[ { "name": "cve-2024-12084", "full_name": "themirze/cve-2024-12084", "html_url": "https://github.com/themirze/cve-2024-12084", "description": null, "stargazers_count": 3, "forks_count": 2, "created_at": "2025-01-21T02:13:14Z" }, { "name": "CVE-2024-1208-and-CVE-2024-1210", "full_name": "karlemilnikka/CVE-2024-1208-and-CVE-2024-1210", "html_url": "https://github.com/karlemilnikka/CVE-2024-1208-and-CVE-2024-1210", "description": "Sensitive Information Exposure via API in LearnDash.", "stargazers_count": 3, "forks_count": 0, "created_at": "2024-02-05T17:46:41Z" }, { "name": "CVE-2024-1208", "full_name": "Cappricio-Securities/CVE-2024-1208", "html_url": "https://github.com/Cappricio-Securities/CVE-2024-1208", "description": "LearnDash LMS < 4.10.3 - Sensitive Information Exposure", "stargazers_count": 1, "forks_count": 0, "created_at": "2024-05-30T17:55:45Z" }, { "name": "CVE-2024-12084", "full_name": "rxerium/CVE-2024-12084", "html_url": "https://github.com/rxerium/CVE-2024-12084", "description": "A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer.", "stargazers_count": 0, "forks_count": 0, "created_at": "2025-01-29T20:44:04Z" } ]