From 1deaf9cd4066fb4e678375f4966d6170aa44ba20 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 9 Dec 2024 15:04:30 +0000 Subject: [PATCH] Auto-Update: 2024-12-09T15:01:07.506196+00:00 --- CVE-2023/CVE-2023-227xx/CVE-2023-22701.json | 56 +++ CVE-2023/CVE-2023-227xx/CVE-2023-22708.json | 56 +++ CVE-2023/CVE-2023-237xx/CVE-2023-23715.json | 56 +++ CVE-2023/CVE-2023-237xx/CVE-2023-23716.json | 56 +++ CVE-2023/CVE-2023-237xx/CVE-2023-23725.json | 56 +++ CVE-2023/CVE-2023-237xx/CVE-2023-23726.json | 56 +++ CVE-2023/CVE-2023-238xx/CVE-2023-23814.json | 56 +++ CVE-2023/CVE-2023-238xx/CVE-2023-23823.json | 56 +++ CVE-2023/CVE-2023-238xx/CVE-2023-23825.json | 56 +++ CVE-2023/CVE-2023-238xx/CVE-2023-23834.json | 56 +++ CVE-2023/CVE-2023-238xx/CVE-2023-23868.json | 56 +++ CVE-2023/CVE-2023-238xx/CVE-2023-23886.json | 56 +++ CVE-2023/CVE-2023-238xx/CVE-2023-23887.json | 56 +++ CVE-2023/CVE-2023-238xx/CVE-2023-23893.json | 56 +++ CVE-2023/CVE-2023-238xx/CVE-2023-23895.json | 56 +++ CVE-2023/CVE-2023-239xx/CVE-2023-23975.json | 56 +++ CVE-2023/CVE-2023-239xx/CVE-2023-23986.json | 56 +++ CVE-2023/CVE-2023-243xx/CVE-2023-24375.json | 56 +++ CVE-2023/CVE-2023-244xx/CVE-2023-24407.json | 56 +++ CVE-2023/CVE-2023-250xx/CVE-2023-25026.json | 56 +++ CVE-2023/CVE-2023-250xx/CVE-2023-25035.json | 56 +++ CVE-2023/CVE-2023-250xx/CVE-2023-25037.json | 56 +++ CVE-2023/CVE-2023-250xx/CVE-2023-25048.json | 56 +++ CVE-2023/CVE-2023-250xx/CVE-2023-25060.json | 56 +++ CVE-2023/CVE-2023-250xx/CVE-2023-25067.json | 56 +++ CVE-2023/CVE-2023-254xx/CVE-2023-25454.json | 56 +++ CVE-2023/CVE-2023-254xx/CVE-2023-25455.json | 56 +++ CVE-2023/CVE-2023-254xx/CVE-2023-25469.json | 56 +++ CVE-2023/CVE-2023-254xx/CVE-2023-25486.json | 56 +++ CVE-2023/CVE-2023-257xx/CVE-2023-25703.json | 56 +++ CVE-2023/CVE-2023-257xx/CVE-2023-25714.json | 56 +++ CVE-2023/CVE-2023-257xx/CVE-2023-25791.json | 56 +++ CVE-2023/CVE-2023-259xx/CVE-2023-25959.json | 56 +++ CVE-2023/CVE-2023-259xx/CVE-2023-25966.json | 56 +++ CVE-2023/CVE-2023-259xx/CVE-2023-25993.json | 56 +++ CVE-2023/CVE-2023-265xx/CVE-2023-26520.json | 56 +++ CVE-2023/CVE-2023-265xx/CVE-2023-26522.json | 56 +++ CVE-2023/CVE-2023-274xx/CVE-2023-27428.json | 56 +++ CVE-2023/CVE-2023-274xx/CVE-2023-27449.json | 56 +++ CVE-2023/CVE-2023-274xx/CVE-2023-27454.json | 56 +++ CVE-2023/CVE-2023-276xx/CVE-2023-27625.json | 56 +++ CVE-2023/CVE-2023-276xx/CVE-2023-27626.json | 56 +++ CVE-2023/CVE-2023-281xx/CVE-2023-28165.json | 56 +++ CVE-2023/CVE-2023-281xx/CVE-2023-28168.json | 56 +++ CVE-2023/CVE-2023-284xx/CVE-2023-28416.json | 56 +++ CVE-2023/CVE-2023-284xx/CVE-2023-28417.json | 56 +++ CVE-2023/CVE-2023-285xx/CVE-2023-28532.json | 56 +++ CVE-2023/CVE-2023-285xx/CVE-2023-28536.json | 56 +++ CVE-2023/CVE-2023-286xx/CVE-2023-28688.json | 56 +++ CVE-2023/CVE-2023-286xx/CVE-2023-28689.json | 56 +++ CVE-2023/CVE-2023-291xx/CVE-2023-29173.json | 56 +++ CVE-2023/CVE-2023-292xx/CVE-2023-29237.json | 56 +++ CVE-2023/CVE-2023-292xx/CVE-2023-29239.json | 56 +++ CVE-2023/CVE-2023-294xx/CVE-2023-29422.json | 56 +++ CVE-2023/CVE-2023-294xx/CVE-2023-29429.json | 56 +++ CVE-2023/CVE-2023-294xx/CVE-2023-29431.json | 56 +++ CVE-2023/CVE-2023-294xx/CVE-2023-29433.json | 56 +++ CVE-2023/CVE-2023-304xx/CVE-2023-30476.json | 56 +++ CVE-2023/CVE-2023-304xx/CVE-2023-30479.json | 56 +++ CVE-2023/CVE-2023-304xx/CVE-2023-30486.json | 56 +++ CVE-2023/CVE-2023-304xx/CVE-2023-30488.json | 56 +++ CVE-2023/CVE-2023-307xx/CVE-2023-30748.json | 56 +++ CVE-2023/CVE-2023-307xx/CVE-2023-30783.json | 56 +++ CVE-2023/CVE-2023-308xx/CVE-2023-30870.json | 56 +++ CVE-2023/CVE-2023-308xx/CVE-2023-30873.json | 56 +++ CVE-2023/CVE-2023-310xx/CVE-2023-31073.json | 56 +++ CVE-2023/CVE-2023-312xx/CVE-2023-31214.json | 56 +++ CVE-2023/CVE-2023-320xx/CVE-2023-32094.json | 56 +++ CVE-2023/CVE-2023-321xx/CVE-2023-32117.json | 56 +++ CVE-2023/CVE-2023-321xx/CVE-2023-32126.json | 56 +++ CVE-2023/CVE-2023-322xx/CVE-2023-32293.json | 56 +++ CVE-2023/CVE-2023-322xx/CVE-2023-32299.json | 56 +++ CVE-2023/CVE-2023-419xx/CVE-2023-41953.json | 56 +++ CVE-2023/CVE-2023-429xx/CVE-2023-42938.json | 74 ++- CVE-2023/CVE-2023-476xx/CVE-2023-47694.json | 56 +++ CVE-2023/CVE-2023-476xx/CVE-2023-47698.json | 56 +++ CVE-2023/CVE-2023-477xx/CVE-2023-47756.json | 56 +++ CVE-2023/CVE-2023-477xx/CVE-2023-47760.json | 56 +++ CVE-2023/CVE-2023-477xx/CVE-2023-47761.json | 56 +++ CVE-2023/CVE-2023-477xx/CVE-2023-47762.json | 56 +++ CVE-2023/CVE-2023-477xx/CVE-2023-47763.json | 56 +++ CVE-2023/CVE-2023-477xx/CVE-2023-47764.json | 56 +++ CVE-2023/CVE-2023-477xx/CVE-2023-47776.json | 56 +++ CVE-2023/CVE-2023-477xx/CVE-2023-47780.json | 56 +++ CVE-2023/CVE-2023-477xx/CVE-2023-47793.json | 56 +++ CVE-2023/CVE-2023-478xx/CVE-2023-47805.json | 56 +++ CVE-2023/CVE-2023-478xx/CVE-2023-47820.json | 56 +++ CVE-2023/CVE-2023-478xx/CVE-2023-47822.json | 56 +++ CVE-2023/CVE-2023-478xx/CVE-2023-47823.json | 56 +++ CVE-2023/CVE-2023-478xx/CVE-2023-47826.json | 56 +++ CVE-2023/CVE-2023-478xx/CVE-2023-47830.json | 56 +++ CVE-2023/CVE-2023-478xx/CVE-2023-47832.json | 56 +++ CVE-2023/CVE-2023-478xx/CVE-2023-47836.json | 56 +++ CVE-2023/CVE-2023-478xx/CVE-2023-47838.json | 56 +++ CVE-2023/CVE-2023-478xx/CVE-2023-47841.json | 56 +++ CVE-2023/CVE-2023-478xx/CVE-2023-47847.json | 56 +++ CVE-2023/CVE-2023-478xx/CVE-2023-47849.json | 56 +++ CVE-2023/CVE-2023-478xx/CVE-2023-47869.json | 56 +++ CVE-2023/CVE-2023-478xx/CVE-2023-47871.json | 56 +++ CVE-2023/CVE-2023-482xx/CVE-2023-48274.json | 56 +++ CVE-2023/CVE-2023-482xx/CVE-2023-48277.json | 56 +++ CVE-2023/CVE-2023-482xx/CVE-2023-48286.json | 56 +++ CVE-2023/CVE-2023-482xx/CVE-2023-48287.json | 56 +++ CVE-2023/CVE-2023-483xx/CVE-2023-48324.json | 56 +++ CVE-2023/CVE-2023-483xx/CVE-2023-48332.json | 56 +++ CVE-2023/CVE-2023-487xx/CVE-2023-48740.json | 56 +++ CVE-2023/CVE-2023-487xx/CVE-2023-48750.json | 56 +++ CVE-2023/CVE-2023-487xx/CVE-2023-48774.json | 56 +++ CVE-2023/CVE-2023-487xx/CVE-2023-48776.json | 56 +++ CVE-2023/CVE-2023-487xx/CVE-2023-48779.json | 56 +++ CVE-2023/CVE-2023-491xx/CVE-2023-49154.json | 56 +++ CVE-2023/CVE-2023-491xx/CVE-2023-49156.json | 56 +++ CVE-2023/CVE-2023-491xx/CVE-2023-49158.json | 56 +++ CVE-2023/CVE-2023-491xx/CVE-2023-49167.json | 56 +++ CVE-2023/CVE-2023-491xx/CVE-2023-49192.json | 56 +++ CVE-2023/CVE-2023-491xx/CVE-2023-49193.json | 56 +++ CVE-2023/CVE-2023-491xx/CVE-2023-49194.json | 56 +++ CVE-2023/CVE-2023-491xx/CVE-2023-49196.json | 56 +++ CVE-2023/CVE-2023-497xx/CVE-2023-49754.json | 56 +++ CVE-2023/CVE-2023-497xx/CVE-2023-49755.json | 56 +++ CVE-2023/CVE-2023-497xx/CVE-2023-49756.json | 56 +++ CVE-2023/CVE-2023-497xx/CVE-2023-49757.json | 56 +++ CVE-2023/CVE-2023-497xx/CVE-2023-49758.json | 56 +++ CVE-2023/CVE-2023-498xx/CVE-2023-49817.json | 56 +++ CVE-2023/CVE-2023-498xx/CVE-2023-49818.json | 56 +++ CVE-2023/CVE-2023-498xx/CVE-2023-49831.json | 56 +++ CVE-2023/CVE-2023-498xx/CVE-2023-49832.json | 56 +++ CVE-2023/CVE-2023-498xx/CVE-2023-49835.json | 56 +++ CVE-2023/CVE-2023-498xx/CVE-2023-49845.json | 56 +++ CVE-2023/CVE-2023-498xx/CVE-2023-49848.json | 56 +++ CVE-2023/CVE-2023-498xx/CVE-2023-49849.json | 56 +++ CVE-2023/CVE-2023-498xx/CVE-2023-49850.json | 56 +++ CVE-2023/CVE-2023-498xx/CVE-2023-49851.json | 56 +++ CVE-2023/CVE-2023-498xx/CVE-2023-49856.json | 56 +++ CVE-2023/CVE-2023-498xx/CVE-2023-49857.json | 56 +++ CVE-2023/CVE-2023-498xx/CVE-2023-49858.json | 56 +++ CVE-2023/CVE-2023-498xx/CVE-2023-49859.json | 56 +++ CVE-2023/CVE-2023-498xx/CVE-2023-49861.json | 56 +++ CVE-2023/CVE-2023-503xx/CVE-2023-50373.json | 56 +++ CVE-2023/CVE-2023-503xx/CVE-2023-50375.json | 56 +++ CVE-2023/CVE-2023-508xx/CVE-2023-50876.json | 56 +++ CVE-2023/CVE-2023-508xx/CVE-2023-50877.json | 56 +++ CVE-2023/CVE-2023-508xx/CVE-2023-50882.json | 56 +++ CVE-2023/CVE-2023-508xx/CVE-2023-50884.json | 56 +++ CVE-2023/CVE-2023-508xx/CVE-2023-50887.json | 56 +++ CVE-2023/CVE-2023-508xx/CVE-2023-50899.json | 56 +++ CVE-2023/CVE-2023-509xx/CVE-2023-50903.json | 56 +++ CVE-2023/CVE-2023-509xx/CVE-2023-50904.json | 56 +++ CVE-2023/CVE-2023-513xx/CVE-2023-51353.json | 56 +++ CVE-2023/CVE-2023-513xx/CVE-2023-51355.json | 56 +++ CVE-2023/CVE-2023-513xx/CVE-2023-51357.json | 56 +++ CVE-2023/CVE-2023-513xx/CVE-2023-51359.json | 56 +++ CVE-2023/CVE-2023-513xx/CVE-2023-51360.json | 56 +++ CVE-2023/CVE-2023-513xx/CVE-2023-51362.json | 56 +++ CVE-2023/CVE-2023-525xx/CVE-2023-52540.json | 108 +++- CVE-2023/CVE-2023-525xx/CVE-2023-52546.json | 88 +++- CVE-2023/CVE-2023-529xx/CVE-2023-52920.json | 8 +- CVE-2024/CVE-2024-232xx/CVE-2024-23262.json | 118 ++++- CVE-2024/CVE-2024-232xx/CVE-2024-23263.json | 320 ++++++++++-- CVE-2024/CVE-2024-232xx/CVE-2024-23264.json | 225 ++++++++- CVE-2024/CVE-2024-232xx/CVE-2024-23265.json | 251 ++++++++-- CVE-2024/CVE-2024-232xx/CVE-2024-23283.json | 151 +++++- CVE-2024/CVE-2024-232xx/CVE-2024-23284.json | 327 +++++++++++-- CVE-2024/CVE-2024-232xx/CVE-2024-23286.json | 251 ++++++++-- CVE-2024/CVE-2024-232xx/CVE-2024-23287.json | 128 ++++- CVE-2024/CVE-2024-232xx/CVE-2024-23288.json | 149 +++++- CVE-2024/CVE-2024-232xx/CVE-2024-23289.json | 147 +++++- CVE-2024/CVE-2024-232xx/CVE-2024-23290.json | 153 +++++- CVE-2024/CVE-2024-232xx/CVE-2024-23291.json | 149 +++++- CVE-2024/CVE-2024-232xx/CVE-2024-23292.json | 102 +++- CVE-2024/CVE-2024-232xx/CVE-2024-23298.json | 64 ++- CVE-2024/CVE-2024-266xx/CVE-2024-26686.json | 6 +- CVE-2024/CVE-2024-288xx/CVE-2024-28825.json | 517 +++++++++++++++++++- CVE-2024/CVE-2024-409xx/CVE-2024-40965.json | 6 +- CVE-2024/CVE-2024-409xx/CVE-2024-40975.json | 6 +- CVE-2024/CVE-2024-410xx/CVE-2024-41014.json | 6 +- CVE-2024/CVE-2024-421xx/CVE-2024-42122.json | 6 +- CVE-2024/CVE-2024-421xx/CVE-2024-42156.json | 6 +- CVE-2024/CVE-2024-422xx/CVE-2024-42252.json | 8 +- CVE-2024/CVE-2024-423xx/CVE-2024-42319.json | 6 +- CVE-2024/CVE-2024-432xx/CVE-2024-43222.json | 56 +++ CVE-2024/CVE-2024-438xx/CVE-2024-43857.json | 8 +- CVE-2024/CVE-2024-439xx/CVE-2024-43913.json | 8 +- CVE-2024/CVE-2024-449xx/CVE-2024-44950.json | 8 +- CVE-2024/CVE-2024-449xx/CVE-2024-44955.json | 8 +- CVE-2024/CVE-2024-449xx/CVE-2024-44963.json | 8 +- CVE-2024/CVE-2024-45xx/CVE-2024-4561.json | 72 ++- CVE-2024/CVE-2024-45xx/CVE-2024-4562.json | 72 ++- CVE-2024/CVE-2024-468xx/CVE-2024-46841.json | 8 +- CVE-2024/CVE-2024-498xx/CVE-2024-49891.json | 8 +- CVE-2024/CVE-2024-498xx/CVE-2024-49897.json | 8 +- CVE-2024/CVE-2024-498xx/CVE-2024-49898.json | 8 +- CVE-2024/CVE-2024-498xx/CVE-2024-49899.json | 8 +- CVE-2024/CVE-2024-499xx/CVE-2024-49906.json | 8 +- CVE-2024/CVE-2024-499xx/CVE-2024-49909.json | 8 +- CVE-2024/CVE-2024-499xx/CVE-2024-49911.json | 8 +- CVE-2024/CVE-2024-499xx/CVE-2024-49914.json | 8 +- CVE-2024/CVE-2024-499xx/CVE-2024-49915.json | 8 +- CVE-2024/CVE-2024-499xx/CVE-2024-49917.json | 8 +- CVE-2024/CVE-2024-499xx/CVE-2024-49934.json | 8 +- CVE-2024/CVE-2024-523xx/CVE-2024-52385.json | 56 +++ CVE-2024/CVE-2024-523xx/CVE-2024-52391.json | 56 +++ CVE-2024/CVE-2024-524xx/CVE-2024-52480.json | 56 +++ CVE-2024/CVE-2024-530xx/CVE-2024-53085.json | 8 +- CVE-2024/CVE-2024-531xx/CVE-2024-53141.json | 6 +- CVE-2024/CVE-2024-531xx/CVE-2024-53142.json | 6 +- CVE-2024/CVE-2024-537xx/CVE-2024-53785.json | 56 +++ CVE-2024/CVE-2024-537xx/CVE-2024-53790.json | 56 +++ CVE-2024/CVE-2024-537xx/CVE-2024-53791.json | 56 +++ CVE-2024/CVE-2024-537xx/CVE-2024-53798.json | 56 +++ CVE-2024/CVE-2024-538xx/CVE-2024-53814.json | 56 +++ CVE-2024/CVE-2024-538xx/CVE-2024-53816.json | 56 +++ CVE-2024/CVE-2024-538xx/CVE-2024-53818.json | 56 +++ CVE-2024/CVE-2024-538xx/CVE-2024-53819.json | 56 +++ CVE-2024/CVE-2024-538xx/CVE-2024-53821.json | 10 +- CVE-2024/CVE-2024-538xx/CVE-2024-53822.json | 56 +++ CVE-2024/CVE-2024-539xx/CVE-2024-53947.json | 78 +++ CVE-2024/CVE-2024-539xx/CVE-2024-53948.json | 78 +++ CVE-2024/CVE-2024-539xx/CVE-2024-53949.json | 78 +++ CVE-2024/CVE-2024-542xx/CVE-2024-54214.json | 8 +- CVE-2024/CVE-2024-542xx/CVE-2024-54215.json | 56 +++ CVE-2024/CVE-2024-542xx/CVE-2024-54216.json | 10 +- CVE-2024/CVE-2024-542xx/CVE-2024-54217.json | 56 +++ CVE-2024/CVE-2024-542xx/CVE-2024-54218.json | 56 +++ CVE-2024/CVE-2024-542xx/CVE-2024-54219.json | 56 +++ CVE-2024/CVE-2024-542xx/CVE-2024-54220.json | 56 +++ CVE-2024/CVE-2024-542xx/CVE-2024-54223.json | 56 +++ CVE-2024/CVE-2024-542xx/CVE-2024-54224.json | 56 +++ CVE-2024/CVE-2024-542xx/CVE-2024-54225.json | 56 +++ CVE-2024/CVE-2024-542xx/CVE-2024-54226.json | 56 +++ CVE-2024/CVE-2024-542xx/CVE-2024-54227.json | 56 +++ CVE-2024/CVE-2024-542xx/CVE-2024-54228.json | 56 +++ CVE-2024/CVE-2024-542xx/CVE-2024-54230.json | 56 +++ CVE-2024/CVE-2024-542xx/CVE-2024-54232.json | 56 +++ CVE-2024/CVE-2024-542xx/CVE-2024-54247.json | 56 +++ CVE-2024/CVE-2024-542xx/CVE-2024-54251.json | 56 +++ CVE-2024/CVE-2024-542xx/CVE-2024-54253.json | 56 +++ CVE-2024/CVE-2024-542xx/CVE-2024-54254.json | 56 +++ CVE-2024/CVE-2024-542xx/CVE-2024-54255.json | 56 +++ CVE-2024/CVE-2024-542xx/CVE-2024-54260.json | 56 +++ CVE-2024/CVE-2024-549xx/CVE-2024-54929.json | 21 + CVE-2024/CVE-2024-549xx/CVE-2024-54936.json | 21 + CVE-2024/CVE-2024-549xx/CVE-2024-54937.json | 21 + CVE-2024/CVE-2024-82xx/CVE-2024-8259.json | 56 +++ README.md | 64 ++- _state.csv | 304 +++++++++--- 246 files changed, 14358 insertions(+), 431 deletions(-) create mode 100644 CVE-2023/CVE-2023-227xx/CVE-2023-22701.json create mode 100644 CVE-2023/CVE-2023-227xx/CVE-2023-22708.json create mode 100644 CVE-2023/CVE-2023-237xx/CVE-2023-23715.json create mode 100644 CVE-2023/CVE-2023-237xx/CVE-2023-23716.json create mode 100644 CVE-2023/CVE-2023-237xx/CVE-2023-23725.json create mode 100644 CVE-2023/CVE-2023-237xx/CVE-2023-23726.json create mode 100644 CVE-2023/CVE-2023-238xx/CVE-2023-23814.json create mode 100644 CVE-2023/CVE-2023-238xx/CVE-2023-23823.json create mode 100644 CVE-2023/CVE-2023-238xx/CVE-2023-23825.json create mode 100644 CVE-2023/CVE-2023-238xx/CVE-2023-23834.json create mode 100644 CVE-2023/CVE-2023-238xx/CVE-2023-23868.json create mode 100644 CVE-2023/CVE-2023-238xx/CVE-2023-23886.json create mode 100644 CVE-2023/CVE-2023-238xx/CVE-2023-23887.json create mode 100644 CVE-2023/CVE-2023-238xx/CVE-2023-23893.json create mode 100644 CVE-2023/CVE-2023-238xx/CVE-2023-23895.json create mode 100644 CVE-2023/CVE-2023-239xx/CVE-2023-23975.json create mode 100644 CVE-2023/CVE-2023-239xx/CVE-2023-23986.json create mode 100644 CVE-2023/CVE-2023-243xx/CVE-2023-24375.json create mode 100644 CVE-2023/CVE-2023-244xx/CVE-2023-24407.json create mode 100644 CVE-2023/CVE-2023-250xx/CVE-2023-25026.json create mode 100644 CVE-2023/CVE-2023-250xx/CVE-2023-25035.json create mode 100644 CVE-2023/CVE-2023-250xx/CVE-2023-25037.json create mode 100644 CVE-2023/CVE-2023-250xx/CVE-2023-25048.json create mode 100644 CVE-2023/CVE-2023-250xx/CVE-2023-25060.json create mode 100644 CVE-2023/CVE-2023-250xx/CVE-2023-25067.json create mode 100644 CVE-2023/CVE-2023-254xx/CVE-2023-25454.json create mode 100644 CVE-2023/CVE-2023-254xx/CVE-2023-25455.json create mode 100644 CVE-2023/CVE-2023-254xx/CVE-2023-25469.json create mode 100644 CVE-2023/CVE-2023-254xx/CVE-2023-25486.json create mode 100644 CVE-2023/CVE-2023-257xx/CVE-2023-25703.json create mode 100644 CVE-2023/CVE-2023-257xx/CVE-2023-25714.json create mode 100644 CVE-2023/CVE-2023-257xx/CVE-2023-25791.json create mode 100644 CVE-2023/CVE-2023-259xx/CVE-2023-25959.json create mode 100644 CVE-2023/CVE-2023-259xx/CVE-2023-25966.json create mode 100644 CVE-2023/CVE-2023-259xx/CVE-2023-25993.json create mode 100644 CVE-2023/CVE-2023-265xx/CVE-2023-26520.json create mode 100644 CVE-2023/CVE-2023-265xx/CVE-2023-26522.json create mode 100644 CVE-2023/CVE-2023-274xx/CVE-2023-27428.json create mode 100644 CVE-2023/CVE-2023-274xx/CVE-2023-27449.json create mode 100644 CVE-2023/CVE-2023-274xx/CVE-2023-27454.json create mode 100644 CVE-2023/CVE-2023-276xx/CVE-2023-27625.json create mode 100644 CVE-2023/CVE-2023-276xx/CVE-2023-27626.json create mode 100644 CVE-2023/CVE-2023-281xx/CVE-2023-28165.json create mode 100644 CVE-2023/CVE-2023-281xx/CVE-2023-28168.json create mode 100644 CVE-2023/CVE-2023-284xx/CVE-2023-28416.json create mode 100644 CVE-2023/CVE-2023-284xx/CVE-2023-28417.json create mode 100644 CVE-2023/CVE-2023-285xx/CVE-2023-28532.json create mode 100644 CVE-2023/CVE-2023-285xx/CVE-2023-28536.json create mode 100644 CVE-2023/CVE-2023-286xx/CVE-2023-28688.json create mode 100644 CVE-2023/CVE-2023-286xx/CVE-2023-28689.json create mode 100644 CVE-2023/CVE-2023-291xx/CVE-2023-29173.json create mode 100644 CVE-2023/CVE-2023-292xx/CVE-2023-29237.json create mode 100644 CVE-2023/CVE-2023-292xx/CVE-2023-29239.json create mode 100644 CVE-2023/CVE-2023-294xx/CVE-2023-29422.json create mode 100644 CVE-2023/CVE-2023-294xx/CVE-2023-29429.json create mode 100644 CVE-2023/CVE-2023-294xx/CVE-2023-29431.json create mode 100644 CVE-2023/CVE-2023-294xx/CVE-2023-29433.json create mode 100644 CVE-2023/CVE-2023-304xx/CVE-2023-30476.json create mode 100644 CVE-2023/CVE-2023-304xx/CVE-2023-30479.json create mode 100644 CVE-2023/CVE-2023-304xx/CVE-2023-30486.json create mode 100644 CVE-2023/CVE-2023-304xx/CVE-2023-30488.json create mode 100644 CVE-2023/CVE-2023-307xx/CVE-2023-30748.json create mode 100644 CVE-2023/CVE-2023-307xx/CVE-2023-30783.json create mode 100644 CVE-2023/CVE-2023-308xx/CVE-2023-30870.json create mode 100644 CVE-2023/CVE-2023-308xx/CVE-2023-30873.json create mode 100644 CVE-2023/CVE-2023-310xx/CVE-2023-31073.json create mode 100644 CVE-2023/CVE-2023-312xx/CVE-2023-31214.json create mode 100644 CVE-2023/CVE-2023-320xx/CVE-2023-32094.json create mode 100644 CVE-2023/CVE-2023-321xx/CVE-2023-32117.json create mode 100644 CVE-2023/CVE-2023-321xx/CVE-2023-32126.json create mode 100644 CVE-2023/CVE-2023-322xx/CVE-2023-32293.json create mode 100644 CVE-2023/CVE-2023-322xx/CVE-2023-32299.json create mode 100644 CVE-2023/CVE-2023-419xx/CVE-2023-41953.json create mode 100644 CVE-2023/CVE-2023-476xx/CVE-2023-47694.json create mode 100644 CVE-2023/CVE-2023-476xx/CVE-2023-47698.json create mode 100644 CVE-2023/CVE-2023-477xx/CVE-2023-47756.json create mode 100644 CVE-2023/CVE-2023-477xx/CVE-2023-47760.json create mode 100644 CVE-2023/CVE-2023-477xx/CVE-2023-47761.json create mode 100644 CVE-2023/CVE-2023-477xx/CVE-2023-47762.json create mode 100644 CVE-2023/CVE-2023-477xx/CVE-2023-47763.json create mode 100644 CVE-2023/CVE-2023-477xx/CVE-2023-47764.json create mode 100644 CVE-2023/CVE-2023-477xx/CVE-2023-47776.json create mode 100644 CVE-2023/CVE-2023-477xx/CVE-2023-47780.json create mode 100644 CVE-2023/CVE-2023-477xx/CVE-2023-47793.json create mode 100644 CVE-2023/CVE-2023-478xx/CVE-2023-47805.json create mode 100644 CVE-2023/CVE-2023-478xx/CVE-2023-47820.json create mode 100644 CVE-2023/CVE-2023-478xx/CVE-2023-47822.json create mode 100644 CVE-2023/CVE-2023-478xx/CVE-2023-47823.json create mode 100644 CVE-2023/CVE-2023-478xx/CVE-2023-47826.json create mode 100644 CVE-2023/CVE-2023-478xx/CVE-2023-47830.json create mode 100644 CVE-2023/CVE-2023-478xx/CVE-2023-47832.json create mode 100644 CVE-2023/CVE-2023-478xx/CVE-2023-47836.json create mode 100644 CVE-2023/CVE-2023-478xx/CVE-2023-47838.json create mode 100644 CVE-2023/CVE-2023-478xx/CVE-2023-47841.json create mode 100644 CVE-2023/CVE-2023-478xx/CVE-2023-47847.json create mode 100644 CVE-2023/CVE-2023-478xx/CVE-2023-47849.json create mode 100644 CVE-2023/CVE-2023-478xx/CVE-2023-47869.json create mode 100644 CVE-2023/CVE-2023-478xx/CVE-2023-47871.json create mode 100644 CVE-2023/CVE-2023-482xx/CVE-2023-48274.json create mode 100644 CVE-2023/CVE-2023-482xx/CVE-2023-48277.json create mode 100644 CVE-2023/CVE-2023-482xx/CVE-2023-48286.json create mode 100644 CVE-2023/CVE-2023-482xx/CVE-2023-48287.json create mode 100644 CVE-2023/CVE-2023-483xx/CVE-2023-48324.json create mode 100644 CVE-2023/CVE-2023-483xx/CVE-2023-48332.json create mode 100644 CVE-2023/CVE-2023-487xx/CVE-2023-48740.json create mode 100644 CVE-2023/CVE-2023-487xx/CVE-2023-48750.json create mode 100644 CVE-2023/CVE-2023-487xx/CVE-2023-48774.json create mode 100644 CVE-2023/CVE-2023-487xx/CVE-2023-48776.json create mode 100644 CVE-2023/CVE-2023-487xx/CVE-2023-48779.json create mode 100644 CVE-2023/CVE-2023-491xx/CVE-2023-49154.json create mode 100644 CVE-2023/CVE-2023-491xx/CVE-2023-49156.json create mode 100644 CVE-2023/CVE-2023-491xx/CVE-2023-49158.json create mode 100644 CVE-2023/CVE-2023-491xx/CVE-2023-49167.json create mode 100644 CVE-2023/CVE-2023-491xx/CVE-2023-49192.json create mode 100644 CVE-2023/CVE-2023-491xx/CVE-2023-49193.json create mode 100644 CVE-2023/CVE-2023-491xx/CVE-2023-49194.json create mode 100644 CVE-2023/CVE-2023-491xx/CVE-2023-49196.json create mode 100644 CVE-2023/CVE-2023-497xx/CVE-2023-49754.json create mode 100644 CVE-2023/CVE-2023-497xx/CVE-2023-49755.json create mode 100644 CVE-2023/CVE-2023-497xx/CVE-2023-49756.json create mode 100644 CVE-2023/CVE-2023-497xx/CVE-2023-49757.json create mode 100644 CVE-2023/CVE-2023-497xx/CVE-2023-49758.json create mode 100644 CVE-2023/CVE-2023-498xx/CVE-2023-49817.json create mode 100644 CVE-2023/CVE-2023-498xx/CVE-2023-49818.json create mode 100644 CVE-2023/CVE-2023-498xx/CVE-2023-49831.json create mode 100644 CVE-2023/CVE-2023-498xx/CVE-2023-49832.json create mode 100644 CVE-2023/CVE-2023-498xx/CVE-2023-49835.json create mode 100644 CVE-2023/CVE-2023-498xx/CVE-2023-49845.json create mode 100644 CVE-2023/CVE-2023-498xx/CVE-2023-49848.json create mode 100644 CVE-2023/CVE-2023-498xx/CVE-2023-49849.json create mode 100644 CVE-2023/CVE-2023-498xx/CVE-2023-49850.json create mode 100644 CVE-2023/CVE-2023-498xx/CVE-2023-49851.json create mode 100644 CVE-2023/CVE-2023-498xx/CVE-2023-49856.json create mode 100644 CVE-2023/CVE-2023-498xx/CVE-2023-49857.json create mode 100644 CVE-2023/CVE-2023-498xx/CVE-2023-49858.json create mode 100644 CVE-2023/CVE-2023-498xx/CVE-2023-49859.json create mode 100644 CVE-2023/CVE-2023-498xx/CVE-2023-49861.json create mode 100644 CVE-2023/CVE-2023-503xx/CVE-2023-50373.json create mode 100644 CVE-2023/CVE-2023-503xx/CVE-2023-50375.json create mode 100644 CVE-2023/CVE-2023-508xx/CVE-2023-50876.json create mode 100644 CVE-2023/CVE-2023-508xx/CVE-2023-50877.json create mode 100644 CVE-2023/CVE-2023-508xx/CVE-2023-50882.json create mode 100644 CVE-2023/CVE-2023-508xx/CVE-2023-50884.json create mode 100644 CVE-2023/CVE-2023-508xx/CVE-2023-50887.json create mode 100644 CVE-2023/CVE-2023-508xx/CVE-2023-50899.json create mode 100644 CVE-2023/CVE-2023-509xx/CVE-2023-50903.json create mode 100644 CVE-2023/CVE-2023-509xx/CVE-2023-50904.json create mode 100644 CVE-2023/CVE-2023-513xx/CVE-2023-51353.json create mode 100644 CVE-2023/CVE-2023-513xx/CVE-2023-51355.json create mode 100644 CVE-2023/CVE-2023-513xx/CVE-2023-51357.json create mode 100644 CVE-2023/CVE-2023-513xx/CVE-2023-51359.json create mode 100644 CVE-2023/CVE-2023-513xx/CVE-2023-51360.json create mode 100644 CVE-2023/CVE-2023-513xx/CVE-2023-51362.json create mode 100644 CVE-2024/CVE-2024-432xx/CVE-2024-43222.json create mode 100644 CVE-2024/CVE-2024-523xx/CVE-2024-52385.json create mode 100644 CVE-2024/CVE-2024-523xx/CVE-2024-52391.json create mode 100644 CVE-2024/CVE-2024-524xx/CVE-2024-52480.json create mode 100644 CVE-2024/CVE-2024-537xx/CVE-2024-53785.json create mode 100644 CVE-2024/CVE-2024-537xx/CVE-2024-53790.json create mode 100644 CVE-2024/CVE-2024-537xx/CVE-2024-53791.json create mode 100644 CVE-2024/CVE-2024-537xx/CVE-2024-53798.json create mode 100644 CVE-2024/CVE-2024-538xx/CVE-2024-53814.json create mode 100644 CVE-2024/CVE-2024-538xx/CVE-2024-53816.json create mode 100644 CVE-2024/CVE-2024-538xx/CVE-2024-53818.json create mode 100644 CVE-2024/CVE-2024-538xx/CVE-2024-53819.json create mode 100644 CVE-2024/CVE-2024-538xx/CVE-2024-53822.json create mode 100644 CVE-2024/CVE-2024-539xx/CVE-2024-53947.json create mode 100644 CVE-2024/CVE-2024-539xx/CVE-2024-53948.json create mode 100644 CVE-2024/CVE-2024-539xx/CVE-2024-53949.json create mode 100644 CVE-2024/CVE-2024-542xx/CVE-2024-54215.json create mode 100644 CVE-2024/CVE-2024-542xx/CVE-2024-54217.json create mode 100644 CVE-2024/CVE-2024-542xx/CVE-2024-54218.json create mode 100644 CVE-2024/CVE-2024-542xx/CVE-2024-54219.json create mode 100644 CVE-2024/CVE-2024-542xx/CVE-2024-54220.json create mode 100644 CVE-2024/CVE-2024-542xx/CVE-2024-54223.json create mode 100644 CVE-2024/CVE-2024-542xx/CVE-2024-54224.json create mode 100644 CVE-2024/CVE-2024-542xx/CVE-2024-54225.json create mode 100644 CVE-2024/CVE-2024-542xx/CVE-2024-54226.json create mode 100644 CVE-2024/CVE-2024-542xx/CVE-2024-54227.json create mode 100644 CVE-2024/CVE-2024-542xx/CVE-2024-54228.json create mode 100644 CVE-2024/CVE-2024-542xx/CVE-2024-54230.json create mode 100644 CVE-2024/CVE-2024-542xx/CVE-2024-54232.json create mode 100644 CVE-2024/CVE-2024-542xx/CVE-2024-54247.json create mode 100644 CVE-2024/CVE-2024-542xx/CVE-2024-54251.json create mode 100644 CVE-2024/CVE-2024-542xx/CVE-2024-54253.json create mode 100644 CVE-2024/CVE-2024-542xx/CVE-2024-54254.json create mode 100644 CVE-2024/CVE-2024-542xx/CVE-2024-54255.json create mode 100644 CVE-2024/CVE-2024-542xx/CVE-2024-54260.json create mode 100644 CVE-2024/CVE-2024-549xx/CVE-2024-54929.json create mode 100644 CVE-2024/CVE-2024-549xx/CVE-2024-54936.json create mode 100644 CVE-2024/CVE-2024-549xx/CVE-2024-54937.json create mode 100644 CVE-2024/CVE-2024-82xx/CVE-2024-8259.json diff --git a/CVE-2023/CVE-2023-227xx/CVE-2023-22701.json b/CVE-2023/CVE-2023-227xx/CVE-2023-22701.json new file mode 100644 index 00000000000..27d58ce04d0 --- /dev/null +++ b/CVE-2023/CVE-2023-227xx/CVE-2023-22701.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-22701", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:20.060", + "lastModified": "2024-12-09T13:15:20.060", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Shopfiles Ltd Ebook Store allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Ebook Store: from n/a through 5.775." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ebook-store/vulnerability/wordpress-ebook-store-plugin-5-775-broken-authentication-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-227xx/CVE-2023-22708.json b/CVE-2023/CVE-2023-227xx/CVE-2023-22708.json new file mode 100644 index 00000000000..e4d2675194b --- /dev/null +++ b/CVE-2023/CVE-2023-227xx/CVE-2023-22708.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-22708", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:20.260", + "lastModified": "2024-12-09T13:15:20.260", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Karim Salman Kraken.io Image Optimizer allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Kraken.io Image Optimizer: from n/a through 2.6.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/kraken-image-optimizer/vulnerability/wordpress-kraken-io-image-optimizer-plugin-2-6-7-broken-access-control?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23715.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23715.json new file mode 100644 index 00000000000..3d1d88b54cf --- /dev/null +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23715.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-23715", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:20.390", + "lastModified": "2024-12-09T13:15:20.390", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in JobBoardWP JobBoardWP \u2013 Job Board Listings and Submissions allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects JobBoardWP \u2013 Job Board Listings and Submissions: from n/a through 1.2.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", + "baseScore": 5.2, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/jobboardwp/vulnerability/wordpress-jobboardwp-job-board-listings-and-submissions-plugin-1-2-2-idor-leading-to-job-removal-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23716.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23716.json new file mode 100644 index 00000000000..4c545e33384 --- /dev/null +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23716.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-23716", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:20.523", + "lastModified": "2024-12-09T13:15:20.523", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Zendesk Zendesk Support for WordPress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Zendesk Support for WordPress: from n/a through 1.8.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/zendesk/vulnerability/wordpress-zendesk-support-for-wordpress-plugin-1-8-4-cross-site-request-forgery-csrf?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23725.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23725.json new file mode 100644 index 00000000000..299b3a196e8 --- /dev/null +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23725.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-23725", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:20.657", + "lastModified": "2024-12-09T13:15:20.657", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Chris Baldelomar Shortcodes allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Shortcodes: from n/a through 3.46." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wc-shortcodes/vulnerability/wordpress-shortcodes-by-angie-makes-plugin-3-46-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23726.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23726.json new file mode 100644 index 00000000000..11cb0ce6235 --- /dev/null +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23726.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-23726", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:20.787", + "lastModified": "2024-12-09T13:15:20.787", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Tickera.com Tickera allows Cross Site Request Forgery.This issue affects Tickera: from n/a through 3.5.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/tickera-event-ticketing-system/vulnerability/wordpress-tickera-wordpress-event-ticketing-plugin-3-5-1-0-csrf-leading-to-post-status-change-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-238xx/CVE-2023-23814.json b/CVE-2023/CVE-2023-238xx/CVE-2023-23814.json new file mode 100644 index 00000000000..e0ed51cd5f8 --- /dev/null +++ b/CVE-2023/CVE-2023-238xx/CVE-2023-23814.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-23814", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:20.910", + "lastModified": "2024-12-09T13:15:20.910", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in CodePeople CP Multi View Event Calendar allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects CP Multi View Event Calendar : from n/a through 1.4.13." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 3.8, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/cp-multi-view-calendar/vulnerability/wordpress-calendar-event-multi-view-plugin-1-4-13-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-238xx/CVE-2023-23823.json b/CVE-2023/CVE-2023-238xx/CVE-2023-23823.json new file mode 100644 index 00000000000..79b59a1a136 --- /dev/null +++ b/CVE-2023/CVE-2023-238xx/CVE-2023-23823.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-23823", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:21.037", + "lastModified": "2024-12-09T13:15:21.037", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Clever Widgets Enhanced Text Widget allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Enhanced Text Widget: from n/a through 1.5.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/enhanced-text-widget/vulnerability/wordpress-enhanced-text-widget-plugin-1-5-7-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-238xx/CVE-2023-23825.json b/CVE-2023/CVE-2023-238xx/CVE-2023-23825.json new file mode 100644 index 00000000000..19a8237975a --- /dev/null +++ b/CVE-2023/CVE-2023-238xx/CVE-2023-23825.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-23825", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:21.163", + "lastModified": "2024-12-09T13:15:21.163", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Brainstorm Force Spectra allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Spectra: from n/a through 2.3.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 3.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ultimate-addons-for-gutenberg/vulnerability/wordpress-spectra-wordpress-gutenberg-blocks-plugin-2-3-0-broken-access-control-csrf-on-import-wpforms-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-238xx/CVE-2023-23834.json b/CVE-2023/CVE-2023-238xx/CVE-2023-23834.json new file mode 100644 index 00000000000..36540ed50c5 --- /dev/null +++ b/CVE-2023/CVE-2023-238xx/CVE-2023-23834.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-23834", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:21.290", + "lastModified": "2024-12-09T13:15:21.290", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Brainstorm Force Spectra allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Spectra: from n/a through 2.3.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ultimate-addons-for-gutenberg/vulnerability/wordpress-spectra-wordpress-gutenberg-blocks-plugin-2-3-0-broken-access-control-csrf-on-activate-plugin-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-238xx/CVE-2023-23868.json b/CVE-2023/CVE-2023-238xx/CVE-2023-23868.json new file mode 100644 index 00000000000..05ece2ea6f5 --- /dev/null +++ b/CVE-2023/CVE-2023-238xx/CVE-2023-23868.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-23868", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:21.417", + "lastModified": "2024-12-09T13:15:21.417", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in WPFactory Cost of Goods for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Cost of Goods for WooCommerce: from n/a through 2.8.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/cost-of-goods-for-woocommerce/vulnerability/wordpress-cost-of-goods-for-woocommerce-plugin-2-8-6-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-238xx/CVE-2023-23886.json b/CVE-2023/CVE-2023-238xx/CVE-2023-23886.json new file mode 100644 index 00000000000..d0cdfb6353b --- /dev/null +++ b/CVE-2023/CVE-2023-238xx/CVE-2023-23886.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-23886", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:21.540", + "lastModified": "2024-12-09T13:15:21.540", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in mg12 WP-RecentComments allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP-RecentComments: from n/a through 2.2.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-recentcomments/vulnerability/wordpress-wp-recentcomments-plugin-2-2-7-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-238xx/CVE-2023-23887.json b/CVE-2023/CVE-2023-238xx/CVE-2023-23887.json new file mode 100644 index 00000000000..e8343c68ab8 --- /dev/null +++ b/CVE-2023/CVE-2023-238xx/CVE-2023-23887.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-23887", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:21.663", + "lastModified": "2024-12-09T13:15:21.663", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Shaon Easy Google Analytics for WordPress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Easy Google Analytics for WordPress: from n/a through 1.6.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/easy-google-analytics-for-wordpress/vulnerability/wordpress-easy-google-analytics-for-wordpress-plugin-1-6-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-238xx/CVE-2023-23893.json b/CVE-2023/CVE-2023-238xx/CVE-2023-23893.json new file mode 100644 index 00000000000..cee1f454632 --- /dev/null +++ b/CVE-2023/CVE-2023-238xx/CVE-2023-23893.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-23893", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:21.793", + "lastModified": "2024-12-09T13:15:21.793", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Igor Benic Simple Giveaways allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Simple Giveaways: from n/a through 2.48.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/giveasap/vulnerability/wordpress-simple-giveaways-plugin-2-45-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-238xx/CVE-2023-23895.json b/CVE-2023/CVE-2023-238xx/CVE-2023-23895.json new file mode 100644 index 00000000000..0abfe9f1196 --- /dev/null +++ b/CVE-2023/CVE-2023-238xx/CVE-2023-23895.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-23895", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:21.920", + "lastModified": "2024-12-09T13:15:21.920", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in CodePeople WP Time Slots Booking Form allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Time Slots Booking Form: from n/a through 1.1.82." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-time-slots-booking-form/vulnerability/wordpress-wp-time-slots-booking-form-plugin-1-1-82-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-239xx/CVE-2023-23975.json b/CVE-2023/CVE-2023-239xx/CVE-2023-23975.json new file mode 100644 index 00000000000..799109de0d8 --- /dev/null +++ b/CVE-2023/CVE-2023-239xx/CVE-2023-23975.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-23975", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:22.040", + "lastModified": "2024-12-09T13:15:22.040", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Fullworks Quick Event Manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Quick Event Manager: from n/a through 9.7.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/quick-event-manager/vulnerability/wordpress-quick-event-manager-plugin-9-7-4-broken-access-control?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-239xx/CVE-2023-23986.json b/CVE-2023/CVE-2023-239xx/CVE-2023-23986.json new file mode 100644 index 00000000000..bc926d5c982 --- /dev/null +++ b/CVE-2023/CVE-2023-239xx/CVE-2023-23986.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-23986", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:22.163", + "lastModified": "2024-12-09T13:15:22.163", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Noah Hearle, Design Extreme Reviews and Rating \u2013 Google My Business allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Reviews and Rating \u2013 Google My Business: from n/a through 4.14." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/g-business-reviews-rating/vulnerability/wordpress-reviews-and-rating-google-my-business-plugin-4-14-broken-access-control?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-243xx/CVE-2023-24375.json b/CVE-2023/CVE-2023-243xx/CVE-2023-24375.json new file mode 100644 index 00000000000..7c5112eb4c8 --- /dev/null +++ b/CVE-2023/CVE-2023-243xx/CVE-2023-24375.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-24375", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:22.283", + "lastModified": "2024-12-09T13:15:22.283", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in miniOrange WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn): from n/a through 7.5.14." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/miniorange-login-openid/vulnerability/wordpress-wordpress-social-login-and-register-discord-google-twitter-linkedin-plugin-7-5-14-broken-access-control?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24407.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24407.json new file mode 100644 index 00000000000..078467fd4df --- /dev/null +++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24407.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-24407", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:22.407", + "lastModified": "2024-12-09T13:15:22.407", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in WpDevArt Booking calendar, Appointment Booking System allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Booking calendar, Appointment Booking System: from n/a through 3.2.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.0, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/booking-calendar/vulnerability/wordpress-booking-calendar-appointment-booking-system-plugin-3-2-3-broken-access-control?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25026.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25026.json new file mode 100644 index 00000000000..a2dc35a6637 --- /dev/null +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25026.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-25026", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:22.533", + "lastModified": "2024-12-09T13:15:22.533", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in PayPal PayPal Brasil para WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects PayPal Brasil para WooCommerce: from n/a through 1.4.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/paypal-brasil-para-woocommerce/vulnerability/wordpress-paypal-brasil-para-woocommerce-plugin-1-4-2-broken-access-control?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25035.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25035.json new file mode 100644 index 00000000000..d32285b8ebd --- /dev/null +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25035.