259.json) (`2024-12-18T04:15:07.803`) +- [CVE-2024-12432](CVE-2024/CVE-2024-124xx/CVE-2024-12432.json) (`2024-12-18T04:15:07.947`) +- [CVE-2024-12449](CVE-2024/CVE-2024-124xx/CVE-2024-12449.json) (`2024-12-18T04:15:08.103`) +- [CVE-2024-12500](CVE-2024/CVE-2024-125xx/CVE-2024-12500.json) (`2024-12-18T03:15:26.257`) +- [CVE-2024-12513](CVE-2024/CVE-2024-125xx/CVE-2024-12513.json) (`2024-12-18T03:15:26.427`) +- [CVE-2024-12596](CVE-2024/CVE-2024-125xx/CVE-2024-12596.json) (`2024-12-18T04:15:08.253`) +- [CVE-2024-47480](CVE-2024/CVE-2024-474xx/CVE-2024-47480.json) (`2024-12-18T03:15:26.583`) ### CVEs modified in the last Commit -Recently modified CVEs: `3` +Recently modified CVEs: `2` -- [CVE-2023-46846](CVE-2023/CVE-2023-468xx/CVE-2023-46846.json) (`2024-12-18T01:15:06.010`) -- [CVE-2024-53677](CVE-2024/CVE-2024-536xx/CVE-2024-53677.json) (`2024-12-18T01:15:06.237`) -- [CVE-2024-55956](CVE-2024/CVE-2024-559xx/CVE-2024-55956.json) (`2024-12-18T02:00:02.997`) +- [CVE-2024-11079](CVE-2024/CVE-2024-110xx/CVE-2024-11079.json) (`2024-12-18T04:15:06.310`) +- [CVE-2024-11483](CVE-2024/CVE-2024-114xx/CVE-2024-11483.json) (`2024-12-18T04:15:07.210`) ## Download and Usage diff --git a/_state.csv b/_state.csv index a9e9310b09d..cfe2331975a 100644 --- a/_state.csv +++ b/_state.csv @@ -235831,7 +235831,7 @@ CVE-2023-46840,0,0,35101892971cbf6355ae8df6a82236e4f3dffa9cecb80f1c3349b445a8ac7 CVE-2023-46841,0,0,71e9de96ddef1ab2841aa33002d01f31cc3ab11cd177eac4236ba25c36b232a4,2024-11-21T08:29:24.397000 CVE-2023-46842,0,0,79191b4d36ae3903ee5a7b9711e63bf5596944942e06d8c4bd75cd870ab3491c,2024-12-04T17:15:11.343000 CVE-2023-46845,0,0,8cca69f35c18b37d1e400c1780d51f45ac93f2d00dcfe2123c24403e52459030,2024-11-21T08:29:24.673000 -CVE-2023-46846,0,1,b73bc8a6a9a81e5c869755df7f9ec3e498228884dcb6e74b5679aa1ec816512a,2024-12-18T01:15:06.010000 +CVE-2023-46846,0,0,b73bc8a6a9a81e5c869755df7f9ec3e498228884dcb6e74b5679aa1ec816512a,2024-12-18T01:15:06.010000 CVE-2023-46847,0,0,25226d6c3ea5f3ae387efea28db924389911d043f96c3ee615accfee7a912619,2024-11-21T08:29:25 CVE-2023-46848,0,0,fc1a3cbe733e7d75d5767c3bf972500d8208d1d249d69703d688044c0e53a543,2024-11-21T08:29:25.190000 CVE-2023-46849,0,0,d939db9ad23b15e2c76e72ad352b3bf6d630c9fe03bd4a9ee0d93213deca79b3,2024-11-21T08:29:25.337000 @@ -243886,7 +243886,7 @@ CVE-2024-11075,0,0,1453691218eaa30381e9b896380b7d3816e51e01355ecf6bb51d349da772d CVE-2024-11076,0,0,82524b74886a82ba09f33edf13fd9a8f5f86e092e9bbf909a4e53028c97856fb,2024-11-14T19:14:26.717000 CVE-2024-11077,0,0,a548949903d5d799c3512cf90a23f879ee8299884e96a824994982a4f1a0ff5f,2024-11-14T18:57:17.743000 