Auto-Update: 2024-12-17T11:00:29.863597+00:00

This commit is contained in:
cad-safe-bot 2024-12-17 11:03:52 +00:00
parent d848e4fe5b
commit efc326ba89
8 changed files with 431 additions and 17 deletions

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-11294",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-17T09:15:05.193",
"lastModified": "2024-12-17T09:15:05.193",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Memberful plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.73.9 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as site members."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3204895/memberful-wp",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/19ad787d-e027-48f5-8b5f-9263338b4fc3?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,76 @@
{
"id": "CVE-2024-12024",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-17T10:15:05.643",
"lastModified": "2024-12-17T10:15:05.643",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The EventPrime \u2013 Events Calendar, Bookings and Tickets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the em_ticket_category_data and em_ticket_individual_data parameters in all versions up to, and including, 4.0.5.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an administrative user accesses an injected page.\r\nNote: this vulnerability requires the \"Guest Submissions\" setting to be enabled. It is disabled by default."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/eventprime-event-calendar-management/tags/4.0.5.3/admin/partials/metaboxes/meta-box-tickets-panel-html.php#L216",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/eventprime-event-calendar-management/tags/4.0.5.3/admin/partials/metaboxes/meta-box-tickets-panel-html.php#L264",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/eventprime-event-calendar-management/tags/4.0.5.3/includes/class-ep-ajax.php#L1245",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/eventprime-event-calendar-management/tags/4.0.5.3/includes/class-ep-ajax.php#L971",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/eventprime-event-calendar-management/tags/4.0.5.3/includes/class-eventprime-sanitizer.php#L122",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9e51c8b5-cbb9-48aa-9c99-69f1b39fb0b4?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-12127",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-17T10:15:05.830",
"lastModified": "2024-12-17T10:15:05.830",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Learning Management System, eLearning, Course Builder, WordPress LMS Plugin \u2013 Sikshya LMS plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018page\u2019 parameter in all versions up to, and including, 0.0.21 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-80"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3207940/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/sikshya/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c0170668-65bc-4d65-a88b-9398391c98d9?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2024-12293",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-17T09:15:05.347",