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-25035", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:22.670", + "lastModified": "2024-12-09T13:15:22.670", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Fullworks Quick Contact Form allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Quick Contact Form : from n/a through 8.0.3.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/quick-contact-form/vulnerability/wordpress-quick-contact-form-plugin-8-0-3-1-broken-access-control?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25037.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25037.json new file mode 100644 index 00000000000..d17dc4ab13d --- /dev/null +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25037.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-25037", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:22.800", + "lastModified": "2024-12-09T13:15:22.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in CodePeople Booking Calendar Contact Form allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Booking Calendar Contact Form: from n/a through 1.2.34." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/booking-calendar-contact-form/vulnerability/wordpress-booking-calendar-contact-form-plugin-1-2-34-broken-access-control?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25048.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25048.json new file mode 100644 index 00000000000..e13ce89a655 --- /dev/null +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25048.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-25048", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:22.937", + "lastModified": "2024-12-09T13:15:22.937", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Fantastic Plugins Fantastic Content Protector Free allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Fantastic Content Protector Free: from n/a through 2.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/fantastic-content-protector-free/vulnerability/wordpress-fantastic-content-protector-free-plugin-2-6-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25060.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25060.json new file mode 100644 index 00000000000..2e2b0676580 --- /dev/null +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25060.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-25060", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:23.067", + "lastModified": "2024-12-09T13:15:23.067", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in WP OnlineSupport, Essential Plugin Album and Image Gallery plus Lightbox allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Album and Image Gallery plus Lightbox: from n/a through 1.6.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/album-and-image-gallery-plus-lightbox/vulnerability/wordpress-album-and-image-gallery-plus-lightbox-plugin-1-6-2-broken-access-control?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25067.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25067.json new file mode 100644 index 00000000000..8deae53fd6d --- /dev/null +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25067.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-25067", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:23.200", + "lastModified": "2024-12-09T13:15:23.200", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Noah Hearle, Design Extreme We\u2019re Open! allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects We\u2019re Open!: from n/a through 1.45." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/opening-hours/vulnerability/wordpress-we-re-open-plugin-1-45-broken-access-control?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-254xx/CVE-2023-25454.json b/CVE-2023/CVE-2023-254xx/CVE-2023-25454.json new file mode 100644 index 00000000000..a5e8f3a61ee --- /dev/null +++ b/CVE-2023/CVE-2023-254xx/CVE-2023-25454.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-25454", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:23.327", + "lastModified": "2024-12-09T13:15:23.327", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Nate Reist Protected Posts Logout Button allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Protected Posts Logout Button: from n/a through 1.4.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/protected-posts-logout-button/vulnerability/wordpress-protected-posts-logout-button-plugin-1-4-5-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-254xx/CVE-2023-25455.json b/CVE-2023/CVE-2023-254xx/CVE-2023-25455.json new file mode 100644 index 00000000000..7f4403c7857 --- /dev/null +++ b/CVE-2023/CVE-2023-254xx/CVE-2023-25455.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-25455", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:23.460", + "lastModified": "2024-12-09T13:15:23.460", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in miniOrange WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn): from n/a through 7.6.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/miniorange-login-openid/vulnerability/wordpress-wordpress-social-login-and-register-discord-google-twitter-linkedin-plugin-7-6-0-arbitrary-content-deletion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-254xx/CVE-2023-25469.json b/CVE-2023/CVE-2023-254xx/CVE-2023-25469.json new file mode 100644 index 00000000000..68241feb4ff --- /dev/null +++ b/CVE-2023/CVE-2023-254xx/CVE-2023-25469.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-25469", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:23.587", + "lastModified": "2024-12-09T13:15:23.587", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Magazine3 Easy Table of Contents allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Easy Table of Contents: from n/a through 2.0.45.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/easy-table-of-contents/vulnerability/wordpress-easy-table-of-contents-plugin-2-0-45-2-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-254xx/CVE-2023-25486.json b/CVE-2023/CVE-2023-254xx/CVE-2023-25486.json new file mode 100644 index 00000000000..77881dd7016 --- /dev/null +++ b/CVE-2023/CVE-2023-254xx/CVE-2023-25486.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-25486", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:23.717", + "lastModified": "2024-12-09T13:15:23.717", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Migrate Clone allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Clone: from n/a through 2.3.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-clone-by-wp-academy/vulnerability/wordpress-clone-plugin-2-3-7-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25703.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25703.json new file mode 100644 index 00000000000..faf5b96648b --- /dev/null +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25703.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-25703", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:23.847", + "lastModified": "2024-12-09T13:15:23.847", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in WP OnlineSupport, Essential Plugin Meta slider and carousel with lightbox allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Meta slider and carousel with lightbox: from n/a through 1.6.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/meta-slider-and-carousel-with-lightbox/vulnerability/wordpress-meta-slider-and-carousel-with-lightbox-plugin-1-6-2-broken-access-control?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25714.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25714.json new file mode 100644 index 00000000000..55bfe69bd8a --- /dev/null +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25714.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-25714", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:23.967", + "lastModified": "2024-12-09T13:15:23.967", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Fullworks Quick Paypal Payments allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Quick Paypal Payments: from n/a through 5.7.25." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/quick-paypal-payments/vulnerability/wordpress-quick-paypal-payments-plugin-5-7-25-broken-access-control?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25791.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25791.json new file mode 100644 index 00000000000..743d5c3f25e --- /dev/null +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25791.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-25791", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:24.097", + "lastModified": "2024-12-09T13:15:24.097", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Cadus Pro Fontiran allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Fontiran: from n/a through 2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/fontiran/vulnerability/wordpress-fontiran-plugin-2-1-broken-access-control?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25959.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25959.json new file mode 100644 index 00000000000..7aa7a6be73c --- /dev/null +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25959.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-25959", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:24.230", + "lastModified": "2024-12-09T13:15:24.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Apollo13Themes Apollo13 Framework Extensions allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Apollo13 Framework Extensions: from n/a through 1.8.10." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/apollo13-framework-extensions/vulnerability/wordpress-apollo13-framework-extensions-plugin-1-8-10-broken-access-control?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25966.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25966.json new file mode 100644 index 00000000000..cad715e7ba7 --- /dev/null +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25966.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-25966", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:24.370", + "lastModified": "2024-12-09T13:15:24.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Ninja Team Filebird allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Filebird: from n/a through 5.1.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/filebird/vulnerability/wordpress-filebird-plugin-5-1-4-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25993.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25993.json new file mode 100644 index 00000000000..22a25829d79 --- /dev/null +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25993.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-25993", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:24.500", + "lastModified": "2024-12-09T13:15:24.500", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in WebberZone Top 10 allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Top 10: from n/a through 3.2.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/top-10/vulnerability/wordpress-top-10-popular-posts-plugin-for-wordpress-plugin-3-2-3-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26520.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26520.json new file mode 100644 index 00000000000..88d6638480f --- /dev/null +++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26520.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-26520", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:24.623", + "lastModified": "2024-12-09T13:15:24.623", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Max Chirkov Advanced Text Widget allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Advanced Text Widget : from n/a through 2.1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/advanced-text-widget/vulnerability/wordpress-advanced-text-widget-plugin-2-1-2-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26522.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26522.json new file mode 100644 index 00000000000..ce557476cf7 --- /dev/null +++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26522.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-26522", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:24.777", + "lastModified": "2024-12-09T13:15:24.777", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in OneWebsite WP Repost allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Repost: from n/a through 0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-repost/vulnerability/wordpress-wp-repost-plugin-0-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-274xx/CVE-2023-27428.json b/CVE-2023/CVE-2023-274xx/CVE-2023-27428.json new file mode 100644 index 00000000000..45d8ebdcaeb --- /dev/null +++ b/CVE-2023/CVE-2023-274xx/CVE-2023-27428.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-27428", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:24.917", + "lastModified": "2024-12-09T13:15:24.917", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Damir Calusic WP users media allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP users media: from n/a through 4.2.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-users-media/vulnerability/wordpress-wp-users-media-plugin-4-2-3-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-274xx/CVE-2023-27449.json b/CVE-2023/CVE-2023-274xx/CVE-2023-27449.json new file mode 100644 index 00000000000..76997f11dba --- /dev/null +++ b/CVE-2023/CVE-2023-274xx/CVE-2023-27449.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-27449", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:25.050", + "lastModified": "2024-12-09T13:15:25.050", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in TotalSuite Total Poll Lite allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Total Poll Lite: from n/a through 4.8.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/totalpoll-lite/vulnerability/wordpress-total-poll-lite-plugin-4-8-6-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-274xx/CVE-2023-27454.json b/CVE-2023/CVE-2023-274xx/CVE-2023-27454.json new file mode 100644 index 00000000000..67da1a1f295 --- /dev/null +++ b/CVE-2023/CVE-2023-274xx/CVE-2023-27454.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-27454", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:25.177", + "lastModified": "2024-12-09T13:15:25.177", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Apollo13Themes Rife Elementor Extensions & Templates allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Rife Elementor Extensions & Templates: from n/a through 1.1.10." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/rife-elementor-extensions/vulnerability/wordpress-rife-elementor-extensions-templates-plugin-1-1-10-broken-access-control?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-276xx/CVE-2023-27625.json b/CVE-2023/CVE-2023-276xx/CVE-2023-27625.json new file mode 100644 index 00000000000..f49d6abe167 --- /dev/null +++ b/CVE-2023/CVE-2023-276xx/CVE-2023-27625.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-27625", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:25.303", + "lastModified": "2024-12-09T13:15:25.303", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Paul Ryley Site Reviews allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Site Reviews: from n/a through 6.5.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/site-reviews/vulnerability/wordpress-site-reviews-plugin-6-5-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-276xx/CVE-2023-27626.json b/CVE-2023/CVE-2023-276xx/CVE-2023-27626.json new file mode 100644 index 00000000000..5b539666640 --- /dev/null +++ b/CVE-2023/CVE-2023-276xx/CVE-2023-27626.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-27626", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:25.420", + "lastModified": "2024-12-09T13:15:25.420", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Aleksandar Uro\u0161evi\u0107 Stock Ticker allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Stock Ticker: from n/a through 3.23.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/stock-ticker/vulnerability/wordpress-stock-ticker-plugin-3-23-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28165.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28165.json new file mode 100644 index 00000000000..ddaf0f74fa3 --- /dev/null +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28165.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-28165", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:25.550", + "lastModified": "2024-12-09T13:15:25.550", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Tech Banker Backup Bank: WordPress Backup Plugin allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Backup Bank: WordPress Backup Plugin: from n/a through 4.0.28." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-backup-bank/vulnerability/wordpress-backup-bank-wordpress-backup-plugin-plugin-4-0-28-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28168.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28168.json new file mode 100644 index 00000000000..e0b1ab22dbf --- /dev/null +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28168.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-28168", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:25.670", + "lastModified": "2024-12-09T13:15:25.670", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Jerod Santo WordPress Console allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WordPress Console: from n/a through 0.3.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 3.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wordpress-console/vulnerability/wordpress-wordpress-console-plugin-0-3-9-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28416.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28416.json new file mode 100644 index 00000000000..d749880240f --- /dev/null +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28416.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-28416", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:25.837", + "lastModified": "2024-12-09T13:15:25.837", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Sparkle Themes Chankhe allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Chankhe: from n/a through 1.0.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/chankhe/vulnerability/wordpress-chankhe-theme-1-0-5-authenticated-arbitrary-plugin-activation?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28417.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28417.json new file mode 100644 index 00000000000..317323970e4 --- /dev/null +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28417.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-28417", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:25.977", + "lastModified": "2024-12-09T13:15:25.977", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in AlexaCRM Dynamics 365 Integration allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Dynamics 365 Integration: from n/a through 1.3.12." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/integration-dynamics/vulnerability/wordpress-dynamics-365-integration-plugin-1-3-12-broken-access-control?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28532.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28532.json new file mode 100644 index 00000000000..7e6573e4ff4 --- /dev/null +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28532.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-28532", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:26.107", + "lastModified": "2024-12-09T13:15:26.107", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in wpdirectorykit.com Real Estate Directory allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Real Estate Directory: from n/a through 1.0.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/real-estate-directory/vulnerability/wordpress-real-estate-directory-theme-1-0-5-authenticated-arbitrary-plugin-activation?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28536.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28536.json new file mode 100644 index 00000000000..6e715b0e225 --- /dev/null +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28536.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-28536", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:26.240", + "lastModified": "2024-12-09T13:15:26.240", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Acato Branded Social Images allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Branded Social Images: from n/a through 1.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/branded-social-images/vulnerability/wordpress-branded-social-images-plugin-1-1-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-286xx/CVE-2023-28688.json b/CVE-2023/CVE-2023-286xx/CVE-2023-28688.json new file mode 100644 index 00000000000..fd945a4cc84 --- /dev/null +++ b/CVE-2023/CVE-2023-286xx/CVE-2023-28688.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-28688", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:26.370", + "lastModified": "2024-12-09T13:15:26.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in ThemeHunk TH Variation Swatches allows Cross Site Request Forgery.This issue affects TH Variation Swatches: from n/a through 1.2.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/th-variation-swatches/vulnerability/wordpress-th-variation-swatches-plugin-1-2-7-multiple-vulnerabilities?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-286xx/CVE-2023-28689.json b/CVE-2023/CVE-2023-286xx/CVE-2023-28689.json new file mode 100644 index 00000000000..5c98e2f78a9 --- /dev/null +++ b/CVE-2023/CVE-2023-286xx/CVE-2023-28689.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-28689", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:26.500", + "lastModified": "2024-12-09T13:15:26.500", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in JoomSky JS Job Manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects JS Job Manager: from n/a through 2.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/js-jobs/vulnerability/wordpress-js-job-manager-plugin-2-0-0-broken-access-control?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-291xx/CVE-2023-29173.json b/CVE-2023/CVE-2023-291xx/CVE-2023-29173.json new file mode 100644 index 00000000000..8abbb54b22f --- /dev/null +++ b/CVE-2023/CVE-2023-291xx/CVE-2023-29173.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-29173", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:26.630", + "lastModified": "2024-12-09T13:15:26.630", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in AWESOME TOGI Product Category Tree allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Product Category Tree: from n/a through 2.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/product-category-tree/vulnerability/wordpress-product-category-tree-plugin-2-5-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-292xx/CVE-2023-29237.json b/CVE-2023/CVE-2023-292xx/CVE-2023-29237.json new file mode 100644 index 00000000000..8e8696052e5 --- /dev/null +++ b/CVE-2023/CVE-2023-292xx/CVE-2023-29237.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-29237", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:26.760", + "lastModified": "2024-12-09T13:15:26.760", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Muhammad Rehman Remove Duplicate Posts allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Remove Duplicate Posts: from n/a through 1.3.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/remove-duplicate-posts/vulnerability/wordpress-remove-duplicate-posts-plugin-1-3-4-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-292xx/CVE-2023-29239.json b/CVE-2023/CVE-2023-292xx/CVE-2023-29239.json new file mode 100644 index 00000000000..7bc4dff223e --- /dev/null +++ b/CVE-2023/CVE-2023-292xx/CVE-2023-29239.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-29239", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:26.887", + "lastModified": "2024-12-09T13:15:26.887", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in LuckyWP LuckyWP Scripts Control allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects LuckyWP Scripts Control: from n/a through 1.2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/luckywp-scripts-control/vulnerability/wordpress-luckywp-scripts-control-plugin-1-2-1-broken-access-control-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29422.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29422.json new file mode 100644 index 00000000000..e39f345b09a --- /dev/null +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29422.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-29422", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:27.020", + "lastModified": "2024-12-09T13:15:27.020", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in AlexaCRM Dynamics 365 Integration allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Dynamics 365 Integration: from n/a through 1.3.13." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/integration-dynamics/vulnerability/wordpress-dynamics-365-integration-plugin-1-3-13-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29429.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29429.json new file mode 100644 index 00000000000..0aae5189c20 --- /dev/null +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29429.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-29429", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:27.153", + "lastModified": "2024-12-09T13:15:27.153", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in WPEverest User Registration allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects User Registration: from n/a through 2.3.2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/user-registration/vulnerability/wordpress-user-registration-plugin-2-3-2-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29431.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29431.json new file mode 100644 index 00000000000..5c0cb117796 --- /dev/null +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29431.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-29431", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:27.283", + "lastModified": "2024-12-09T13:15:27.283", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in OntheGoSystems qTranslate X Cleanup and WPML Import allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects qTranslate X Cleanup and WPML Import: from n/a through 3.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/qtranslate-to-wpml-export/vulnerability/wordpress-qtranslate-x-cleanup-and-wpml-import-plugin-3-0-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29433.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29433.json new file mode 100644 index 00000000000..26724fa9d63 --- /dev/null +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29433.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-29433", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:27.407", + "lastModified": "2024-12-09T13:15:27.407", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in \u817e\u8baf\u4e91 tencentcloud-cos allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects tencentcloud-cos: from n/a through 1.0.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/tencentcloud-cos/vulnerability/wordpress-tencentcloud-cos-plugin-1-0-7-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-304xx/CVE-2023-30476.json b/CVE-2023/CVE-2023-304xx/CVE-2023-30476.json new file mode 100644 index 00000000000..4e6acc38397 --- /dev/null +++ b/CVE-2023/CVE-2023-304xx/CVE-2023-30476.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-30476", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:27.533", + "lastModified": "2024-12-09T13:15:27.533", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Sparkle Themes Blogger Buzz allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Blogger Buzz: from n/a through 1.2.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/blogger-buzz/vulnerability/wordpress-blogger-buzz-theme-1-2-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-304xx/CVE-2023-30479.json b/CVE-2023/CVE-2023-304xx/CVE-2023-30479.json new file mode 100644 index 00000000000..c135ba89fd8 --- /dev/null +++ b/CVE-2023/CVE-2023-304xx/CVE-2023-30479.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-30479", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:27.660", + "lastModified": "2024-12-09T13:15:27.660", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Stamped.io Stamped.io Product Reviews & UGC for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Stamped.io Product Reviews & UGC for WooCommerce: from n/a through 2.3.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/stampedio-product-reviews/vulnerability/wordpress-stamped-io-product-reviews-ugc-for-woocommerce-plugin-2-3-2-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-304xx/CVE-2023-30486.json b/CVE-2023/CVE-2023-304xx/CVE-2023-30486.json new file mode 100644 index 00000000000..bc5411adab2 --- /dev/null +++ b/CVE-2023/CVE-2023-304xx/CVE-2023-30486.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-30486", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:27.787", + "lastModified": "2024-12-09T13:15:27.787", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in HashThemes Square allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Square: from n/a through 2.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/square/vulnerability/wordpress-square-theme-2-0-0-broken-access-control?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-304xx/CVE-2023-30488.json b/CVE-2023/CVE-2023-304xx/CVE-2023-30488.json new file mode 100644 index 00000000000..4a92657cf31 --- /dev/null +++ b/CVE-2023/CVE-2023-304xx/CVE-2023-30488.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-30488", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:27.907", + "lastModified": "2024-12-09T13:15:27.907", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in WP OnlineSupport, Essential Plugin Featured Post Creative allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Featured Post Creative: from n/a through 1.2.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/featured-post-creative/vulnerability/wordpress-featured-post-creative-plugin-1-2-7-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-307xx/CVE-2023-30748.json b/CVE-2023/CVE-2023-307xx/CVE-2023-30748.json new file mode 100644 index 00000000000..a06070bad9a --- /dev/null +++ b/CVE-2023/CVE-2023-307xx/CVE-2023-30748.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-30748", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:28.030", + "lastModified": "2024-12-09T13:15:28.030", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Nikola Loncar Easy Appointments allows Stored XSS.This issue affects Easy Appointments: from n/a through 3.10.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/easy-appointments/vulnerability/wordpress-easy-appointments-plugin-3-10-7-auth-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-307xx/CVE-2023-30783.json b/CVE-2023/CVE-2023-307xx/CVE-2023-30783.json new file mode 100644 index 00000000000..428476aeadc --- /dev/null +++ b/CVE-2023/CVE-2023-307xx/CVE-2023-30783.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-30783", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:28.160", + "lastModified": "2024-12-09T13:15:28.160", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in YummyWP Smart WooCommerce Search allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Smart WooCommerce Search: from n/a through 2.5.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/smart-woocommerce-search/vulnerability/wordpress-smart-woocommerce-search-plugin-2-5-0-broken-access-control?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-308xx/CVE-2023-30870.json b/CVE-2023/CVE-2023-308xx/CVE-2023-30870.json new file mode 100644 index 00000000000..0605800f4ec --- /dev/null +++ b/CVE-2023/CVE-2023-308xx/CVE-2023-30870.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-30870", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:28.283", + "lastModified": "2024-12-09T13:15:28.283", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in wooproductimporter Sharkdropship for AliExpress Dropship and Affiliate allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Sharkdropship for AliExpress Dropship and Affiliate: from n/a through 2.2.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wooshark-aliexpress-importer/vulnerability/wordpress-sharkdropship-for-aliexpress-dropship-and-affiliate-plugin-2-2-3-multiple-broken-access-control-vulnerabilities?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-308xx/CVE-2023-30873.json b/CVE-2023/CVE-2023-308xx/CVE-2023-30873.json new file mode 100644 index 00000000000..00f05ebebef --- /dev/null +++ b/CVE-2023/CVE-2023-308xx/CVE-2023-30873.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-30873", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:28.413", + "lastModified": "2024-12-09T13:15:28.413", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Fahad Mahmood WP Docs allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Docs: from n/a through 1.9.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-docs/vulnerability/wordpress-wp-docs-plugin-1-9-8-broken-access-control?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-310xx/CVE-2023-31073.json b/CVE-2023/CVE-2023-310xx/CVE-2023-31073.json new file mode 100644 index 00000000000..a927718f13c --- /dev/null +++ b/CVE-2023/CVE-2023-310xx/CVE-2023-31073.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-31073", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:28.540", + "lastModified": "2024-12-09T13:15:28.540", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Jose Vega Display custom fields in the frontend \u2013 Post and User Profile Fields allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Display custom fields in the frontend \u2013 Post and User Profile Fields: from n/a through 1.2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/shortcode-to-display-post-and-user-data/vulnerability/wordpress-shortcode-to-display-post-and-user-data-plugin-1-2-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-312xx/CVE-2023-31214.json b/CVE-2023/CVE-2023-312xx/CVE-2023-31214.json new file mode 100644 index 00000000000..650632ade98 --- /dev/null +++ b/CVE-2023/CVE-2023-312xx/CVE-2023-31214.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-31214", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:28.663", + "lastModified": "2024-12-09T13:15:28.663", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Arul Prasad J WP Quick Post Duplicator allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Quick Post Duplicator: from n/a through 2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-quick-post-duplicator/vulnerability/wordpress-wp-quick-post-duplicator-plugin-1-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32094.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32094.json new file mode 100644 index 00000000000..26fbc927772 --- /dev/null +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32094.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-32094", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:28.790", + "lastModified": "2024-12-09T13:15:28.790", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Felix Welberg Extended Post Status allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Extended Post Status: from n/a through 1.0.19." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/extended-post-status/vulnerability/wordpress-extended-post-status-plugin-1-0-19-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32117.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32117.json new file mode 100644 index 00000000000..19d3e7de204 --- /dev/null +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32117.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-32117", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:28.917", + "lastModified": "2024-12-09T13:15:28.917", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in SoftLab Integrate Google Drive allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Integrate Google Drive: from n/a through 1.1.99." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/integrate-google-drive/vulnerability/wordpress-integrate-google-drive-plugin-1-1-99-unauthenticated-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32126.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32126.json new file mode 100644 index 00000000000..19b8760a5c6 --- /dev/null +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32126.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-32126", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:29.047", + "lastModified": "2024-12-09T13:15:29.047", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in WPoperation SALERT allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SALERT: from n/a through 1.2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/salert/vulnerability/wordpress-salert-plugin-1-2-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32293.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32293.json new file mode 100644 index 00000000000..6182f5cae99 --- /dev/null +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32293.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-32293", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:29.177", + "lastModified": "2024-12-09T13:15:29.177", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Realwebcare WRC Pricing Tables allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WRC Pricing Tables: from n/a through 2.3.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wrc-pricing-tables/vulnerability/wordpress-wrc-pricing-tables-plugin-2-3-7-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32299.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32299.json new file mode 100644 index 00000000000..042e454ff0c --- /dev/null +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32299.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-32299", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:29.300", + "lastModified": "2024-12-09T13:15:29.300", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in anzia Ni WooCommerce Sales Report allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Ni WooCommerce Sales Report: from n/a through 3.7.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ni-woocommerce-sales-report/vulnerability/wordpress-ni-woocommerce-sales-report-plugin-3-7-2-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41953.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41953.json new file mode 100644 index 00000000000..e4e9d144185 --- /dev/null +++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41953.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-41953", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T14:15:08.710", + "lastModified": "2024-12-09T14:15:08.710", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in ProfilePress Membership Team ProfilePress.This issue affects ProfilePress: from n/a through 4.13.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-user-avatar/vulnerability/wordpress-profilepress-plugin-4-13-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42938.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42938.json index 9354c00861a..7835a9f488b 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42938.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42938.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42938", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-14T19:15:49.270", - "lastModified": "2024-11-21T08:23:33.427", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-09T14:48:51.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,22 +59,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "12.13.1", + "matchCriteriaId": "8A30B943-125C-4839-8EF8-282619E375B2" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT214091", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214091", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214091", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214091", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47694.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47694.json new file mode 100644 index 00000000000..33a73e056d5 --- /dev/null +++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47694.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-47694", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:29.440", + "lastModified": "2024-12-09T13:15:29.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in appsbd Mini Cart Drawer For WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Mini Cart Drawer For WooCommerce: from n/a through 4.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/woo-mini-cart-drawer/vulnerability/wordpress-mini-cart-drawer-for-woocommerce-plugin-3-3-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47698.