CVE-2024-11078,0,0,0bd64d79edb4bca6b6662894de14196529e42eaf34f19ad82faa60601adf2c0a,2024-11-23T01:26:39.680000 -CVE-2024-11079,0,0,87360400b05f65e57c76d4f1cf85630018b92cfd2e2d149a775a69b292e0c722,2024-12-04T02:15:04.100000 +CVE-2024-11079,0,1,4429678b1338007ef95bc9554c7c9cf15512d4d01927364e7ca6363e4b71338b,2024-12-18T04:15:06.310000 CVE-2024-1108,0,0,3c3223886b933a1311ef33eade22c9c98c307e25133c1194aafbd11353968069,2024-11-21T08:49:48.850000 CVE-2024-11081,0,0,868ddada0bf262c198b91d0f6dc5cc082627c1fafb1bc6c0669f2cc02fb00c28,2024-11-20T18:15:22.340000 CVE-2024-11082,0,0,2068f4ddbc0d21e33db6ba3989176bd5aedcb5da6f30a07d96e2944d8ba88bcb,2024-11-28T10:15:05.973000 @@ -244022,6 +244022,7 @@ CVE-2024-1125,0,0,dc5b54d054e72b77ddaac01d062bdb38da667c754da803a72000bba0d9623c CVE-2024-11250,0,0,30ad3d0d58cc914838a0c9f0ed52ca375c320917547ffc5deccabf737c546160,2024-12-10T17:22:10.547000 CVE-2024-11251,0,0,a5e300dd05d8f2142172ae8a0de73066b49d6ea2d842d19c278f24903bcb19d9,2024-11-18T17:11:56.587000 CVE-2024-11252,0,0,e3a49be80375d7d6eb07a5b8ea5fe1ead6b27bf2476ff0719e421b392fb0b61d,2024-11-30T06:15:17.580000 +CVE-2024-11254,1,1,b65034987757b0efed5e98a306995ce44a949cd249a52219eb2ca987aaaaba11,2024-12-18T04:15:07.053000 CVE-2024-11256,0,0,30f7d19719f67ba63c2030d41b8ecbc41608177c8376a62edfd9dc345be8acd5,2024-11-19T21:49:04.790000 CVE-2024-11257,0,0,b96233e0d3ce67cf21f4e9f7807a6a1ab2c5647b6c783486e6d663acf9a8bbd9,2024-11-19T21:24:40.443000 CVE-2024-11258,0,0,b92dad8d1bb6f081dbd92f3c42d86d75296924d80ba167376d7d843bce1f48d5,2024-11-19T21:24:27.473000 @@ -244154,6 +244155,7 @@ CVE-2024-11433,0,0,d7d2b17ecf1f1820c7a169038fcd2102a16fa9aa18d9b8e0d8b10a268cadf CVE-2024-11435,0,0,1380b27cd2035f7566d8c3a22d2255debbb483bdbc16e31011480f4da4fce733,2024-11-21T13:57:24.187000 CVE-2024-11436,0,0,d9ba482fa12f5a77f1e6d71752538b4ac13c80723176e1f973fa002876475cf9,2024-12-07T02:15:17.980000 CVE-2024-11438,0,0,f8be712e8ca0c6e2e4ec7ab8e5edf4587d3042f01694165651aa92a3bd58aa58,2024-11-21T13:57:24.187000 +CVE-2024-11439,1,1,809535394f731209f6d3cb5bf4ce7d64bdcd112a2b72128d2b460d6fa248397a,2024-12-18T03:15:24.583000 CVE-2024-1144,0,0,abce3af1982b67316bbd44c97fc519435f8a2ffe156205161918695ae799390d,2024-11-21T08:49:53.953000 CVE-2024-11440,0,0,f7fa3eb74eeaf205f9272a5dd5c90b4e40423e1f48cb0e4f0c2b5ed6bd6788ad,2024-11-21T13:57:24.187000 CVE-2024-11442,0,0,3be9d0f63b7eda8d31b9090ec24b06639190cf0bc4f30335348dc6f41a62dbe4,2024-12-12T04:15:06.157000 @@ -244184,7 +244186,7 @@ CVE-2024-11479,0,0,e45a25bfdd55a73dd4f84ed406864a56b4c33194e1807e98971c4aae47176 CVE-2024-1148,0,0,42f8b4a331499e416da7e39ecb917cc148de70355c01e7459a0ecc809b95c273,2024-11-21T08:49:54.507000 CVE-2024-11481,0,0,43aefde0b60b7bb2c03e6e9073efa36888743c80ea5c30a176dc892fe3500a31,2024-11-29T08:15:04.270000 CVE-2024-11482,0,0,4a494a040c0c12a4aaccef44b799c17acca5321d5d56618a638640183e9fb1c6,2024-11-29T08:15:04.437000 -CVE-2024-11483,0,0,c24beeba1a184509d8d782bce9b08d1bd8d30020f315920929dc043669d1a6d3,2024-11-25T04:15:03.683000 +CVE-2024-11483,0,1,32b38db9518e8939d03a454ab14c476cd7f841536222995cb659679bfca30e6e,2024-12-18T04:15:07.210000 CVE-2024-11484,0,0,874751733a81b1e93607d69587bc16a71e3355c7d5478fd9bd33309669fc9c42,2024-11-23T01:07:09.537000 CVE-2024-11485,0,0,7f196ff2bde9d043f76118fba25993af5a8ff5df60e850d7e15381d52ed8a7d7,2024-11-23T01:12:38.790000 CVE-2024-11486,0,0,cb450883271b451ba42f46731588c9b30bec79658013ea8ae18f18f9f0220058,2024-11-22T21:43:34.230000 @@ -244406,6 +244408,7 @@ CVE-2024-11743,0,0,f820c67dcaaaf23a6b1da5f22e8dfaf3af6e92af3da2964cdf1cbb12adde8 CVE-2024-11744,0,0,d39b5f592014fd4a2278c647fc2411f75d3865150415b86b86bc4d90ea41f3d3,2024-12-03T15:30:32.153000 CVE-2024-11745,0,0,96069305de6ef8812783ef245e2f61d86d985db42c36cad22c8d389adbd7e8c1,2024-12-03T15:25:28.847000 CVE-2024-11747,0,0,3759ff4fc6bacdbc93b41c30e49e712686d53794386a1c516e9d37a83c4db995,2024-12-04T03:15:04.933000 +CVE-2024-11748,1,1,d30259db6a36f0e465c5fe0dea33ed3a5fb546a0dc57006bbf05ca5acb70f2b3,2024-12-18T03:15:25.943000 CVE-2024-1175,0,0,f997875411f4ee3836569f05e6ded063f5984d7986ed98f909a5423e1a302ce0,2024-11-21T08:49:58 CVE-2024-11750,0,0,7ad8eba5e612b45089b0006a10c8f5004dc37025f0797564ad303213ba0cd10f,2024-12-12T05:15:09.577000 CVE-2024-11751,0,0,67dbb8797b0431ee7206db6e4550daf24d2677d7c3589966da6466cb099d5323,2024-12-14T05:15:06.923000 @@ -244503,6 +244506,7 @@ CVE-2024-11877,0,0,0b34673f01d0d1e7e6d2a67dc1819f1f33a60d34a4311d2b4c1472795752b CVE-2024-11879,0,0,8b1fe425c329588ef1ebe3acf2d107f6c7ec5bd8a31ce8d8d2ecd6a4e6c522e2,2024-12-14T05:15:09.257000 CVE-2024-1188,0,0,a65e9144328c7bf88ed9510065b2567c80bec907fa15019254b44a904bcf4c98,2024-11-21T08:49:59.690000 CVE-2024-11880,0,0,bc08b419001e69ecc8df6960919cacc77cc712a48473883e8526af3cf15bbb8b,2024-12-04T09:15:04.470000 +CVE-2024-11881,1,1,2cbebd6bb092280b1d4c9bd0ca8f6c37e50b5d3b4a507a5e6c7e95320ce54fd6,2024-12-18T03:15:26.103000 CVE-2024-11882,0,0,c14c2af9493e334fe3da2508e7ca83b6d319f8d382e00a76baaf2e7e94429e52,2024-12-12T06:15:22.543000 CVE-2024-11883,0,0,43e4f153757375016f31f50ea51681bab5f5a66bc81238b0aaac8f3120da073c,2024-12-14T05:15:09.440000 