"lastModified": "2024-12-17T09:15:05.347",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The User Role Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.64.3. This is due to missing or incorrect nonce validation on the update_roles() function. This makes it possible for unauthenticated attackers to add or remove roles for arbitrary users, including escalating their privileges to administrator, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/user-role-editor/trunk/includes/classes/grant-roles.php#L184",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/user-role-editor/trunk/includes/classes/grant-roles.php#L187",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3208193/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/user-role-editor/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6f359d02-d4ce-4045-9e79-ae0f92b84766?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-12469",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-17T10:15:05.997",
"lastModified": "2024-12-17T10:15:05.997",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WP BASE Booking of Appointments, Services and Events plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018status\u2019 parameter in all versions up to, and including, 4.9.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3207855/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/wp-base-booking-of-appointments-services-and-events/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/eb6613ad-1fb2-4278-adc1-fe5d1ade3ad5?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2024-8326",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-17T10:15:06.167",
"lastModified": "2024-12-17T10:15:06.167",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The s2Member \u2013 Excellent for All Kinds of Memberships, Content Restriction Paywalls & Member Access Subscriptions plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 241114 via the 'sc_get_details' function. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data including user data and database configuration information, which can lead to reading, updating, or dropping database tables. The vulnerability was partially patched in version 241114."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/s2member/trunk/src/includes/classes/sc-gets-in.inc.php",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/s2member/trunk/src/includes/classes/sc-gets.inc.php",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3188157/",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3208315/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/410d4ab0-22dd-4993-afbf-ae6193b70977?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-12-17T09:00:47.315344+00:00
2024-12-17T11:00:29.863597+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-12-17T08:15:05.573000+00:00
2024-12-17T10:15:06.167000+00:00
```
### Last Data Feed Release
@ -33,25 +33,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
274111
274117
```
### CVEs added in the last Commit
Recently added CVEs: `5`
Recently added CVEs: `6`
- [CVE-2021-26280](CVE-2021/CVE-2021-262xx/CVE-2021-26280.json) (`2024-12-17T07:15:05.343`)
- [CVE-2021-26281](CVE-2021/CVE-2021-262xx/CVE-2021-26281.json) (`2024-12-17T07:15:05.927`)
- [CVE-2024-11999](CVE-2024/CVE-2024-119xx/CVE-2024-11999.json) (`2024-12-17T07:15:06.113`)
- [CVE-2024-12219](CVE-2024/CVE-2024-122xx/CVE-2024-12219.json) (`2024-12-17T08:15:05.010`)
- [CVE-2024-12220](CVE-2024/CVE-2024-122xx/CVE-2024-12220.json) (`2024-12-17T08:15:05.393`)
- [CVE-2024-11294](CVE-2024/CVE-2024-112xx/CVE-2024-11294.json) (`2024-12-17T09:15:05.193`)
- [CVE-2024-12024](CVE-2024/CVE-2024-120xx/CVE-2024-12024.json) (`2024-12-17T10:15:05.643`)
- [CVE-2024-12127](CVE-2024/CVE-2024-121xx/CVE-2024-12127.json) (`2024-12-17T10:15:05.830`)