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47698.json new file mode 100644 index 00000000000..4bb25ce1f3a --- /dev/null +++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47698.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-47698", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:29.587", + "lastModified": "2024-12-09T13:15:29.587", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Artisan Workshop Japanized For WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Japanized For WooCommerce: from n/a through 2.6.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/woocommerce-for-japan/vulnerability/wordpress-japanized-for-woocommerce-plugin-2-6-4-multiple-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-477xx/CVE-2023-47756.json b/CVE-2023/CVE-2023-477xx/CVE-2023-47756.json new file mode 100644 index 00000000000..6d58ea9176d --- /dev/null +++ b/CVE-2023/CVE-2023-477xx/CVE-2023-47756.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-47756", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:29.713", + "lastModified": "2024-12-09T13:15:29.713", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in David Vongries Welcome Email Editor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Welcome Email Editor: from n/a through 5.0.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/welcome-email-editor/vulnerability/wordpress-welcome-email-editor-plugin-5-0-5-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-477xx/CVE-2023-47760.json b/CVE-2023/CVE-2023-477xx/CVE-2023-47760.json new file mode 100644 index 00000000000..ee9a885f61f --- /dev/null +++ b/CVE-2023/CVE-2023-477xx/CVE-2023-47760.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-47760", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:29.843", + "lastModified": "2024-12-09T13:15:29.843", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in WPDeveloper Essential Blocks for Gutenberg allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Essential Blocks for Gutenberg: from n/a through 4.2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/essential-blocks/vulnerability/wordpress-essential-blocks-plugin-4-2-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-477xx/CVE-2023-47761.json b/CVE-2023/CVE-2023-477xx/CVE-2023-47761.json new file mode 100644 index 00000000000..007cbad2fda --- /dev/null +++ b/CVE-2023/CVE-2023-477xx/CVE-2023-47761.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-47761", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:29.983", + "lastModified": "2024-12-09T13:15:29.983", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in WPDeveloper Simple 301 Redirects by BetterLinks allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Simple 301 Redirects by BetterLinks: from n/a through 2.0.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/simple-301-redirects/vulnerability/wordpress-simple-301-redirects-by-betterlinks-plugin-2-0-7-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-477xx/CVE-2023-47762.json b/CVE-2023/CVE-2023-477xx/CVE-2023-47762.json new file mode 100644 index 00000000000..f7e65d17940 --- /dev/null +++ b/CVE-2023/CVE-2023-477xx/CVE-2023-47762.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-47762", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:30.113", + "lastModified": "2024-12-09T13:15:30.113", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in WPDeveloper BetterDocs allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects BetterDocs: from n/a through 2.5.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/betterdocs/vulnerability/wordpress-betterdocs-plugin-2-5-2-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-477xx/CVE-2023-47763.json b/CVE-2023/CVE-2023-477xx/CVE-2023-47763.json new file mode 100644 index 00000000000..1022236bb7e --- /dev/null +++ b/CVE-2023/CVE-2023-477xx/CVE-2023-47763.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-47763", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:30.240", + "lastModified": "2024-12-09T13:15:30.240", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Martin Gibson WP Custom Admin Interface allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Custom Admin Interface: from n/a through 7.31." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-custom-admin-interface/vulnerability/wordpress-wp-custom-admin-interface-plugin-7-31-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-477xx/CVE-2023-47764.json b/CVE-2023/CVE-2023-477xx/CVE-2023-47764.json new file mode 100644 index 00000000000..931fada2a92 --- /dev/null +++ b/CVE-2023/CVE-2023-477xx/CVE-2023-47764.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-47764", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:30.377", + "lastModified": "2024-12-09T13:15:30.377", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Metaphor Creations Ditty allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Ditty: from n/a through 3.1.24." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ditty-news-ticker/vulnerability/wordpress-ditty-plugin-3-1-24-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-477xx/CVE-2023-47776.json b/CVE-2023/CVE-2023-477xx/CVE-2023-47776.json new file mode 100644 index 00000000000..6a9ca7e3ff2 --- /dev/null +++ b/CVE-2023/CVE-2023-477xx/CVE-2023-47776.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-47776", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:30.510", + "lastModified": "2024-12-09T13:15:30.510", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in miniOrange miniorange otp verification allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects miniorange otp verification: from n/a through 4.2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/miniorange-otp-verification/vulnerability/wordpress-miniorange-otp-verification-plugin-4-2-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-477xx/CVE-2023-47780.json b/CVE-2023/CVE-2023-477xx/CVE-2023-47780.json new file mode 100644 index 00000000000..423879d98bb --- /dev/null +++ b/CVE-2023/CVE-2023-477xx/CVE-2023-47780.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-47780", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:30.643", + "lastModified": "2024-12-09T13:15:30.643", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in EasyAzon EasyAzon allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects EasyAzon: from n/a through 5.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/easyazon/vulnerability/wordpress-easyazon-amazon-associates-affiliate-plugin-plugin-5-1-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-477xx/CVE-2023-47793.json b/CVE-2023/CVE-2023-477xx/CVE-2023-47793.json new file mode 100644 index 00000000000..d6e7a340da9 --- /dev/null +++ b/CVE-2023/CVE-2023-477xx/CVE-2023-47793.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-47793", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:30.773", + "lastModified": "2024-12-09T13:15:30.773", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in acmethemes Acme Fix Images allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Acme Fix Images: from n/a through 1.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/acme-fix-images/vulnerability/wordpress-acme-fix-images-plugin-1-0-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47805.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47805.json new file mode 100644 index 00000000000..1e317811cae --- /dev/null +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47805.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-47805", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:30.923", + "lastModified": "2024-12-09T13:15:30.923", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Themewinter WPCafe allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WPCafe: from n/a through 2.2.22." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-cafe/vulnerability/wordpress-wpcafe-plugin-2-2-19-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47820.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47820.json new file mode 100644 index 00000000000..b3e3ac6e2d3 --- /dev/null +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47820.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-47820", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:31.100", + "lastModified": "2024-12-09T13:15:31.100", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in CRUDLab WP Like Button allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Like Button: from n/a through 1.7.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-like-button/vulnerability/wordpress-wp-like-button-plugin-1-7-0-broken-access-control-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47822.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47822.json new file mode 100644 index 00000000000..7f98b9ddc9b --- /dev/null +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47822.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-47822", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:31.253", + "lastModified": "2024-12-09T13:15:31.253", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Sonaar Music MP3 Audio Player for Music, Radio & Podcast by Sonaar allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects MP3 Audio Player for Music, Radio & Podcast by Sonaar: from n/a through 4.10." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/mp3-music-player-by-sonaar/vulnerability/wordpress-mp3-audio-player-for-music-radio-podcast-by-sonaar-plugin-4-10-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47823.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47823.json new file mode 100644 index 00000000000..0df2ee9f439 --- /dev/null +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47823.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-47823", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:31.390", + "lastModified": "2024-12-09T13:15:31.390", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in nCrafts FormCraft allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects FormCraft: from n/a through 1.2.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/formcraft-form-builder/vulnerability/wordpress-formcraft-contact-form-builder-for-wordpress-plugin-1-2-7-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47826.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47826.json new file mode 100644 index 00000000000..689eb45120f --- /dev/null +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47826.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-47826", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:31.537", + "lastModified": "2024-12-09T13:15:31.537", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in NicheAddons Restaurant & Cafe Addon for Elementor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Restaurant & Cafe Addon for Elementor: from n/a through 1.5.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/restaurant-cafe-addon-for-elementor/vulnerability/wordpress-restaurant-cafe-addon-for-elementor-plugin-1-5-3-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47830.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47830.json new file mode 100644 index 00000000000..a200a7bf92a --- /dev/null +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47830.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-47830", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:31.680", + "lastModified": "2024-12-09T13:15:31.680", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Addons for Contact Form 7 Live Preview for Contact Form 7 allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Live Preview for Contact Form 7: from n/a through 1.2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/cf7-live-preview/vulnerability/wordpress-live-preview-for-contact-form-7-plugin-1-2-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47832.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47832.json new file mode 100644 index 00000000000..39a91d1555c --- /dev/null +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47832.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-47832", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:31.827", + "lastModified": "2024-12-09T13:15:31.827", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in searchiq SearchIQ allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SearchIQ: from n/a through 4.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/searchiq/vulnerability/wordpress-searchiq-plugin-4-4-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47836.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47836.json new file mode 100644 index 00000000000..a59983739a7 --- /dev/null +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47836.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-47836", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:31.970", + "lastModified": "2024-12-09T13:15:31.970", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Prasad Kirpekar WP Meta and Date Remover allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Meta and Date Remover: from n/a through 2.3.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-meta-and-date-remover/vulnerability/wordpress-wp-meta-and-date-remover-plugin-2-2-1-broken-access-control-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47838.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47838.json new file mode 100644 index 00000000000..1e2703f4095 --- /dev/null +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47838.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-47838", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:32.107", + "lastModified": "2024-12-09T13:15:32.107", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Jules Colle Conditional Fields for Contact Form 7 allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Conditional Fields for Contact Form 7: from n/a through 2.4.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/cf7-conditional-fields/vulnerability/wordpress-conditional-fields-for-contact-form-7-plugin-2-4-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47841.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47841.json new file mode 100644 index 00000000000..b2775cdf655 --- /dev/null +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47841.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-47841", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:32.240", + "lastModified": "2024-12-09T13:15:32.240", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Analytify Analytify allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Analytify: from n/a through 5.1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-analytify/vulnerability/wordpress-analytify-plugin-5-1-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47847.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47847.json new file mode 100644 index 00000000000..bd9b8773c27 --- /dev/null +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47847.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-47847", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:32.370", + "lastModified": "2024-12-09T13:15:32.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in PayTR \u00d6deme ve Elektronik Para Kurulu\u015fu A.\u015e. PayTR Taksit Tablosu allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects PayTR Taksit Tablosu: from n/a through 1.3.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/paytr-taksit-tablosu-woocommerce/vulnerability/wordpress-paytr-taksit-tablosu-plugin-1-3-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47849.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47849.json new file mode 100644 index 00000000000..d388bf5fdf1 --- /dev/null +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47849.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-47849", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:32.500", + "lastModified": "2024-12-09T13:15:32.500", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in blossomthemes BlossomThemes Email Newsletter allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects BlossomThemes Email Newsletter: from n/a through 2.2.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/blossomthemes-email-newsletter/vulnerability/wordpress-blossomthemes-email-newsletter-plugin-2-2-4-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47869.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47869.json new file mode 100644 index 00000000000..5e798fde3d2 --- /dev/null +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47869.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-47869", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:32.633", + "lastModified": "2024-12-09T13:15:32.633", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in gVectors Team wpForo Forum allows Code Injection.This issue affects wpForo Forum: from n/a through 2.2.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wpforo/vulnerability/wordpress-wpforo-plugin-2-2-3-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47871.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47871.json new file mode 100644 index 00000000000..0a1f4b8c8b8 --- /dev/null +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47871.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-47871", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:32.767", + "lastModified": "2024-12-09T13:15:32.767", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in IT Path Solutions Contact Form to Any API allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Contact Form to Any API: from n/a through 1.1.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/contact-form-to-any-api/vulnerability/wordpress-contact-form-to-any-api-plugin-1-1-6-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-482xx/CVE-2023-48274.json b/CVE-2023/CVE-2023-482xx/CVE-2023-48274.json new file mode 100644 index 00000000000..a8f41c89e1e --- /dev/null +++ b/CVE-2023/CVE-2023-482xx/CVE-2023-48274.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-48274", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:32.897", + "lastModified": "2024-12-09T13:15:32.897", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Mondial Relay WooCommerce - WCMultiShipping WCMultiShipping allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WCMultiShipping: from n/a through 2.3.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wc-multishipping/vulnerability/wordpress-wcmultishipping-plugin-2-3-5-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-482xx/CVE-2023-48277.json b/CVE-2023/CVE-2023-482xx/CVE-2023-48277.json new file mode 100644 index 00000000000..404063ed4ce --- /dev/null +++ b/CVE-2023/CVE-2023-482xx/CVE-2023-48277.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-48277", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:33.030", + "lastModified": "2024-12-09T13:15:33.030", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in SuperPWA Super Progressive Web Apps allows Exploiting Incorrectly Configured Access Control Security Levels.\n\nThis issue affects Super Progressive Web Apps: from n/a through 2.2.21." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/super-progressive-web-apps/vulnerability/wordpress-super-progressive-web-apps-plugin-2-2-21-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-482xx/CVE-2023-48286.json b/CVE-2023/CVE-2023-482xx/CVE-2023-48286.json new file mode 100644 index 00000000000..a6210dc08e2 --- /dev/null +++ b/CVE-2023/CVE-2023-482xx/CVE-2023-48286.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-48286", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:33.160", + "lastModified": "2024-12-09T13:15:33.160", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Tips and Tricks HQ, wptipsntricks Stripe Payments allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Stripe Payments: from n/a through 2.0.79." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/stripe-payments/vulnerability/wordpress-accept-stripe-payments-plugin-2-0-79-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-482xx/CVE-2023-48287.json b/CVE-2023/CVE-2023-482xx/CVE-2023-48287.json new file mode 100644 index 00000000000..d5c04bb60bb --- /dev/null +++ b/CVE-2023/CVE-2023-482xx/CVE-2023-48287.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-48287", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:33.283", + "lastModified": "2024-12-09T13:15:33.283", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Matat Technologies TextMe SMS allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects TextMe SMS: from n/a through 1.9.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/textme-sms-integration/vulnerability/wordpress-textme-sms-plugin-1-9-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-483xx/CVE-2023-48324.json b/CVE-2023/CVE-2023-483xx/CVE-2023-48324.json new file mode 100644 index 00000000000..6e9cd434429 --- /dev/null +++ b/CVE-2023/CVE-2023-483xx/CVE-2023-48324.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-48324", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:33.407", + "lastModified": "2024-12-09T13:15:33.407", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Awesome Support Team Awesome Support allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Awesome Support: from n/a through 6.1.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/awesome-support/vulnerability/wordpress-awesome-support-helpdesk-plugin-6-1-4-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-483xx/CVE-2023-48332.json b/CVE-2023/CVE-2023-483xx/CVE-2023-48332.json new file mode 100644 index 00000000000..f5ed44185dd --- /dev/null +++ b/CVE-2023/CVE-2023-483xx/CVE-2023-48332.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-48332", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:33.530", + "lastModified": "2024-12-09T13:15:33.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Tech Banker Mail Bank - #1 Mail SMTP Plugin for WordPress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Mail Bank - #1 Mail SMTP Plugin for WordPress: from n/a through 4.0.14." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-mail-bank/vulnerability/wordpress-mail-bank-1-mail-smtp-plugin-for-wordpress-plugin-4-0-14-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48740.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48740.json new file mode 100644 index 00000000000..d027b6245f8 --- /dev/null +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48740.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-48740", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:33.670", + "lastModified": "2024-12-09T13:15:33.670", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Easy Social Feed Easy Social Feed allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Easy Social Feed: from n/a through 6.5.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/easy-facebook-likebox/vulnerability/wordpress-easy-social-feed-plugin-6-5-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48750.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48750.json new file mode 100644 index 00000000000..ac640169fbc --- /dev/null +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48750.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-48750", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:33.803", + "lastModified": "2024-12-09T13:15:33.803", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in VOID CODERS Void Elementor Post Grid Addon for Elementor Page builder allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Void Elementor Post Grid Addon for Elementor Page builder: from n/a through 2.1.10." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/void-elementor-post-grid-addon-for-elementor-page-builder/vulnerability/wordpress-void-elementor-post-grid-addon-for-elementor-page-builder-plugin-2-1-10-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48774.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48774.json new file mode 100644 index 00000000000..7026fcd53d5 --- /dev/null +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48774.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-48774", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:33.937", + "lastModified": "2024-12-09T13:15:33.937", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Martin Gibson IdeaPush allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects IdeaPush: from n/a through n/a." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ideapush/vulnerability/wordpress-ideapush-plugin-8-53-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48776.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48776.json new file mode 100644 index 00000000000..f9f9fa78833 --- /dev/null +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48776.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-48776", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:34.077", + "lastModified": "2024-12-09T13:15:34.077", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Thomas Scholl canvasio3D Light allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects canvasio3D Light: from n/a through 2.5.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/canvasio3d-light/vulnerability/wordpress-canvasio3d-light-plugin-2-4-6-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48779.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48779.json new file mode 100644 index 00000000000..ef0b40b4d9d --- /dev/null +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48779.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-48779", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:34.210", + "lastModified": "2024-12-09T13:15:34.210", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in 360 Javascript Viewer 360 Javascript Viewer allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects 360 Javascript Viewer: from n/a through 1.7.11." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/360deg-javascript-viewer/vulnerability/wordpress-360-javascript-viewer-plugin-1-7-11-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49154.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49154.json new file mode 100644 index 00000000000..528206d07d7 --- /dev/null +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49154.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-49154", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:34.337", + "lastModified": "2024-12-09T13:15:34.337", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Wow-Company Button Generator \u2013 easily Button Builder allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Button Generator \u2013 easily Button Builder: from n/a through 2.3.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/button-generation/vulnerability/wordpress-button-generator-easily-button-builder-plugin-2-3-8-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49156.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49156.json new file mode 100644 index 00000000000..6102514e34d --- /dev/null +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49156.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-49156", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:34.470", + "lastModified": "2024-12-09T13:15:34.470", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in GoDaddy GoDaddy Email Marketing allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects GoDaddy Email Marketing: from n/a through 1.4.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/godaddy-email-marketing-sign-up-forms/vulnerability/wordpress-godaddy-email-marketing-plugin-1-4-3-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49158.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49158.json new file mode 100644 index 00000000000..cf3a6ab9ac1 --- /dev/null +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49158.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-49158", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:34.603", + "lastModified": "2024-12-09T13:15:34.603", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LadiPage LadiApp allows Stored XSS.This issue affects LadiApp: from n/a through 4.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ladipage/vulnerability/wordpress-ladiapp-plugin-4-3-broken-access-control-lead-to-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49167.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49167.json new file mode 100644 index 00000000000..19280fa1882 --- /dev/null +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49167.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-49167", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:34.740", + "lastModified": "2024-12-09T13:15:34.740", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Code4Life Database for CF7 allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Database for CF7: from n/a through 1.2.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/database-for-cf7/vulnerability/wordpress-database-for-cf7-plugin-1-2-4-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49192.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49192.json new file mode 100644 index 00000000000..99e9abcc5e4 --- /dev/null +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49192.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-49192", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:34.883", + "lastModified": "2024-12-09T13:15:34.883", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Clever Widgets Enhanced Text Widget allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Enhanced Text Widget: from n/a through 1.6.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/enhanced-text-widget/vulnerability/wordpress-enhanced-text-widget-plugin-1-6-2-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49193.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49193.json new file mode 100644 index 00000000000..32cc15f2899 --- /dev/null +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49193.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-49193", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:35.043", + "lastModified": "2024-12-09T13:15:35.043", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in NerdPress Social Pug allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Social Pug: from n/a through 1.30.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/social-pug/vulnerability/wordpress-grow-social-plugin-1-20-3-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49194.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49194.json new file mode 100644 index 00000000000..67071d9eed7 --- /dev/null +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49194.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-49194", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:35.173", + "lastModified": "2024-12-09T13:15:35.173", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insertion of Sensitive Information Into Debugging Code vulnerability in Importify Importify (Dropshipping WooCommerce) allows Retrieve Embedded Sensitive Data.This issue affects Importify (Dropshipping WooCommerce): from n/a through 1.0.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-215" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/importify/vulnerability/wordpress-importify-dropshipping-woocommerce-plugin-1-0-4-sensitive-data-exposure-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49196.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49196.json new file mode 100644 index 00000000000..d5c1d743ff2 --- /dev/null +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49196.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-49196", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:35.310", + "lastModified": "2024-12-09T13:15:35.310", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Pagelayer Team PageLayer allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects PageLayer: from n/a through 1.7.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/pagelayer/vulnerability/wordpress-pagelayer-plugin-1-7-7-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-497xx/CVE-2023-49754.json b/CVE-2023/CVE-2023-497xx/CVE-2023-49754.json new file mode 100644 index 00000000000..340b4174dbf --- /dev/null +++ b/CVE-2023/CVE-2023-497xx/CVE-2023-49754.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-49754", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:35.440", + "lastModified": "2024-12-09T13:15:35.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Yogesh Pawar, Clarion Technologies Bulk Edit Post Titles allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Bulk Edit Post Titles: from n/a through 5.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/bulk-edit-post-titles/vulnerability/wordpress-bulk-edit-post-titles-plugin-5-0-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-497xx/CVE-2023-49755.json b/CVE-2023/CVE-2023-497xx/CVE-2023-49755.json new file mode 100644 index 00000000000..ba9efc15dcf --- /dev/null +++ b/CVE-2023/CVE-2023-497xx/CVE-2023-49755.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-49755", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:35.567", + "lastModified": "2024-12-09T13:15:35.567", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in B.M. Rafiul Alam Elementor Timeline Widget allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Elementor Timeline Widget: from n/a through 2.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/3r-elementor-timeline-widget/vulnerability/wordpress-elementor-timeline-widget-plugin-2-0-notice-dismissal-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-497xx/CVE-2023-49756.json b/CVE-2023/CVE-2023-497xx/CVE-2023-49756.json new file mode 100644 index 00000000000..0e5ba7fbf1a --- /dev/null +++ b/CVE-2023/CVE-2023-497xx/CVE-2023-49756.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-49756", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:35.697", + "lastModified": "2024-12-09T13:15:35.697", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Themewinter Eventin allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Eventin: from n/a through 3.3.52." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-event-solution/vulnerability/wordpress-eventin-plugin-3-3-44-authenticated-notice-dismissal-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-497xx/CVE-2023-49757.json b/CVE-2023/CVE-2023-497xx/CVE-2023-49757.json new file mode 100644 index 00000000000..c5314a1522c --- /dev/null +++ b/CVE-2023/CVE-2023-497xx/CVE-2023-49757.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-49757", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:35.830", + "lastModified": "2024-12-09T13:15:35.830", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Awesome Support Team Awesome Support allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Awesome Support: from n/a through 6.1.10." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/awesome-support/vulnerability/wordpress-awesome-support-plugin-6-1-6-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-497xx/CVE-2023-49758.json b/CVE-2023/CVE-2023-497xx/CVE-2023-49758.json new file mode 100644 index 00000000000..3c268532b91 --- /dev/null +++ b/CVE-2023/CVE-2023-497xx/CVE-2023-49758.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-49758", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:35.990", + "lastModified": "2024-12-09T13:15:35.990", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Veribo, Roland Murg WP Booking System allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Booking System: from n/a through 2.0.19.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-booking-system/vulnerability/wordpress-wp-booking-system-plugin-2-0-19-2-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49817.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49817.json new file mode 100644 index 00000000000..604e6d5439d --- /dev/null +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49817.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-49817", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:36.157", + "lastModified": "2024-12-09T13:15:36.157", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in heoLixfy Flexible Woocommerce Checkout Field Editor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Flexible Woocommerce Checkout Field Editor: from n/a through 2.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/flexible-woocommerce-checkout-field-editor/vulnerability/wordpress-flexible-woocommerce-checkout-field-editor-plugin-2-0-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49818.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49818.json new file mode 100644 index 00000000000..94a2a0ae53f --- /dev/null +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49818.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-49818", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:36.327", + "lastModified": "2024-12-09T13:15:36.327", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Webflow Webflow Pages allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Webflow Pages: from n/a through 1.0.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/webflow-pages/vulnerability/wordpress-webflow-pages-plugin-1-0-8-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49831.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49831.json new file mode 100644 index 00000000000..62c7bc0f60d --- /dev/null +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49831.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-49831", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:36.463", + "lastModified": "2024-12-09T13:15:36.463", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Metagauss User Registration Forms RegistrationMagic allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects RegistrationMagic: from n/a through 5.2.3.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/custom-registration-form-builder-with-submission-manager/vulnerability/wordpress-registrationmagic-plugin-5-2-3-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49832.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49832.json new file mode 100644 index 00000000000..cc3f6b85d73 --- /dev/null +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49832.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-49832", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:36.597", + "lastModified": "2024-12-09T13:15:36.597", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Paul Ryley Site Reviews allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Site Reviews: from n/a through 6.10.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/site-reviews/vulnerability/wordpress-site-reviews-plugin-6-10-2-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49835.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49835.json new file mode 100644 index 00000000000..425c33803a9 --- /dev/null +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49835.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-49835", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:36.733", + "lastModified": "2024-12-09T13:15:36.733", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Metaphor Creations Post Duplicator allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Post Duplicator: from n/a through 2.31." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/post-duplicator/vulnerability/wordpress-post-duplicator-plugin-2-31-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49845.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49845.json new file mode 100644 index 00000000000..fc9c186770e --- /dev/null +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49845.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-49845", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:36.877", + "lastModified": "2024-12-09T13:15:36.877", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Loud Dog Redirects allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Redirects: from n/a through 1.2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/redirects/vulnerability/wordpress-redirects-plugin-1-2-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49848.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49848.json new file mode 100644 index 00000000000..4898ce0f7dd --- /dev/null +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49848.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-49848", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:37.050", + "lastModified": "2024-12-09T13:15:37.050", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in wooproductimporter Sharkdropship dropshipping for Aliexpress, eBay, Amazon, etsy allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Sharkdropship dropshipping for Aliexpress, eBay, Amazon, etsy: from n/a through 2.1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/woo-aliexpress-dropshipping/vulnerability/wordpress-sharkdropship-dropshipping-for-aliexpress-ebay-amazon-etsy-plugin-2-1-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49849.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49849.json new file mode 100644 index 00000000000..44b0334deab --- /dev/null +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49849.