CVE-2024-11884,0,0,55fb2df52f83e40f0fc8b2f5e152d287536f634f475dce9208a6bcb3453005b7,2024-12-14T05:15:09.640000 @@ -244591,6 +244595,7 @@ CVE-2024-12015,0,0,d5a693fd232b1e3fbc53d72a834e39c83a435aa6e5ae231752c351acc22ca CVE-2024-12018,0,0,593c05ac2f3dac4339301164983c309f8de674e944577becd0f305b7e0d23ef0,2024-12-12T06:15:22.737000 CVE-2024-1202,0,0,a098cbd545693e5d361995e28174ffa246c4ae019a07a45a38ebe2abdfe163e3,2024-11-21T08:50:01.790000 CVE-2024-12024,0,0,5a3106bf981113dfa4ff23e5cefbf63a1c0b56982c8dec2c76da492a62325ef2,2024-12-17T10:15:05.643000 +CVE-2024-12025,1,1,8ae98f3affa2449fdaa85e27cccf4272ff03bb1aa127ab1a3298ec6a700c18b7,2024-12-18T04:15:07.347000 CVE-2024-12026,0,0,cbdee4f4d341b218f2a9910c9db7c968e1470cd32e93684865d3bd2934d626d1,2024-12-07T02:15:18.520000 CVE-2024-12027,0,0,37ec4b44c0b83690aba6eca2d38a4a49f2c2ce6081a618c323d63a584206d2b7,2024-12-06T09:15:07.803000 CVE-2024-12028,0,0,1e73c6e2445828811f3920b16dca38e7a1768853994affcbd716568d4e1eb5f0,2024-12-06T09:15:07.957000 @@ -244605,6 +244610,7 @@ CVE-2024-12057,0,0,bd805d2c90bd77944ba46eb8c9dc7c23cbacd60316de3cfa41d8ef3c61043 CVE-2024-12059,0,0,9c6b9e40ba3530efc99fd3b20a62c2d64e18bfab9b7e6210831ac824ade4b6d9,2024-12-12T06:15:23.167000 CVE-2024-1206,0,0,e6f906610cc8644e5dec32911bcdfaec3d978e30884ee402a8df2dfa2fabd584,2024-11-21T08:50:02.327000 CVE-2024-12060,0,0,00194c71df08040c99f5a5536b3c32fccdf95c506294b164954268126957b170,2024-12-06T09:15:08.117000 +CVE-2024-12061,1,1,bc00fe28c495570b252586e8c7544d20f1fc0d8fe14476b03d25c05f9c7d077d,2024-12-18T04:15:07.500000 CVE-2024-12062,0,0,72735736917491b453ec9a8b66f16471859e8308b17c93b657198e604c611c2f,2024-12-03T10:15:05.493000 CVE-2024-12064,0,0,5bbffd5016c2c66c65f1cad07469a2c9304ddde32e6765225186e453c653a401,2024-12-05T22:15:20.080000 CVE-2024-1207,0,0,7ca2a33c54192dfcfa7fe7f99bed16fbfa1215b4ac8ba5de485b890ce26af06c,2024-11-21T08:50:02.457000 @@ -244691,11 +244697,13 @@ CVE-2024-12239,0,0,7e14d3325d4b147176649ece8dc2b0064f40f6c3be58ca9c730b210c8ac8e CVE-2024-1224,0,0,cbfbaa5b4f0e1c410530412d727d5bf58dfe126bd3d740f330bf5c6e93a0658e,2024-11-21T08:50:05.487000 CVE-2024-12247,0,0,ad117a7da5529073984608210b9ebf0c8357341e47d0f7a47c01f4275cf4ac25,2024-12-05T16:15:25.243000 CVE-2024-1225,0,0,1335eabc5dc5752fbd7f31a11bdeda2f1be9be2c21abaca809140eabb8940f2a,2024-11-21T08:50:05.673000 +CVE-2024-12250,1,1,198dd6a1889258f19819a814aec5366cd4009bbe44cdaf84f941a92ddcdf9780,2024-12-18T04:15:07.657000 CVE-2024-12253,0,0,ddc85ae180bc30a65db67a43f7fe8d6c4299882333782166c00f6946fb3a98d4,2024-12-07T10:15:06.030000 