- [CVE-2024-12293](CVE-2024/CVE-2024-122xx/CVE-2024-12293.json) (`2024-12-17T09:15:05.347`)
- [CVE-2024-12469](CVE-2024/CVE-2024-124xx/CVE-2024-12469.json) (`2024-12-17T10:15:05.997`)
- [CVE-2024-8326](CVE-2024/CVE-2024-83xx/CVE-2024-8326.json) (`2024-12-17T10:15:06.167`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `0`
- [CVE-2024-53080](CVE-2024/CVE-2024-530xx/CVE-2024-53080.json) (`2024-12-17T08:15:05.573`)
## Download and Usage

View File

@ -171955,8 +171955,8 @@ CVE-2021-26276,0,0,fe12842147a3d9597cc53ff3b852150c687cc9cccbec63feeda8fb67ff2b9
CVE-2021-26277,0,0,0a521d9773294b67632bbd79404a9f6d2a97acd1eb8e9f9a8038e5d2b475c2ca,2024-11-21T05:56:01.737000
CVE-2021-26278,0,0,55407bd13a095819f1504458cc6585abdb858e5fd2879472762489a613345e4f,2024-12-17T03:15:06.573000
CVE-2021-26279,0,0,9dd09a10896aa30f87886cca9f28cc67fa690cc104e533c9343e07e9982338fb,2024-12-17T04:15:05.333000
CVE-2021-26280,1,1,81bbd0eaa2db53185bf3228c30a083e02603bb5cb4d0af8a2eb2fc638e29da0b,2024-12-17T07:15:05.343000
CVE-2021-26281,1,1,2067b11aa9d615d5bd64ea2e3f8b883bbc2e7c361839b6b3aa957521a7fbe4a0,2024-12-17T07:15:05.927000
CVE-2021-26280,0,0,81bbd0eaa2db53185bf3228c30a083e02603bb5cb4d0af8a2eb2fc638e29da0b,2024-12-17T07:15:05.343000
CVE-2021-26281,0,0,2067b11aa9d615d5bd64ea2e3f8b883bbc2e7c361839b6b3aa957521a7fbe4a0,2024-12-17T07:15:05.927000
CVE-2021-26291,0,0,a04873286f43d02ade91ec647e4cbb9371cd14cf2599798866ce37ea0cdaa411,2024-11-21T05:56:01.890000
CVE-2021-26293,0,0,c750cb4d2f6ab1250e05b92eab3115686dad6da9115e076093b7972b18076f46,2024-11-21T05:56:02.120000
CVE-2021-26294,0,0,c601a19fe6c9ddea2dedc80c3da8fb3ff5a80b9d3af720fefe2ace690f633037,2024-11-21T05:56:02.270000
@ -244040,6 +244040,7 @@ CVE-2024-11289,0,0,1d2443a1a9242c04e29818ad13875ac1c58e80e7866f1501dec4b2d1a8559
CVE-2024-1129,0,0,cbf5818dce2e4cd60590d30546d905436cb36b8ec16eeb56ee9382ffddfc0bc3,2024-11-21T08:49:51.773000
CVE-2024-11292,0,0,44d76ae9b7e309446be6c076fee918f16faf12f6eba1bd4aed88a2108eee73db,2024-12-06T09:15:05.993000
CVE-2024-11293,0,0,963e5cd86fd8964150efb764dabf7f60f1898cb3eb1113839b414494aefc5068,2024-12-04T08:15:06.343000
CVE-2024-11294,1,1,2eb006c700872e4221a5d65f1f84540c18c42b5a19bdffcef60597b889db391d,2024-12-17T09:15:05.193000
CVE-2024-11296,0,0,fb7d94da02b5205207d7d82f7728d17cf0d45360472acb20ff8132fc89a748af,2024-11-22T23:15:04.507000
CVE-2024-11298,0,0,cd8027ff7c1e39b70cf43f7d5a6cec3a72565a042c79fb93ed3ff58ccba5dece,2024-11-22T23:15:04.983000
CVE-2024-1130,0,0,a3e19aef9eb3382013136f74a42e19afeb0e606b8f2206b5fca2ea0a53428b21,2024-11-21T08:49:51.890000
@ -244570,7 +244571,7 @@ CVE-2024-11995,0,0,2072ff09f6a8d91ce5a6cb9ddb1c925e662d777c56c3ca9e5422a4217a97b
CVE-2024-11996,0,0,c9890e109cbd3473a593b35fd7d1b915d4d2a7a9695a33296844a7786a35e6d8,2024-12-04T21:29:13.483000
CVE-2024-11997,0,0,2af8126987a27c26e5e9fb866e5bf6a59fe0bc68e164aa36d761876f8d96a284,2024-12-04T21:26:54.147000
CVE-2024-11998,0,0,c32498d8a84a24616240eccde60a71f350199dae5d10d57970d82263bdad0fd7,2024-12-04T21:23:13.700000
CVE-2024-11999,1,1,d661960e0bef836a0d23d3369cebc7dcaa7c91a4dfe67177ec6dadfe82119b04,2024-12-17T07:15:06.113000
CVE-2024-11999,0,0,d661960e0bef836a0d23d3369cebc7dcaa7c91a4dfe67177ec6dadfe82119b04,2024-12-17T07:15:06.113000
CVE-2024-1200,0,0,e8315157751d481549a2635b52695b341549aeb4d8405db846b56db1c12fa29b,2024-11-21T08:50:01.490000
CVE-2024-12000,0,0,e45e46bd9049a7c2eac2343a939848eded6d5b005c7247796df205afc6eac9d3,2024-12-10T23:16:02.667000