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-49849", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:37.177", + "lastModified": "2024-12-09T13:15:37.177", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Aakash Chakravarthy Shortcoder allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Shortcoder: from n/a through 6.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/shortcoder/vulnerability/wordpress-shortcoder-plugin-6-3-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49850.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49850.json new file mode 100644 index 00000000000..54f477c34ba --- /dev/null +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49850.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-49850", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:37.300", + "lastModified": "2024-12-09T13:15:37.300", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Ashish Ajani WP Simple HTML Sitemap allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Simple HTML Sitemap: from n/a through 2.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-simple-html-sitemap/vulnerability/wordpress-wp-simple-html-sitemap-plugin-2-4-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49851.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49851.json new file mode 100644 index 00000000000..dc148a6d3bb --- /dev/null +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49851.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-49851", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:37.427", + "lastModified": "2024-12-09T13:15:37.427", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in ILMDESIGNS Square Thumbnails allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Square Thumbnails: from n/a through 1.1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/square-thumbnails/vulnerability/wordpress-square-thumbnails-plugin-1-1-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49856.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49856.json new file mode 100644 index 00000000000..6c5339adcf6 --- /dev/null +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49856.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-49856", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:37.557", + "lastModified": "2024-12-09T13:15:37.557", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in RedNao Smart Forms allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Smart Forms: from n/a through 2.6.84." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/smart-forms/vulnerability/wordpress-smart-forms-plugin-2-6-84-authenticated-arbitrary-options-change-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49857.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49857.json new file mode 100644 index 00000000000..918f7d56a22 --- /dev/null +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49857.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-49857", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:37.683", + "lastModified": "2024-12-09T13:15:37.683", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Awesome Support Team Awesome Support allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Awesome Support: from n/a through 6.1.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/awesome-support/vulnerability/wordpress-awesome-support-plugin-6-1-6-broken-access-control-vulnerability-2?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49858.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49858.json new file mode 100644 index 00000000000..ef8db4afa70 --- /dev/null +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49858.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-49858", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:37.810", + "lastModified": "2024-12-09T13:15:37.810", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Austin Passy Custom Login allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Custom Login: from n/a through 4.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/custom-login/vulnerability/wordpress-custom-login-plugin-4-1-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49859.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49859.json new file mode 100644 index 00000000000..91f459acd97 --- /dev/null +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49859.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-49859", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:37.933", + "lastModified": "2024-12-09T13:15:37.933", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Pixelite Login With Ajax allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Login With Ajax: from n/a through 4.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/login-with-ajax/vulnerability/wordpress-login-with-ajax-plugin-4-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49861.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49861.json new file mode 100644 index 00000000000..d840809ada4 --- /dev/null +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49861.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-49861", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:38.060", + "lastModified": "2024-12-09T13:15:38.060", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in socialmediafeather Social Media Feather allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Social Media Feather: from n/a through 2.1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/social-media-feather/vulnerability/wordpress-social-media-feather-plugin-2-1-3-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50373.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50373.json new file mode 100644 index 00000000000..dcef3a4dddd --- /dev/null +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50373.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-50373", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:38.190", + "lastModified": "2024-12-09T13:15:38.190", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in WPSAAD Alt Manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Alt Manager: from n/a through 1.6.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/alt-manager/vulnerability/wordpress-alt-manager-plugin-1-5-9-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50375.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50375.json new file mode 100644 index 00000000000..bc7c5eaa289 --- /dev/null +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50375.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-50375", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:38.330", + "lastModified": "2024-12-09T13:15:38.330", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Translate AI Multilingual Solutions Google Language Translator allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Google Language Translator: from n/a through 6.0.19." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/google-language-translator/vulnerability/wordpress-translate-wordpress-google-language-translator-plugin-6-0-19-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50876.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50876.json new file mode 100644 index 00000000000..60440c5ff02 --- /dev/null +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50876.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-50876", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:38.460", + "lastModified": "2024-12-09T13:15:38.460", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Molongui Molongui allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Molongui: from n/a through 4.7.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/molongui-authorship/vulnerability/wordpress-molongui-plugin-4-7-3-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50877.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50877.json new file mode 100644 index 00000000000..687a1d14f17 --- /dev/null +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50877.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-50877", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:38.590", + "lastModified": "2024-12-09T13:15:38.590", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in woobewoo Product Filter by WBW allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Product Filter by WBW: from n/a through 2.5.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/woo-product-filter/vulnerability/wordpress-product-filter-by-wbw-plugin-2-5-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50882.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50882.json new file mode 100644 index 00000000000..c3c9c3d408d --- /dev/null +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50882.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-50882", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:38.720", + "lastModified": "2024-12-09T13:15:38.720", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in ProfilePress Membership Team ProfilePress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects ProfilePress: from n/a through 4.13.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-user-avatar/vulnerability/wordpress-profilepress-plugin-4-13-2-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50884.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50884.json new file mode 100644 index 00000000000..106e21479c7 --- /dev/null +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50884.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-50884", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:38.850", + "lastModified": "2024-12-09T13:15:38.850", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in LA-Studio LA-Studio Element Kit for Elementor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects LA-Studio Element Kit for Elementor: from n/a through 1.1.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/lastudio-element-kit/vulnerability/wordpress-la-studio-element-kit-for-elementor-plugin-1-1-5-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50887.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50887.json new file mode 100644 index 00000000000..2d519887375 --- /dev/null +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50887.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-50887", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:38.970", + "lastModified": "2024-12-09T13:15:38.970", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in UserFeedback Team User Feedback allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects User Feedback: from n/a through 1.0.10." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/userfeedback-lite/vulnerability/wordpress-user-feedback-plugin-1-0-10-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50899.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50899.json new file mode 100644 index 00000000000..fe48ba92fd6 --- /dev/null +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50899.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-50899", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:39.097", + "lastModified": "2024-12-09T13:15:39.097", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in MultiVendorX Product Catalog Enquiry for WooCommerce by MultiVendorX allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Product Catalog Enquiry for WooCommerce by MultiVendorX: from n/a through 5.0.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/woocommerce-catalog-enquiry/vulnerability/wordpress-product-catalog-enquiry-for-woocommerce-by-multivendorx-plugin-5-0-2-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50903.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50903.json new file mode 100644 index 00000000000..0a1d631fb31 --- /dev/null +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50903.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-50903", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:39.233", + "lastModified": "2024-12-09T13:15:39.233", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Wpmet Metform Elementor Contact Form Builder allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Metform Elementor Contact Form Builder: from n/a through 3.4.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/metform/vulnerability/wordpress-metform-elementor-contact-form-builder-plugin-3-4-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50904.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50904.json new file mode 100644 index 00000000000..b212a5b274f --- /dev/null +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50904.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-50904", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:39.360", + "lastModified": "2024-12-09T13:15:39.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Poll Maker Team Poll Maker allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Poll Maker: from n/a through 4.8.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/poll-maker/vulnerability/wordpress-poll-maker-plugin-4-8-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51353.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51353.json new file mode 100644 index 00000000000..1c0529290af --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51353.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-51353", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:39.513", + "lastModified": "2024-12-09T13:15:39.513", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in supsystic.com Popup by Supsystic allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Popup by Supsystic: from n/a through 1.10.19." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/popup-by-supsystic/vulnerability/wordpress-popup-by-supsystic-plugin-1-10-19-broken-access-control-vulnerability-2?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51355.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51355.json new file mode 100644 index 00000000000..039f46e6c53 --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51355.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-51355", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:39.650", + "lastModified": "2024-12-09T13:15:39.650", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in MultiVendorX WC Marketplace allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WC Marketplace: from n/a through 4.0.23." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/dc-woocommerce-multi-vendor/vulnerability/wordpress-multivendorx-plugin-4-0-23-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51357.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51357.json new file mode 100644 index 00000000000..26e8277250d --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51357.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-51357", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:39.773", + "lastModified": "2024-12-09T13:15:39.773", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Conversios Conversios.io allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Conversios.io: from n/a through 6.5.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/enhanced-e-commerce-for-woocommerce-store/vulnerability/wordpress-track-google-analytics-4-facebook-pixel-conversions-api-via-google-tag-manager-for-woocommerce-plugin-6-5-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51359.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51359.json new file mode 100644 index 00000000000..9774ffab984 --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51359.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-51359", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:39.920", + "lastModified": "2024-12-09T13:15:39.920", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in WPDeveloper Essential Blocks for Gutenberg allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Essential Blocks for Gutenberg: from n/a through 4.2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/essential-blocks/vulnerability/wordpress-essential-blocks-plugin-4-2-0-multiple-contributor-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51360.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51360.json new file mode 100644 index 00000000000..b098a60dc0c --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51360.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-51360", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:40.047", + "lastModified": "2024-12-09T13:15:40.047", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in WPDeveloper Essential Blocks for Gutenberg allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Essential Blocks for Gutenberg: from n/a through 4.2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/essential-blocks/vulnerability/wordpress-essential-blocks-plugin-4-2-0-multiple-subscriber-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51362.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51362.json new file mode 100644 index 00000000000..16c4b45da09 --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51362.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-51362", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:40.170", + "lastModified": "2024-12-09T13:15:40.170", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Premio All-in-one Floating Contact Form \u2013 My Sticky Elements allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects All-in-one Floating Contact Form \u2013 My Sticky Elements: from n/a through 2.1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/mystickyelements/vulnerability/wordpress-mystickyelements-plugin-2-1-3-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52540.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52540.json index 10637fb8a9e..d0c10891d65 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52540.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52540.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52540", "sourceIdentifier": "psirt@huawei.com", "published": "2024-04-08T09:15:08.550", - "lastModified": "2024-11-21T08:40:00.210", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-09T14:12:49.007", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,117 @@ "value": "Vulnerabilidad de autenticaci\u00f3n inadecuada en el m\u00f3dulo Iaware. Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad afectar\u00e1 la disponibilidad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545" + } + ] + } + ] + } + ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52546.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52546.json index e8ae5a8b825..7173a907988 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52546.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52546.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52546", "sourceIdentifier": "psirt@huawei.com", "published": "2024-04-08T09:15:08.920", - "lastModified": "2024-11-21T08:40:01.263", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-09T13:54:48.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,97 @@ "value": "Vulnerabilidad de omitir la verificaci\u00f3n del nombre del paquete en la aplicaci\u00f3n Calendario. Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545" + } + ] + } + ] + } + ], "references": [ { "url": "https://https://consumer.huawei.com/en/support/bulletin/2024/3/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://https://consumer.huawei.com/en/support/bulletin/2024/3/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52920.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52920.json index 3ef81b187de..230fa90ebd2 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52920.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52920.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52920", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-05T10:15:24.580", - "lastModified": "2024-11-07T19:31:31.217", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-09T11:15:05.403", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -77,6 +77,10 @@ "Mailing List", "Patch" ] + }, + { + "url": "https://git.kernel.org/stable/c/ecc2aeeaa08a355d84d3ca9c3d2512399a194f29", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23262.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23262.json index 48b8a45565c..dedf565d6d7 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23262.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23262.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23262", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:48.937", - "lastModified": "2024-11-21T15:15:27.280", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-09T14:38:23.027", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,38 +81,106 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.6", + "matchCriteriaId": "9277B3E8-4519-4E07-A89A-A08C604AB78C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.4", + "matchCriteriaId": "7CB78D53-5EC0-45E5-871B-0C18F1E6D438" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.6", + "matchCriteriaId": "2AF8B925-3DE5-4CC8-A4C3-95D8F107D607" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.4", + "matchCriteriaId": "C2FE8515-300C-4B6F-92A0-7D1E6D93F907" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.1", + "matchCriteriaId": "EB7F6CDA-FEC0-45D7-ACBE-8B5AD35F1AB5" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/26", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://support.apple.com/en-us/HT214081", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214082", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214087", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/26", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://support.apple.com/en-us/HT214081", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214082", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214087", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23263.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23263.json index 55cf3bda6e6..6b7f38b006a 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23263.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23263.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23263", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:48.980", - "lastModified": "2024-11-21T08:57:20.367", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-09T14:55:47.257", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,142 +81,360 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.4", + "matchCriteriaId": "DC7753BA-5DF8-4F98-8DA8-69DA473F8307" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.6", + "matchCriteriaId": "9277B3E8-4519-4E07-A89A-A08C604AB78C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.4", + "matchCriteriaId": "7CB78D53-5EC0-45E5-871B-0C18F1E6D438" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.6", + "matchCriteriaId": "2AF8B925-3DE5-4CC8-A4C3-95D8F107D607" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.4", + "matchCriteriaId": "C2FE8515-300C-4B6F-92A0-7D1E6D93F907" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.4", + "matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.4", + "matchCriteriaId": "BB6BA6CB-001B-4440-A9AE-473F5722F8E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.1", + "matchCriteriaId": "EB7F6CDA-FEC0-45D7-ACBE-8B5AD35F1AB5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.4", + "matchCriteriaId": "5547F484-4E4B-4961-BAF8-F891D50BB4B6" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.44.0", + "matchCriteriaId": "EF5BDB2C-7F5F-41B4-87C4-C4B938C7D317" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.44.0", + "matchCriteriaId": "336F9990-F267-4013-8353-5AA10039C515" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/20", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/24", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/25", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/26", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/03/26/1", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://support.apple.com/en-us/HT214081", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214082", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214084", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214086", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214087", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214088", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214089", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/20", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/24", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/25", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/26", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/03/26/1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://support.apple.com/en-us/HT214081", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214082", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214084", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214086", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214087", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214088", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214089", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23264.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23264.json index 5ba047ff321..2d1a7c52e47 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23264.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23264.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23264", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:49.030", - "lastModified": "2024-11-21T20:15:39.470", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-09T14:54:57.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,102 +81,245 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.6", + "matchCriteriaId": "9277B3E8-4519-4E07-A89A-A08C604AB78C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.4", + "matchCriteriaId": "7CB78D53-5EC0-45E5-871B-0C18F1E6D438" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.6", + "matchCriteriaId": "2AF8B925-3DE5-4CC8-A4C3-95D8F107D607" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.4", + "matchCriteriaId": "C2FE8515-300C-4B6F-92A0-7D1E6D93F907" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0", + "versionEndExcluding": "12.7.4", + "matchCriteriaId": "A61173BD-535F-46FC-B40F-DA78B168E420" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.6.5", + "matchCriteriaId": "69C4F06A-061F-46B3-8BB7-5C9B47C00956" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.4", + "matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.4", + "matchCriteriaId": "BB6BA6CB-001B-4440-A9AE-473F5722F8E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.1", + "matchCriteriaId": "EB7F6CDA-FEC0-45D7-ACBE-8B5AD35F1AB5" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/22", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/23", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/25", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/26", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://support.apple.com/en-us/HT214081", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214082", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214083", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214084", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214085", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214086", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214087", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/22", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/23", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/25", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/26", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://support.apple.com/en-us/HT214081", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214082", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214083", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214084", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214085", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214086", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214087", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23265.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23265.json index 98e1aac8470..b1d2e03b06a 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23265.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23265.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23265", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:49.077", - "lastModified": "2024-11-21T08:57:20.703", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-09T14:53:52.510", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,118 +81,279 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.6", + "matchCriteriaId": "9277B3E8-4519-4E07-A89A-A08C604AB78C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.4", + "matchCriteriaId": "7CB78D53-5EC0-45E5-871B-0C18F1E6D438" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.6", + "matchCriteriaId": "2AF8B925-3DE5-4CC8-A4C3-95D8F107D607" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.4", + "matchCriteriaId": "C2FE8515-300C-4B6F-92A0-7D1E6D93F907" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0", + "versionEndExcluding": "12.7.4", + "matchCriteriaId": "A61173BD-535F-46FC-B40F-DA78B168E420" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.6.5", + "matchCriteriaId": "69C4F06A-061F-46B3-8BB7-5C9B47C00956" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.4", + "matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.4", + "matchCriteriaId": "BB6BA6CB-001B-4440-A9AE-473F5722F8E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.1", + "matchCriteriaId": "EB7F6CDA-FEC0-45D7-ACBE-8B5AD35F1AB5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.4", + "matchCriteriaId": "5547F484-4E4B-4961-BAF8-F891D50BB4B6" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/22", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/23", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/24", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/25", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/26", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://support.apple.com/en-us/HT214081", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214082", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214083", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214084", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214085", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214086", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214087", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214088", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/22", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/23", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/24", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/25", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/26", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://support.apple.com/en-us/HT214081", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214082", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214083", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214084", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214085", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214086", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214087", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214088", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23283.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23283.json index e53ac761422..f8be56ee2a2 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23283.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23283.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23283", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:49.830", - "lastModified": "2024-11-21T08:57:24.143", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-09T14:52:10.927", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,62 +59,161 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.6", + "matchCriteriaId": "9277B3E8-4519-4E07-A89A-A08C604AB78C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.6", + "matchCriteriaId": "2AF8B925-3DE5-4CC8-A4C3-95D8F107D607" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0", + "versionEndExcluding": "12.7.4", + "matchCriteriaId": "A61173BD-535F-46FC-B40F-DA78B168E420" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.6.5", + "matchCriteriaId": "69C4F06A-061F-46B3-8BB7-5C9B47C00956" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.4", + "matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/22", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/23", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://support.apple.com/en-us/HT214082", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214083", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214084", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214085", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/22", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/23", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://support.apple.com/en-us/HT214082", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214083", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214084", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214085", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23284.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23284.json index f43aa604d7d..0ba7fa2b4bc 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23284.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23284.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23284", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:49.883", - "lastModified": "2024-11-21T08:57:24.343", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-09T14:51:06.673", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,143 +15,396 @@ "value": "Se abord\u00f3 una cuesti\u00f3n de l\u00f3gica con una mejor gesti\u00f3n de estado. Este problema se solucion\u00f3 en tvOS 17.4, macOS Sonoma 14.4, visionOS 1.1, iOS 17.4 y iPadOS 17.4, watchOS 10.4, iOS 16.7.6 y iPadOS 16.7.6, Safari 17.4. El procesamiento de contenido web creado con fines malintencionados puede impedir que se aplique la Pol\u00edtica de seguridad de contenido." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.4", + "matchCriteriaId": "DC7753BA-5DF8-4F98-8DA8-69DA473F8307" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.6", + "matchCriteriaId": "9277B3E8-4519-4E07-A89A-A08C604AB78C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.4", + "matchCriteriaId": "7CB78D53-5EC0-45E5-871B-0C18F1E6D438" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.6", + "matchCriteriaId": "2AF8B925-3DE5-4CC8-A4C3-95D8F107D607" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.4", + "matchCriteriaId": "C2FE8515-300C-4B6F-92A0-7D1E6D93F907" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.4", + "matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.4", + "matchCriteriaId": "BB6BA6CB-001B-4440-A9AE-473F5722F8E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.1", + "matchCriteriaId": "EB7F6CDA-FEC0-45D7-ACBE-8B5AD35F1AB5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.4", + "matchCriteriaId": "5547F484-4E4B-4961-BAF8-F891D50BB4B6" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.44.0", + "matchCriteriaId": "EF5BDB2C-7F5F-41B4-87C4-C4B938C7D317" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.44.0", + "matchCriteriaId": "336F9990-F267-4013-8353-5AA10039C515" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/20", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/24", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/25", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/26", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/03/26/1", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://support.apple.com/en-us/HT214081", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214082", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214084", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214086", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214087", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214088", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214089", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/20", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/24", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/25", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/26", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/03/26/1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://support.apple.com/en-us/HT214081", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214082", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214084", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214086", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214087", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214088", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214089", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23286.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23286.json index c09fcd17da6..ca9ea5be1d9 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23286.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23286.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23286", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:49.973", - "lastModified": "2024-11-21T08:57:24.690", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-09T14:46:04.583", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,118 +81,279 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.6", + "matchCriteriaId": "9277B3E8-4519-4E07-A89A-A08C604AB78C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.4", + "matchCriteriaId": "7CB78D53-5EC0-45E5-871B-0C18F1E6D438" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.6", + "matchCriteriaId": "2AF8B925-3DE5-4CC8-A4C3-95D8F107D607" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.4", + "matchCriteriaId": "C2FE8515-300C-4B6F-92A0-7D1E6D93F907" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0", + "versionEndExcluding": "12.7.4", + "matchCriteriaId": "A61173BD-535F-46FC-B40F-DA78B168E420" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.6.5", + "matchCriteriaId": "69C4F06A-061F-46B3-8BB7-5C9B47C00956" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.4", + "matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.4", + "matchCriteriaId": "BB6BA6CB-001B-4440-A9AE-473F5722F8E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.1", + "matchCriteriaId": "EB7F6CDA-FEC0-45D7-ACBE-8B5AD35F1AB5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.4", + "matchCriteriaId": "5547F484-4E4B-4961-BAF8-F891D50BB4B6" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/22", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/23", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/24", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/25", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/26", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://support.apple.com/en-us/HT214081", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214082", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214083", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214084", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214085", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214086", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214087", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214088", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/22", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/23", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/24", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/25", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/26", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://support.apple.com/en-us/HT214081", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214082", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214083", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214084", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214085", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214086", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214087", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214088", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23287.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23287.json index dc90cd4014d..c9205cd7e34 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23287.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23287.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23287", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:50.020", - "lastModified": "2024-11-21T08:57:24.907", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-09T14:45:36.460", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,47 +15,149 @@ "value": "Se solucion\u00f3 un problema de privacidad mejorando el manejo de archivos temporales. Este problema se solucion\u00f3 en macOS Sonoma 14.4, iOS 17.4 y iPadOS 17.4, watchOS 10.4. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.4", + "matchCriteriaId": "CCCC6AF9-4EFA-4A45-888B-93C0C1327BC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.4", + "matchCriteriaId": "BCB4911E-7824-4C34-916D-88110CB415EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.4", + "matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.4", + "matchCriteriaId": "5547F484-4E4B-4961-BAF8-F891D50BB4B6" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/24", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://support.apple.com/en-us/HT214081", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214084", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214088", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/24", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://support.apple.com/en-us/HT214081", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214084", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214088", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23288.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23288.json index 857a097a29b..39d9d00dab6 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23288.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23288.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23288", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:50.070", - "lastModified": "2024-11-21T08:57:25.027", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-09T14:44:52.763", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,62 +59,159 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.4", + "matchCriteriaId": "CCCC6AF9-4EFA-4A45-888B-93C0C1327BC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.4", + "matchCriteriaId": "BCB4911E-7824-4C34-916D-88110CB415EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.4", + "matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.4", + "matchCriteriaId": "BB6BA6CB-001B-4440-A9AE-473F5722F8E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.4", + "matchCriteriaId": "5547F484-4E4B-4961-BAF8-F891D50BB4B6" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/24", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/25", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://support.apple.com/en-us/HT214081", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214084", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214086", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214088", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/24", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/25", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://support.apple.com/en-us/HT214081", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214084", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214086", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214088", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23289.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23289.json index c6d4fb7f082..49a6dfafd3b 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23289.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23289.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23289", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:50.117", - "lastModified": "2024-11-21T08:57:25.220", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-09T14:43:14.650", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,54 +59,153 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.6", + "matchCriteriaId": "9277B3E8-4519-4E07-A89A-A08C604AB78C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.4", + "matchCriteriaId": "7CB78D53-5EC0-45E5-871B-0C18F1E6D438" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.6", + "matchCriteriaId": "2AF8B925-3DE5-4CC8-A4C3-95D8F107D607" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.4", + "matchCriteriaId": "C2FE8515-300C-4B6F-92A0-7D1E6D93F907" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.4", + "matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.4", + "matchCriteriaId": "5547F484-4E4B-4961-BAF8-F891D50BB4B6" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/24", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://support.apple.com/en-us/HT214081", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214082", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214084", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214088", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/24", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://support.apple.com/en-us/HT214081", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214082", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214084", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214088", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23290.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23290.json index c1320cefda7..a2b4fbb1c2d 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23290.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23290.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23290", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:50.163", - "lastModified": "2024-12-04T18:15:13.557", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-09T14:51:21.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,62 +81,153 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.4", + "matchCriteriaId": "CCCC6AF9-4EFA-4A45-888B-93C0C1327BC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.4", + "matchCriteriaId": "BCB4911E-7824-4C34-916D-88110CB415EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.4", + "matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.4", + "matchCriteriaId": "BB6BA6CB-001B-4440-A9AE-473F5722F8E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.4", + "matchCriteriaId": "5547F484-4E4B-4961-BAF8-F891D50BB4B6" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/24", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/25", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214081", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214084", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214086", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214088", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/24", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/25", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214081", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214084", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214086", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214088", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23291.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23291.json index 8d6fad69106..09df48506a7 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23291.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23291.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23291", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:50.210", - "lastModified": "2024-11-21T08:57:25.537", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-09T14:41:40.010", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,62 +59,159 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.4", + "matchCriteriaId": "CCCC6AF9-4EFA-4A45-888B-93C0C1327BC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.4", + "matchCriteriaId": "BCB4911E-7824-4C34-916D-88110CB415EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.4", + "matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.4", + "matchCriteriaId": "BB6BA6CB-001B-4440-A9AE-473F5722F8E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.4", + "matchCriteriaId": "5547F484-4E4B-4961-BAF8-F891D50BB4B6" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/24", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/25", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://support.apple.com/en-us/HT214081", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214084", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214086", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214088", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/24", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/25", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://support.apple.com/en-us/HT214081", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214084", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214086", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214088", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23292.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23292.json index b2f13d7c564..ec4f2ecf547 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23292.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23292.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23292", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:50.257", - "lastModified": "2024-11-21T08:57:25.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-09T14:39:31.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,115 @@ "value": "Este problema se solucion\u00f3 mejorando la protecci\u00f3n de datos. Este problema se solucion\u00f3 en macOS Sonoma 14.4, iOS 17.4 y iPadOS 17.4. Es posible que una aplicaci\u00f3n pueda acceder a informaci\u00f3n sobre los contactos de un usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.4", + "matchCriteriaId": "CCCC6AF9-4EFA-4A45-888B-93C0C1327BC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.4", + "matchCriteriaId": "BCB4911E-7824-4C34-916D-88110CB415EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.4", + "matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://support.apple.com/en-us/HT214081", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214084", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://support.apple.com/en-us/HT214081", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214084", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23298.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23298.json index 6678595a69f..836fc1f4bd2 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23298.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23298.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23298", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-15T23:15:07.403", - "lastModified": "2024-11-21T08:57:26.953", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-09T14:44:22.810", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,14 +59,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.3", + "matchCriteriaId": "BE07CC78-00D0-4B3A-9737-D6540E5BD57B" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT214092", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214092", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26686.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26686.json index 734f029ac0a..1cd7d8130d7 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26686.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26686.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26686", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T15:15:52.263", - "lastModified": "2024-11-21T09:02:50.707", + "lastModified": "2024-12-09T13:10:00.537", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -21,6 +21,10 @@ "url": "https://git.kernel.org/stable/c/27978243f165b44e342f28f449b91327944ea071", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, + { + "url": "https://git.kernel.org/stable/c/3820b0fac7732a653bcc6f6ac20c1d72e697f8f6", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/7601df8031fd67310af891897ef6cc0df4209305", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28825.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28825.json index 040249c4324..1ea47f8ebf7 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28825.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28825.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28825", "sourceIdentifier": "security@checkmk.com", "published": "2024-04-24T12:15:06.887", - "lastModified": "2024-11-21T09:07:00.360", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-09T13:43:48.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,16 +69,505 @@ "value": "CWE-307" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.0.0", + "matchCriteriaId": "C59985CE-68DF-433D-87BD-97EDCA81E039" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:*", + "matchCriteriaId": "1AE224D8-742B-4D1F-ABBE-3DDA3EA5C5AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:*", + "matchCriteriaId": "1E6FCE7B-7ECE-42A4-82C5-12A647B0CCC8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:*", + "matchCriteriaId": "923AA113-D5E7-4F78-88BA-B72EF250F3EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:*", + "matchCriteriaId": "B1984F57-A313-48AC-B8F9-F352D82824D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:*", + "matchCriteriaId": "A38DB527-72A6-40B8-B46F-B8E78BFFDB1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:*", + "matchCriteriaId": "67643E11-91A1-4580-BC4C-574074C862CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:*", + "matchCriteriaId": "350B7E0F-D234-4D7C-91E4-F35E73579A24" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:*", + "matchCriteriaId": "DE58ACA9-8078-46A7-8487-C06E4E38F372" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:*", + "matchCriteriaId": "B3D8CF4D-E1F8-4D8D-A8A9-1783CAC869E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:*", + "matchCriteriaId": "58B0B051-7D3C-4EC7-96B0-38A1CC108D61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p1:*:*:*:*:*:*", + "matchCriteriaId": "B783A741-AAF2-43EE-8272-9239133A01E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p10:*:*:*:*:*:*", + "matchCriteriaId": "A5F275A3-A99E-40E1-BD77-694FA568541F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p11:*:*:*:*:*:*", + "matchCriteriaId": "3A44BF1A-5BE0-4412-B51D-055445758B61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p12:*:*:*:*:*:*", + "matchCriteriaId": "A31BAE94-9096-4320-AC19-AA204E8EC08D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p13:*:*:*:*:*:*", + "matchCriteriaId": "1B0784EA-98E8-4490-B97B-894F188A223D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p14:*:*:*:*:*:*", + "matchCriteriaId": "A56A901F-1040-4DB9-9BE3-FE1999C514CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p15:*:*:*:*:*:*", + "matchCriteriaId": "58A904FC-C015-469D-8502-E678D5FDBD06" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p16:*:*:*:*:*:*", + "matchCriteriaId": "1B5D109C-60AA-4FA4-9B10-2191AAF109F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p17:*:*:*:*:*:*", + "matchCriteriaId": "37297866-24BB-4044-8744-EC0A8C29F152" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p18:*:*:*:*:*:*", + "matchCriteriaId": "F9D4A171-CCB3-43B8-8B70-78610423E7C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p19:*:*:*:*:*:*", + "matchCriteriaId": "5E1145FF-426D-407C-9F4B-EF773BD191EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p2:*:*:*:*:*:*", + "matchCriteriaId": "4DA8F776-A724-48FC-B7EF-13788BC69753" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p20:*:*:*:*:*:*", + "matchCriteriaId": "46F42A22-99F2-4DF5-9B00-3123396F87AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p21:*:*:*:*:*:*", + "matchCriteriaId": "1C59D4D3-D526-4E6B-B3AA-FE485D030190" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p22:*:*:*:*:*:*", + "matchCriteriaId": "65E5CAE6-DC8B-47B3-84A0-D79B0C33EB45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p23:*:*:*:*:*:*", + "matchCriteriaId": "8B9E0D89-79E2-476A-8A3E-8443316BC310" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p24:*:*:*:*:*:*", + "matchCriteriaId": "38EA0591-C30B-4102-8A06-1B922FD3A0C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p25:*:*:*:*:*:*", + "matchCriteriaId": "5E9AF0D3-8DD6-4EC7-BB33-54401D4025FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p26:*:*:*:*:*:*", + "matchCriteriaId": "983604CC-DD2C-42A9-8B9D-A9A261CE8BA6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p27:*:*:*:*:*:*", + "matchCriteriaId": "224960F7-695C-415B-B991-E8C01859AA80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p28:*:*:*:*:*:*", + "matchCriteriaId": "1F6D86E4-738B-4ADA-858E-C12CCED9FAAA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p29:*:*:*:*:*:*", + "matchCriteriaId": "BD8EBF09-9B70-4972-85B1-82F41488BE3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p3:*:*:*:*:*:*", + "matchCriteriaId": "076463AA-195F-4CD6-861B-72FE1C8A407F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p30:*:*:*:*:*:*", + "matchCriteriaId": "009D2C7B-39B8-400F-80A5-06D56319232C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p31:*:*:*:*:*:*", + "matchCriteriaId": "3D5AEB8D-772E-401F-975C-61BDD30B481E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p32:*:*:*:*:*:*", + "matchCriteriaId": "2ECAB6C5-518C-4CA4-8B2B-D51115612A8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p33:*:*:*:*:*:*", + "matchCriteriaId": "FECC252C-02AA-41EC-BB84-5C1A6BC0FB8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p34:*:*:*:*:*:*", + "matchCriteriaId": "238324F5-7225-40DD-82E8-52F30F0D3776" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p35:*:*:*:*:*:*", + "matchCriteriaId": "4F3C9510-BD43-4F67-9C30-4F82B5D230E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p36:*:*:*:*:*:*", + "matchCriteriaId": "51941654-F6FF-4323-AECA-5D1D84308CD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p37:*:*:*:*:*:*", + "matchCriteriaId": "6E800133-1D28-41D1-8D73-9437D741F83B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p38:*:*:*:*:*:*", + "matchCriteriaId": "8A34B28B-2BD9-4F28-9428-8CF7FCEAD7C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p39:*:*:*:*:*:*", + "matchCriteriaId": "D3FC491E-DE27-4C8F-B699-DB5260935D51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p4:*:*:*:*:*:*", + "matchCriteriaId": "63043834-98E5-47C2-91F1-41B98270ABCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p40:*:*:*:*:*:*", + "matchCriteriaId": "0BE2C8FE-20CC-4B7E-B27B-54C873DC7530" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p41:*:*:*:*:*:*", + "matchCriteriaId": "5C3C3714-C696-4456-88AA-B6E4EFC73C92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p42:*:*:*:*:*:*", + "matchCriteriaId": "BFF9D1C9-C340-4C31-A3EA-74EF85C6F34D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p5:*:*:*:*:*:*", + "matchCriteriaId": "FCF745D0-2EA6-4414-90BC-99D3ED08BB01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p6:*:*:*:*:*:*", + "matchCriteriaId": "4823087F-D7FA-4594-8FD3-412DE5EA1F02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p7:*:*:*:*:*:*", + "matchCriteriaId": "6429F9CE-D477-4CFF-B6E0-4BF11B61ED0E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p8:*:*:*:*:*:*", + "matchCriteriaId": "A50C58F9-94ED-4D85-8331-2D81F8E0760A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p9:*:*:*:*:*:*", + "matchCriteriaId": "9A6AC0BD-FB65-4FAA-B344-66F87F16F8B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*", + "matchCriteriaId": "C66704F1-0B5E-4B43-8748-987022F378F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:*", + "matchCriteriaId": "B068974F-6F67-4CBB-B567-FCED86E28F22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:*", + "matchCriteriaId": "EA70F36A-EEF6-48DC-B15E-055D0DE8A052" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:*", + "matchCriteriaId": "B2017F38-38DB-4E96-B34F-160BC731CBBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b4:*:*:*:*:*:*", + "matchCriteriaId": "0949F399-371B-409C-AF9F-32690D881440" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b5:*:*:*:*:*:*", + "matchCriteriaId": "42E1E31A-B5CC-45F2-A2E5-3EEF735499BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b6:*:*:*:*:*:*", + "matchCriteriaId": "4B364FCA-500C-458E-B997-82CD0B1D24F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b7:*:*:*:*:*:*", + "matchCriteriaId": "0B32E657-917B-482B-B6A4-3D3746992A4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b8:*:*:*:*:*:*", + "matchCriteriaId": "2119C732-E024-4DA6-8E47-9E08E5E12602" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:i1:*:*:*:*:*:*", + "matchCriteriaId": "4F0B99A8-A124-43BD-B8AA-EECC9112346F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*", + "matchCriteriaId": "3FB7221E-BE9F-4529-8E07-8AD547FA3208" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*", + "matchCriteriaId": "30A074AD-9499-46E3-AB67-D6CEE3AA01C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*", + "matchCriteriaId": "A8BD0240-A22B-4273-BD47-C35A8C12E127" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*", + "matchCriteriaId": "DAA5680F-1DD0-48AA-BB7F-15B27365F0FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*", + "matchCriteriaId": "BC2F31CA-D4EB-44E6-9A09-5255D33F4A88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*", + "matchCriteriaId": "CD80BD69-20C6-4E17-B165-98689179A5A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p15:*:*:*:*:*:*", + "matchCriteriaId": "B044D43B-0233-4A0D-A356-B9F9324E2777" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*", + "matchCriteriaId": "7DE79896-EBE5-42F2-A126-2A871BBA1071" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*", + "matchCriteriaId": "51A44E69-EEA1-4B01-B7B3-5BF7B39819E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:*", + "matchCriteriaId": "BCB65AEB-CF52-410B-92B1-2DCFB914FFA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:*", + "matchCriteriaId": "B7E17FA6-9011-489C-9FA9-368CA2D86FAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p2:*:*:*:*:*:*", + "matchCriteriaId": "7BCEB6FF-668F-4313-9264-0BF021AFC45F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p20:*:*:*:*:*:*", + "matchCriteriaId": "F8B27218-A4FF-47BE-B578-6DB704478921" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:*", + "matchCriteriaId": "8735357F-16A7-4408-9DDD-1C6796BADBE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:*", + "matchCriteriaId": "4505098C-0A2B-481E-A3DF-D6DF8EFA4DE7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p23:*:*:*:*:*:*", + "matchCriteriaId": "C12AFCCF-014E-4EEB-8F04-F1ACE182BA98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p24:*:*:*:*:*:*", + "matchCriteriaId": "66B85557-D5EC-4AF4-B97A-D2B80A58B3B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p25:*:*:*:*:*:*", + "matchCriteriaId": "233ECD21-FA72-43AF-8E4C-DAC27CC18F3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*", + "matchCriteriaId": "E2342E2D-58B0-43E7-8C01-DF4678520F39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*", + "matchCriteriaId": "1871B646-CA69-477F-B113-B901AC7B3934" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*", + "matchCriteriaId": "EEC65A72-CAE1-4E28-83EF-7ECAFE921BB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:*", + "matchCriteriaId": "D8FDECBC-8213-495F-A932-C4310F7C1F87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:*", + "matchCriteriaId": "CB49BC95-6AA8-4F53-A3D6-E199BF756AAF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p8:*:*:*:*:*:*", + "matchCriteriaId": "050B6617-8FD4-47A6-BE4A-A52503A65812" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p9:*:*:*:*:*:*", + "matchCriteriaId": "4CA0FEC5-7036-47AF-A341-873B6C324B58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b1:*:*:*:*:*:*", + "matchCriteriaId": "1A020A77-7D84-4557-9B0B-D74A89BC1538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b2:*:*:*:*:*:*", + "matchCriteriaId": "D9770554-978B-4552-9E0E-CD6B6675243C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b3:*:*:*:*:*:*", + "matchCriteriaId": "1883D2F4-CB96-4DDE-87E8-D1990A3FA092" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b4:*:*:*:*:*:*", + "matchCriteriaId": "99AD6F39-AF67-4CB9-BED2-00CA75B9F5DB" + } + ] + } + ] } ], "references": [ { "url": "https://checkmk.com/werk/15198", - "source": "security@checkmk.com" + "source": "security@checkmk.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://checkmk.com/werk/15198", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-409xx/CVE-2024-40965.json b/CVE-2024/CVE-2024-409xx/CVE-2024-40965.json index b61ef98b396..2b7df0727ae 100644 --- a/CVE-2024/CVE-2024-409xx/CVE-2024-40965.json +++ b/CVE-2024/CVE-2024-409xx/CVE-2024-40965.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40965", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-12T13:15:18.370", - "lastModified": "2024-11-21T09:31:57.930", + "lastModified": "2024-12-09T13:10:01.363", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -84,6 +84,10 @@ "Patch" ] }, + { + "url": "https://git.kernel.org/stable/c/d038693e08adf9c162c6377800495e4f5a2df045", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/2b42e9587a7a9c7b824e0feb92958f258263963e", "source": "af854a3a-2127-422b-91ae-364da2661108", diff --git a/CVE-2024/CVE-2024-409xx/CVE-2024-40975.json b/CVE-2024/CVE-2024-409xx/CVE-2024-40975.json index 96d7eda4802..bee7880198d 100644 --- a/CVE-2024/CVE-2024-409xx/CVE-2024-40975.json +++ b/CVE-2024/CVE-2024-409xx/CVE-2024-40975.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40975", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-12T13:15:19.007", - "lastModified": "2024-11-21T09:31:59.193", + "lastModified": "2024-12-09T13:10:01.607", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -17,6 +17,10 @@ ], "metrics": {}, "references": [ + { + "url": "https://git.kernel.org/stable/c/36ff963c133a25ed1166a25c3ba8b357ea010fda", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/3de0f2627ef849735f155c1818247f58404dddfe", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41014.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41014.json index de9c74f1455..8dceb9e53da 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41014.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41014.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41014", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-29T07:15:05.810", - "lastModified": "2024-11-21T09:32:04.100", + "lastModified": "2024-12-09T13:10:01.833", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -17,6 +17,10 @@ ], "metrics": {}, "references": [ + { + "url": "https://git.kernel.org/stable/c/7cd9f0a33e738cd58876f1bc8d6c1aa5bc4fc8c1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/fb63435b7c7dc112b1ae1baea5486e0a6e27b196", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42122.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42122.json index 89790e82b46..03bb97f4934 100644 --- a/CVE-2024/CVE-2024-421xx/CVE-2024-42122.json +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42122.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42122", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-30T08:15:04.430", - "lastModified": "2024-11-21T09:33:38.937", + "lastModified": "2024-12-09T13:10:02.027", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -84,6 +84,10 @@ "Patch" ] }, + { + "url": "https://git.kernel.org/stable/c/cd1e565a5b7fa60c349ca8a16db1e61715fe8230", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/062edd612fcd300f0f79a36fca5b8b6a5e2fce70", "source": "af854a3a-2127-422b-91ae-364da2661108", diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42156.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42156.json index e7bc65734dc..c192e9370e8 100644 --- a/CVE-2024/CVE-2024-421xx/CVE-2024-42156.json +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42156.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42156", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-30T08:15:07.080", - "lastModified": "2024-11-21T09:33:43.093", + "lastModified": "2024-12-09T13:10:02.267", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -78,6 +78,10 @@ "Patch" ] }, + { + "url": "https://git.kernel.org/stable/c/a891938947f4427f98cb1ce54f27223501efe750", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/d65d76a44ffe74c73298ada25b0f578680576073", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2024/CVE-2024-422xx/CVE-2024-42252.json b/CVE-2024/CVE-2024-422xx/CVE-2024-42252.json index e742e128ed5..cc2f5ed5d9f 100644 --- a/CVE-2024/CVE-2024-422xx/CVE-2024-42252.json +++ b/CVE-2024/CVE-2024-422xx/CVE-2024-42252.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42252", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-08T09:15:08.150", - "lastModified": "2024-09-06T13:37:31.460", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-09T13:10:02.447", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -103,6 +103,10 @@ "tags": [ "Patch" ] + }, + { + "url": "https://git.kernel.org/stable/c/ecb4aaa658da760fb83afd79cc5fd4360aa60635", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-423xx/CVE-2024-42319.json b/CVE-2024/CVE-2024-423xx/CVE-2024-42319.json index 225ad97dd1b..ea4f7f1ac3f 100644 --- a/CVE-2024/CVE-2024-423xx/CVE-2024-42319.json +++ b/CVE-2024/CVE-2024-423xx/CVE-2024-42319.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42319", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T09:15:11.767", - "lastModified": "2024-08-19T12:59:59.177", + "lastModified": "2024-12-09T13:10:02.630", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -24,6 +24,10 @@ { "url": "https://git.kernel.org/stable/c/a8bd68e4329f9a0ad1b878733e0f80be6a971649", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/d00df6700ad10974a7e20646956f4ff22cdbe0ec", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43222.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43222.json new file mode 100644 index 00000000000..457ff41f108 --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43222.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43222", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:40.300", + "lastModified": "2024-12-09T13:15:40.300", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Envato Security Team Sweet Date.This issue affects Sweet Date: from n/a through 3.7.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/sweetdate/vulnerability/wordpress-sweet-date-more-than-a-wordpress-dating-theme-theme-3-7-3-privilege-escalation-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43857.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43857.json index 58047dd99b8..564b54520db 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43857.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43857.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43857", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T10:15:10.687", - "lastModified": "2024-08-22T17:38:21.003", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-09T13:10:02.783", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -78,6 +78,10 @@ "Patch" ] }, + { + "url": "https://git.kernel.org/stable/c/b98777309756ebe15cc9ad4e8ab64bbfaf878a3f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/c82bc1ab2a8a5e73d9728e80c4c2ed87e8921a38", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43913.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43913.json index 4fe35975ed2..f5b5d7b363b 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43913.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43913.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43913", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-26T11:15:05.330", - "lastModified": "2024-09-05T18:12:55.680", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-09T13:10:03.003", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -83,6 +83,10 @@ "tags": [ "Patch" ] + }, + { + "url": "https://git.kernel.org/stable/c/f7d9a18572fcd7130459b7691bd19ee2a2e951ad", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44950.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44950.json index d06bf7f4aed..4c5a6f06ee0 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44950.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44950.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44950", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-04T19:15:30.100", - "lastModified": "2024-10-09T14:21:16.773", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-09T13:10:03.227", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -94,6 +94,10 @@ "tags": [ "Patch" ] + }, + { + "url": "https://git.kernel.org/stable/c/dc5ead0e8fc5ef53b8553394d4aab60c277976b3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44955.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44955.json index 2fa2117dcaa..7a0b95f5bc0 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44955.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44955.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44955", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-04T19:15:30.423", - "lastModified": "2024-10-10T17:57:00.267", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-09T13:10:03.600", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -77,6 +77,10 @@ "Patch" ] }, + { + "url": "https://git.kernel.org/stable/c/c7e65cab54a89f4df54110f0b44c4ade93d1a911", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/fcf6a49d79923a234844b8efe830a61f3f0584e4", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44963.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44963.json index 50578ec8817..b051eac5098 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44963.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44963.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44963", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-04T19:15:30.883", - "lastModified": "2024-10-04T16:19:20.770", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-09T13:10:03.787", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -70,6 +70,10 @@ } ], "references": [ + { + "url": "https://git.kernel.org/stable/c/22d907bcd283d69d5e60497fc0d51969545c583b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/98251cd60b4d702a8a81de442ab621e83a3fb24f", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4561.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4561.json index 71cef907855..b6ff803dc15 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4561.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4561.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4561", "sourceIdentifier": "security@progress.com", "published": "2024-05-14T21:15:13.010", - "lastModified": "2024-11-21T09:43:06.663", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-09T13:31:41.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,24 +69,64 @@ "value": "CWE-918" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.1.2", + "matchCriteriaId": "FF563542-A8E7-49AD-B46C-8C222CDE1016" + } + ] + } + ] } ], "references": [ { "url": "https://community.progress.com/s/article/Announcing-WhatsUp-Gold-v2023-1-2", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.progress.com/network-monitoring", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Product" + ] }, { "url": "https://community.progress.com/s/article/Announcing-WhatsUp-Gold-v2023-1-2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.progress.com/network-monitoring", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4562.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4562.json index 34a5a40c5cf..535cb508165 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4562.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4562.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4562", "sourceIdentifier": "security@progress.com", "published": "2024-05-14T21:15:13.767", - "lastModified": "2024-11-21T09:43:06.807", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-09T13:40:22.660", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 } ] }, @@ -49,24 +69,64 @@ "value": "CWE-918" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.1.2", + "matchCriteriaId": "FF563542-A8E7-49AD-B46C-8C222CDE1016" + } + ] + } + ] } ], "references": [ { "url": "https://community.progress.com/s/article/Announcing-WhatsUp-Gold-v2023-1-2", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.progress.com/network-monitoring", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Product" + ] }, { "url": "https://community.progress.com/s/article/Announcing-WhatsUp-Gold-v2023-1-2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.progress.com/network-monitoring", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46841.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46841.json index d02e494bf27..a5ac928f3cf 100644 --- a/CVE-2024/CVE-2024-468xx/CVE-2024-46841.json +++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46841.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46841", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-27T13:15:16.130", - "lastModified": "2024-10-08T18:17:07.870", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-09T13:10:03.940", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -70,6 +70,10 @@ } ], "references": [ + { + "url": "https://git.kernel.org/stable/c/135b4819f6fba87fd5a2693023133e78ac73f1d3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/704c359b4093a2af650a20eaa030c435d7c30f91", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49891.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49891.json index 06793d692e2..c858346827a 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49891.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49891.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49891", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:11.657", - "lastModified": "2024-10-25T14:42:27.193", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-09T13:10:04.093", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -77,6 +77,10 @@ } ], "references": [ + { + "url": "https://git.kernel.org/stable/c/232a138bd843d48cb2368f604646d990db7640f3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/2be1d4f11944cd6283cb97268b3e17c4424945ca", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49897.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49897.json index ed59681081e..19722b38f6c 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49897.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49897.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49897", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:12.133", - "lastModified": "2024-11-01T14:55:46.557", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-09T13:10:04.243", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -97,6 +97,10 @@ "tags": [ "Patch" ] + }, + { + "url": "https://git.kernel.org/stable/c/d247af7c5dbf143ad6be8179bb1550e76d6af57e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49898.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49898.json index 7528c7323fa..de3f8377a9d 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49898.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49898.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49898", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:12.190", - "lastModified": "2024-10-24T03:43:20.723", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-09T13:10:04.373", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -97,6 +97,10 @@ "tags": [ "Patch" ] + }, + { + "url": "https://git.kernel.org/stable/c/c3a3b6d9a9383e3c1a4a08878ba5046e68647595", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49899.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49899.json index 6a1369d4972..ddff6c5103b 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49899.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49899.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49899", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:12.253", - "lastModified": "2024-10-25T14:35:52.620", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-09T13:10:04.517", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -77,6 +77,10 @@ "Patch" ] }, + { + "url": "https://git.kernel.org/stable/c/9f35cec5e4b9759b38c663d18eae4eaf30f36527", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/b995c0a6de6c74656a0c39cd57a0626351b13e3c", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49906.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49906.json index 17fb904439d..c227ac18ad2 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49906.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49906.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49906", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:13.120", - "lastModified": "2024-10-24T03:43:55.397", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-09T13:10:04.640", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -83,6 +83,10 @@ "tags": [ "Patch" ] + }, + { + "url": "https://git.kernel.org/stable/c/ebef6616219ff04abdeb39450625f85419787ee3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49909.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49909.json index 70dcdb46d69..8436e45f338 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49909.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49909.