CVE-2024-12254,0,0,a10252fca25a6d0cb79d12c00246cbbc9e593a3c9c199cebcc7f84ee54eefcf8,2024-12-06T19:15:10.983000 CVE-2024-12255,0,0,3e6ee7ef8ecf957b3c9750bb4e9452362942858fad7f6d35e3c4d339eaa5898b,2024-12-12T15:15:09.967000 CVE-2024-12257,0,0,51052901a7cca4cc3e08f8db1db23715b8800d7e5a86753505efbff635c332e0,2024-12-07T02:15:19.187000 CVE-2024-12258,0,0,3eb19625a1330fc72081e9c0b05d899d6c52aedf5334c3f98a645064595ca085,2024-12-12T04:15:07.160000 +CVE-2024-12259,1,1,bea52da34c85acd5565b88f0d965cee7216916867a752217c1ee1168ca550f6b,2024-12-18T04:15:07.803000 CVE-2024-1226,0,0,b8e723228c95f73a75e74922943d4c7b5983bd824925379e4a1dadf0498e92dc,2024-11-21T08:50:05.893000 CVE-2024-12260,0,0,6279b3003f5c04cde3aca10d6cb551198f7d4f49319583b742575d1bffcdfccd,2024-12-12T04:15:07.330000 CVE-2024-12263,0,0,183574df079ffbee27d57051711c108d812463b16a94004cdf52784fa08d4f65,2024-12-12T06:15:23.960000 @@ -244771,11 +244779,13 @@ CVE-2024-1242,0,0,d730388eb7530fa29fb11ce649456e01cfb020c8a1d70e87c977d44dc13140 CVE-2024-12420,0,0,ae8d110f5efef295dc5d542d71461638a083f9c010e00a24758178ab1b247bfd,2024-12-13T09:15:08.627000 CVE-2024-12421,0,0,d0800edd844bf37ccee00fc76da3ec64bb2b51e717430e725122892ee39e78eb,2024-12-13T09:15:08.870000 CVE-2024-12422,0,0,05369736cfa99e7a93f623e0bf231830f42417dd4b9e28a7ca0096ebfd842f0b,2024-12-14T06:15:19.357000 +CVE-2024-12432,1,1,3f31304e6415ca6c0e09025ff8706e9fa7079fa53f71acd2187be9cf72e41b72,2024-12-18T04:15:07.947000 CVE-2024-12441,0,0,60177bfa0d9dcd79729d5ab6a51352067dd3b55deb7861fd956eb7f2cdfb3058,2024-12-12T05:15:12.703000 CVE-2024-12443,0,0,b39fd2946c2fbefa55158bd864172df98a06d98976b732fc4c22eac806259995,2024-12-16T23:15:06.097000 CVE-2024-12446,0,0,bc4dc12729ac5f85e4be698a629e224d6f337e87d1b81d5042c0eddb71088b1a,2024-12-14T07:15:07.040000 CVE-2024-12447,0,0,c7d237797e5045bf7231fd7a8dd02f5534e2ad794fcb81ab9e39a8e990833ac6,2024-12-14T05:15:10.670000 CVE-2024-12448,0,0,11e50dbe77a1a32d7920e9e6082c85f472336b04f5fe27094dc25dc5df597595,2024-12-14T05:15:10.873000 +CVE-2024-12449,1,1,cc5a471cbb81d8238c3d9f1680145c72ae8c0bd44f99f5f3dc86949ac489bcc7,2024-12-18T04:15:08.103000 CVE-2024-1245,0,0,95e8542ba13fb11ab7fe96b21acceb5168a3d85655e46eadbf4243e255ea26c4,2024-11-21T08:50:08.740000 CVE-2024-12458,0,0,2dff647285f20b176250357c056fba4cfb4d59ea24572e2cfd9d5f5ecb43bfcb,2024-12-14T05:15:11.060000 CVE-2024-12459,0,0,afa492c736eca842cbfac1bae4af71a966055505fb77debb49ea61411a663e1d,2024-12-14T06:15:19.487000 @@ -244803,10 +244813,12 @@ CVE-2024-12490,0,0,1555e4125b1bbd18e44ad154504a390e80c730aff0638a2c04280c85da66d