CVE-2024-12001,0,0,75bbf94d31b41f422ac1216beeda365d0b924dd232e408edb33262f11bb39f10,2024-12-10T23:16:24.893000
@ -244582,6 +244583,7 @@ CVE-2024-1201,0,0,98150b7d086d80b767e6802e39750bc86f0479b7a9cd93495263225678c4d4
CVE-2024-12015,0,0,d5a693fd232b1e3fbc53d72a834e39c83a435aa6e5ae231752c351acc22ca6db,2024-12-02T14:15:05.383000
CVE-2024-12018,0,0,593c05ac2f3dac4339301164983c309f8de674e944577becd0f305b7e0d23ef0,2024-12-12T06:15:22.737000
CVE-2024-1202,0,0,a098cbd545693e5d361995e28174ffa246c4ae019a07a45a38ebe2abdfe163e3,2024-11-21T08:50:01.790000
CVE-2024-12024,1,1,5a3106bf981113dfa4ff23e5cefbf63a1c0b56982c8dec2c76da492a62325ef2,2024-12-17T10:15:05.643000
CVE-2024-12026,0,0,cbdee4f4d341b218f2a9910c9db7c968e1470cd32e93684865d3bd2934d626d1,2024-12-07T02:15:18.520000
CVE-2024-12027,0,0,37ec4b44c0b83690aba6eca2d38a4a49f2c2ce6081a618c323d63a584206d2b7,2024-12-06T09:15:07.803000
CVE-2024-12028,0,0,1e73c6e2445828811f3920b16dca38e7a1768853994affcbd716568d4e1eb5f0,2024-12-06T09:15:07.957000
@ -244616,6 +244618,7 @@ CVE-2024-12110,0,0,f266935beaa447960f1dea8d3421db64eefadfd0613c53fd8d2543de02327
CVE-2024-12115,0,0,e6944683813361fa4999b92dbfb5849d2d0c20bc3f6186b671317bdf2839435d,2024-12-07T02:15:18.653000
CVE-2024-1212,0,0,c6c0d98b39fe69ac963e13ef16e93aec1a62abd1466de44e7788f638a4921cfa,2024-11-21T08:50:03.010000
CVE-2024-12123,0,0,3314f70340307f7968d2c224d2753ec462f128bd5dd04a8f7d840d35f281e69e,2024-12-04T04:15:04.430000
CVE-2024-12127,1,1,2f75cfc1ef9826b6524289717f08c448185c9e1ac906a2393b8e7f15baff93de,2024-12-17T10:15:05.830000
CVE-2024-12128,0,0,c4db33033b659bed09aac37afde730f735bf98fa121412b3aa3432fe49f39a39,2024-12-07T10:15:05.843000
CVE-2024-1213,0,0,71ef51029e532fbd05d5ffce04ca88ce9c1183a8c328c139d7f9dd3d163c9edb,2024-11-21T08:50:03.180000
CVE-2024-12130,0,0,7cfba8bfed047a35f2157b6593a70767911cb47817273a684a588e01474943c3,2024-12-09T23:00:48.743000
@ -244653,9 +244656,9 @@ CVE-2024-12201,0,0,24aea21415169e4ceff164eedb7fa32646ef24d523e6e014144846720c08c
CVE-2024-12209,0,0,965d45920161ad8379a478313464ecb572a2b8b8ed1bf056a1646168e0b8105f,2024-12-08T06:15:04.823000
CVE-2024-1221,0,0,c833d2d1840e5e81b3c325295532e3c4cac8ba514abb434d638a7c419bdc43e8,2024-11-21T08:50:04.920000
CVE-2024-12212,0,0,4068a90166bc858f8bfa4c7fe1dbc180f7e4e033930f31a1b74471c9abd7763b,2024-12-13T01:15:05.810000
CVE-2024-12219,1,1,e42ce79f4eac32c20088caad5cf702de45bef3a188d2252b2567136ea1215a33,2024-12-17T08:15:05.010000
CVE-2024-12219,0,0,e42ce79f4eac32c20088caad5cf702de45bef3a188d2252b2567136ea1215a33,2024-12-17T08:15:05.010000
CVE-2024-1222,0,0,ff0f67607974451388d42ae6b90b2e9690717b801a6493a4e7aa508a94c6883e,2024-11-21T08:50:05.110000
CVE-2024-12220,1,1,c9c00163c7d98ea5d1257b3516b672220af80796c01576c7cfdda54df95bcbc0,2024-12-17T08:15:05.393000
CVE-2024-12220,0,0,c9c00163c7d98ea5d1257b3516b672220af80796c01576c7cfdda54df95bcbc0,2024-12-17T08:15:05.393000
CVE-2024-12227,0,0,c353a784c73b22c93b545f7e3c07e2ff77771e5d977f7464354ff7113388628f,2024-12-05T14:15:19.400000
CVE-2024-12228,0,0,cba3b66c66f8b74b7da0219a0273d1dd0c005a65d0aca4a38c9a6589b54985c9,2024-12-10T23:19:04.773000
CVE-2024-12229,0,0,aa44844c8d830c107b3760370b58cb504158d7d7c510be09891b02a376b9c9ac,2024-12-10T23:19:31.487000
@ -244689,6 +244692,7 @@ CVE-2024-12286,0,0,a2cf97a2f897256d80732f72cb83c0245f2eb4e867cc795bfeda6550048be
CVE-2024-12289,0,0,13ceaf41c63ab9df769c06a97eb1837bd3475cf420d82b37c196bad01ff19ec0,2024-12-12T23:15:10.500000