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49909", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:13.357", - "lastModified": "2024-10-24T02:57:36.467", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-09T13:10:04.777", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -97,6 +97,10 @@ "tags": [ "Patch" ] + }, + { + "url": "https://git.kernel.org/stable/c/f38b09ba6a335c511eb27920bb9bb4a1b2c20084", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49911.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49911.json index 34f517306f4..8e6edd157c4 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49911.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49911.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49911", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:13.507", - "lastModified": "2024-10-24T03:19:10.477", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-09T13:10:04.947", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -97,6 +97,10 @@ "tags": [ "Patch" ] + }, + { + "url": "https://git.kernel.org/stable/c/8c854138b593efbbd8fa46a25f3288c121c1d1a1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49914.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49914.json index 935449e604e..29d65acd080 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49914.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49914.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49914", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:13.723", - "lastModified": "2024-10-24T17:09:50.003", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-09T13:10:05.087", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -77,6 +77,10 @@ "Patch" ] }, + { + "url": "https://git.kernel.org/stable/c/68f75e6f08aad66069a629db8d7840919156c761", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/8e4ed3cf1642df0c4456443d865cff61a9598aa8", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49915.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49915.json index ee17b2325bd..4d992968d25 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49915.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49915.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49915", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:13.787", - "lastModified": "2024-10-24T17:08:04.020", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-09T13:10:05.233", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -91,6 +91,10 @@ "Patch" ] }, + { + "url": "https://git.kernel.org/stable/c/ec1be3c527b4a5fc85bcc1b0be7cec08bf60c796", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/f0454b3cb0584a6bf275aeb49be61a760fd546a2", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49917.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49917.json index 09ec62d7efb..1c68e998ecd 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49917.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49917.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49917", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:13.937", - "lastModified": "2024-10-24T16:54:05.930", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-09T13:10:05.430", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -77,6 +77,10 @@ } ], "references": [ + { + "url": "https://git.kernel.org/stable/c/205e3b96cc9aa9211fd2c849a16245cf236b2d36", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/5443c83eb8fd2f88c71ced38848fbf744d6206a2", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49934.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49934.json index ffabc11533d..32a5faba874 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49934.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49934.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49934", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:15.273", - "lastModified": "2024-11-13T15:18:14.487", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-09T13:10:05.653", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -84,6 +84,10 @@ "Patch" ] }, + { + "url": "https://git.kernel.org/stable/c/e0f6ee75f50476607ca82fc7c3711c795ce09b52", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/ef921bc72328b577cb45772ff7921cba4773b74a", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52385.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52385.json new file mode 100644 index 00000000000..c860eed5565 --- /dev/null +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52385.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-52385", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T14:15:11.590", + "lastModified": "2024-12-09T14:15:11.590", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Sk. Abul Hasan Team Member.This issue affects Team Member: from n/a through 7.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/team-showcase-supreme/vulnerability/wordpress-team-member-multi-language-supported-team-plugin-7-1-limited-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52391.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52391.json new file mode 100644 index 00000000000..e2c95700314 --- /dev/null +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52391.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-52391", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T14:15:11.740", + "lastModified": "2024-12-09T14:15:11.740", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Genetech Pie Register Premium.This issue affects Pie Register Premium: from n/a before 3.8.3.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/pie-register-premium/vulnerability/wordpress-pie-register-premium-plugin-3-8-3-3-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-524xx/CVE-2024-52480.json b/CVE-2024/CVE-2024-524xx/CVE-2024-52480.json new file mode 100644 index 00000000000..0ecf59a6fd8 --- /dev/null +++ b/CVE-2024/CVE-2024-524xx/CVE-2024-52480.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-52480", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T14:15:11.873", + "lastModified": "2024-12-09T14:15:11.873", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Astoundify Jobify - Job Board WordPress Theme.This issue affects Jobify - Job Board WordPress Theme: from n/a through 4.2.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/jobify/vulnerability/wordpress-jobify-plugin-4-2-3-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53085.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53085.json index 72a285f96ea..514aa788b19 100644 --- a/CVE-2024/CVE-2024-530xx/CVE-2024-53085.json +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53085.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53085", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-19T18:15:27.757", - "lastModified": "2024-11-27T19:59:54.767", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-09T13:10:05.850", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -114,6 +114,10 @@ "tags": [ "Patch" ] + }, + { + "url": "https://git.kernel.org/stable/c/cfaf83501a0cbb104499c5b0892ee5ebde4e967f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-531xx/CVE-2024-53141.json b/CVE-2024/CVE-2024-531xx/CVE-2024-53141.json index ed139c10e89..fc4f84443c1 100644 --- a/CVE-2024/CVE-2024-531xx/CVE-2024-53141.json +++ b/CVE-2024/CVE-2024-531xx/CVE-2024-53141.json @@ -2,7 +2,7 @@ "id": "CVE-2024-53141", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-06T10:15:06.050", - "lastModified": "2024-12-06T10:15:06.050", + "lastModified": "2024-12-09T13:10:06.060", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -28,6 +28,10 @@ { "url": "https://git.kernel.org/stable/c/591efa494a1cf649f50a35def649c43ae984cd03", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/856023ef032d824309abd5c747241dffa33aae8c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-531xx/CVE-2024-53142.json b/CVE-2024/CVE-2024-531xx/CVE-2024-53142.json index af36ab52e19..d9ad7f94dbd 100644 --- a/CVE-2024/CVE-2024-531xx/CVE-2024-53142.json +++ b/CVE-2024/CVE-2024-531xx/CVE-2024-53142.json @@ -2,7 +2,7 @@ "id": "CVE-2024-53142", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-06T10:15:06.203", - "lastModified": "2024-12-06T10:15:06.203", + "lastModified": "2024-12-09T13:10:06.213", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -13,6 +13,10 @@ ], "metrics": {}, "references": [ + { + "url": "https://git.kernel.org/stable/c/1a423bbbeaf9e3e20c4686501efd9b661fe834db", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/49d01e736c3045319e030d1e75fb983011abaca7", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2024/CVE-2024-537xx/CVE-2024-53785.json b/CVE-2024/CVE-2024-537xx/CVE-2024-53785.json new file mode 100644 index 00000000000..10bec621988 --- /dev/null +++ b/CVE-2024/CVE-2024-537xx/CVE-2024-53785.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-53785", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:40.547", + "lastModified": "2024-12-09T13:15:40.547", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Alexander Volkov Chatter.This issue affects Chatter: from n/a through 1.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/chatter/vulnerability/wordpress-chatter-plugin-1-0-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-537xx/CVE-2024-53790.json b/CVE-2024/CVE-2024-537xx/CVE-2024-53790.json new file mode 100644 index 00000000000..ed535b0bb14 --- /dev/null +++ b/CVE-2024/CVE-2024-537xx/CVE-2024-53790.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-53790", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:40.673", + "lastModified": "2024-12-09T13:15:40.673", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Ogun Labs Lenxel Core for Lenxel(LNX) LMS.This issue affects Lenxel Core for Lenxel(LNX) LMS: from n/a through 1.2.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/lenxel-core/vulnerability/wordpress-lenxel-core-plugin-1-1-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-537xx/CVE-2024-53791.json b/CVE-2024/CVE-2024-537xx/CVE-2024-53791.json new file mode 100644 index 00000000000..6ad91c7ef80 --- /dev/null +++ b/CVE-2024/CVE-2024-537xx/CVE-2024-53791.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-53791", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:40.800", + "lastModified": "2024-12-09T13:15:40.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ogun Labs Lenxel Core for Lenxel(LNX) LMS allows Stored XSS.This issue affects Lenxel Core for Lenxel(LNX) LMS: from n/a through 1.2.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/lenxel-core/vulnerability/wordpress-lenxel-core-plugin-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-537xx/CVE-2024-53798.json b/CVE-2024/CVE-2024-537xx/CVE-2024-53798.json new file mode 100644 index 00000000000..c25ee42c620 --- /dev/null +++ b/CVE-2024/CVE-2024-537xx/CVE-2024-53798.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-53798", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:40.930", + "lastModified": "2024-12-09T13:15:40.930", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in BAKKBONE Australia FloristPress.This issue affects FloristPress: from n/a through 7.3.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/bakkbone-florist-companion/vulnerability/wordpress-floristpress-plugin-7-3-0-nonce-leakage-to-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53814.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53814.json new file mode 100644 index 00000000000..98c51f38ffa --- /dev/null +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53814.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-53814", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T14:15:12.003", + "lastModified": "2024-12-09T14:15:12.003", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Analytify.This issue affects Analytify: from n/a through 5.4.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-497" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-analytify/vulnerability/wordpress-analytify-plugin-5-4-3-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53816.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53816.json new file mode 100644 index 00000000000..77f8d2326ed --- /dev/null +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53816.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-53816", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:41.060", + "lastModified": "2024-12-09T13:15:41.060", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Themeum Tutor LMS Elementor Addons.This issue affects Tutor LMS Elementor Addons: from n/a through 2.1.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/tutor-lms-elementor-addons/vulnerability/wordpress-tutor-lms-elementor-addons-plugin-2-1-5-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53818.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53818.json new file mode 100644 index 00000000000..f17af9d8955 --- /dev/null +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53818.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-53818", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:41.193", + "lastModified": "2024-12-09T13:15:41.193", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Post Grid Team by WPXPO PostX allows Stored XSS.This issue affects PostX: from n/a through 4.1.15." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ultimate-post/vulnerability/wordpress-postx-plugin-4-1-15-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53819.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53819.json new file mode 100644 index 00000000000..a6a5f7b6694 --- /dev/null +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53819.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-53819", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:41.370", + "lastModified": "2024-12-09T13:15:41.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Sprout Invoices Client Invoicing by Sprout Invoices.This issue affects Client Invoicing by Sprout Invoices: from n/a through 20.8.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/sprout-invoices/vulnerability/wordpress-client-invoicing-by-sprout-invoices-plugin-20-8-0-insecure-direct-object-references-idor-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53821.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53821.json index 78d530fdad6..0cbb7d54853 100644 --- a/CVE-2024/CVE-2024-538xx/CVE-2024-53821.json +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53821.json @@ -2,13 +2,17 @@ "id": "CVE-2024-53821", "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-06T14:15:24.497", - "lastModified": "2024-12-06T14:15:24.497", + "lastModified": "2024-12-09T14:15:12.167", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Pie Register Premium allows Reflected XSS.This issue affects Pie Register Premium: from n/a through n/a." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Genetech Pie Register Premium allows Reflected XSS.This issue affects Pie Register Premium: from n/a before 3.8.3.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Pie Register Premium permite XSS reflejado. Este problema afecta a Pie Register Premium: desde n/a hasta n/a." } ], "metrics": { @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53822.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53822.json new file mode 100644 index 00000000000..d393d1c5a96 --- /dev/null +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53822.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-53822", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:41.507", + "lastModified": "2024-12-09T13:15:41.507", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Genetech Pie Register Premium.This issue affects Pie Register Premium: from n/a before 3.8.3.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/pie-register-premium/vulnerability/wordpress-pie-register-premium-plugin-3-8-3-3-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53947.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53947.json new file mode 100644 index 00000000000..26ae007e2d9 --- /dev/null +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53947.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-53947", + "sourceIdentifier": "security@apache.org", + "published": "2024-12-09T14:15:12.267", + "lastModified": "2024-12-09T14:15:12.267", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Superset. Specifically, certain engine-specific functions are not checked, which allows attackers to bypass Apache Superset's SQL authorization. This issue is a follow-up to\u00a0CVE-2024-39887 with additional disallowed PostgreSQL functions now included:\u00a0query_to_xml_and_xmlschema,\u00a0table_to_xml,\u00a0table_to_xml_and_xmlschema.\n\nThis issue affects Apache Superset: <4.1.0.\n\nUsers are recommended to upgrade to version 4.1.0, which fixes the issue or add these Postgres functions to the config set\u00a0DISALLOWED_SQL_FUNCTIONS." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@apache.org", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.3, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://lists.apache.org/thread/hj3gfsjh67vqw12nlrshlsym4bkopjmn", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53948.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53948.json new file mode 100644 index 00000000000..099a8e5ddb3 --- /dev/null +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53948.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-53948", + "sourceIdentifier": "security@apache.org", + "published": "2024-12-09T14:15:12.483", + "lastModified": "2024-12-09T14:15:12.483", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Generation of Error Message Containing analytics metadata Information in Apache Superset.\n\nThis issue affects Apache Superset: before 4.1.0.\n\nUsers are recommended to upgrade to version 4.1.0, which fixes the issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@apache.org", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-209" + } + ] + } + ], + "references": [ + { + "url": "https://lists.apache.org/thread/8howpf3png0wrgpls46ggk441oczlfvf", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53949.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53949.json new file mode 100644 index 00000000000..244444dcb89 --- /dev/null +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53949.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-53949", + "sourceIdentifier": "security@apache.org", + "published": "2024-12-09T14:15:12.647", + "lastModified": "2024-12-09T14:15:12.647", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Authorization vulnerability in Apache Superset when\u00a0FAB_ADD_SECURITY_API is enabled (disabled by default). Allows for lower privilege users to use this API.\n\n\u00a0issue affects Apache Superset: from 2.0.0 before 4.1.0.\n\nUsers are recommended to upgrade to version 4.1.0, which fixes the issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@apache.org", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://lists.apache.org/thread/d3scbwmfpzbpm6npnzdw5y4owtqqyq8d", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-542xx/CVE-2024-54214.json b/CVE-2024/CVE-2024-542xx/CVE-2024-54214.json index 982f0802079..9feb10bc383 100644 --- a/CVE-2024/CVE-2024-542xx/CVE-2024-54214.json +++ b/CVE-2024/CVE-2024-542xx/CVE-2024-54214.json @@ -2,13 +2,17 @@ "id": "CVE-2024-54214", "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-06T14:15:26.507", - "lastModified": "2024-12-06T14:15:26.507", + "lastModified": "2024-12-09T13:15:41.657", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Unrestricted Upload of File with Dangerous Type vulnerability in NotFound Revy allows Upload a Web Shell to a Web Server.This issue affects Revy: from n/a through 1.18." + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Envato Security Team Revy allows Upload a Web Shell to a Web Server.This issue affects Revy: from n/a through 1.18." + }, + { + "lang": "es", + "value": "La vulnerabilidad de carga sin restricciones de archivos con tipos peligrosos en NotFound Revy permite cargar un shell web a un servidor web. Este problema afecta a Revy: desde n/a hasta 1.18." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-542xx/CVE-2024-54215.json b/CVE-2024/CVE-2024-542xx/CVE-2024-54215.json new file mode 100644 index 00000000000..0044f25d32d --- /dev/null +++ b/CVE-2024/CVE-2024-542xx/CVE-2024-54215.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-54215", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:41.760", + "lastModified": "2024-12-09T13:15:41.760", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Envato Security Team Revy.This issue affects Revy: from n/a through 1.18." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/revy/vulnerability/wordpress-revy-plugin-1-18-unauthenticated-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-542xx/CVE-2024-54216.json b/CVE-2024/CVE-2024-542xx/CVE-2024-54216.json index 5be680d91e9..70f5badb85d 100644 --- a/CVE-2024/CVE-2024-542xx/CVE-2024-54216.json +++ b/CVE-2024/CVE-2024-542xx/CVE-2024-54216.json @@ -2,13 +2,17 @@ "id": "CVE-2024-54216", "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-06T14:15:26.633", - "lastModified": "2024-12-06T14:15:26.633", + "lastModified": "2024-12-09T13:15:41.900", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Path Traversal vulnerability in NotFound ARForms allows Path Traversal.This issue affects ARForms: from n/a through 6.4.1." + "value": "Path Traversal: '.../...//' vulnerability in Envato Security Team ARForms allows Path Traversal.This issue affects ARForms: from n/a through 6.4.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de path traversal en NotFound ARForms permite el path traversal. Este problema afecta a ARForms: desde n/a hasta 6.4.1." } ], "metrics": { @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-542xx/CVE-2024-54217.json b/CVE-2024/CVE-2024-542xx/CVE-2024-54217.json new file mode 100644 index 00000000000..9087416226b --- /dev/null +++ b/CVE-2024/CVE-2024-542xx/CVE-2024-54217.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-54217", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:41.997", + "lastModified": "2024-12-09T13:15:41.997", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Repute info systems ARForms.This issue affects ARForms: from n/a through 6.4.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/arforms/vulnerability/wordpress-arforms-plugin-6-4-1-subscriber-plugin-settings-change-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-542xx/CVE-2024-54218.json b/CVE-2024/CVE-2024-542xx/CVE-2024-54218.json new file mode 100644 index 00000000000..b330e194120 --- /dev/null +++ b/CVE-2024/CVE-2024-542xx/CVE-2024-54218.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-54218", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T14:15:12.813", + "lastModified": "2024-12-09T14:15:12.813", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Thehp AIO Contact.This issue affects AIO Contact: from n/a through 2.8.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/aio-contact/vulnerability/wordpress-aio-contact-plugin-2-8-1-unauthenticated-plugin-settings-change-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-542xx/CVE-2024-54219.json b/CVE-2024/CVE-2024-542xx/CVE-2024-54219.json new file mode 100644 index 00000000000..b894c12d52d --- /dev/null +++ b/CVE-2024/CVE-2024-542xx/CVE-2024-54219.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-54219", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:42.130", + "lastModified": "2024-12-09T13:15:42.130", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Thehp AIO Contact.This issue affects AIO Contact: from n/a through 2.8.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/aio-contact/vulnerability/wordpress-aio-contact-plugin-2-8-1-unauthenticated-site-wide-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-542xx/CVE-2024-54220.json b/CVE-2024/CVE-2024-542xx/CVE-2024-54220.json new file mode 100644 index 00000000000..2285262af32 --- /dev/null +++ b/CVE-2024/CVE-2024-542xx/CVE-2024-54220.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-54220", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:42.257", + "lastModified": "2024-12-09T13:15:42.257", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Roninwp FAT Services Booking allows Stored XSS.This issue affects FAT Services Booking: from n/a through 5.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/fat-services-booking/vulnerability/wordpress-fat-services-booking-plugin-5-6-subscriber-site-wide-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-542xx/CVE-2024-54223.json b/CVE-2024/CVE-2024-542xx/CVE-2024-54223.json new file mode 100644 index 00000000000..dcdfb1ba245 --- /dev/null +++ b/CVE-2024/CVE-2024-542xx/CVE-2024-54223.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-54223", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:42.397", + "lastModified": "2024-12-09T13:15:42.397", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Contact Form - Repute InfoSystems ARForms Form Builder allows Code Injection.This issue affects ARForms Form Builder: from n/a through 1.7.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/arforms-form-builder/vulnerability/wordpress-arforms-plugin-1-7-1-html-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-542xx/CVE-2024-54224.json b/CVE-2024/CVE-2024-542xx/CVE-2024-54224.json new file mode 100644 index 00000000000..4218bc3bccd --- /dev/null +++ b/CVE-2024/CVE-2024-542xx/CVE-2024-54224.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-54224", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:42.530", + "lastModified": "2024-12-09T13:15:42.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in QuomodoSoft ElementsReady Addons for Elementor allows DOM-Based XSS.This issue affects ElementsReady Addons for Elementor: from n/a through 6.4.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/element-ready-lite/vulnerability/wordpress-elementsready-addons-for-elementor-plugin-6-4-7-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-542xx/CVE-2024-54225.json b/CVE-2024/CVE-2024-542xx/CVE-2024-54225.json new file mode 100644 index 00000000000..2d18fbe279c --- /dev/null +++ b/CVE-2024/CVE-2024-542xx/CVE-2024-54225.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-54225", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:42.660", + "lastModified": "2024-12-09T13:15:42.660", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in CodegearThemes Designer allows PHP Local File Inclusion.This issue affects Designer: from n/a through 1.3.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/designer/vulnerability/wordpress-designer-plugin-1-3-3-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-542xx/CVE-2024-54226.json b/CVE-2024/CVE-2024-542xx/CVE-2024-54226.json new file mode 100644 index 00000000000..9df749b7fde --- /dev/null +++ b/CVE-2024/CVE-2024-542xx/CVE-2024-54226.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-54226", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:42.787", + "lastModified": "2024-12-09T13:15:42.787", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Karl Kiesinger Country Blocker allows Stored XSS.This issue affects Country Blocker: from n/a through 3.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/country-blocker/vulnerability/wordpress-country-blocker-plugin-3-2-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-542xx/CVE-2024-54227.json b/CVE-2024/CVE-2024-542xx/CVE-2024-54227.json new file mode 100644 index 00000000000..6e10086e30b --- /dev/null +++ b/CVE-2024/CVE-2024-542xx/CVE-2024-54227.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-54227", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:42.910", + "lastModified": "2024-12-09T13:15:42.910", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in theDotstore Minimum and Maximum Quantity for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Minimum and Maximum Quantity for WooCommerce: from n/a through 2.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/min-and-max-quantity-for-woocommerce/vulnerability/wordpress-minimum-and-maximum-quantity-for-woocommerce-plugin-2-0-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-542xx/CVE-2024-54228.json b/CVE-2024/CVE-2024-542xx/CVE-2024-54228.json new file mode 100644 index 00000000000..40a5996cae3 --- /dev/null +++ b/CVE-2024/CVE-2024-542xx/CVE-2024-54228.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-54228", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:43.030", + "lastModified": "2024-12-09T13:15:43.030", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WebOccult Technologies Pvt Ltd Wot Elementor Widgets allows DOM-Based XSS.This issue affects Wot Elementor Widgets: from n/a through 1.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wot-elementor-widgets/vulnerability/wordpress-wot-elementor-widgets-plugin-1-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-542xx/CVE-2024-54230.json b/CVE-2024/CVE-2024-542xx/CVE-2024-54230.json new file mode 100644 index 00000000000..f89310cdbcd --- /dev/null +++ b/CVE-2024/CVE-2024-542xx/CVE-2024-54230.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-54230", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:43.163", + "lastModified": "2024-12-09T13:15:43.163", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPRealizer Unlock Addons for Elementor allows DOM-Based XSS.This issue affects Unlock Addons for Elementor: from n/a through 1.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/unlock-addons-for-elementor/vulnerability/wordpress-unlock-addons-for-elementor-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-542xx/CVE-2024-54232.json b/CVE-2024/CVE-2024-542xx/CVE-2024-54232.json new file mode 100644 index 00000000000..19c3050df43 --- /dev/null +++ b/CVE-2024/CVE-2024-542xx/CVE-2024-54232.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-54232", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:43.297", + "lastModified": "2024-12-09T13:15:43.297", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in rrdevs RRAddons for Elementor allows Stored XSS.This issue affects RRAddons for Elementor: from n/a through 1.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/rrdevs-for-elementor/vulnerability/wordpress-rraddons-for-elementor-plugin-1-1-0-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-542xx/CVE-2024-54247.json b/CVE-2024/CVE-2024-542xx/CVE-2024-54247.json new file mode 100644 index 00000000000..efe2fd77799 --- /dev/null +++ b/CVE-2024/CVE-2024-542xx/CVE-2024-54247.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-54247", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:43.440", + "lastModified": "2024-12-09T13:15:43.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ABCBiz ABCBiz Addons and Templates for Elementor allows Stored XSS.This issue affects ABCBiz Addons and Templates for Elementor: from n/a through 2.0.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/abcbiz-addons/vulnerability/wordpress-abcbiz-addons-and-templates-for-elementor-plugin-2-0-2-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-542xx/CVE-2024-54251.json b/CVE-2024/CVE-2024-542xx/CVE-2024-54251.json new file mode 100644 index 00000000000..0bf9e3e95b7 --- /dev/null +++ b/CVE-2024/CVE-2024-542xx/CVE-2024-54251.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-54251", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:43.587", + "lastModified": "2024-12-09T13:15:43.587", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Prodigy Commerce Prodigy Commerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Prodigy Commerce: from n/a through 3.0.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/prodigy-commerce/vulnerability/wordpress-prodigy-commerce-plugin-3-0-7-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-542xx/CVE-2024-54253.json b/CVE-2024/CVE-2024-542xx/CVE-2024-54253.json new file mode 100644 index 00000000000..108e10c867e --- /dev/null +++ b/CVE-2024/CVE-2024-542xx/CVE-2024-54253.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-54253", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:43.720", + "lastModified": "2024-12-09T13:15:43.720", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Xpro Xpro Elementor Addons allows Stored XSS.This issue affects Xpro Elementor Addons: from n/a through 1.4.6.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/xpro-elementor-addons/vulnerability/wordpress-xpro-addons-for-elementor-plugin-1-4-6-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-542xx/CVE-2024-54254.json b/CVE-2024/CVE-2024-542xx/CVE-2024-54254.json new file mode 100644 index 00000000000..97c11cd940c --- /dev/null +++ b/CVE-2024/CVE-2024-542xx/CVE-2024-54254.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-54254", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:43.860", + "lastModified": "2024-12-09T13:15:43.860", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Kofi Mokome Message Filter for Contact Form 7.This issue affects Message Filter for Contact Form 7: from n/a through 1.6.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/cf7-message-filter/vulnerability/wordpress-message-filter-for-contact-form-7-plugin-1-6-3-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-542xx/CVE-2024-54255.json b/CVE-2024/CVE-2024-542xx/CVE-2024-54255.json new file mode 100644 index 00000000000..139fc60f3cd --- /dev/null +++ b/CVE-2024/CVE-2024-542xx/CVE-2024-54255.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-54255", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:44.007", + "lastModified": "2024-12-09T13:15:44.007", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in aviplugins.com Login Widget With Shortcode allows Phishing.This issue affects Login Widget With Shortcode: from n/a through 6.1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/login-sidebar-widget/vulnerability/wordpress-login-widget-with-shortcode-plugin-6-1-2-open-redirection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-542xx/CVE-2024-54260.json b/CVE-2024/CVE-2024-542xx/CVE-2024-54260.json new file mode 100644 index 00000000000..472b75a5f75 --- /dev/null +++ b/CVE-2024/CVE-2024-542xx/CVE-2024-54260.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-54260", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-09T13:15:44.153", + "lastModified": "2024-12-09T13:15:44.153", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BlazeThemes News Kit Elementor Addons allows Stored XSS.This issue affects News Kit Elementor Addons: from n/a through 1.2.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/news-kit-elementor-addons/vulnerability/wordpress-news-kit-elementor-addons-plugin-1-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54929.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54929.json new file mode 100644 index 00000000000..2c8380c11eb --- /dev/null +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54929.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-54929", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-09T14:15:12.957", + "lastModified": "2024-12-09T14:15:12.957", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "KASHIPARA E-learning Management System v1.0 is vulnerable to SQL Injection in /admin/delete_subject.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/SQL%20Injection%20-%20delete%20subject.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54936.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54936.json new file mode 100644 index 00000000000..9b67e133d3a --- /dev/null +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54936.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-54936", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-09T14:15:13.127", + "lastModified": "2024-12-09T14:15:13.127", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Stored Cross-Site Scripting (XSS) vulnerability was found in the /send_message.php of Kashipara E-learning Management System v1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the my_message parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/Stored%20XSS%20-%20teacher%20message.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54937.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54937.json new file mode 100644 index 00000000000..d77da35f3cf --- /dev/null +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54937.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-54937", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-09T14:15:13.303", + "lastModified": "2024-12-09T14:15:13.303", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Directory Listing issue was found in Kashipara E-Learning Management System v1.0, which allows remote attackers to access sensitive files and directories via /admin/assets." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/Directory%20listing%20-%20admin-assets.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8259.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8259.json new file mode 100644 index 00000000000..e1e8ba9dc61 --- /dev/null +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8259.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-8259", + "sourceIdentifier": "iletisim@usom.gov.tr", + "published": "2024-12-09T14:15:13.473", + "lastModified": "2024-12-09T14:15:13.473", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Eryaz Information Technologies NatraCar B2B Dealer Management Program allows SQL Injection.This issue affects NatraCar B2B Dealer Management Program: through 09.12.2024.\n\n\n\nNOTE: The vendor was contacted and it was learned that the product is not supported." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.usom.gov.tr/bildirim/tr-24-1881", + "source": "iletisim@usom.gov.tr" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 0917e303044..b0ccf643530 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-09T11:01:48.087203+00:00 +2024-12-09T15:01:07.506196+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-09T10:15:05.230000+00:00 +2024-12-09T14:55:47.257000+00:00 ``` ### Last Data Feed Release @@ -33,23 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -272636 +272828 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `192` -- [CVE-2024-12305](CVE-2024/CVE-2024-123xx/CVE-2024-12305.json) (`2024-12-09T09:15:04.970`) -- [CVE-2024-12306](CVE-2024/CVE-2024-123xx/CVE-2024-12306.json) (`2024-12-09T09:15:05.293`) -- [CVE-2024-12307](CVE-2024/CVE-2024-123xx/CVE-2024-12307.json) (`2024-12-09T09:15:05.433`) -- [CVE-2024-46901](CVE-2024/CVE-2024-469xx/CVE-2024-46901.json) (`2024-12-09T10:15:05.230`) +- [CVE-2024-53948](CVE-2024/CVE-2024-539xx/CVE-2024-53948.json) (`2024-12-09T14:15:12.483`) +- [CVE-2024-53949](CVE-2024/CVE-2024-539xx/CVE-2024-53949.json) (`2024-12-09T14:15:12.647`) +- [CVE-2024-54215](CVE-2024/CVE-2024-542xx/CVE-2024-54215.json) (`2024-12-09T13:15:41.760`) +- [CVE-2024-54217](CVE-2024/CVE-2024-542xx/CVE-2024-54217.json) (`2024-12-09T13:15:41.997`) +- [CVE-2024-54218](CVE-2024/CVE-2024-542xx/CVE-2024-54218.json) (`2024-12-09T14:15:12.813`) +- [CVE-2024-54219](CVE-2024/CVE-2024-542xx/CVE-2024-54219.json) (`2024-12-09T13:15:42.130`) +- [CVE-2024-54220](CVE-2024/CVE-2024-542xx/CVE-2024-54220.json) (`2024-12-09T13:15:42.257`) +- [CVE-2024-54223](CVE-2024/CVE-2024-542xx/CVE-2024-54223.json) (`2024-12-09T13:15:42.397`) +- [CVE-2024-54224](CVE-2024/CVE-2024-542xx/CVE-2024-54224.json) (`2024-12-09T13:15:42.530`) +- [CVE-2024-54225](CVE-2024/CVE-2024-542xx/CVE-2024-54225.json) (`2024-12-09T13:15:42.660`) +- [CVE-2024-54226](CVE-2024/CVE-2024-542xx/CVE-2024-54226.json) (`2024-12-09T13:15:42.787`) +- [CVE-2024-54227](CVE-2024/CVE-2024-542xx/CVE-2024-54227.json) (`2024-12-09T13:15:42.910`) +- [CVE-2024-54228](CVE-2024/CVE-2024-542xx/CVE-2024-54228.json) (`2024-12-09T13:15:43.030`) +- [CVE-2024-54230](CVE-2024/CVE-2024-542xx/CVE-2024-54230.json) (`2024-12-09T13:15:43.163`) +- [CVE-2024-54232](CVE-2024/CVE-2024-542xx/CVE-2024-54232.json) (`2024-12-09T13:15:43.297`) +- [CVE-2024-54247](CVE-2024/CVE-2024-542xx/CVE-2024-54247.json) (`2024-12-09T13:15:43.440`) +- [CVE-2024-54251](CVE-2024/CVE-2024-542xx/CVE-2024-54251.json) (`2024-12-09T13:15:43.587`) +- [CVE-2024-54253](CVE-2024/CVE-2024-542xx/CVE-2024-54253.json) (`2024-12-09T13:15:43.720`) +- [CVE-2024-54254](CVE-2024/CVE-2024-542xx/CVE-2024-54254.json) (`2024-12-09T13:15:43.860`) +- [CVE-2024-54255](CVE-2024/CVE-2024-542xx/CVE-2024-54255.json) (`2024-12-09T13:15:44.007`) +- [CVE-2024-54260](CVE-2024/CVE-2024-542xx/CVE-2024-54260.json) (`2024-12-09T13:15:44.153`) +- [CVE-2024-54929](CVE-2024/CVE-2024-549xx/CVE-2024-54929.json) (`2024-12-09T14:15:12.957`) +- [CVE-2024-54936](CVE-2024/CVE-2024-549xx/CVE-2024-54936.json) (`2024-12-09T14:15:13.127`) +- [CVE-2024-54937](CVE-2024/CVE-2024-549xx/CVE-2024-54937.json) (`2024-12-09T14:15:13.303`) +- [CVE-2024-8259](CVE-2024/CVE-2024-82xx/CVE-2024-8259.json) (`2024-12-09T14:15:13.473`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `52` +- [CVE-2024-43857](CVE-2024/CVE-2024-438xx/CVE-2024-43857.json) (`2024-12-09T13:10:02.783`) +- [CVE-2024-43913](CVE-2024/CVE-2024-439xx/CVE-2024-43913.json) (`2024-12-09T13:10:03.003`) +- [CVE-2024-44950](CVE-2024/CVE-2024-449xx/CVE-2024-44950.json) (`2024-12-09T13:10:03.227`) +- [CVE-2024-44955](CVE-2024/CVE-2024-449xx/CVE-2024-44955.json) (`2024-12-09T13:10:03.600`) +- [CVE-2024-44963](CVE-2024/CVE-2024-449xx/CVE-2024-44963.json) (`2024-12-09T13:10:03.787`) +- [CVE-2024-4561](CVE-2024/CVE-2024-45xx/CVE-2024-4561.json) (`2024-12-09T13:31:41.683`) +- [CVE-2024-4562](CVE-2024/CVE-2024-45xx/CVE-2024-4562.json) (`2024-12-09T13:40:22.660`) +- [CVE-2024-46841](CVE-2024/CVE-2024-468xx/CVE-2024-46841.json) (`2024-12-09T13:10:03.940`) +- [CVE-2024-49891](CVE-2024/CVE-2024-498xx/CVE-2024-49891.json) (`2024-12-09T13:10:04.093`) +- [CVE-2024-49897](CVE-2024/CVE-2024-498xx/CVE-2024-49897.json) (`2024-12-09T13:10:04.243`) +- [CVE-2024-49898](CVE-2024/CVE-2024-498xx/CVE-2024-49898.json) (`2024-12-09T13:10:04.373`) +- [CVE-2024-49899](CVE-2024/CVE-2024-498xx/CVE-2024-49899.json) (`2024-12-09T13:10:04.517`) +- [CVE-2024-49906](CVE-2024/CVE-2024-499xx/CVE-2024-49906.json) (`2024-12-09T13:10:04.640`) +- [CVE-2024-49909](CVE-2024/CVE-2024-499xx/CVE-2024-49909.json) (`2024-12-09T13:10:04.777`) +- [CVE-2024-49911](CVE-2024/CVE-2024-499xx/CVE-2024-49911.json) (`2024-12-09T13:10:04.947`) +- [CVE-2024-49914](CVE-2024/CVE-2024-499xx/CVE-2024-49914.json) (`2024-12-09T13:10:05.087`) +- [CVE-2024-49915](CVE-2024/CVE-2024-499xx/CVE-2024-49915.json) (`2024-12-09T13:10:05.233`) +- [CVE-2024-49917](CVE-2024/CVE-2024-499xx/CVE-2024-49917.json) (`2024-12-09T13:10:05.430`) +- [CVE-2024-49934](CVE-2024/CVE-2024-499xx/CVE-2024-49934.json) (`2024-12-09T13:10:05.653`) +- [CVE-2024-53085](CVE-2024/CVE-2024-530xx/CVE-2024-53085.json) (`2024-12-09T13:10:05.850`) +- [CVE-2024-53141](CVE-2024/CVE-2024-531xx/CVE-2024-53141.json) (`2024-12-09T13:10:06.060`) +- [CVE-2024-53142](CVE-2024/CVE-2024-531xx/CVE-2024-53142.json) (`2024-12-09T13:10:06.213`) +- [CVE-2024-53821](CVE-2024/CVE-2024-538xx/CVE-2024-53821.json) (`2024-12-09T14:15:12.167`) +- [CVE-2024-54214](CVE-2024/CVE-2024-542xx/CVE-2024-54214.json) (`2024-12-09T13:15:41.657`) +- [CVE-2024-54216](CVE-2024/CVE-2024-542xx/CVE-2024-54216.json) (`2024-12-09T13:15:41.900`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 0d3fab31508..16e766423ad 100644 --- a/_state.csv +++ b/_state.csv @@ -217317,12 +217317,14 @@ CVE-2023-22698,0,0,427fd1ced323b74a989be935536154038e41823d05edf1b83c2bda788a938 CVE-2023-22699,0,0,8d77cf8bdaaceda9949642af3b0c17cac202715660a348b5e3152cf21fe73893,2024-11-21T07:45:14.807000 CVE-2023-2270,0,0,88f5a20f6513829667681e37dd6b5395d3b65b46760485c6eb300e16ece54cb6,2024-11-21T07:58:16.910000 CVE-2023-22700,0,0,a153c6d7097ff9b259e2a5298998c1f3d24c48a606d041a4d0835ec3a5a54522,2024-11-21T07:45:14.967000 +CVE-2023-22701,1,1,55ab5a016363ce13b1599b86dc1dc69cdcddfad8dd3dff67ef7cba1d415dbd63,2024-12-09T13:15:20.060000 CVE-2023-22702,0,0,63646635b8b25b70f959d3244f2cbdbd986ff674b2b86e6fc443700f91111ac3,2024-11-21T07:45:15.100000 CVE-2023-22703,0,0,4b32806e4f436b1f1436770eade73f2520caa7ef1950020afb644b3703414fed,2024-11-21T07:45:15.227000 CVE-2023-22704,0,0,97e2f636c01b60d2160b9c1ab59fea4ab76a80dda149656991dddce186a0ef6b,2024-11-21T07:45:15.363000 CVE-2023-22705,0,0,65973db752a75c1aefb8423eeb981dbb110113de8aa579e1b895f4bd82c26ba8,2024-11-21T07:45:15.500000 CVE-2023-22706,0,0,e23e670a170088f4b3a35a51c618b41bd586e135e5ef6b6e9a4e212cbcdb0b7b,2024-11-21T07:45:15.623000 CVE-2023-22707,0,0,bde2443dcc4c3f801cb3440dce40a54a921b6214956baa9b02180f12bc5062f2,2024-11-21T07:45:15.753000 +CVE-2023-22708,1,1,c82b9c49352b4443d1f7efee437745a4a26c570562ce9cc6179ab69dfea472de,2024-12-09T13:15:20.260000 CVE-2023-22709,0,0,e7c836ff6ce93032ec50342dc5b584e3ab1034b81d73292075b5befcbe4fcb9d,2024-11-21T07:45:15.890000 CVE-2023-2271,0,0,82a1b193d56a689b6f14541ed8547a7aebaefaa1fa98350a6f5d11be1c01604a,2024-11-21T07:58:17.063000 CVE-2023-22710,0,0,6321674a7d61870fc7bcb2f501ad4bb221c3ecd462b1be5f77a58d22213ee00f,2024-11-21T07:45:16.030000 @@ -218060,6 +218062,8 @@ CVE-2023-23711,0,0,c5b51bedaab6d0395e3c0a83294cf94339f04565bcf611fcbd37cae3d9e2b CVE-2023-23712,0,0,4a23bcba6d9f2c7a98ec54642c96c71a469063cf4f87d5d6a484456bd7c3a3b5,2024-11-21T07:46:42.870000 CVE-2023-23713,0,0,2318993e0ec3f76fc16e838f785ccafea16e1fb9201a7c21314ab3ce19f1f347,2024-11-21T07:46:42.993000 CVE-2023-23714,0,0,57fe889088181e8642d5f8753316861af4e72269362e7feb87e66671d8632800,2024-11-21T07:46:43.120000 +CVE-2023-23715,1,1,4d1c85144d79d6712edc4ce8dab9edbd292efeab3a274470b68e769b83d7f9e3,2024-12-09T13:15:20.390000 +CVE-2023-23716,1,1,a96dadb2b3fa45d006074fbb513612a2c9b91cf808dec274e1a476132383c5eb,2024-12-09T13:15:20.523000 CVE-2023-23717,0,0,76ef1c74f013570afc1886f3097f80eeb023ba7b92d94580dc7b2069cc4c909a,2024-11-21T07:46:43.240000 CVE-2023-23718,0,0,2d21808a91ec5db44041cfba2ed5bd218533531801101d13651063a6b3863b6e,2024-11-21T07:46:43.360000 CVE-2023-23719,0,0,d7a17e48175934680965b9bcfe866d0966b039ed2eb7ae97007a6035047d2ebf,2024-11-21T07:46:43.487000 @@ -218069,6 +218073,8 @@ CVE-2023-23721,0,0,be3d017fddd919f8d467a09be33afd3d29ef07c10a5a824a4e6411110796e CVE-2023-23722,0,0,d71101ccf780b3e06d8b10c03eab1f87966e642d8a60d2ca0194afdd5a03bb38,2024-11-21T07:46:43.867000 CVE-2023-23723,0,0,addf435ae8ee87161fb9f919df431652915e9073bb99212a74ec2446b7a520f9,2024-11-21T07:46:43.980000 CVE-2023-23724,0,0,d61a0119c3493d469c301a833c9348ff00ef99f853a7c8ade7352e12da12978f,2024-11-21T07:46:44.107000 +CVE-2023-23725,1,1,1fc1e05bde3abc404bf8e1b3c87c928b46dd2f8bdf46f66445654d597a8365f1,2024-12-09T13:15:20.657000 +CVE-2023-23726,1,1,649853e98cc586ec2f5da69e45479cfa34ed5170439141cfdc88d95edb718efd,2024-12-09T13:15:20.787000 CVE-2023-23727,0,0,ba3ebf8ffcee46a37bd947448a29e81778da5b21f3eebe5825acfb5f7b4900ad,2024-11-21T07:46:44.233000 CVE-2023-23728,0,0,9b0e360c2292b0aa05e3a60e150a859697d6d306609818daf59c010fc67f3a41,2024-11-21T07:46:44.353000 CVE-2023-2373,0,0,61ce23693eddb97904f7e49db20480f413ff4075dae01cb1a28f536bf4df6aa2,2024-11-21T07:58:28.970000 @@ -218150,6 +218156,7 @@ CVE-2023-23810,0,0,38be04a9c9dfd02231d5c01b9c9080ea04ef73ee6f15217eba0015806f919 CVE-2023-23811,0,0,a29e3b8554d98ebf5d2035cef50c441da4abc5cb8806b64bb6623472ac3aa180,2024-11-21T07:46:52.833000 CVE-2023-23812,0,0,92c5f50caf4472f527d67b2355a876f31653e21fdf11631b7472679107b5ade6,2024-11-21T07:46:52.957000 CVE-2023-23813,0,0,337769e8710220814f14080fb7b12b918b1c12701a420e590943e43f1d67a5af,2024-11-21T07:46:53.073000 +CVE-2023-23814,1,1,f6af4f5619687c74901f99c9527b4001075aa6f48420d8e5d04c94e12369d6d4,2024-12-09T13:15:20.910000 CVE-2023-23815,0,0,01ab9a44d2ea90b10e9e12286db2402d8e1bd420d3928718353bb22a403209e9,2024-11-21T07:46:53.197000 CVE-2023-23816,0,0,c572f77cf4135bf8267ccd72c96c5ea27e3ef4e30c993e819db09afc2050c29e,2024-11-21T07:46:53.320000 CVE-2023-23817,0,0,ca1f7b56d699f25a58c2cc9f5fd9522936d86c871ed111874474560e4871ba4f,2024-11-21T07:46:53.440000 @@ -218159,7 +218166,9 @@ CVE-2023-2382,0,0,cd62959973e3d160c97d09231a9241b29017087751216ecc836ce397c89653 CVE-2023-23820,0,0,9d9471eea9f3213e9aa4f4fd9b5b884a13f95d358434820d500a4002a334cc8b,2024-11-21T07:46:53.807000 CVE-2023-23821,0,0,a0a05d242cc1499776a7941100a759a23f4d822f4b7538d3f7c73ac2ceb30dbf,2024-11-21T07:46:53.930000 CVE-2023-23822,0,0,ff510e2bee15698461d5bc2bb280972cc9c2d592cd12b6b9289b5df20d9697e0,2024-11-21T07:46:54.057000 +CVE-2023-23823,1,1,1ba5ee8ca38363cecad7ad0193e0e8198c0d079ef27e9e2dd3a29d5f4fefb677,2024-12-09T13:15:21.037000 CVE-2023-23824,0,0,b66ea116e12cfb945606ca7ccb06380e4f7d98052dab6f97fd5fd32c0417ca6e,2024-11-21T07:46:54.180000 +CVE-2023-23825,1,1,0e00515b4829f799a512e0eaff1b32eb8ae3d6b23cca1b70b4a050ffbdeae852,2024-12-09T13:15:21.163000 CVE-2023-23826,0,0,0439088e2c899647a3d6d3fa882bc8a54854f115bf11608865e091c2c6ceb811,2024-11-21T07:46:54.300000 CVE-2023-23827,0,0,05b2127e4eda4f91e44ceb113739441093b74dc62d3e2adf4feb9ec679191def,2024-11-21T07:46:54.417000 CVE-2023-23828,0,0,2de5cc6c86d6bd1d59e5ce45c7bfa3497c552751af90a2bb9124f40bd41328a2,2024-11-21T07:46:54.530000 @@ -218169,6 +218178,7 @@ CVE-2023-23830,0,0,1d4c740b1ee747dee5309d2ce5298aac6e450aa059de73692927e8184d199 CVE-2023-23831,0,0,fe2f84fb1b6b7f5e3e016dd695ec78ca1a5954c7c62b69e6ca9abeaf949ed474,2024-11-21T07:46:54.910000 CVE-2023-23832,0,0,dc6378672d1193a307e27ef4d04dffba10e19a07b39218350aee32402d74e070,2024-11-21T07:46:55.030000 CVE-2023-23833,0,0,791d82c2fc3a555ce5d4439f513c6d9574984f490e28e8f01ac26ad183c1a97f,2024-11-21T07:46:55.147000 +CVE-2023-23834,1,1,5fd8b9c587d76f30656da9ae5f0258603e097f8cf80ac2303bb0ca83aadb94e0,2024-12-09T13:15:21.290000 CVE-2023-23835,0,0,d6e142f819111a387384439ec29beb3e50ae3e2cffcf490dd765a6dbf5259276,2024-11-21T07:46:55.280000 CVE-2023-23836,0,0,fc39bf47e345047e224b6e8ef3479ce98fcbaa5036c6b1e5788d4dfc3d0a76c6,2024-11-21T07:46:55.403000 CVE-2023-23837,0,0,360399c396839e179591b535ae7b0bc93dc9a559cfc3542db0d40cdcfb380648,2024-11-21T07:46:55.530000 @@ -218205,6 +218215,7 @@ CVE-2023-23864,0,0,780550c8ed90fcab0caf7a6437743d5f7fe4bfda030cd6c9f18203182763e CVE-2023-23865,0,0,f8f5e9a209577ed94d675b6364c8d24ac61cf3584ef86fa13882fa35492233b5,2024-11-21T07:46:59.997000 CVE-2023-23866,0,0,9d598f0b7190250dfab081bddfc475cc2e59e14d9959905cf881f3f1cb59cc53,2024-11-21T07:47:00.120000 CVE-2023-23867,0,0,8b075d821572691d4801e829cad9f334261c75480f4a5cbc29b6d1ee1a9ce5d0,2024-11-21T07:47:00.223000 +CVE-2023-23868,1,1,af93dd634bdaa632f1fdd9254bed58589c0cb3b10ee0890d36ee90d91e799682,2024-12-09T13:15:21.417000 CVE-2023-23869,0,0,183306b36c1fd28cd16cfee5c45d28986845281f57d816979f3d20d7c889ee47,2024-11-21T07:47:00.347000 CVE-2023-2387,0,0,894e369b65e1bba2f328891a343e5479ac5f90a39cb710e21fe27e7d23498979,2024-11-21T07:58:30.910000 CVE-2023-23870,0,0,cb354082ae5b0343560e20a8bcd1e0bfde871a5512dc0c7cb9a65c159a4e10ec,2024-11-21T07:47:00.473000 @@ -218224,13 +218235,17 @@ CVE-2023-23882,0,0,7f19603e61b80c8fdd6d5fd7f492d7c20d44e59ca95cc9147f70968ac7a39 CVE-2023-23883,0,0,45d8b9390ccae4a073f589976a6de0df4a2ac3981a27567da99d1d9c833ca63b,2024-11-21T07:47:02.087000 CVE-2023-23884,0,0,e378740170a083204bce996e1b1727347126ac7e2f0bd58b9a1f2f9454c7fb68,2024-11-21T07:47:02.210000 CVE-2023-23885,0,0,5d31d3780c502a57766c2754607059c517057994a6bcc708cd1e805d581b6b1a,2024-11-21T07:47:02.330000 +CVE-2023-23886,1,1,7525ba1ce2dcef57c76bcaa3082413f6e166f97e58875bb6d375113ad24e8967,2024-12-09T13:15:21.540000 +CVE-2023-23887,1,1,582361426fff4dc8ce6e04913046b1aad204ead07da2c5ee9afa6a4f2a2e0fe2,2024-12-09T13:15:21.663000 CVE-2023-23888,0,0,6c2fa8f8ffd502e2aea419ef22b6050d4aa5c16fe9407cac158acd307fe0f9ee,2024-11-21T07:47:02.460000 CVE-2023-23889,0,0,2f9c654883627524fdecd6a808b667582c84c3aee2e0e515099e18d841ab0c75,2024-11-21T07:47:02.577000 CVE-2023-2389,0,0,6986b444cfe71633f1ca70f3b845ed2363133012cf38997ec444797519dd3361,2024-11-21T07:58:31.167000 CVE-2023-23890,0,0,95223acf8ca5f9c713da1ce8c977e30518980aeb30d945f538ee617435b0b6e1,2024-11-21T07:47:02.697000 CVE-2023-23891,0,0,974963b24b3c04c9ad99f156d31440dc77f3ab594026226012ef46256e771522,2024-11-21T07:47:02.817000 CVE-2023-23892,0,0,16aedf0a652c179666576abb4321d225e92d46f37638ca7d791847c40f552632,2024-11-21T07:47:02.940000 +CVE-2023-23893,1,1,c6bd8a5d41639a6260f96e8c8bd7f9c889d97ce24336d370a55f273c3c6464fa,2024-12-09T13:15:21.793000 CVE-2023-23894,0,0,74009a3bb66389c37bbeefdbe2da0fc26902420d894707582f935310546209b7,2024-11-21T07:47:03.067000 +CVE-2023-23895,1,1,57da0b3a63bc1357fa3b132f52771afe6d729cd53f369d2620843c5ed4447bff,2024-12-09T13:15:21.920000 CVE-2023-23896,0,0,3f31e708781682d61cd8976a1c4659e99a0f6a692795e2497dd8366687e243e5,2024-11-21T07:47:03.193000 CVE-2023-23897,0,0,74aeacc16a3534644e121b14cc0deff3d1b96e000d7bcebaa3bb490dae6e9d61,2024-11-21T07:47:03.320000 CVE-2023-23898,0,0,28c1116ebc2fb83092e339e4dcc0271eabc0cd6e8390758885b7f8df720331ac,2024-11-21T07:47:03.457000 @@ -218305,6 +218320,7 @@ CVE-2023-23971,0,0,4e95a1c3c50888a782c8add70d2e5771127d2282380096f8baa12799e6a1d CVE-2023-23972,0,0,eb55fda58366890ef8982622224c6f4a3b0b53798d940da42cba93058e1cc224,2024-11-21T07:47:11.243000 CVE-2023-23973,0,0,522000d239815d7444e006daf5df856b170568ec6f00eb46ac911ef9c157c377,2024-11-21T07:47:11.367000 CVE-2023-23974,0,0,f6da80e0e0351ea6d0b02df5aa1bf9241b4afc96c35e75f0a79addb649d307e5,2024-11-21T07:47:11.493000 +CVE-2023-23975,1,1,cf038846a463b152c7c461650d6009011eb539ff935e24166e938561a3886489,2024-12-09T13:15:22.040000 CVE-2023-23976,0,0,b7c29ea46cb00ac158600e3a61186bbd2dafe359a8afe710d490b950a358c5ee,2024-11-21T07:47:11.613000 CVE-2023-23977,0,0,3e3beda45f56a16d98f2e96a01d8fece20d907253495d351d76f7f6e67e96967,2024-11-21T07:47:11.743000 CVE-2023-23978,0,0,ff7191db1fc1da9c775b56a9bdaf984811707a76ca46dc95d1cbe67723cc169b,2024-11-21T07:47:11.870000 @@ -218316,6 +218332,7 @@ CVE-2023-23982,0,0,6b6491c8330148040cb4057fb1733b1de5c9fac62ad4ab2e0b7403600b7e9 CVE-2023-23983,0,0,b96fdf69104ff91693c0fc20393a4807672d8bbd1f1d29450657a43b8a65ef2d,2024-11-21T07:47:12.497000 CVE-2023-23984,0,0,d7b32856dd3378c43968295f3e295d6314a0f98eaed1339af4b674a5c3f94945,2024-11-21T07:47:12.607000 CVE-2023-23985,0,0,61f04ac5fc308c2c9601e85f79b94f4a5b5fd0770a493495e206116240672f7c,2024-11-21T07:47:12.723000 +CVE-2023-23986,1,1,153d4ed52ed46b2bf1b03f1e43aa1bfffe04b962f008f5899a94c4fdb0060ab0,2024-12-09T13:15:22.163000 CVE-2023-23987,0,0,321012c2c457c78dcda0fb780073a99fb84973f993e37039e2dd33e4933fed99,2024-11-21T07:47:12.837000 CVE-2023-23988,0,0,4aea36b2679f4014d0083d8b04fc38185e89979c524099b1ac9a511750c3a025,2024-11-21T07:47:12.957000 CVE-2023-23989,0,0,95280ace9ebd55b1cabb079557f1d6bf59f494394b55ae3115bfab0c0fa65376,2024-11-21T07:47:13.063000 @@ -218566,6 +218583,7 @@ CVE-2023-2437,0,0,225eaae043eb2f8b6533e248cbd8b158dfa9d2f2d50334309a3f9b53226e65 CVE-2023-24372,0,0,239892ae50958d33037cab2e2bbfd1320924b87074c71623b18d170a1b64d100,2024-11-21T07:47:44 CVE-2023-24373,0,0,107994e1df97306f9a856b46d5628f563bc6eb23330cc6326f17cb853cb40e19,2024-11-21T07:47:44.133000 CVE-2023-24374,0,0,106d8ec4cc04e390dfefdc7816c2986ed31f550ae0f8fface3a519b27d8a3433,2024-11-21T07:47:44.247000 +CVE-2023-24375,1,1,c1be296e9cc539a093e68d8c22fe58ac5cd13912803afa407cc0f0975c533f83,2024-12-09T13:15:22.283000 CVE-2023-24376,0,0,7e8c1d5bfb70186cdf73b3d242840f0ba3f40be17b511638da78139199e8bc76,2024-11-21T07:47:44.370000 CVE-2023-24377,0,0,87457d50935a2e527375dde5df318eac134a629a0e80cba9fa81121b47396f6a,2024-11-21T07:47:44.500000 CVE-2023-24378,0,0,1e44592d84d7ca1913dbc88f2e610f7021df3acaba75632c8187ff923b9868d4,2024-11-21T07:47:44.630000 @@ -218600,6 +218618,7 @@ CVE-2023-24403,0,0,8fa32d946164376efaaf2620ffa91bf670b8cedacc35cda91d61fba262355 CVE-2023-24404,0,0,167b284b28aca3f396e2f9632265e9914f6ba93ab3787f801656242355c36007,2024-11-21T07:47:47.993000 CVE-2023-24405,0,0,b4009c7d638957fcf5baba92d35048c64d1f07e29a0d54cd23dfc601c3155ed4,2024-11-21T07:47:48.130000 CVE-2023-24406,0,0,cd804166f5fd93221f0ef2bec2a6ce69810f79b591dea7244f8096ce132e8bc5,2024-11-21T07:47:48.260000 +CVE-2023-24407,1,1,32aa38d066ec7a335eab86ff153db0d7f921ae586c75510dc36897099539b7f8,2024-12-09T13:15:22.407000 CVE-2023-24408,0,0,60da60eaec5aed4af17cd8a2790a14d12e0bf436ceaa9ced42ddf4526b50dac8,2024-11-21T07:47:48.380000 CVE-2023-24409,0,0,90e512201713f19f1cf6a22a06cd07de44815ae44b74abfaf0de91ed5d230751,2024-11-21T07:47:48.510000 CVE-2023-24410,0,0,caad190bc272d0db4a7215b1d39daacc2e5a9a6c7988d8dd02ad3a169a814c8a,2024-11-21T07:47:48.643000 @@ -219130,6 +219149,7 @@ CVE-2023-25022,0,0,c38238b3d4101062d1415cbd1f4bc7e2dc70455d3babceb0061f16b7ad3a9 CVE-2023-25023,0,0,c45147f78f152c5de7e5250be1230b569d95911ad1993835df83f2986c6e73a4,2024-11-21T07:48:57.160000 CVE-2023-25024,0,0,bdcb31bd13eef6b22cdc2734b4cd186dc267a3480ee347a6e53336d160599175,2024-11-21T07:48:57.280000 CVE-2023-25025,0,0,77016b5a6e011bd731313e2d152d1ead9502fa4f8700aa8f0ef6b3a0f498e001,2024-11-21T07:48:57.393000 +CVE-2023-25026,1,1,4457fd496bec7fc7e4afa2d307ae3dc6924eb95db4513f80b9ad30b402cac7c6,2024-12-09T13:15:22.533000 CVE-2023-25027,0,0,fe3b55e5b1b9a332fd8f464801ed7a9d6adcbb1de6d3b7e6a32b129c9b8db99c,2024-11-21T07:48:57.517000 CVE-2023-25028,0,0,22494f4656d49e01f6c4f60b6460589188fddf14e7a6e0709f43ac6c436fcec9,2024-11-21T07:48:57.640000 CVE-2023-25029,0,0,45b27099d0387dae90f4fc0505aa9b35a1e18a04d4c809b4a4b309af17947845,2024-11-21T07:48:57.763000 @@ -219139,7 +219159,9 @@ CVE-2023-25031,0,0,52bcdb226eb12a51d3e873a3030ad234ca73fd83566d402a0b7ef2768f33b CVE-2023-25032,0,0,52c788c44446f61f055a5ea7ab41de9949e1b6ed783a711a1d63f8cd1c608ce0,2024-11-21T07:48:58.157000 CVE-2023-25033,0,0,28aadad51b13d2a68202e05cdb74f7dd8263801ff503a1a26c0cdb047e844963,2024-11-21T07:48:58.283000 CVE-2023-25034,0,0,c617167bb5934445c3a3ffe5e0ddd111ccf6d296f9fdcfaa2959f4650b716f26,2024-11-21T07:48:58.407000 +CVE-2023-25035,1,1,e831a0dfe65eee662f97138d8925b27def09535face69b6243faad5554f0ba7f,2024-12-09T13:15:22.670000 CVE-2023-25036,0,0,33457b07eb30d0470bac07a601b1544c04fc8641564b5ea5973438bf10cfea2c,2024-11-21T07:48:58.523000 +CVE-2023-25037,1,1,af37d6622c0116e5dad2765b117a381d12eb62f8c3e20042a399b9eeabd057cf,2024-12-09T13:15:22.800000 CVE-2023-25038,0,0,d7bc051b38e68cf9f4b6a2bc39d647f15457e1463e8ea62914ceb176717dad6e,2024-11-21T07:48:58.643000 CVE-2023-25039,0,0,c32eebc99f7dcc5ae7668da2cc45ea6e31f43f4b26e303648c0bdf0c035db471,2024-11-21T07:48:58.760000 CVE-2023-2504,0,0,7181128ba62df7f8e33de6930d2cd65aa5ad9b7b973c4e8d8ffa398da3f5fae4,2024-11-21T07:58:44.320000 @@ -219151,6 +219173,7 @@ CVE-2023-25044,0,0,01a3239b05165b9d0b76589aa6ce3406f6a6060c764e191a294ea9c66d8e3 CVE-2023-25045,0,0,e3939b722065c6a0a06d7607200f6002a0e99f5a41ff32ba49837d30f88f0611,2024-11-21T07:48:59.550000 CVE-2023-25046,0,0,9aa307000d0f814525b42beee08a2a08452c0cec512a4bef947056a5179e386c,2024-11-21T07:49:00.327000 CVE-2023-25047,0,0,90ba64de7e48fb78c4b0d0665f1c0a60c18e2042a4594658bc5ee8965cd7b83e,2024-11-21T07:49:00.450000 +CVE-2023-25048,1,1,90dfc3d8948353a76ae0236588dea39deb579fa7799fdece194f68b6d70df200,2024-12-09T13:15:22.937000 CVE-2023-25049,0,0,c404c1d6920536e37c3ed02277ef9808a11e76a57bb1987bfa91a91bad5d1da3,2024-11-21T07:49:00.627000 CVE-2023-2505,0,0,22d1c282c412c65b85fb76a3fab2a74c52e9b09584d649a257d2eea7cdca3327,2024-11-21T07:58:44.450000 CVE-2023-25050,0,0,e712a31a102f9a45f7ba4119ddb437d121c1fba6e4763d2f05575c5ad2e99500,2024-11-21T07:49:00.747000 @@ -219162,12 +219185,14 @@ CVE-2023-25056,0,0,6e744de7ec7e6cdf534bc6c72aa0daefae55f538e7999c62748215962df55 CVE-2023-25057,0,0,a54158d9a05a6e059c863c3415644cef07bd073e531ab44f7aa9538036988828,2024-11-21T07:49:01.453000 CVE-2023-25058,0,0,4e70625378435b1af821b09004b836ef0f0c43276057e06bfd60412cb947a3d1,2024-11-21T07:49:01.580000 CVE-2023-25059,0,0,c8cb0f4b207c67d0a6b093080073af53cb99958fec73cf746e44a6c80ac37927,2024-11-21T07:49:01.703000 +CVE-2023-25060,1,1,0ae17db4bf54839a5c4a9c89a83dcf987638de9892518ce2c2ed0784076612f6,2024-12-09T13:15:23.067000 CVE-2023-25061,0,0,0938c5e9b6bf44e5dea4b594b34e925f76166534dd60cd93ee62f36b87a64c05,2024-11-21T07:49:01.827000 CVE-2023-25062,0,0,31895d4830f08f1ac656c1565b252e53cac8b66ea9cc08a2b78be927f06bbf12,2024-11-21T07:49:01.960000 CVE-2023-25063,0,0,0b1ba4b5ef34a232bf24e574d381f05d165cb95022a58eb2996cbcc1f0732c3c,2024-11-21T07:49:02.100000 CVE-2023-25064,0,0,a4724ec5805a645a0b6c91c0dd717964a708ef063f213e48db189e31b8d591e1,2024-11-21T07:49:02.233000 CVE-2023-25065,0,0,d992349792f90c1392f73a95472c50acf7c5c78f7a2534a5de3c56bf853fa2b8,2024-11-21T07:49:02.353000 CVE-2023-25066,0,0,9fd4d21f9f87bb444e665efd0d48ba86eb99e37aac7673be5a79a3a7a2b570ac,2024-11-21T07:49:02.487000 +CVE-2023-25067,1,1,5bcb0f4757b0e35d25e0873d819c2f16462dece7dbe9baa5a9366c8e394c7c81,2024-12-09T13:15:23.200000 CVE-2023-25069,0,0,249c3b4a3b20cdd1631995386e688e0dd272bcb83da1502d4142c0969f6a631b,2024-11-21T07:49:02.610000 CVE-2023-2507,0,0,fd94d1512aa25b7f0c85d521ddea312fc16ff137a967f9987d743b0f1911256a,2024-11-21T07:58:44.577000 CVE-2023-25070,0,0,95c90078ac53551cdda0941e41174ac16f21d603c474b6a376eb05dec1a9bc4b,2024-11-21T07:49:02.733000 @@ -219431,6 +219456,8 @@ CVE-2023-25450,0,0,52626529944979cc4c6bd62cd2ed7f4031eefdaf4a5c1c0c79d17ccbe3e34 CVE-2023-25451,0,0,c3a4ddbbe3f536e3ef9c02fddfe3467737878eacd28e2dd1493f565127581233,2024-11-21T07:49:32.113000 CVE-2023-25452,0,0,28f6d5375bbe909d2f16b624d4bca65b53b8cd00687f50df142ff44c93c062e0,2024-11-21T07:49:32.257000 CVE-2023-25453,0,0,9b1b466bb1315b567c29b1cca2eaf7ae1f6b5b66e8dcb868ad55e0cc64552a27,2024-11-21T07:49:32.383000 +CVE-2023-25454,1,1,3455a7a82beaa883575c82297c4cc6a2ef1bb4909c5561a205bf023a40e44030,2024-12-09T13:15:23.327000 +CVE-2023-25455,1,1,db03c7465e06953967631c9cabc7d2584f2da58ed20a9f7ce6317987631350ec,2024-12-09T13:15:23.460000 CVE-2023-25456,0,0,ee00d08a216169b78c5809fb9bf008b29bf71a91300a55e9f7b3a4048dd2908a,2024-11-21T07:49:32.503000 CVE-2023-25457,0,0,cebdb8a5bc290b0e5927b8894007ec5130d5d9f11d86c115c913583feb781f57,2024-11-21T07:49:32.637000 CVE-2023-25458,0,0,e71cfc9ea7290d0fad0cdc062964fb4932f51d8429b2eedf41d3b598cf5fbcce,2024-11-21T07:49:32.763000 @@ -219445,6 +219472,7 @@ CVE-2023-25465,0,0,7891074619cbabfede8214c7dfab9f2b2171a663280f842c30eec60c19753 CVE-2023-25466,0,0,df54b64548bbf7f2cc1b03923e31d1f9fe81f6cbc5615979b098a1b52276aaad,2024-11-21T07:49:33.747000 CVE-2023-25467,0,0,108b136db469529a240d4af389f8762a873e45436df4812dcdd1d2c5f66061e6,2024-11-21T07:49:33.870000 CVE-2023-25468,0,0,160f78207b2a89fd3c437b5b5c121243961828f4e340a9634cc2e4a6af1bfaab,2024-11-21T07:49:33.990000 +CVE-2023-25469,1,1,ab2812d361e52eb196224a7baa7ad7259131d2db234f56ca69a4a3b84633bf75,2024-12-09T13:15:23.587000 CVE-2023-2547,0,0,dee85cdd5eb07ba66d03c49e68756b6c9303efb3740054d49eded83094ffc135,2024-11-21T07:58:48.380000 CVE-2023-25470,0,0,7de62cc6cd1748ff209585240dcb1c702f0b1e30b6dcc7bd976edfebd854fd02,2024-11-21T07:49:34.113000 CVE-2023-25471,0,0,9634fa3602a05d83d55ba4403dda372454c7aa162a1f06d3ebfe5fefdcd83cbb,2024-11-21T07:49:34.243000 @@ -219463,6 +219491,7 @@ CVE-2023-25482,0,0,36bf2605e1f5e57a5c87c24026ff14d98bbe2807e1002a4eab12d9b95df04 CVE-2023-25483,0,0,29e3630dce7681a74269378e0161d7891880d1f8e60aaf4c2e05548ca23fe542,2024-11-21T07:49:35.743000 CVE-2023-25484,0,0,5458d23c0413fd2d254cf7b9e6a9c49eb31784a5de6c42e55f30d210bef45057,2024-11-21T07:49:35.870000 CVE-2023-25485,0,0,0d59bde7884ee28d5aabbc03a97d15c3d1f8afb1721b9560a2a6ddcfff0eca0d,2024-11-21T07:49:35.990000 +CVE-2023-25486,1,1,baa3e6dce66988ba3cc4f8795b8fbc352e26ff5adbcf7e7731709dc7048a84ac,2024-12-09T13:15:23.717000 CVE-2023-25487,0,0,b5517032b05a50953307acb28cfeb55db3b50cea88535f4dac2a79830f8c5f8f,2024-11-21T07:49:36.110000 CVE-2023-25488,0,0,966de58504e3622ca420b74e52bd97cdc602cbcb77e9ae1a3e66c3c41f389b29,2024-11-21T07:49:36.233000 CVE-2023-25489,0,0,3ff062172dff059327a75908011773354c6812a00af06709190e39566f3d53ec,2024-11-21T07:49:36.357000 @@ -219666,6 +219695,7 @@ CVE-2023-2570,0,0,50d82595694931d774e4f01cd35ff6092b3e43842d86aa07228d66b41bce6a CVE-2023-25700,0,0,e4f66a9f3680c32aeb294953d25f3ec4cbb81b285a7f1ca4642f20b670fed262,2024-11-21T07:49:57.897000 CVE-2023-25701,0,0,692301bb050b88eb5f85e376c22af7e4812a8ac50623f271bfe0d1504ce66984,2024-11-21T07:49:58.077000 CVE-2023-25702,0,0,82b5c9440ce711552a8300563c8f2a39792da4165bc1b8afe80359b14bec5f8d,2024-11-21T07:49:58.190000 +CVE-2023-25703,1,1,724c049eb8a6e66498b1ee34af1d7e62205ac86bd52bc8e045ac909dcac84a3b,2024-12-09T13:15:23.847000 CVE-2023-25704,0,0,389c486460b36af45c9b198460bc7108d20c020a89c1856737ca84467848151c,2024-11-21T07:49:58.317000 CVE-2023-25705,0,0,39385871d3ff3a09603ffc2ff14685fda2dd71baaec90a2580117da5f28725c1,2024-11-21T07:49:58.443000 CVE-2023-25706,0,0,f0ec5c448c59b7bb0e45c9f534a9fc982ccb76bc1ed0b8aecc940ba74ecc9735,2024-11-21T07:49:58.563000 @@ -219677,6 +219707,7 @@ CVE-2023-25710,0,0,9619028ffc0d2cd3d9aa3660844b77286117fd32e8dce7b65aa9228328249 CVE-2023-25711,0,0,75e0ab0bdf1eeb6f32e7574739d7e1b804a8722bd13a9a46c9118b7e91ff2eb6,2024-11-21T07:49:59.150000 CVE-2023-25712,0,0,911dd85ef7fabed1c2aa0a3c60a0158dcefea94382e1973d9b0fc3ce496c39aa,2024-11-21T07:49:59.263000 CVE-2023-25713,0,0,9447e5e6794ab61930365921d97896a42afe6eb8911c5835975e1093e652df98,2024-11-21T07:49:59.380000 +CVE-2023-25714,1,1,0e484f9074cd50f87279626e6bee95fa30180eb409cfcd8915a4d5dd191bcbdc,2024-12-09T13:15:23.967000 CVE-2023-25715,0,0,9d4734c60db6232111e4dbed4be21bc69af7e91f017742fb355247cf00d20f49,2024-11-21T07:49:59.500000 CVE-2023-25716,0,0,6a68a371fb70c98c3f42445bc57863f0a9fc317dbcca5e2cf2d7a9605735c149,2024-11-21T07:49:59.620000 CVE-2023-25717,0,0,e74d1eee0b5325b9355e668aec0a2894d959be2124ebcddfb4c6513e788921d1,2024-11-21T07:49:59.737000 @@ -219757,6 +219788,7 @@ CVE-2023-25788,0,0,3b09f5a30d0ef88e3addce5040fa6b8cbff7cab64790deedb4a095ac5db36 CVE-2023-25789,0,0,c586a4ea6c83b2a91db5b5bcbc6ee1e71d8e88b22c307a9e6c2088d62eed5ae1,2024-11-21T07:50:12.387000 CVE-2023-2579,0,0,1e5a29846bd81c36e30f599fae289d7bd2d292c08507ba67edde202ddf40fed5,2024-11-21T07:58:52.127000 CVE-2023-25790,0,0,d63e8ba25cce0410a7e841ba3b673d6c65fdf62d790dc7c959277fefc54e5544,2024-11-21T07:50:12.507000 +CVE-2023-25791,1,1,3bcb63657c7b38a45fde236ab9a39d08f7f51283b663ade09ec5449a821bcd9c,2024-12-09T13:15:24.097000 CVE-2023-25792,0,0,2312627ef9ab7936c42555252de7559a15e7e63ba4521e6c6117d0bbfc36190d,2024-11-21T07:50:12.620000 CVE-2023-25793,0,0,c5edc0e4ebde46f1c5c19bf4cc4ad8e8c2d13b4be4d3f6c55e0f7700ac0aacc2,2024-11-21T07:50:12.733000 CVE-2023-25794,0,0,4233e233c4d3c0cf1452a1ebe496c03653b51f9c3134b2c1a51f11e7b568b654,2024-11-21T07:50:12.860000 @@ -219912,6 +219944,7 @@ CVE-2023-25955,0,0,a5674fef30cfd50e0f69ca26585ceee9624b2e16aac77484f6a586723321b CVE-2023-25956,0,0,d35b58c231ec89240b887ad75a98ba5a0c50817f8520b7ecb0e99688c228b62f,2024-11-21T07:50:30.970000 CVE-2023-25957,0,0,3ce627ddff280b8eefad8e286a8185f36b639c36d916c6e3ff978bfac6abc023,2024-11-21T07:50:31.157000 CVE-2023-25958,0,0,07ccf660ba18811cc42c683fb4dfa32b40815c4a3d128b0612fd215fdf0dad15,2024-11-21T07:50:31.280000 +CVE-2023-25959,1,1,f7585fce3ba2ddf3ef49fd8742d078983a31128172f631ab8e4142d1de534151,2024-12-09T13:15:24.230000 CVE-2023-2596,0,0,db38c35317e88d042a3accfc3dd67f5c5785a7ccd81be41c5b69bdfac17d0dd4,2024-11-21T07:58:54 CVE-2023-25960,0,0,d5b677c1d66d1a58e7a7b37b0b27649550d6cb60b370aa1b7c3933f2a6959254,2024-11-21T07:50:31.400000 CVE-2023-25961,0,0,39814954f65a91a4323644d6586f45689381c8d165dbd0834b01c2fc80644dd3,2024-11-21T07:50:31.520000 @@ -219919,6 +219952,7 @@ CVE-2023-25962,0,0,3d589446be3dcebbb5955bcff4ea12b085e1310c4f11ee07b98ecb6fd1793 CVE-2023-25963,0,0,f6642a43be56e1e3b6d3981aee6b65bbc3b2aec8599ea348c1e42030675c035c,2024-11-21T07:50:31.750000 CVE-2023-25964,0,0,20d90356ef2902c54a1cd0dd154dabca818d894779eb34ae9908939062dd3779,2024-11-21T07:50:31.870000 CVE-2023-25965,0,0,37c452616c3bdf0fcdaf606a8b0b0c7cc0d7696337a5231531548825d42b4a48,2024-11-21T07:50:31.987000 +CVE-2023-25966,1,1,96fcb87593ba6983dbc47513ec61d340e6e31c6e447bb5116581fa64dbe5e72a,2024-12-09T13:15:24.370000 CVE-2023-25967,0,0,df78ed2b179ad1e74b516bb8f3891499a53ad1c111ae7857dfd66fe9fa6216a2,2024-11-21T07:50:32.100000 CVE-2023-25968,0,0,961b85cebdcd62a2617feb910c5ed8523547069f3019f8dd95d3b20de855146c,2024-11-21T07:50:32.220000 CVE-2023-2597,0,0,303cc785566dc8801b26b54d7ade491ff996c6bc976f3b826f6eff26020c8f98,2024-11-21T07:58:54.127000 @@ -219946,6 +219980,7 @@ CVE-2023-2599,0,0,b76744f3acba41494cb805e3f6269130779e31e079e7b68345e4049df6dc4f CVE-2023-25990,0,0,70ac9550644dbe096e9806e0516a248c4369b252624d2e770e3a58db941a6abd,2024-11-21T07:50:34.830000 CVE-2023-25991,0,0,217fd7b6cc0dc181d40443725db551fc8f75c3541ac2f33bfe356f9e1e1a92fb,2024-11-21T07:50:35.013000 CVE-2023-25992,0,0,eece75fda217904df813650485417d68f6045dd9f5fd72ecb60658ead4feae2b,2024-11-21T07:50:35.137000 +CVE-2023-25993,1,1,27f58278352c505271e57f1b90fdf36a8bd557542c62e107cef32b3149e0ae1f,2024-12-09T13:15:24.500000 CVE-2023-25994,0,0,caf61fef662ce4d6d0dc2751e7868978024a548f7dda40e15bfed14ed72904fa,2024-11-21T07:50:35.260000 CVE-2023-2600,0,0,84c160f4e8753f60b46a2ddf820a732144b973f93dc5cd474c235d61736051a0,2024-11-21T07:58:54.503000 CVE-2023-26008,0,0,5e6d6641f92c61ee1423f72291fd4b9b8091c1ec2192c28625ad23dfdfd34129,2024-11-21T07:50:35.390000 @@ -220405,7 +220440,9 @@ CVE-2023-26517,0,0,a3514b9eb03b32435832821a60b86278cd4e87a80941e58a62e773aee7590 CVE-2023-26518,0,0,c6a122c04ece2b09554db8251246b7c5205e644254286094dd4981ecc61e8093,2024-11-21T07:51:40.093000 CVE-2023-26519,0,0,7b8bfc9cf19ac9bb697e5802a2935250d0d746f3c159bc834fcbc60b8c303770,2024-11-21T07:51:40.220000 CVE-2023-2652,0,0,39332d82d3e406302a233e1bb71031ecbff1c5169f1f7c7b80ea5ee6fc52185f,2024-11-21T07:59:00.557000 +CVE-2023-26520,1,1,1a7a8cc6d27aecc432d1835b1eb951a59200dcf6b4f175007d6e85a8807c3573,2024-12-09T13:15:24.623000 CVE-2023-26521,0,0,9b025c0740b71806f679769b8c710244bb74bf3dc6394de4036ba9f960ec51d0,2024-11-21T07:51:40.347000 +CVE-2023-26522,1,1,2e06b33c8d4dfec4ccf5e5c873ff10f6c573cffaf71bfcc154a6bec0b9cc4da5,2024-12-09T13:15:24.777000 CVE-2023-26523,0,0,e57f98036f26a1920e749f1b338a2ba634a30a2031ed2d1aab6b09d7931c7959,2024-11-21T07:51:40.467000 CVE-2023-26524,0,0,02151efd7bae8537ebbb9dbd3413a130a03e2425346072e00f0a0df666dc2ece,2024-11-21T07:51:40.577000 CVE-2023-26525,0,0,732790b8aaeb6da11e651ac39ecaabeb7f852af4619c870b6175d12b10cbc1d4,2024-11-21T07:51:40.690000 @@ -221001,6 +221038,7 @@ CVE-2023-27424,0,0,6d184610d469ad7c554ed227ae88c31a615650642615f565010269e944b2a CVE-2023-27425,0,0,b71af69b963cc8f3c2458a44d2d76ee967445a43c08a2b58f9921ff3eff2f055,2024-11-21T07:52:53.300000 CVE-2023-27426,0,0,bc5ce8e150fd46964d0718b5e3bfdf8c20403b04ba34f72559c7e3ae5f522843,2024-11-21T07:52:53.423000 CVE-2023-27427,0,0,a68e0033cdfeeb1981d392f1d6f899f76b2a41566b10c03908544b59896c8474,2024-11-21T07:52:53.563000 +CVE-2023-27428,1,1,eb4976738f5d223722770353eef530d5321091e3c36818eaa490fb12f0ae5a24,2024-12-09T13:15:24.917000 CVE-2023-27429,0,0,44330f4c562f6fc42675ded672e825ce740f78fd23cb2e04b22e37010f1a91b0,2024-11-21T07:52:53.683000 CVE-2023-2743,0,0,15428878f46f968790f3e1d5b97fae48aee1c99c519bb84811af9cefb3674882,2024-11-21T07:59:12.503000 CVE-2023-27430,0,0,39cdfd6d0918aedca08b77dff0ba97e92df4fec3bee1c3fd088a9c365aa1567e,2024-11-21T07:52:53.793000 @@ -221023,11 +221061,13 @@ CVE-2023-27445,0,0,8d4d32812feedc5bab6fb6932ff77743b99a067d7aaa1e2346be21127ac26 CVE-2023-27446,0,0,1b8b76c9273752b6c01a0e0ebeec81194722ec0717eb7929f97009dd0061eaa2,2024-11-21T07:52:55.850000 CVE-2023-27447,0,0,4892455b4ed147f284ebd92a30d064ed670fc5edbe110607455ced5d2a6940f7,2024-11-21T07:52:55.970000 CVE-2023-27448,0,0,f940dbde72372910d63556ce4e502dc6f086d323266775a6ad5763435e0745af,2024-11-21T07:52:56.110000 +CVE-2023-27449,1,1,b32aa572aa205bcfe43cc214e108c1d88aae4288abbda7d5fb464c8c2dc3a955,2024-12-09T13:15:25.050000 CVE-2023-2745,0,0,d6aa0a744f7f88557636c8e91859010c5514789fdab53c04d2d7653a8a84bdd4,2024-11-21T07:59:12.713000 CVE-2023-27450,0,0,eaaff15e243ed35a04dac2f517f1c57407acf33ca2ed330fb41e6e66118c42f1,2024-11-21T07:52:56.240000 CVE-2023-27451,0,0,42b40fa475e3554e3e6934b75ce24a1dc25438fe272291f26d75a55309d44c02,2024-11-21T07:52:56.370000 CVE-2023-27452,0,0,9fbcdb9a4659d936bd8fb36408bdf3697ab7448fc078ff4db490aeb2c9622d37,2024-11-21T07:52:56.493000 CVE-2023-27453,0,0,20bd3bd805e9a827032d50e720c0a731c9de37fc1fda790dd2f403a1c7ab4e4f,2024-11-21T07:52:56.623000 +CVE-2023-27454,1,1,c48c533e060582ade3413057ab25b3eb1b5207b8e87643ee0797a76ba79ce52f,2024-12-09T13:15:25.177000 CVE-2023-27455,0,0,e69bd1ece19d8f81dcd85c13d223df939b3387caab24c9f573621fa733edb5bf,2024-11-21T07:52:56.770000 CVE-2023-27457,0,0,de46a60b2f8a2036047b7f6ab0faba38995666913ecc22f1270b64e6d8c59e8e,2024-11-21T07:52:56.920000 CVE-2023-27458,0,0,72f63a7dc4baad5b877257b3e2edfdcf3718e24661edf4a00069bab70ec5e210,2024-11-21T07:52:57.050000 @@ -221187,6 +221227,8 @@ CVE-2023-27621,0,0,b901783c1536e1c025f19d5d3f3d3fb34b61d440d3e0a045f8ec50bc9d3cd CVE-2023-27622,0,0,344ef9a394141a8a5b54898ad1134380ccedff9dfc0fd8da7bf62fe0d5d6224a,2024-11-21T07:53:17.197000 CVE-2023-27623,0,0,1e2bd9d49b961ecbf991035d5fadb269fc246688c9ee2cc7763a12a0eb74a6db,2024-11-21T07:53:17.333000 CVE-2023-27624,0,0,d3cab75fba8e85e73bea86e4ce05e19c87d6d1ce2a67648a59320f928f9d7a91,2024-11-21T07:53:17.467000 +CVE-2023-27625,1,1,8613541d33e12464a472bd326063dd4cd7e0857681e2c159e04b621119d9d1d4,2024-12-09T13:15:25.303000 +CVE-2023-27626,1,1,215065fd9afac7cd8ce36c275b5bb00cd92b3bb7e80d1bf2b0765b0edc6db363,2024-12-09T13:15:25.420000 CVE-2023-27627,0,0,94b6aa8410d43e8addeaad7a532e714cc17ce756cc042ad65591e06523cb7872,2024-11-21T07:53:17.590000 CVE-2023-27628,0,0,12742fa77318997a76cf3e3be93a7373cceb356b8532f4497733ce447bcd9c1c,2024-11-21T07:53:17.720000 CVE-2023-27629,0,0,9309a84f12aaf1b1a4db20486928efffc59fbe0d57e2ab07e329e731446d598a,2024-11-21T07:53:17.850000 @@ -221636,8 +221678,10 @@ CVE-2023-28161,0,0,fe16d67b1bd421cd5819329f2cd10ab4252f4605b312b40df03f13bed60fa CVE-2023-28162,0,0,c0fc6938a251be037e6ba911423d4b66c5218fdf0a491a60a1b4355a5a4c5622,2024-11-21T07:54:30.837000 CVE-2023-28163,0,0,6c0233265de2af129dea10504855ca3f2105097cc529247d2fe9ccdf083ed332,2024-11-21T07:54:30.960000 CVE-2023-28164,0,0,83b8a611ff40e22a135b86d9f2a02866c1d62577cfa65a833d8d755130adf0b5,2024-11-21T07:54:31.090000 +CVE-2023-28165,1,1,117905429bbc531d5b86a1e3afcde854976c47f3b7945995a54cac9d7084a8d6,2024-12-09T13:15:25.550000 CVE-2023-28166,0,0,fb7089501e9bd450e58cecf7786e6c54c706675cfc74a25a42071c5aa0b89eac,2024-11-21T07:54:31.227000 CVE-2023-28167,0,0,54ee421e317802e0652c255216e057d7a604cbe327ec5d1a59870afab5fc6ea2,2024-11-21T07:54:31.367000 +CVE-2023-28168,1,1,29cc0515f514106a02ec29ec5f03cbe6e745e636e46f6f7c49601ffa378c7837,2024-12-09T13:15:25.670000 CVE-2023-28169,0,0,2f9a60cea0b4a177f169ef9ed9084b09b663c9573896bc0c197a53eb82d43b66,2024-11-21T07:54:31.503000 CVE-2023-2817,0,0,7f14141b14e584d689756c6c2ace0268e4a0dd7d7a701264a4d7313e437c5d58,2024-11-21T07:59:20.883000 CVE-2023-28170,0,0,946783bcf2903a5f4fab4628de65d338ccb7ce60a67f74813bfef6fbca785c89,2024-11-21T07:54:31.630000 @@ -221882,6 +221926,8 @@ CVE-2023-28412,0,0,018c981340f217bbbfc219bbec1d653c50b130d19003aaaf23a15f7a99344 CVE-2023-28413,0,0,12778e00125ecb388ad0d1f211f0e2642299095042a0935910390dd6d28cde80,2024-11-21T07:55:01.097000 CVE-2023-28414,0,0,665229fa8acbd226853c3a758826435b0d0456499a7d078fd6ad4a52210d772f,2024-11-21T07:55:01.200000 CVE-2023-28415,0,0,a5791734864e12842d75be01c8f1677a7f5cea03788886829006e74e2439a9f4,2024-11-21T07:55:01.313000 +CVE-2023-28416,1,1,934bb464831a8bf29b89f7c12e5cf025dc81f0c9d7d97b70bc9d9b5ecdb59fe5,2024-12-09T13:15:25.837000 +CVE-2023-28417,1,1,1ca2ae01a9789f78f4d2b7c95057d3c08e6d4b2e7c07668fbbaba0f23b920c34,2024-12-09T13:15:25.977000 CVE-2023-28418,0,0,dc330bd0de5a0e11ea2bbdae80533a3190d66321c886f2a9f652f7e6154144d2,2024-11-21T07:55:01.460000 CVE-2023-28419,0,0,e0f4e09af667dd171d89b21bd294ec2c99db2bf5c3c9fedd4f164736ca4165b3,2024-11-21T07:55:01.590000 CVE-2023-2842,0,0,6f2490aba961dc2f42888795318f086e53f25eba3c68f10742b09e0f4327e8c0,2024-11-21T07:59:23.910000 @@ -221995,9 +222041,11 @@ CVE-2023-28529,0,0,386fb0c088d9a922cc08e6eda220f2e51fb4640b14082ff4c739ed06d9954 CVE-2023-2853,0,0,fb787171c46911da9de835f4be6fc6a8a6a5826fa2dc8aa52e99966dcc57bb0d,2024-11-21T07:59:25.447000 CVE-2023-28530,0,0,b1b46c2911c136b7d2898df67c6bc7443317f11a5edd1d1af944058b44d69ec2,2024-11-21T07:55:17.480000 CVE-2023-28531,0,0,45ecc3b3ad788b056e6708c31e5e9ca7fe601bce76c45cd2c191aa636d3bd83d,2024-11-21T07:55:17.627000 +CVE-2023-28532,1,1,6ca39c3861d4f1313930a554d80aa52d2b9e8b9c4bf387230ac4bbeb10266e13,2024-12-09T13:15:26.107000 CVE-2023-28533,0,0,80fdba6129d5cb43c878df4496f262391ed2ce918e4391acb5ba31334ff4239e,2024-11-21T07:55:17.783000 CVE-2023-28534,0,0,add6eed07f7b29224facff18cde9949515a9f7bdbe413ca8b50d59cd0b6a46b3,2024-11-21T07:55:17.923000 CVE-2023-28535,0,0,e8f39fc59bcabb803f5a3c266e1579353ed474cb74b84f00d8563a6cf6c06f6f,2024-11-21T07:55:18.050000 +CVE-2023-28536,1,1,3901a625be50ffe2e389d6a8d94214b38d2f0368f216090f1322dbce2f97905b,2024-12-09T13:15:26.240000 CVE-2023-28537,0,0,de5cf3b023e579049bbda6a2f33cfc6992146d5e6457f6f4d3d686c6588d0a8e,2024-11-21T07:55:18.200000 CVE-2023-28538,0,0,6fe33062b2cc27026008b1a6d71546d21d88f551796821ac448989304bd501e1,2024-11-21T07:55:18.670000 CVE-2023-28539,0,0,1535ad7a4566819de1df659b7d45cb3761598963180885f8220f344f3b3b1e2c,2024-11-21T07:55:19.010000 @@ -222148,6 +222196,8 @@ CVE-2023-28684,0,0,4c986b655539f2c1f76d1b090aaba59d8a4ddd92746eea6f1830c296766a1 CVE-2023-28685,0,0,658083785298e53ddf6aa90648b9d44e88c968a84e6bb685839c5265a01391fd,2024-11-21T07:55:48.230000 CVE-2023-28686,0,0,9a6bfec58f3de7d5db77eb1c832d421d370eaade63901d222690fac40d1d4224,2024-11-21T07:55:48.343000 CVE-2023-28687,0,0,d2c035ca653bc8cac64edf153e3b1ee09b48eedb85d2642d9d181eb816044d42,2024-11-21T07:55:48.500000 +CVE-2023-28688,1,1,2b20c76ac32367a8b5c3a978e1d0dc3b4d5a871ff9ba2b736a29d9a4b947b547,2024-12-09T13:15:26.370000 +CVE-2023-28689,1,1,2383fb1f758a5135f814a78242d19f22cd5920af0d8b44f8cf4169f3c603ea8b,2024-12-09T13:15:26.500000 CVE-2023-2869,0,0,f1d74ec9bd04bb9988c20b51ba19f55ca39a3718ef5a457487b24a32ea8b2cda,2024-11-21T07:59:27.530000 CVE-2023-28690,0,0,ea0faec1d6a92542cd468c31e361e62729a0237f2adfa712722cd0feaac88bde,2024-11-21T07:55:48.630000 CVE-2023-28692,0,0,3262584b0e220bc60989d8d3e90b18e9927f10209e9a43ca50c21be8d5e18292,2024-11-21T07:55:48.760000 @@ -222584,6 +222634,7 @@ CVE-2023-2917,0,0,53f93b220e6679003249d2250d092dbb4f1cbeaaee0e29556caf9766d81bb0 CVE-2023-29170,0,0,60255ffdb178927216cc19e1e018839e6d91753c97ba1575a7ee90ee5953c583,2024-11-21T07:56:39.230000 CVE-2023-29171,0,0,7a24520ce55e05af1e465192c3b692e97b70e7f5b7b2c328f969682d381fc3c4,2024-11-21T07:56:39.340000 CVE-2023-29172,0,0,bdbbf9d36630ebe4691398a0b26696d386445b90c61697346d46f994eddcd3e3,2024-11-21T07:56:39.450000 +CVE-2023-29173,1,1,869a612f3d83db12c09939fc0d1d94a3da4f695a7987145f4dc2e690306b67da,2024-12-09T13:15:26.630000 CVE-2023-29174,0,0,60d4c62538ccab7168a6cd1f2a056c225b5c01512c96133b1a896e778a7454c6,2024-11-21T07:56:39.553000 CVE-2023-29175,0,0,29ceee8620dffa511afd919186e9b4ab646732bc7395836fcee591326fc57bd1,2024-11-21T07:56:39.663000 CVE-2023-29177,0,0,34e536b2dd6516017134ae202be208043d632e379b245de54d5f97456f70853e,2024-11-21T07:56:39.793000 @@ -222632,7 +222683,9 @@ CVE-2023-2923,0,0,1785972f4d67cc8f83c3ca06db4e8914d84b21d5ccc07e0e55911e9b5fccfc CVE-2023-29234,0,0,d44e8c9b7cb87da9599c5060c8c1b65844c803c30d614b3d256373a1345a68d8,2024-11-21T07:56:44.270000 CVE-2023-29235,0,0,77360807621d09932e7b5c5e5ce00c65afd22336b84b4e766cc708fadb8d760f,2024-11-21T07:56:44.397000 CVE-2023-29236,0,0,ada45dc8b4dcedf5d03dc5a74099f25669289b68f6890de96a5ef4a8c4ce80d7,2024-11-21T07:56:44.507000 +CVE-2023-29237,1,1,7bb6ecbcb4344d1004896acd1d8a5bc24c70a45fc9a8d101a42cae8d939e5238,2024-12-09T13:15:26.760000 CVE-2023-29238,0,0,504d56b14363a029c3039b900ccaa69ed6df0b8e55ed98b8f3c8bbe08eb4bd75,2024-11-21T07:56:44.603000 +CVE-2023-29239,1,1,72fa9290907534aa066aa2a66ea954903b3e1ab09911971917529de233904ba2,2024-12-09T13:15:26.887000 CVE-2023-2924,0,0,1229dabc84933fa194f7babffe3249de520f2ee9ede7a909dcc130373135d1a2,2024-11-21T07:59:34.527000 CVE-2023-29240,0,0,cb5ab1001b15df2ed49385b777c6def72e382f9adb10df2c3aff7623aa728e1a,2024-11-21T07:56:44.710000 CVE-2023-29241,0,0,fb07f54da2c2852149b39e96b9319e8a4b8893ad8db49d2f0ea34e3cb4ca667f,2024-11-21T07:56:44.813000 @@ -222801,15 +222854,19 @@ CVE-2023-29419,0,0,eee99d945f06108a5e40a1ec9c523d1176d85c277e5d1c52341cf8f78429a CVE-2023-2942,0,0,bcea677d5638e51b06efa8283ee788187c34c42641149d304d360989514ef932,2024-11-21T07:59:36.943000 CVE-2023-29420,0,0,e2b6c7bb8587b7680c7006d5e1355d456a81008ea4d057255a2c0081ee9dd6a5,2024-11-21T07:57:01.760000 CVE-2023-29421,0,0,3480105a35b1fc45f53ba6202bbea9ada34c4f35cc82b1910e8fe111f5eb12be,2024-11-21T07:57:01.903000 +CVE-2023-29422,1,1,2342876d495ca610e0d702158cde0ee87d3c69a818cf90cd5558728813aa9d36,2024-12-09T13:15:27.020000 CVE-2023-29423,0,0,d028bc30e5096a145c0be183f3ed1de05081dd514a97251140042c62dc30ddf6,2024-11-21T07:57:02.053000 CVE-2023-29424,0,0,a4b9b592f3a43e54040dc151817c2d7b0444853daf763f71b6d607e9267e913a,2024-11-21T07:57:02.167000 CVE-2023-29425,0,0,3abb8b43714388b9111927fee4f9f1318a69d31c31f77cb66ef64d093cf17eb3,2024-11-21T07:57:02.283000 CVE-2023-29426,0,0,fd89d6e7c2eb0549369f5e6265d76248b5af0ab021145a369f21cbd3744bacfc,2024-11-21T07:57:02.400000 CVE-2023-29427,0,0,2747a7375fd677e15183c5d755ea4a8056eb12b978bfaa270037daf820ba8617,2024-11-21T07:57:02.510000 CVE-2023-29428,0,0,d391d19883b6575b2e8643de653f1cac482105d0747d48f87f1f93c7de85704d,2024-11-21T07:57:02.627000 +CVE-2023-29429,1,1,a49b1b9c45d18efe1c03a04557eb6df8fae5704462e1a98ac7645028c4ecb782,2024-12-09T13:15:27.153000 CVE-2023-2943,0,0,8fe191f1bf840269442a2bed1f427585acf9f562712a8131475be16487f77b57,2024-11-21T07:59:37.070000 CVE-2023-29430,0,0,0037a7442f80b5283a1fa4eb1e21c5bea88e883b4dd73d6a706ff70b3d826c97,2024-11-21T07:57:02.740000 +CVE-2023-29431,1,1,84d3840feb64a617829a65ffde2cad716637e1d1e2841ea068d6807a720a4191,2024-12-09T13:15:27.283000 CVE-2023-29432,0,0,eee705bb20cafbce01ce984a074ea86343ce705875b8fc0b55302ce9e1aba8bf,2024-11-21T07:57:02.853000 +CVE-2023-29433,1,1,8a2eb77548356b12242b78c29c5e53c902ee8f50e121838839156a29603bea64,2024-12-09T13:15:27.407000 CVE-2023-29434,0,0,6b633bc545ca3dd850d02798a85d8ed9a99078cf1f40255a6331aac3fa415504,2024-11-21T07:57:02.967000 CVE-2023-29435,0,0,db695a59d50d94121cea65834dd38d7a56155494f0c071e363283bdf6c437502,2024-11-21T07:57:03.083000 CVE-2023-29436,0,0,dcb926af61a6067bb68b8073dabc6e9e3b5b933dfc0bb4029400029ac2dc24d1,2024-11-21T07:57:03.200000 @@ -223404,8 +223461,10 @@ CVE-2023-30472,0,0,0be88802a6db6fffe267668a3b4dccd742d470cc4204604d482f704b74d9c CVE-2023-30473,0,0,7e1c7728842ba214bc17d11b0a5baee89132aa0d969c1799c316efd564b4b709,2024-11-21T08:00:15.277000 