CVE-2024-12492,0,0,d916ae3db37806ef5451c78588e17d1a804f7c9a228c6c5f62bb3eeb89f366ac,2024-12-13T17:12:51.283000 CVE-2024-12497,0,0,2fa5c57c56d5261d14e7efca34ea444e21df46aee84c2eede506aff4e7856847,2024-12-13T17:13:18.457000 CVE-2024-1250,0,0,c54b18c5c3077dc882ddb080c03b243e2860ef906533ea0af6c558156b694109,2024-11-21T08:50:09.347000 +CVE-2024-12500,1,1,91a78173a00b8923c6065fae142a28107d51dd137f72c2dcd125d694804a0480,2024-12-18T03:15:26.257000 CVE-2024-12501,0,0,5cbd9f9a342d7bd3b80b0e76e0f5058fb53e053502f02c282879631f5e242603,2024-12-14T06:15:19.770000 CVE-2024-12502,0,0,9df1e99058de0594df9a1e119549359f5b02524e122b46846c6476ea29e82157,2024-12-14T05:15:11.260000 CVE-2024-12503,0,0,e53e761e34d39e4e7df36516ec31d7b0a69f9ff2ae79d7b9e9b3c291572b84d0,2024-12-13T17:13:37.483000 CVE-2024-1251,0,0,8c0214d9f05a1f50e84514dc27e8bafe56d249b59ef6b0b677b5e947e572faed,2024-11-21T08:50:09.497000 +CVE-2024-12513,1,1,dca945128b57953412f66421e839e160ec8ed8fa444319b37f70dd69033190d5,2024-12-18T03:15:26.427000 CVE-2024-12517,0,0,468899f199d602580a1bce011d5d81c6e61db10c42b8285d87bc20145862442b,2024-12-14T05:15:11.453000 CVE-2024-1252,0,0,d03beb126367df5b21be601ec7e2ecf5f48cece91d0754af14f589827736f3cf,2024-11-21T08:50:09.700000 CVE-2024-12523,0,0,4d11c79c0a7bbf59aef6883f50a68fa29b12db1595dcca5fbdbdf864ec9292c7,2024-12-14T05:15:11.640000 @@ -244830,6 +244842,7 @@ CVE-2024-12579,0,0,6b066a632ed42755872bfe12897131044e41b00627589546ab36be31d813b CVE-2024-1258,0,0,36d421eec5fc7cce6382fad9fd3a9a8780da80fcb6e09fc8e5e480709b2e6caa,2024-11-21T08:50:10.573000 CVE-2024-12581,0,0,899275a869b7c967a158446f680d5b1e6ee7fb8c13fa325a1164dc54186bea7f,2024-12-13T06:15:26.433000 CVE-2024-1259,0,0,1c6bb100fc9cba505c4d696801bfd3102c508e530bb2e36c86a6685675278bd7,2024-11-21T08:50:10.730000 +CVE-2024-12596,1,1,e90ded9007b974bbde2cfd1ae98f2588ae4014955a30c3526b941fc61c029c03,2024-12-18T04:15:08.253000 CVE-2024-1260,0,0,237fdcd6650ec6f817190c6cbe0c450181ce5f478e263f9f314859cdec5f8244,2024-11-21T08:50:10.880000 CVE-2024-12601,0,0,2ca4ea21e5bfaf124d19bbe4bee1a196aca18d8d864e8b042ec1fe94e0d48399,2024-12-17T12:15:20.543000 CVE-2024-12603,0,0,b77b6c9527bd0798c4124cb6a67b3eb0384daf1c81bc149052bbc09ab0e74875,2024-12-13T03:15:05.187000 @@ -265696,6 +265709,7 @@ CVE-2024-47464,0,0,547614204d1f6cfc29d3faea8ceb0db89983ab29949fcfd3f158bcfa0ee8d CVE-2024-4747,0,0,dc86c3306ee43b541fd6b01412a7d057d47b79f0d0be13cb5d0ca8e311f58a48,2024-11-21T09:43:30.670000 CVE-2024-47476,0,0,7fbeddc8b679c54b9a8d16b073a75eec4d455c0be7f1e02e1d7d8aa5633f37d1,2024-12-03T10:15:05.883000 