CVE-2024-1229,0,0,8ad8bfe76844e757ec6d08a1bad2f097b99b608e965943a6e4928e217dfee4df,2024-11-21T08:50:06.520000
CVE-2024-12292,0,0,9c2e3f4715c47523d2f1e1d813aca821c280ab211aff2eeed6650ad59c376aa9,2024-12-12T12:15:22.470000
CVE-2024-12293,1,1,58025d1a2dcf918e16a4969f9d5ebe14b0f8d6bcf49c0a1ef6faca0e96fe0ad0,2024-12-17T09:15:05.347000
CVE-2024-12294,0,0,beb757b9be530a21bd62fb0889c97c31013e2208ab8db98bc3384b757caf5365,2024-12-11T11:15:06.623000
CVE-2024-1230,0,0,4e58704ea3cd6d96f1b95bf7630f56ca27fd7e9cf7f7c464007165035f04082e,2024-11-21T08:50:06.710000
CVE-2024-12300,0,0,0328248a8fb43f00ec541ab5455f8917a3d5219f0a666c2cc7f8e41b776c4b36,2024-12-13T04:15:05.073000
@ -244761,6 +244765,7 @@ CVE-2024-1246,0,0,1f374a88e5f240286cc1247b0f1cf35c16b35bebd909ebb6b31cd5f41f4735
CVE-2024-12461,0,0,f7bab5c2b1e2764e06dde5d0575615b7d6c222c7cf9c0439423d8ffeaa327299,2024-12-12T04:15:07.820000
CVE-2024-12463,0,0,bf2ad951357546047d42b0aefb8a66347583691f5449e603983c94f9bac4eadf,2024-12-12T05:15:13.197000
CVE-2024-12465,0,0,71cf8d099f9bc4306dd9d21cf13805ebee4cfad62908f99a6e3f6ef7ca285117,2024-12-13T09:15:09.060000
CVE-2024-12469,1,1,9a4f166acc6277cee98455054d0c44f2c7182c91ecd09ca5065dff96aca63fd6,2024-12-17T10:15:05.997000
CVE-2024-1247,0,0,87dd54613b1838220658d2242080e8fb0b79934df6e5afef144b61ee319c0ba1,2024-11-21T08:50:09.013000
CVE-2024-12474,0,0,bcf4da13bc4f1e0c625542bed8143ddc9b6abe063d1d53c5426da4c6de732659,2024-12-14T06:15:19.627000
CVE-2024-12478,0,0,7473ce067b9c599bc20c6c8d7a8c7536b78b656ac44817a403493b4711b0f4db,2024-12-16T11:15:04.890000
@ -269293,7 +269298,7 @@ CVE-2024-53076,0,0,64d262957ec2a034b75f0ff3bb1ed976df231b16dffe0d2ed1faf5fd2b0e4
CVE-2024-53077,0,0,b81197bcf0e4f508fd1ad3bbb2e989516094354dfae57056a9ce7890af6cff80,2024-11-25T20:41:41.093000
CVE-2024-53078,0,0,c37b8dc734ef26e92a5b1e502aba1b21c80ff547db45a76a5b6d1e5822ef8e1a,2024-11-25T13:31:57.063000
CVE-2024-53079,0,0,842cfa3f805cf283364d877943681242a6e2d56da2e3fc653cb2100a50c04856,2024-11-27T16:59:20.303000
CVE-2024-53080,0,1,40e0ebce3491b3cbba4601900468014dce5564a949ed0b22690d873687088de1,2024-12-17T08:15:05.573000
CVE-2024-53080,0,0,40e0ebce3491b3cbba4601900468014dce5564a949ed0b22690d873687088de1,2024-12-17T08:15:05.573000
CVE-2024-53081,0,0,494d629ca516b5b4db6b9980f8938e11f2c142ff9c2899ebea88d56f8aadc322,2024-11-27T16:56:35.143000
CVE-2024-53082,0,0,fc31cd8f6fb7708465ca1f19762f33fe99db63a39877ed3ef3c6b3fa5f125136,2024-11-25T13:35:34.083000
CVE-2024-53083,0,0,55982879061f1201c3e7c8b0a9106bad767e8ab007c8fffff0751fa2f70ebe5b,2024-11-27T20:09:36.897000
@ -272772,6 +272777,7 @@ CVE-2024-8322,0,0,0eb64053260683ced57840764d85cffb0704ccbac82f140480e18eb74cd8f7
CVE-2024-8323,0,0,a3a077c74edbd32eaf964e492bde06aa618c4c22e94ded32f2e545218fd0007b,2024-11-08T20:30:11.340000
CVE-2024-8324,0,0,a61a7fb01724bdbe53c280d57285ea7bca599acae70289308072d53384384b5b,2024-10-04T13:51:25.567000
CVE-2024-8325,0,0,b1e060c2ab175e8279e2bf7a02f5e6d63f77606604f5fa71d4b2b0df1d6e11ab,2024-10-07T12:37:58.740000
CVE-2024-8326,1,1,819ad31dbf62a29140142128704956d139d3d1bbfefc869ae0331fa3f1090e67,2024-12-17T10:15:06.167000
CVE-2024-8327,0,0,a10cc0fc3cf655105d263642f581b0923c5436bb38004346d9e5dfbbb21b2bfb,2024-09-04T17:11:23.533000
CVE-2024-8328,0,0,00df909881e7461a05eaa1dc993baae29b242e3209e0be2fc4e8367167bacffb,2024-09-04T17:11:19.827000
CVE-2024-8329,0,0,d4c00f08016942f4c57ef430a11a81e377d1de886ce2351913983cb8d2d322ca,2024-09-05T13:40:38.080000

Can't render this file because it is too large.