CVE-2024-4748,0,0,0e1bf604cc16c6bb1a8683ee11cfaa8201b2be0b492e06be1984933dd6cedb52,2024-11-21T09:43:30.787000 +CVE-2024-47480,1,1,2cddd0b4bc015141f6da9bb59c9de300db15fba61ab887a41114c6e2e009ab72,2024-12-18T03:15:26.583000 CVE-2024-47481,0,0,71ea09e89917de5bc1b44200d74f1ffc8698bb7da082bd763134d649f33a6380,2024-10-31T00:01:40.487000 CVE-2024-47483,0,0,f01599a6880bac8eacea8814fc1f580c96bada992530caa76be5bdf38bc089f7,2024-10-31T00:01:05.127000 CVE-2024-47484,0,0,a43113a3b51493d7032edb4af2e9799b9e3c0a4d5ceb50c5dbfba812996f3a8c,2024-12-16T11:15:06.110000 @@ -269547,7 +269561,7 @@ CVE-2024-53673,0,0,998c285a4fe0e35cbecbdb698279013b408c1bb4163a1e69369fac314d145 CVE-2024-53674,0,0,f555b7f03d33cd061d1493d8fc99309d52915e66d5ae0672802dcf1d36a50f32,2024-12-12T19:49:49.800000 CVE-2024-53675,0,0,1183b1bd94841ad73311a268c8a0b2c37f3657514fc74825a9481690ca681ab0,2024-12-12T19:48:48.443000 CVE-2024-53676,0,0,9e5335d7636e62fb7cc2e79040736f3f5e3856b52ef7bfb0006141b3e5724acd,2024-12-11T16:49:45.783000 -CVE-2024-53677,0,1,b20f80da36871f8fb5324e3fc1c5ec83c8e6575f3a46d6f78ed41ab00c5aabf8,2024-12-18T01:15:06.237000 +CVE-2024-53677,0,0,b20f80da36871f8fb5324e3fc1c5ec83c8e6575f3a46d6f78ed41ab00c5aabf8,2024-12-18T01:15:06.237000 CVE-2024-5368,0,0,0267b73ce86fd5c42a4c0cf503f4bdead8427924f402a3554f435c1bc916f416,2024-11-21T09:47:30.877000 CVE-2024-5369,0,0,14abdfed4d5003ff16a96b2708e00658833baa1f8166ee56f5ba2dba896b20f5,2024-11-21T09:47:31.020000 CVE-2024-53691,0,0,09846e368cf7a07a1d919202728e77d0589572ed56c2c2f1bb03db07c3ec7fb0,2024-12-06T17:15:10.520000 @@ -270412,7 +270426,7 @@ CVE-2024-55946,0,0,fc4f0ce08741733d6f453b541d54aef404252708bb0bc4e901bbe32fa2942 CVE-2024-55949,0,0,fec4714a7969da92415b3b75b53f65d595fb44a2f90ba2d94f1f93dfae92a1f1,2024-12-16T20:15:13.683000 CVE-2024-5595,0,0,5c3da38e1b5f1812e17cdadfa64cfac3c13c5342e8821d9036b7da1dd32b505d,2024-08-02T17:35:43.927000 CVE-2024-55951,0,0,0f2ba68ba5d937d3f08ffc28ee064a50ef5129020d2db58a508d614718a5fb19,2024-12-16T20:15:13.823000 -CVE-2024-55956,0,1,4dbbe7b27f9e49431f04e908bb363b692252b89466a6d6e1764b8f489f042f8d,2024-12-18T02:00:02.997000 +CVE-2024-55956,0,0,4dbbe7b27f9e49431f04e908bb363b692252b89466a6d6e1764b8f489f042f8d,2024-12-18T02:00:02.997000 CVE-2024-5596,0,0,eb53dbc41b5b12ac359e7b7f77cdb6558119327982ea8ec36e1ee0087b4d4e06,2024-11-21T09:47:59.330000 CVE-2024-55969,0,0,9c57b4a45308acc7d73a4bbfc26f9862d4b6f355188666b7df28aa8e0565bef6,2024-12-16T17:15:12.337000 CVE-2024-5597,0,0,c028f291e4b563828a2ebebe088654ce56adccaea078f8905bc0de855460aa3c,2024-11-21T09:47:59.443000