CVE-2023-30474,0,0,c7000d8722b354426175c46b4db8c5f8aa6b6894f0d64d24e3347d1cdb87747a,2024-11-21T08:00:15.397000 CVE-2023-30475,0,0,a407e7073f19cfaa7170a61f827cabb8cba66043f6f9f2424a061cdbc4ee64aa,2024-11-21T08:00:15.520000 +CVE-2023-30476,1,1,8058180433f8fa009791b55555114e6dde587fc6b090f4bfc81a110ae3abbfe1,2024-12-09T13:15:27.533000 CVE-2023-30477,0,0,4568b3a69702ba0319c9d515465b79c31e0071893d0185b6fed3f12e7e9fc13a,2024-11-21T08:00:15.647000 CVE-2023-30478,0,0,56e80ed6a8ebb97ae319396dc836e4596ee4803d3c3aa60d6e288aa028fdc144,2024-11-21T08:00:15.773000 +CVE-2023-30479,1,1,6fbb533bcf70b49ae420f1f2935e24fa418ec47a10ed83ac92a27d8655a0b6c3,2024-12-09T13:15:27.660000 CVE-2023-3048,0,0,11009fc7e7702a20c10cbff552324e5624d5296870541181738d821f070b9e2d,2024-11-21T08:16:19.393000 CVE-2023-30480,0,0,13646a5573b3bae9eabe715d79afccb14d398d177699d95f5ea0c4a8b867944f,2024-11-21T08:00:15.897000 CVE-2023-30481,0,0,de2ed26b15ffe6a958ff0cde1824db0c2ea21abd4875bdcd60b61e8786d8e2fe,2024-11-21T08:00:16.010000 @@ -223413,7 +223472,9 @@ CVE-2023-30482,0,0,be715f183629d4f04cb02c853c9d09b144c29e141fc1ef0cecd92f826bfed CVE-2023-30483,0,0,c9a35055cd373bdd5af641417f64b25da26b85d9781eb809a05f9bf8dfd9c767,2024-11-21T08:00:16.273000 CVE-2023-30484,0,0,47b77b4796d96623a658c1d6f918b3b0ae410f616f152a1a3b60afdb6d0bebe0,2024-11-21T08:00:16.397000 CVE-2023-30485,0,0,bb4febcb615bd84ebd705ee5fe9d9e1fc99460b927a42263b75bea1ba10bafda,2024-11-21T08:00:16.527000 +CVE-2023-30486,1,1,5e93c13526423ab7b3e0d6d9e9df31e6a39e46ef6893cd780cffc5c3f852a147,2024-12-09T13:15:27.787000 CVE-2023-30487,0,0,ec14cc7898c658192b3a9530169fa67931cba8110ebaed355c0af0326cd28005,2024-11-21T08:00:16.653000 +CVE-2023-30488,1,1,b4687e713f77dba428b2a7dd22ea878304be8fa83ab4c68bd859071968f1f7db,2024-12-09T13:15:27.907000 CVE-2023-30489,0,0,399a7135250a750904ee597e7be7e6bd546867f3108f79664fc8569fa8c8a044,2024-11-21T08:00:16.780000 CVE-2023-3049,0,0,f45174db219eaf48f1f986e00a9d8599553ed10a40bad4bfa995813682975359,2024-11-21T08:16:19.540000 CVE-2023-30491,0,0,42a5ae30da1307108e333ceb0d151f605ee04cb320fa4d30ff0af67236b64af2,2024-11-21T08:00:16.910000 @@ -223675,6 +223736,7 @@ CVE-2023-30744,0,0,00349a8d5f1d05f9cb060f232943b1edbe2be496a60e64e9c832bf9786a21 CVE-2023-30745,0,0,6cef712bfe6ef5a37aaff992671b82bb087635b01cea5b74ab1d56208a414bdb,2024-11-21T08:00:49.253000 CVE-2023-30746,0,0,8b2a502ab0ba609b516bb45947b661b6d8386d6bd24639cfad877b2b2926d0f3,2024-11-21T08:00:49.380000 CVE-2023-30747,0,0,786383e989f679af73bf66cd357a7b5fc6d542d808c37785e130e3ef1129ec98,2024-11-21T08:00:49.510000 +CVE-2023-30748,1,1,d1e1544c88a35077085222e79952b6d84a20d6bf5e99d2468e41a064b6530334,2024-12-09T13:15:28.030000 CVE-2023-30749,0,0,c446981d4e316f3ffa607a231b07dab06ca63ec6d33e9ac268a68740f67e0712,2024-11-21T08:00:49.650000 CVE-2023-3075,0,0,11421099a613e716c40dfc3cb829f7d9ddfea1965d2db3b2426e5a142a9a1794,2024-11-21T08:16:23.293000 CVE-2023-30750,0,0,ebb6788dbfe3ee45fce7d29973868406b07a8292cbccce4ebaacac037b0263f7,2024-11-21T08:00:49.807000 @@ -223711,6 +223773,7 @@ CVE-2023-3078,0,0,4513f863b596a99ee61adacab88f4f91e6348855c710049b2d3e23c7c225bf CVE-2023-30780,0,0,71e9d00cea8d36083dc28f09df1f1953bfa67a148911d3065b93929d016e4905,2024-11-21T08:00:53.517000 CVE-2023-30781,0,0,dcc6dad5788fdb53b8bdf675713841458121dde236baedf8fe6d968800d4d1f0,2024-11-21T08:00:53.640000 CVE-2023-30782,0,0,078983d27cc6985e57c669a39421a0f4cd23f4f2694ecb3ebe2e37fb9ebeaf39,2024-11-21T08:00:53.763000 +CVE-2023-30783,1,1,d7543f7a7bce038cea37e799f60ca0ef6f1f83640cd25fc60e34f04e1732a0bf,2024-12-09T13:15:28.160000 CVE-2023-30784,0,0,9db24d0c47f5c300469337514ecb5b5609bfa9a19bf96f00f0731d7cb6b3846f,2024-11-21T08:00:53.900000 CVE-2023-30785,0,0,6fdf3f3aa4539bf335f696a50b618cb8824a5cf7219df006f18e64aa9e099acd,2024-11-21T08:00:54.030000 CVE-2023-30786,0,0,8b5a3d236768090b7d5e359db3751a0ab3be52873407f171a6f699146d3b1c52,2024-11-21T08:00:54.150000 @@ -223773,8 +223836,10 @@ CVE-2023-30867,0,0,6209cdddfea6bfa4de6e8f98a67a23c327b90abc77aa6d6ea031f4f03aec8 CVE-2023-30868,0,0,77838ea086b7289562887f7e6d0602e35f931404b3fa16620069442ef92d9257,2024-11-21T08:01:00.437000 CVE-2023-30869,0,0,9125163336bf833c35c53cfea768919b746b13833a940a04cc4ee1a527bb2614,2024-11-21T08:01:00.563000 CVE-2023-3087,0,0,26b7cfb975445200143a9d9a01ddc2b1346846cdb6963af33839f4e5ae7398c0,2024-11-21T08:16:25.003000 +CVE-2023-30870,1,1,6190178ac3eebd21a964888bd0884f3fd4b63b1a3de673a576885bc035caee2c,2024-12-09T13:15:28.283000 CVE-2023-30871,0,0,f49bb7b8609170780d025a9acbf161dbdbe3ffdddc08e73535c2975ef767c309,2024-11-21T08:01:00.683000 CVE-2023-30872,0,0,b631a8c31e6842887b4edc1e9144f73cfc2d9727e0e770216b1aa1204fd3253d,2024-11-21T08:01:00.817000 +CVE-2023-30873,1,1,5eb463d43edbc0b663fcba98b144a8ac4c3a2d8c908ca83466796ddd6decf880,2024-12-09T13:15:28.413000 CVE-2023-30874,0,0,492ad1d5a025de1cbf1e8cda85dbb296790bd9c6972d7d63b32d0b2af406e60e,2024-11-21T08:01:00.940000 CVE-2023-30875,0,0,2987f0d4367888ef7df80a7d46639ade232d782562e87e26b0317993d52dfedf,2024-11-21T08:01:01.067000 CVE-2023-30876,0,0,cf0712cd1ef5e49b63c329c218852250a8294aba947d90e9de445b3df895ba1a,2024-11-21T08:01:01.210000 @@ -223939,6 +224004,7 @@ CVE-2023-31069,0,0,d639030dc2049f9f745b1c4a8b8e0bdc82aa33071598555c69203eeb2b406 CVE-2023-3107,0,0,55dd7abcf03d33dae01824207a6d2226a116b92402d9f3a20e48be934116491b,2024-11-21T08:16:28.423000 CVE-2023-31071,0,0,cc3ac3b928da3f1f08a3e9921d1e3644a8ff15a3e3b634464e3a0214df807207,2024-11-21T08:01:21.483000 CVE-2023-31072,0,0,b2e29128e9adcd29ec6043b61585c8ad8e30fc9168fb2e938add880518df6a8e,2024-11-21T08:01:21.600000 +CVE-2023-31073,1,1,608d9d0c684439c3f16908e9a5de998b9da6714a267117076eee976957fed488,2024-12-09T13:15:28.540000 CVE-2023-31074,0,0,d3dfa4b91e52410acb51646cca935ea040f0c10fb8afd98f9ef0c9327b20c5a5,2024-11-21T08:01:21.710000 CVE-2023-31075,0,0,24dd39da62e6cc2aa8c1db4fbe194979806b0c06f6b3ccf84692412c7f6b45f9,2024-11-21T08:01:21.833000 CVE-2023-31076,0,0,36bac3067e015c0b66ec2372ce6f587ae23e3728a833faffceb614da67fc0da2,2024-11-21T08:01:21.947000 @@ -224073,6 +224139,7 @@ CVE-2023-31210,0,0,e7e3bde0d3ae61f5834dd098754d13a886fe654ab12b3100cd765d118d8e4 CVE-2023-31211,0,0,a965e403210e70e3b7965c647e37ba8a20afd0970054b91d4503fa456f03503e,2024-11-21T08:01:37.957000 CVE-2023-31212,0,0,e220018caf080535997cca22953a7fa4000aecea34f3d86e64d61359a2f1f546,2024-11-21T08:01:38.090000 CVE-2023-31213,0,0,fb6cd307be1f8ab3b3c5d619930eb5b9c96d34e07bcdd95264473a8a7829a465,2024-11-21T08:01:38.260000 +CVE-2023-31214,1,1,3c1dfba688cc4535a5d2fe883ee6bc7eb7767da3313a11bc62a7903a7962b552,2024-12-09T13:15:28.663000 CVE-2023-31215,0,0,2cd05b8ed5c104be2c1bb9cd94ea2f58a7689e54bbe6bcd8a32ca5c43341b22d,2024-11-21T08:01:38.380000 CVE-2023-31216,0,0,4a6e701b09d9417a48779ae27d8e083997e8a43b007f70fdf5d231406fa3edc7,2024-11-21T08:01:38.507000 CVE-2023-31217,0,0,aa358b34169cb8836212a5d880cee3d54512a9e1d1bf01aec6e2b83648a8b7dd,2024-11-21T08:01:38.620000 @@ -224609,6 +224676,7 @@ CVE-2023-32090,0,0,784eb2256c69baf860a8b94e089ec35618566d7d21a4fb3c7976d496820ab CVE-2023-32091,0,0,f210c792c985159353342cfe95eaa2c3cc146de775865fca9b2eb7c45b4fb1a5,2024-11-21T08:02:41.570000 CVE-2023-32092,0,0,190201da20422eb3264ebd890918477ff169d51f2cc0790c803862d6b0f01a31,2024-11-21T08:02:41.693000 CVE-2023-32093,0,0,a36caa8eb05e5c51da9e4793db1e5b2e07adfc4d73182e19f83e28e9785b8eb0,2024-11-21T08:02:41.803000 +CVE-2023-32094,1,1,55a38c102441a1f2cfa1536cf80c87e35aca36cb16ea65ab26b6e6fcc80d256c,2024-12-09T13:15:28.790000 CVE-2023-32095,0,0,72048fe546c55218431dd40abe3339574817730ef8166400a2147c34624468d1,2024-11-21T08:02:42.010000 CVE-2023-32096,0,0,bbeaf73d8539d9cf214ea340b6f097657de9e0cde8e9999b421657beb8d9243f,2024-11-21T08:02:42.123000 CVE-2023-32097,0,0,bfd934f464ec434450cd17572e0a166018a22064038de6343d70af053c6b81b9,2024-11-21T08:02:42.247000 @@ -224633,6 +224701,7 @@ CVE-2023-32113,0,0,180033b70733848eadc9902f23db8155d3a3e9ec8da89614120f9c19fe136 CVE-2023-32114,0,0,1b9a01c4c8a9bb6887fe6bc441160c90842956d539186ff38cc4256f70d87361,2024-11-21T08:02:44.223000 CVE-2023-32115,0,0,521ba8a0cfb687078db82293a712f7e92ef1cb7e0e2f7f8e5402994d8d81a6fc,2024-11-21T08:02:44.353000 CVE-2023-32116,0,0,88979c615b5eb6a68fcffc2773164f0a49a3684b97c95c41b6581dab2bb4501e,2024-11-21T08:02:44.473000 +CVE-2023-32117,1,1,e084997e3cfffa91a40f3b1940e34a170cc5680d0411565db36b5e3190654500,2024-12-09T13:15:28.917000 CVE-2023-32118,0,0,2e6b48dca6bdf7b05cb96195ce8e0fb5f5ae2307143ccb5b1f2bcff04e8dabd5,2024-11-21T08:02:44.613000 CVE-2023-32119,0,0,bf6b3f83e3a7bf4521e7c3f58e99395766acb2272530dcda6330e62c69dc925a,2024-11-21T08:02:44.740000 CVE-2023-3212,0,0,06b711812a31bd5eb0b1f6a7fa151ef5457d92bd866d5705bfd7a88e02b58f22,2024-11-21T08:16:42.500000 @@ -224641,6 +224710,7 @@ CVE-2023-32122,0,0,95d139a29e7c727c3deb3743deee57a13d3e72e33dc10fa1dc99829680166 CVE-2023-32123,0,0,0de9d5909499b8a13f39f824dfa5b27d7eef11c56fbab2b62584b26dfa992a1f,2024-11-21T08:02:45.073000 CVE-2023-32124,0,0,878e7910ceff21cf57f43351a9187572b60f063b0d45d6f90256cb4edcbe1da4,2024-11-21T08:02:45.190000 CVE-2023-32125,0,0,d80fdde7e1e23557307888f598578f171be6ca51e2516150d17b42dc911997d1,2024-11-21T08:02:45.307000 +CVE-2023-32126,1,1,0983601736effc6b9319060bc6c91744dc06f8cd569977cd1997aa96a8abe81d,2024-12-09T13:15:29.047000 CVE-2023-32127,0,0,e525b3f8b1b79bc022afde2e37caf6edd025d5b01f4fa590a60e7f0d86db092e,2024-11-21T08:02:45.480000 CVE-2023-32128,0,0,16f380c76199a905f016cbe766c0a9b5a7e703b50ed9a8d66f9536eeb5aaad22,2024-11-21T08:02:45.593000 CVE-2023-32129,0,0,f6036eed8c822378466766e97055fd3362e88e1ff3b62d72fe9ce2c4f234ef49,2024-11-21T08:02:45.703000 @@ -224806,11 +224876,13 @@ CVE-2023-3229,0,0,785bec1be6fdb7ae454085132be7cab51cb74f4793a71034a78212dc6d8c99 CVE-2023-32290,0,0,6064c4d4ce58ee0d9d82cfe3fa985c8a9f74303a960cb4899e735aa0f8b928ce,2024-11-21T08:03:03.113000 CVE-2023-32291,0,0,27d1ba96fa75c541e45036b60c548bf0083f765013322f12305f5dd719b80b03,2024-11-21T08:03:03.267000 CVE-2023-32292,0,0,e4f399e186a04a7333a010ef0ba55ed899c981710ad9c9bd8adb83fa40b2f362,2024-11-21T08:03:03.397000 +CVE-2023-32293,1,1,c584d63e309051f7953e6209ada77bb951b0bd19503ddb4c4f00fc10420b934b,2024-12-09T13:15:29.177000 CVE-2023-32294,0,0,aa19907968648a76e5f1e5714a1eda462b794f9039df867ce63e67dfaa654608,2024-11-21T08:03:03.520000 CVE-2023-32295,0,0,8deac369a102df5e891e5ff6bcc863605241b7a4a0d88f89b8a24f03c13f3088,2024-11-21T08:03:03.640000 CVE-2023-32296,0,0,6c84168cd0318346926b5f1f1247630cfd9b172814e02740e97bc2c6a931de06,2024-11-21T08:03:03.770000 CVE-2023-32297,0,0,fd6d3e54fbb5030783c77c0d54f8c0c66ba7d299c015ee17931dc5d615ec8669,2024-11-21T08:03:03.887000 CVE-2023-32298,0,0,cdd2ae9355543c590e384fd1f48557bda1baea1bf8d10a5a58351f6c9224a428,2024-11-21T08:03:03.990000 +CVE-2023-32299,1,1,c35ea6b8228a9699cd9637c169675214a2a6ed42b76df4868426bd99eda52890,2024-12-09T13:15:29.300000 CVE-2023-3230,0,0,f9962344746e6265ec731126cd847215f1d8f9028a2bdff2138f297dd677260a,2024-11-21T08:16:45.087000 CVE-2023-32300,0,0,4b21d33e30c8bec32581107fa80a09893ba5c586c667811e8f96881b2e56ba80,2024-11-21T08:03:04.110000 CVE-2023-32301,0,0,36f9bb93dcb9c31026f6cb33274d4baa0a2b8d8f9d17224358e39e0678a1e7e1,2024-11-21T08:03:04.230000 @@ -232261,6 +232333,7 @@ CVE-2023-41948,0,0,38ef00f6355123ba96c1ebbc564879b09feb15414a01a7780104f7146fc02 CVE-2023-41949,0,0,015ed346ea3ab0c75222ed1ca829b3904b18af09e9c28a3b962bfcc2ff3239ac,2024-11-21T08:21:58.943000 CVE-2023-4195,0,0,9d463fa6803b341748ecd877b6cd3c3dd6e8b833e0d0c83ba4d7349002fc93da,2024-11-21T08:34:35.890000 CVE-2023-41950,0,0,ab70f7b0641cfefd16c44efe49a73b19f00dd89d0c8a6001d797d86adf03ddcd,2024-11-21T08:21:59.067000 +CVE-2023-41953,1,1,c2546029b94f03432b13815286d18e9234d5bc108ef5fac2deecbe203bf5d935,2024-12-09T14:15:08.710000 CVE-2023-41954,0,0,d8c277806dfc384ce4e926004798dd8109e8f7c434571cd96d044ee59f5e1440,2024-11-21T08:21:59.187000 CVE-2023-41955,0,0,266dd415daa5394a0adf64bd432798eff05a5611c96d0dd13e0f99dc63798db5,2024-11-21T08:21:59.300000 CVE-2023-41956,0,0,3282aedd80768b55256122ab701e734c381a5dbdfa9d40baad17e088167db9aa,2024-11-21T08:21:59.407000 @@ -232992,7 +233065,7 @@ CVE-2023-42934,0,0,26bdda20c2081dc4127985c6fa43773d2aa5c9fe6c47e51d9295f6a1c17e6 CVE-2023-42935,0,0,4e62087546c6b1071bb765248bf44433404a9c0853a77f0e1c8ab26acf6fb187,2024-11-21T08:23:32.953000 CVE-2023-42936,0,0,a280a8fce0b49fa8377bac3d0a995e8e1f3b86243620e0e29ce39ed0d03898d6,2024-11-21T08:23:33.080000 CVE-2023-42937,0,0,2ea37c8c331f8802aff7473a765e8fd8e748a5a3d465bd69e3249399231890b0,2024-11-21T08:23:33.287000 -CVE-2023-42938,0,0,36ab95e849065b19833b0d7804d2c13d8dc040d01a5b4a1fb278c86c01e3f347,2024-11-21T08:23:33.427000 +CVE-2023-42938,0,1,731f0a5add6e36ed29c8a4c2bbbc163d9f2b745a2171021086125f6950171fe8,2024-12-09T14:48:51.917000 CVE-2023-42939,0,0,e616f5469a9d7bb93c6568524cd0da091acc5847091d9c388ddeadcb2cb5d967,2024-12-03T20:42:07.280000 CVE-2023-4294,0,0,fcd5217d18d35731ba36e8ff238f5a1bf98d496e576a6fdb93d816929d596780,2024-11-21T08:34:48.073000 CVE-2023-42940,0,0,081f1f083b0a5e08a4cc019094cc8130686f6068cec8c929ea7accb4db1ee05f,2024-11-21T08:23:33.703000 @@ -236200,9 +236273,11 @@ CVE-2023-47688,0,0,8046db6a5dd767eb681a11315aed2c67b4153ec5e7a873966d87eba82e062 CVE-2023-4769,0,0,80f7b4952f5eb3b05011890155f8cd91bba720c289229f95ff5262df31aaa0f3,2024-11-21T08:35:56.673000 CVE-2023-47690,0,0,aa8fd2bc69ff1253c39aa64187dd8d36c526b6b79a30d7a17a2a47c2f0eae04c,2024-11-21T08:30:41.420000 CVE-2023-47691,0,0,61045da6f81e2a4bab853f5b0ef82e662dff1bb8c87d4acf5afe68a02e8415a1,2024-03-20T13:15:08.680000 +CVE-2023-47694,1,1,3eb5025301cad9326ea879204fca9c9b09a9f7856137dfef770a0a5ed4be47b3,2024-12-09T13:15:29.440000 CVE-2023-47695,0,0,051a4d51e0c236c1bd654f0b775e5f088507db4d02652e7c8c858b8b530d1b31,2024-11-21T08:30:41.547000 CVE-2023-47696,0,0,346832d91ad525ea9c9ffede51e14120f268698539ce3719578ac4c877939b34,2024-11-21T08:30:41.663000 CVE-2023-47697,0,0,faae3d3332236a547532325e65f04d1671ecd6a7f3eedae253454c1214168478,2024-11-21T08:30:41.780000 +CVE-2023-47698,1,1,bcd304b92f8094f0cbfa53ea7ff83ea81294f350961aec51b9a59e9a33e426d1,2024-12-09T13:15:29.587000 CVE-2023-47699,0,0,9cb463c5533afb761dd8ae103a883cc9979ec54047527c2feb166b1c577307c2,2024-11-21T08:30:41.893000 CVE-2023-4770,0,0,70ede4ebd00462edc148613b4a2f3a029c8784bd04f3d78865d910ba4a758d50,2024-11-21T08:35:56.800000 CVE-2023-47700,0,0,96b9cd1cf3c733102051aa1a1214689676acd82fab133500e3b2eac2b049b327,2024-11-21T08:30:42.010000 @@ -236239,10 +236314,16 @@ CVE-2023-47747,0,0,787aa92e7496a3bdca60bdaecffcb37941545ad2f07b22c84c019ea35422d CVE-2023-4775,0,0,d0e086363573bdbbad4db0ef4272cf3e1990cfed85ee8ec4b7618602e21aca22,2024-11-21T08:35:57.527000 CVE-2023-47754,0,0,e169afae2d517607b662ea5214aa54fa97dca5b7e3d59cff3e1f00c65eeda767,2024-11-21T08:30:45.500000 CVE-2023-47755,0,0,de5e78a0719c5f386c3b00a0d134630c552cbd01c234c0d96a2678234a189255,2024-11-21T08:30:45.633000 +CVE-2023-47756,1,1,e38059404288fc39861d2dcdc878c7631367e49aaf9ebb332ffaa4232ac657b2,2024-12-09T13:15:29.713000 CVE-2023-47757,0,0,317288cd78d3b2135f26b25969c953189486bd6540248bbc58d39003d17fd629,2024-11-21T08:30:45.787000 CVE-2023-47758,0,0,bc9b18d2d6c362df420536e76623acaa85f667de3334b6c2cbe9ad5645c4c413,2024-11-21T08:30:45.943000 CVE-2023-47759,0,0,1d6ab4d40ee0b3a560ea274027fb9a28d9e2f8a297a60560628b381055529fb1,2024-11-21T08:30:46.070000 CVE-2023-4776,0,0,cb7964d60bb4cfd8d195179c52a1ee7c5209abe2b9d3634cc88964bf1fa458e6,2024-11-21T08:35:57.677000 +CVE-2023-47760,1,1,31fec9f6c8af8ab72757d32412ce357989a19d1094d1c976818a331cca188268,2024-12-09T13:15:29.843000 +CVE-2023-47761,1,1,a606ca38902b188eec8682f34936b6a5da41ffa7cb9358b809230d66f170621d,2024-12-09T13:15:29.983000 +CVE-2023-47762,1,1,5b4ad4339b9dd49169e8b4c954f758fddd4a2f92c61738ba7149a0bad3f5da0a,2024-12-09T13:15:30.113000 +CVE-2023-47763,1,1,404f4e89414b7c7327d6fda44534dc4b8fa9198930d77bf749edef3647a6b077,2024-12-09T13:15:30.240000 +CVE-2023-47764,1,1,20989055446bb299c287734cd679a9b6e80d5981f15a5aec6ac4d963dc31f4f5,2024-12-09T13:15:30.377000 CVE-2023-47765,0,0,f09ec5ef77e678cd76ba0a194ac8aa303ed2f6555b053c3d97389f0ab88f67ed,2024-11-21T08:30:46.200000 CVE-2023-47766,0,0,b96fccb0895afac2b78068484699383de80246a319677868b1cb5c07269acdcf,2024-11-21T08:30:46.330000 CVE-2023-47767,0,0,ec921c8144a915c1141b4dcbec4ca7374e7b651250458086b5eb2cf8a39523a7,2024-11-21T08:30:46.460000 @@ -236255,9 +236336,11 @@ CVE-2023-47772,0,0,aaf0bbdb4c3e95ddbc1f74dfd91ce455304afcb0723c0b740d38c15401b3e CVE-2023-47773,0,0,4f618b621e6be906f110efdb82559d7917095b0f565b433ca7422846d0a8b402,2024-11-21T08:30:47.200000 CVE-2023-47774,0,0,74da2c75b6e2337304cf389ee25e3f755157c5e2c3eb239c7eb3b9d52e02116f,2024-11-21T08:30:47.330000 CVE-2023-47775,0,0,fe3b506a23bd6502af89ebad90b2b40ea4702fb7cda27576b760430f4f5dcf80,2024-11-21T08:30:47.467000 +CVE-2023-47776,1,1,0fce9014ebb40286cd4b3deb2cd6eb38135ca05386a43485bedfd1b92950b4b5,2024-12-09T13:15:30.510000 CVE-2023-47777,0,0,a674d4c17556604824cac0b2a57e709e6384f94694506238955331b12a7f8331,2024-11-21T08:30:47.593000 CVE-2023-47779,0,0,c0d93f4d786fcde417af5f52858b8dfadcaa117cbb12754c58cebadb24761e01,2024-11-21T08:30:47.730000 CVE-2023-4778,0,0,2ae8c6b00495a81338964f9d89b8b3562ddae1bde6d9ec7fb1169a91cdbb6aa3,2024-11-21T08:35:57.980000 +CVE-2023-47780,1,1,d318af79d37a5ad8010a95d1d2be4b87e702cd2a13f30a38f3bafbdb385d664c,2024-12-09T13:15:30.643000 CVE-2023-47781,0,0,3c47de9008a52a1f8631d5978699d2c8f282b771bd790bdcd5967029b7cd2b9c,2024-11-21T08:30:47.853000 CVE-2023-47782,0,0,168aa140ada9a9a4dc52e9b2b31f2f1fbd0a53e6f37bf9d52df47b9b16ad9aa9,2024-11-21T08:30:47.973000 CVE-2023-47783,0,0,0764a02ea893f1870e0b669cbf5c18393f0e0dd1519dc21a90562cfaaa6c0b52,2024-11-21T08:30:48.087000 @@ -236271,6 +236354,7 @@ CVE-2023-4779,0,0,bb4591e969771edfa64fe2e6fd9aa4ee6850cfade2d0f2f510986be94ce8dc CVE-2023-47790,0,0,06d7b1a168b6044db7ae82c1fadc24865d08ebd2f90e83054344f736a7f42394,2024-11-21T08:30:48.980000 CVE-2023-47791,0,0,1084dc023aadcbf90d38fc4d4055a046627a0a248f2f1996d1851cffb14fc484,2024-11-21T08:30:49.107000 CVE-2023-47792,0,0,1a37027eea605acda6bd52ccb0a8a23e3eaf5e3c97df9d18db5d1ebfe0e439d8,2024-11-21T08:30:49.233000 +CVE-2023-47793,1,1,74f354735fc7d6ea5d6c57c366be63a0c868abacc025beb55c9dc5536eec482e,2024-12-09T13:15:30.773000 CVE-2023-47795,0,0,ca67cffc3735efa47c60a551ac001e454bf0b40a82a57ff5ffbc2f5bd2df8ffc,2024-11-21T08:30:49.357000 CVE-2023-47797,0,0,0a3ec8caa3da0fc483988f07231b42a39bd1e3d7dc0b796a008e151f31d3fb7a,2024-11-21T08:30:49.477000 CVE-2023-47798,0,0,eabe9df12662645a26581da7b4c9c3364ea7ba78f7e46417e8d593c5db616cc0,2024-11-21T08:30:49.593000 @@ -236280,6 +236364,7 @@ CVE-2023-47801,0,0,6f061e52216fb88e9afdab960e303a263cd89f8039729a97804f9d992ec4b CVE-2023-47802,0,0,a2d305b4c1ac383033fe9417c3ba4ae7ecdb1faf7af3ed24b6f999a9b91a0077,2024-11-21T08:30:50.053000 CVE-2023-47803,0,0,3766ab834beab6f7e33ea054d338d95f1985b8fe64b846032e25331843467f90,2024-11-21T08:30:50.187000 CVE-2023-47804,0,0,224e1f291ba11caf26a1377681a6fdac9ade407cb2f91833ea5738378747a8e8,2024-11-21T08:30:50.297000 +CVE-2023-47805,1,1,1330373a20e42952b6e9d122eca0ea2b54111ea23a208350d397d291706616b9,2024-12-09T13:15:30.923000 CVE-2023-47806,0,0,b0cdbd3a00354474ea134767ba68204fac150af82620653bb81d9b5e16a93e04,2024-11-21T08:30:50.427000 CVE-2023-47808,0,0,d7e6dcf8526589b1b7062dc099847f99c5989b3ba2471986eb35019c3ce2588f,2024-11-21T08:30:50.547000 CVE-2023-47809,0,0,3490faaa535a492586714ce65b3a1bfb34e03d6d95c1a8344acf5cd5bd1038f3,2024-11-21T08:30:50.663000 @@ -236295,26 +236380,37 @@ CVE-2023-47817,0,0,1f805d452efaf982270ac8210375505a84801181d8c647f9fc4da6e099177 CVE-2023-47818,0,0,0f6682a974f7520d5aff4582ffecaac106abf549829d63d7830e1309b723ee42,2024-11-21T08:30:51.760000 CVE-2023-47819,0,0,3e2e31642548f3e1a79845a375ccfcd5eb46f131045301e1b55cfd036b696208,2024-11-21T08:30:51.870000 CVE-2023-4782,0,0,e5805488b01da3d85e73b3359bc45916fd6725f238ac0454d1b2d2cee152d6a9,2024-11-21T08:35:58.410000 +CVE-2023-47820,1,1,4a89834e72527063928f7b678df92404a80c65e0b5b1c13c2cce62d65406aacf,2024-12-09T13:15:31.100000 CVE-2023-47821,0,0,1345c354e174d85dd630ed11b0f18500dab7c99a6b2f25218fe165930cc59161,2024-11-21T08:30:52 +CVE-2023-47822,1,1,770e50d58fe701da9d7734e2e41022e202046b970d3fefa929c4edd1b5228530,2024-12-09T13:15:31.253000 +CVE-2023-47823,1,1,e425b4d838ecb2d317d7177815704c8281b1cb5bccb8b3065843c3d7ecc2e563,2024-12-09T13:15:31.390000 CVE-2023-47824,0,0,b19233a99bb480a234e18e5c7cf7cc4a3cbb88fbb6164c7dafa7b41b71ccfd0f,2024-11-21T08:30:52.120000 CVE-2023-47825,0,0,efccb510abacdada329987df18c744babc854ceef1657a649eff6d5a3dfd622f,2024-11-21T08:30:52.250000 +CVE-2023-47826,1,1,53975cbffe8aa95ae8abfa7efbd4d2c38c8b7aa8fcbab8b3307d800af2fa322a,2024-12-09T13:15:31.537000 CVE-2023-47827,0,0,37f6f4f41aba92e645d709bfaeedc195f175b136e61d60431277a7e816abae0c,2024-11-21T08:30:52.393000 CVE-2023-47828,0,0,ff23b470c1e9046bad2797128a2d1aec6959e8b3e93dc8dd70a4fb2626979c79,2024-11-21T08:30:52.530000 CVE-2023-47829,0,0,a69042f7619543197899cefb3ff2a87a59b5e80e5a0bc5e2f02ef0320802c9e9,2024-11-21T08:30:52.677000 CVE-2023-4783,0,0,661da3eb80030ab3e8ef2b00b4f4e25bb768c750469e97e484d3e2adb480b8ec,2024-11-21T08:35:58.550000 +CVE-2023-47830,1,1,e150bebde18270053b4f82299640e11b39dd8220788dde72adfc800317165007,2024-12-09T13:15:31.680000 CVE-2023-47831,0,0,ec3218db57bd80f93175a90b1e4486d02ebd31236358efe292b6b572f6d5f90e,2024-11-21T08:30:52.807000 +CVE-2023-47832,1,1,37f2bf72b8daedcd9bee6aaaa00c92da948c2e3a1e26a6af344a2ac5781a7bb2,2024-12-09T13:15:31.827000 CVE-2023-47833,0,0,75e470807f009a42998d41e60dc4b07a93111532b7e0f564a1acd6303e03087d,2024-11-21T08:30:52.937000 CVE-2023-47834,0,0,5cf76b4d1ec04ca1e2a9d4f2cde54201f1dcfe24919a1c934f81bbae91888abb,2024-11-21T08:30:53.067000 CVE-2023-47835,0,0,81f760d6538c9b5cbcc332a49292a052f5f12cdf99911eec8a6ce50f681c0a66,2024-11-21T08:30:53.203000 +CVE-2023-47836,1,1,21911b99ae450d87a323d660839303e54d6b5d758eac046349c23ce00c65724f,2024-12-09T13:15:31.970000 CVE-2023-47837,0,0,3e14c85294ecea07e25abbe589d62bbbcd2ec48fab935c96568def535bed69a4,2024-11-21T08:30:53.330000 +CVE-2023-47838,1,1,cf5078aff73273437c93b7aedfe27781f69535628c68aa7c0b0759e51fece3ef,2024-12-09T13:15:32.107000 CVE-2023-47839,0,0,8da14dbd77a2e8d1e014d04cffebb53dc9169f641cefa88092f29179bfb99087,2024-11-21T08:30:53.443000 CVE-2023-47840,0,0,2a3a8114ce0fb54ae3a34cddbda39a67c3e6851e9c1b2ca9d23cfcac157a01c5,2024-11-21T08:30:53.573000 +CVE-2023-47841,1,1,604b83e2420a20aadf19371aadb1307bf10c6bea5230e2e63559a9999c603db5,2024-12-09T13:15:32.240000 CVE-2023-47842,0,0,d8cdddad2e1ff4a906f4bdb5ba33e3efa8065f6c9d411a355ecb64a56913866b,2024-11-21T08:30:53.703000 CVE-2023-47843,0,0,52c3e8ba9365447b1d0ee677bfb6182daba4563fc1ff82d4384c9de166c2aa86,2024-11-21T08:30:53.840000 CVE-2023-47844,0,0,5f661cc1d80b2ccf6630d3d270609ce547ea24aaa2d594ad20ccfa5bfe5150e0,2024-11-21T08:30:54.023000 CVE-2023-47845,0,0,c5c0774170f52d5261df96ec948cddedc85dd51b50571ce872255eb2278a1122,2024-11-21T08:30:54.147000 CVE-2023-47846,0,0,04888ff501562bc81227718544b0bcbd766383de811d3cd22339c35daf8f1baf,2024-11-21T08:30:54.270000 +CVE-2023-47847,1,1,c88492427afd930a40fb72a383b338ac5bb3b4393e7cbb2ac99b4bea7e57f027,2024-12-09T13:15:32.370000 CVE-2023-47848,0,0,5683b38e6f83a9fdbbb746bdcaa01d06c21036dc229ab56fe2c9bb1cc9722ac5,2024-11-21T08:30:54.400000 +CVE-2023-47849,1,1,8869e4ce8c45fc770f6e5709e376950a5bb02890ca309046e812bb2246e4043b,2024-12-09T13:15:32.500000 CVE-2023-4785,0,0,4d59a53a7dabbfe252823f276123a3cc6e59824f279ddfc5562298ac83b96374,2024-11-21T08:35:58.660000 CVE-2023-47850,0,0,c507e7bb4d07297ed81451f39dc1338a0255eaf74d7ed6b0a6e817bde91169cf,2024-11-21T08:30:54.523000 CVE-2023-47851,0,0,5e39d217be666342ff9912309fa3d32e42fba71d3b5749eea8c21057b4a55270,2024-11-21T08:30:54.650000 @@ -236331,7 +236427,9 @@ CVE-2023-47862,0,0,f818188ea00d50335f6d90830f8e6650f03c9140c294f0ad74743d6645e52 CVE-2023-47865,0,0,28e6e2851097a4de3f0ee9821aa94ed6a37712982a7c457635100bca83763406,2024-11-21T08:30:56.033000 CVE-2023-47867,0,0,bfb4c3f0ccdad44261e77263335dde8fe3e19dbccb33aa596cf01d683977932e,2024-11-21T08:30:56.180000 CVE-2023-47868,0,0,a459236cc428840e916cf1e35235f873ba5b2f17c83a5da10f1472d5029e5d19,2024-11-21T08:30:56.323000 +CVE-2023-47869,1,1,e3ba1d1a74bd7ba6032ece2a0abe331541aea7c143cbc6c0684aac1119f51717,2024-12-09T13:15:32.633000 CVE-2023-47870,0,0,74edbd4290cb1b0dd1b6b5fca2c73f8fa08ccd34d3103ec5d108c32505210217,2024-11-21T08:30:56.450000 +CVE-2023-47871,1,1,e345974bcfa7372d5b3589a8e7099ab01aa1028b2993a5b8e215dc44dc4dd1c8,2024-12-09T13:15:32.767000 CVE-2023-47872,0,0,7c6768fbcb0d8724ae7100800814a9d8ed0466e8a124f826ef71dc61efbc24bc,2024-11-21T08:30:56.573000 CVE-2023-47873,0,0,5dd5961a1e29615f7c85b89f6ca1d6467e0d9aa45488b1665947ab1206c9e06c,2024-11-21T08:30:56.700000 CVE-2023-47874,0,0,6cf7a93f225f51faf883a9e81813b473851fb89f826fc7294425152884e1b45f,2024-11-21T08:30:56.817000 @@ -236525,8 +236623,10 @@ CVE-2023-48270,0,0,e8261175d23a5e78bdd45066e6211ad0efc45adde88e39f5b46cede3696e8 CVE-2023-48271,0,0,27254d8a1f44252a5537c072995b0faa9abc9fecccbea92f58d366fac1dcbb6a,2024-11-21T08:31:22.953000 CVE-2023-48272,0,0,40dfacfd2c4dadddc12159c0e503bec9fab850349918abc6582f9e34b39c70bf,2024-11-21T08:31:23.073000 CVE-2023-48273,0,0,03224f81c084df372c31aee353cfb7d439414d9ebffb060baa44b96c152b67fe,2024-11-21T08:31:23.207000 +CVE-2023-48274,1,1,c4869f43b880feb20cb686b5edf3275343321a02732ba37d12c867df834a0987,2024-12-09T13:15:32.897000 CVE-2023-48275,0,0,4fe4261ee32abf34d82b2c4344c936ac59671156f026efcf6b19dd723fdf771e,2024-11-21T08:31:23.340000 CVE-2023-48276,0,0,365788fce19cf5a09611f4edfb173023f76a539810c39459c6e33310096e7bff,2024-11-21T08:31:23.460000 +CVE-2023-48277,1,1,7db329c6c36885c5626b1a1e254a75db568984114aaad4e66a0c1afada1d1163,2024-12-09T13:15:33.030000 CVE-2023-48278,0,0,84b247c99a2f8df9b8fd7c556e726ccaf82a00dae121c0d43c6a367929240d94,2024-11-21T08:31:23.580000 CVE-2023-48279,0,0,55f858a71b0df83962b200d9d61557f4feecc4de409d876f707e290bd968844d,2024-11-21T08:31:23.710000 CVE-2023-4828,0,0,5961e100d75242ac32366efe8adcb7ec06c3ba9b4126ac787e638bf36e509c36,2024-11-21T08:36:03.453000 @@ -236536,6 +236636,8 @@ CVE-2023-48282,0,0,87994cff19991e21d3b3d81471d53bc1e0fa712b4281bc823311425598bca CVE-2023-48283,0,0,3b9d377a9783711456c5509a8b21f1db405e2ffba82d24ae9c66ad7f8d20413a,2024-11-21T08:31:24.223000 CVE-2023-48284,0,0,d7b0427b7d66d3cc6a16eee3100d328b68a96198d9cb772774460d1799f4aadf,2024-11-21T08:31:24.363000 CVE-2023-48285,0,0,9c77c36bd5d402fe99d2f05bd3bfa087ff2492351f5fe1cabee87d040b8aef03,2024-11-21T08:31:24.507000 +CVE-2023-48286,1,1,82ac57e7419a60ada66a4a3d7ff623cf21091ca1048d63d19ff324ad4cfa242a,2024-12-09T13:15:33.160000 +CVE-2023-48287,1,1,38d02bfb60c42fdc091895b0e1e356e5ac81516cc336233c7193fad4e0897609,2024-12-09T13:15:33.283000 CVE-2023-48288,0,0,7cfa4050a86a31e6b1caea966d09d025c06cf4a1bca1d406006d31ad6f798103,2024-11-21T08:31:24.643000 CVE-2023-48289,0,0,1618fea481ab3d42d6aec9a3abe8df12285761b43101567bc237c08d67252f81,2024-11-21T08:31:24.797000 CVE-2023-4829,0,0,9f26b9ebfd7db6fcf41b30dcd4f6fa15656aaf4e17728364563809e300a0d10a,2024-11-21T08:36:03.593000 @@ -236576,6 +236678,7 @@ CVE-2023-48320,0,0,e39b09117ad02f3c682295552346e82f2f45797e9ae7a3d3fe67914e42628 CVE-2023-48321,0,0,fc4621880c6b32f8a0612852f2ffc700c126c282dc7acd95762f367085f3622f,2024-11-21T08:31:29.223000 CVE-2023-48322,0,0,0b120576cd7913d74c297d7185488cb80a58353bde0d40d52678c0db380d5944,2024-11-21T08:31:29.360000 CVE-2023-48323,0,0,e5c9c37a51c31fdede0c482e233cfecdb9951ccb393c452a61e28aee9b4891a8,2024-11-21T08:31:29.490000 +CVE-2023-48324,1,1,6d6da803a93253745d9d54e59a7cefd06d267f33237c6657b51ab91ac6227743,2024-12-09T13:15:33.407000 CVE-2023-48325,0,0,930e65360eefb7d9d7d4e36f2fe67bb66b153b8b5f914f40f1f9eafb8ee10dac,2024-11-21T08:31:29.633000 CVE-2023-48326,0,0,9440d98ec9c1c3831cceaeba5ffd4dc95c0e0d9b29e98d7f100f0d51388f16c2,2024-11-21T08:31:29.813000 CVE-2023-48327,0,0,60bd5759d6af732c1195a656f825137f7d5b7e8d333e92e440447879960c2325,2024-11-21T08:31:30.007000 @@ -236584,6 +236687,7 @@ CVE-2023-48329,0,0,5a226061b047e1b592a63910ae17183c30d5ad10b112521838addfa5fe5ad CVE-2023-4833,0,0,b58e6682b8635b59f7024746957a1206084694cd8848986c1c4c9b05c96b5810,2024-11-21T08:36:04.090000 CVE-2023-48330,0,0,c45f4880cbd6414ba16693dcf17714c10eac651765711c66e81f133765831561,2024-11-21T08:31:30.410000 CVE-2023-48331,0,0,665b9741d7f9d72f3637fa8e0aa812ddfcc1ad2f4930ba71cf6413529cfc5c7a,2024-11-21T08:31:30.527000 +CVE-2023-48332,1,1,92c73f454b7854931d9a2ae5f320f5e772208a51d3ef7e596eca0955ea7da6d3,2024-12-09T13:15:33.530000 CVE-2023-48333,0,0,4466092a0487907f5dc36ad36a1ce7c88ab3ca5e829440171546fedff2905f19,2024-11-21T08:31:30.660000 CVE-2023-48334,0,0,4647f30ce664daee274b015e510262f630a20e203543ceb4653a9f42881a9101,2024-11-21T08:31:30.790000 CVE-2023-48335,0,0,e6634a921b2f14181f5dfa53e48985135aca4892126678c0d2ab2db94e4bb359,2024-11-21T08:31:30.920000 @@ -237005,6 +237109,7 @@ CVE-2023-48736,0,0,cc80e81717100f864d628dea33a18c1b8c7400a26c7a2ddba3ab42bf4097a CVE-2023-48737,0,0,e89931c27d0d6892ba81cea8cc3e133aeba3505ad01a503b803969a05bbc2906,2024-11-21T08:32:21.140000 CVE-2023-48738,0,0,18b16e54e1ec608c90f017dc3baf5ffed5a14cbc61ea5747989be1b8699f37ef,2024-11-21T08:32:21.270000 CVE-2023-4874,0,0,8faf9fe2cba1823131b07c460167cb7451ebc5f11a7f49280b673a795f692df6,2024-11-21T08:36:09.963000 +CVE-2023-48740,1,1,fa979d23e0b087edcdb0ef3f9004da0f23f38bd65b42cb0c1b7cd64e7559c3e9,2024-12-09T13:15:33.670000 CVE-2023-48741,0,0,f0656e1a681a72beb4e0c051f4ded78f94a37fedc179b6be011bee6429e873b3,2024-11-21T08:32:21.410000 CVE-2023-48742,0,0,0064a0daf1b0c02944c6d33bf3df00acd7c501f198631255b984067409ce6a1c,2024-11-21T08:32:21.540000 CVE-2023-48743,0,0,ce635590f763c223a8b7162555ebff111dd9a908763e17a5fbdc7a195669e7e3,2024-11-21T08:32:21.677000 @@ -237015,6 +237120,7 @@ CVE-2023-48747,0,0,2e4ea5d5a3018b9f19f28ab959358ac7c47b96fa0c3a84e86fa5665a31587 CVE-2023-48748,0,0,94c93f12e06f5b8219192e832a7aef7b6c1fb9a2560e65e784ea86be5d766d33,2024-11-21T08:32:22.327000 CVE-2023-48749,0,0,3aeed7cfb909f3c1dadf1a0d469875bf910ba7ac3c4cdfef80fb37ad173731fe,2024-11-21T08:32:22.457000 CVE-2023-4875,0,0,f91e68d69e22fe9dc24c2d595dcfc999eb2fd4cf547d10ea4928ca94eb559beb,2024-11-21T08:36:10.107000 +CVE-2023-48750,1,1,ef236d81d966d7973d744cd81f9d4ca995e2a95ddab7f043f15c5e0b77c675e0,2024-12-09T13:15:33.803000 CVE-2023-48751,0,0,b615408df350e43df2d0f9c35f25c47f8a553fce1e67c2bc0cac5ce0689416aa,2024-11-21T08:32:22.587000 CVE-2023-48752,0,0,b2499dac50102123022f7b9dd402209b98b0b5119ee315ed55e8c38f5e4b2ba4,2024-11-21T08:32:22.730000 CVE-2023-48753,0,0,e3c59f5a68cb84cbe4d7a5ee1cbc9b55329f61d1140e9cca5fecf9aa0fea8d43,2024-11-21T08:32:22.863000 @@ -237039,8 +237145,11 @@ CVE-2023-48770,0,0,173c2f0a161e6dd92380ba4d7c75448ca0f8bd130eb4373a8634f9f37ef54 CVE-2023-48771,0,0,910c52e7660ffb85e50abf99fc10b85346ec3682856839e88cc725b0278415cc,2024-11-21T08:32:25.147000 CVE-2023-48772,0,0,9c00a6c9384130fb96c95c0f23f2d46aaac148964ff2c3adeca7b7fc494bbe55,2024-11-21T08:32:25.287000 CVE-2023-48773,0,0,f50ebfffbe4bb8c0ce4ebf887a7410404be82f1ed7d387682ab8dacbea0134c9,2024-11-21T08:32:25.420000 +CVE-2023-48774,1,1,7b9d047f3571de1a53b69e49260c4c2f1f5841f29bb368b7702e4df389ff0748,2024-12-09T13:15:33.937000 +CVE-2023-48776,1,1,a1b49e194d9a26a8c750c9429d1f26459f555a89accfb3708d19c02665d21e3b,2024-12-09T13:15:34.077000 CVE-2023-48777,0,0,da2fb312c81f4d39e1f6b619e89a76e40c7e69d7c2693339a128d1645085873b,2024-11-21T08:32:25.547000 CVE-2023-48778,0,0,91dd26fa81fbae0cb177c2ca066531bb30275e14e4699bf1bc77f8c1a35e150c,2024-11-21T08:32:25.667000 +CVE-2023-48779,1,1,6d4483995e83a7a22b74a93e38ebaa108c10789de699cc61c5138916a116cc6a,2024-12-09T13:15:34.210000 CVE-2023-4878,0,0,f8018c07247c550bc8b4f14d2122ca357625b0e03d3ae35694b0663995a9b3be,2024-11-21T08:36:10.537000 CVE-2023-48780,0,0,c639956bfab0ce7bfd5af6156a8111806fc286d7ec80bb19f8083e2bac841d38,2024-11-21T08:32:25.807000 CVE-2023-48781,0,0,109739e32305297dfb3840569fb6e728165c6472c6102138ca909d70ef58e69e,2024-11-21T08:32:25.940000 @@ -237277,8 +237386,11 @@ CVE-2023-49150,0,0,2033efa8eef7521c845c8e2b2c87ef6576d549fd67e120b3a9ad791640c1c CVE-2023-49151,0,0,626e45b7a15e8f89a7a35ed278c0a8f7e76e9ef510c80c0f7981a2a610d5d9b9,2024-11-21T08:32:56.233000 CVE-2023-49152,0,0,efae5e84013b9350399b0c784848b0a4bd8983117bba48aff86cf86927b54d3a,2024-11-21T08:32:56.370000 CVE-2023-49153,0,0,584092b7b729d7a1baa7e79edc4eec7f5defeb3fbf85bb90ad991d21807eeb4a,2024-11-21T08:32:56.510000 +CVE-2023-49154,1,1,35e7a9362f2c6af33482f6f7d7000cee25c98f83725db797dc956e6fce5a7046,2024-12-09T13:15:34.337000 CVE-2023-49155,0,0,5cffc6669625622eab06646670df0c886d3de4d539b46af615b5d4c17fad7e26,2024-11-21T08:32:56.633000 +CVE-2023-49156,1,1,4273913f1a5d91f377438ab09db62256eab4ee6d7de0816473d7af7f67bf788d,2024-12-09T13:15:34.470000 CVE-2023-49157,0,0,a95724a018fbe7b80a162910f64babbd51d678c3f0400cf2e95ba888c7bc7c06,2024-11-21T08:32:56.777000 +CVE-2023-49158,1,1,26baf8798c04885a35d71512b88c3aef39451429f4313f80cfa44496ffc6a0f2,2024-12-09T13:15:34.603000 CVE-2023-49159,0,0,2f8f648970db82572fe7b2e3ca562652e1f08e42af7900a78c3f30e26096a69a,2024-11-21T08:32:56.917000 CVE-2023-4916,0,0,37803aaf438d3f76b2a95edb3c966ee28eab07d816551b317ea046aca7ba4e9d,2024-11-21T08:36:15.573000 CVE-2023-49160,0,0,d4f92d5446c04b3b7c4ccadc5a99feaece23d25fd3962482ce914cdc4d61325e,2024-11-21T08:32:57.100000 @@ -237288,6 +237400,7 @@ CVE-2023-49163,0,0,cd486b3c20bf77a618f0ec1fbba3768bf61cf36e08f6ed8771009e87c11c1 CVE-2023-49164,0,0,95024e6809531427448f1aca843a3d52862c81221aaedf91b7ccb9eb6290cca1,2024-11-21T08:32:57.630000 CVE-2023-49165,0,0,6450ce46a06c0307ba869470d4733274ed41cd66d11fc1b1d071e141ec319c06,2024-11-21T08:32:57.767000 CVE-2023-49166,0,0,8b0c150f44680de4d102d73f6c880d6a210277e6ba338ffe81eb0d52a4295d6b,2024-11-21T08:32:57.900000 +CVE-2023-49167,1,1,30e3398b8d829ba1378c7c9123834e63c4891c3159552721568664f889aed96e,2024-12-09T13:15:34.740000 CVE-2023-49168,0,0,e7da83f538ab817448ee841ca4ff44d8286b0020257d6944072a0fa4b60bab2f,2024-11-21T08:32:58.033000 CVE-2023-49169,0,0,9db29d16452ae9dda39f35b5d1ee0ce8677606554b894c8f40c02b87fd7383ed,2024-11-21T08:32:58.187000 CVE-2023-4917,0,0,190a43f5c67013ae900d9ff4e32d7a0cd63076fb765df2c7f5ddc4dd60c64e39,2024-11-21T08:36:15.707000 @@ -237314,7 +237427,11 @@ CVE-2023-49189,0,0,6a7b5d752f61b168bab93a7ca0bf2c8079f307bb6324f31090431e5fb16d9 CVE-2023-4919,0,0,ced1208f23e85d906be67aff509d496833143f11ec0a2f94ec12703f33855d20,2024-11-21T08:36:15.987000 CVE-2023-49190,0,0,741eb2bbf1d9ddb7ea2b78c8a4cf580b0b57b70e4c3b74a71a0365a31ab97640,2024-11-21T08:33:00.840000 CVE-2023-49191,0,0,6dde29fdd298dc0d7d535d8829a4aab66810e3ea3078ea914ab4f3aa978a9c25,2024-11-21T08:33:00.963000 +CVE-2023-49192,1,1,3845e9d61ef78bc4a9d0254354b8c0c76c85057110a988aa401f94342b8b639c,2024-12-09T13:15:34.883000 +CVE-2023-49193,1,1,9492cd2c9d55d3145ca7b0926061569a168c693a7b867cfa22435415776e8bfe,2024-12-09T13:15:35.043000 +CVE-2023-49194,1,1,fc4e29979d16ecac163a05e1d4d378c8586c2741ab88fde2c7fc692f3fa43888,2024-12-09T13:15:35.173000 CVE-2023-49195,0,0,537787afd2f4352480639abfd06d465cf79f256907a5a3423192f00ed3eeb727,2024-11-21T08:33:01.090000 +CVE-2023-49196,1,1,2b60b5d712b6aedecaf7d46c7761d5529072bd35d7e8f861c683c1501b6baf3e,2024-12-09T13:15:35.310000 CVE-2023-49197,0,0,702666669df4c9279840ee8372c1e7b976acbc014fce98e027b0025acad8e39a,2024-11-21T08:33:01.227000 CVE-2023-49198,0,0,dc0c865d171104a671b764cf0207497f38dddd0ee1c9987e893f25e11bd0d0c0,2024-11-21T08:33:01.360000 CVE-2023-4920,0,0,7510aa0f8cfe39793f5658aa0eb2f74937fe87a4b0513700192f5089274e70a4,2024-11-21T08:36:16.123000 @@ -237681,6 +237798,11 @@ CVE-2023-49750,0,0,95f609750a6a7b2597311626391553bca1115997e95e6fa3e548e6207e5c3 CVE-2023-49751,0,0,0d711fb280416251b3bf665a3444fb217947c1b41813205ccf34ed4627a635e6,2024-11-21T08:33:46.863000 CVE-2023-49752,0,0,3a833c0f5b8c4d64a527886f08bf2db2b835ccc647d0bd7962b9d61448a1adb5,2024-11-21T08:33:46.997000 CVE-2023-49753,0,0,51031ca807727afd0b0fde9f8fceaf42e9bbff695832b56a8ca3e945e8fb476e,2024-11-21T08:33:47.117000 +CVE-2023-49754,1,1,4e6be468ceddcf430547022bae1145e5f68a01a8e51adf6d5f7ab500203e2cd2,2024-12-09T13:15:35.440000 +CVE-2023-49755,1,1,f136a767920f662f41151478691ab172fa59098fd62f1ddd85cdf05964a69b64,2024-12-09T13:15:35.567000 +CVE-2023-49756,1,1,21c7196db551a2c6c4a4ffc1d6cfc1f1d7713993c906c55a24a3405667b43001,2024-12-09T13:15:35.697000 +CVE-2023-49757,1,1,864a307f81ee5e84a7bd6928658114f033094ac12436b7fa81bc87665c21172a,2024-12-09T13:15:35.830000 +CVE-2023-49758,1,1,9b404a269e1be18ced5b3168c4b7f49b1b281ae40bcec3b1c6425f8a347e40aa,2024-12-09T13:15:35.990000 CVE-2023-49759,0,0,1c8f74c45d28992b2f5fd498e1db77985978af95a1c29d0f8c2f3ab0c3766468,2024-11-21T08:33:47.230000 CVE-2023-4976,0,0,bf0a5bc363f3b334303591a3ac4522dbbffb60dde2693426aaf9c7af07e8498c,2024-11-21T08:36:23.163000 CVE-2023-49760,0,0,87f3c74fe658638a4cb5e4f80d352ab34e8fb619b65a0ab86e0ff43a25f8b472,2024-11-21T08:33:47.360000 @@ -237740,6 +237862,8 @@ CVE-2023-49813,0,0,7be54fcbbfdc2eb67ee6674be214ea3423c1af8ced8dbd6b87a7892c9588a CVE-2023-49814,0,0,37a1043420e54ae339e498fee49ac27df4cb971165d386104a2a9ffb1529554a,2024-11-21T08:33:53.660000 CVE-2023-49815,0,0,ff3a469d5748f2f68c28f8df9b0958af7d911ff3b920384059fb37c6d1693671,2024-11-21T08:33:53.793000 CVE-2023-49816,0,0,65a6a15cded91f9b3083e0eda4cde64ded75dfb6a3bc4f47a320cbe81b569665,2024-11-21T08:33:53.913000 +CVE-2023-49817,1,1,48767e42a706eb8e197858396d1884c04321d5bb77ec8d8326ee3c3891186b20,2024-12-09T13:15:36.157000 +CVE-2023-49818,1,1,9eb6820b8d841c00c8ea8598e67d10b831f8d39e2142126ff44a7e487eff9ecf,2024-12-09T13:15:36.327000 CVE-2023-49819,0,0,864952e9353b3c3f59f3e82adaf1a0d7c63b941829081ed4fea5963bce921550,2024-11-21T08:33:54.033000 CVE-2023-4982,0,0,ceddb2d699b4cf95735f698ae3c58b17beb69de64cdd685ed761d43a0f894802,2024-11-21T08:36:23.987000 CVE-2023-49820,0,0,12ddd7d4fe021b328114905674c39a43eef8873f695f131e611470d219c601d8,2024-11-21T08:33:54.157000 @@ -237754,8 +237878,11 @@ CVE-2023-49828,0,0,d8b0d88f23ad4c2a93f24196cb40b110a38c1749eea0350a3a5455084a892 CVE-2023-49829,0,0,4dcd61a51d313fdc0daf2edeecfe6680f2b1c860dbb337ad796af82b2223762c,2024-11-21T08:33:55.280000 CVE-2023-4983,0,0,0bd79268dad89a6e024779013cdb908b66802292497b1ed7779af872fc347e6b,2024-11-21T08:36:24.130000 CVE-2023-49830,0,0,fff9bc2dfe6aee15d116a902a82562aa9079d60bc54ea0932eaf8624d0e178b4,2024-11-21T08:33:55.410000 +CVE-2023-49831,1,1,507d8ffa159ed10755c48f2107a7b3520dfa2c7b784834a75604b20d64581504,2024-12-09T13:15:36.463000 +CVE-2023-49832,1,1,435355821d077f236ecf6bccdc4b0f9c87bd5b79cf335650c715cdbd1ddc0d25,2024-12-09T13:15:36.597000 CVE-2023-49833,0,0,7175aedb0772e75c37fe99aea7cde96fd664b7febc6ada5fad2e062763e4f713,2024-11-21T08:33:55.537000 CVE-2023-49834,0,0,d9cdcc34c4805b2c8a34d67e8276724bd8261d0c5e9a4d206d3adf15f4b75aae,2024-11-21T08:33:55.660000 +CVE-2023-49835,1,1,742fd59dd30e53e3bf176724d19ce3d9fbf61b1a9a351ab9d47d00fb95eb920e,2024-12-09T13:15:36.733000 CVE-2023-49836,0,0,feee478175612c89aa70b36c16240a69f073ef14e2e593345df24e98d4df290f,2024-11-21T08:33:55.787000 CVE-2023-49837,0,0,d3bffe4bc493f2734305fdb5c5e137d3525d1b130c1247be06e4f936eefdce1c,2024-11-21T08:33:55.927000 CVE-2023-49838,0,0,3e5fc80f29bf176873176454fcde64084e4bbacaebc8469c4e2fdcd7377bfa0b,2024-11-21T08:33:56.047000 @@ -237766,15 +237893,25 @@ CVE-2023-49841,0,0,ffed0d72d5fa76d929f61ad3612992a412f51e1a36fe2179fba64e10db946 CVE-2023-49842,0,0,4fd8f9262020d597999ea8cb3ef9f44f41d47cdf0b8c0000c3dfc3cae176b517,2024-11-21T08:33:56.570000 CVE-2023-49843,0,0,0cf9612df676374782e97a6c725b93b8f94ddf20cd7f5e432b42dc620cb904a8,2024-11-21T08:33:56.707000 CVE-2023-49844,0,0,f930983dd5621d744eb4c27607469067158c3d0081745cc994871b9bd5013656,2024-11-21T08:33:56.830000 +CVE-2023-49845,1,1,7dee1ce74e7d5fa8d9f6590e20d484e5ea8e28d89cd36d85ccb0263b30fb798a,2024-12-09T13:15:36.877000 CVE-2023-49846,0,0,a71ff0c3ad2dff79a586d7b6db37a75331d6f7c99f1c440d1f7ed6e4f9d44bf5,2024-11-21T08:33:56.943000 CVE-2023-49847,0,0,80eb31dd57cb579f43514e0c3f007f348e04c7b78e7a78c5ca609ea4630535f4,2024-11-21T08:33:57.070000 +CVE-2023-49848,1,1,27a7ed6786e5babf5d1aae33c4490b039f9bccf94e755c0b1e1bb8033ab069d8,2024-12-09T13:15:37.050000 +CVE-2023-49849,1,1,5a37fdcc11fa5edecadafdd730284181c5a2f4f3eb6590091f2f5d56361a2cd8,2024-12-09T13:15:37.177000 CVE-2023-4985,0,0,6e83c32f4e2308fd79338607f7278d05ff71fc7c6762d4bf6f558a5f279a2f5a,2024-11-21T08:36:24.420000 +CVE-2023-49850,1,1,81fd6c61542c1dc89dd074a3ba30096c42c09704f961547d847198703200b3a0,2024-12-09T13:15:37.300000 +CVE-2023-49851,1,1,ccf8f8296e58ea63e2edc2b0e449c300f602d5ee4bd74c9405278fdd35c57072,2024-12-09T13:15:37.427000 CVE-2023-49852,0,0,32cecf17a576eba2a4e4615295d04eb919a748eb094f94350a6e72ca414dcf92,2024-11-21T08:33:57.197000 CVE-2023-49853,0,0,678305dcf584a1a87d0fa653824d94c0ca90b4f453af4856920713b1d1b9d1e3,2024-11-21T08:33:57.303000 CVE-2023-49854,0,0,916acdb781afde9a94582c7eccb7ca3bab02dc64c7cdd0ac029f01e8c3a21b98,2024-11-21T08:33:57.433000 CVE-2023-49855,0,0,7a28f6b37c2f93ecb4eed25e5afbd424d3f5093acf5e6d0a2a8a0a111b8320f5,2024-11-21T08:33:57.563000 +CVE-2023-49856,1,1,f3a1c6b4e7ab2121f7a47f3723b0503872891b6deacd12f85a103cbad27efe3e,2024-12-09T13:15:37.557000 +CVE-2023-49857,1,1,819e362c3f9035f9b063e8ebc66d6683a3a457932a3acc06d8ec0f226d1ea0f3,2024-12-09T13:15:37.683000 +CVE-2023-49858,1,1,5bbed84772acc581f37b6fde9fff27683d4cdc592d8beefe92266844b8c420b5,2024-12-09T13:15:37.810000 +CVE-2023-49859,1,1,41aebeb672f05fdae089f8dcdcb7042ef6ee9a0ad644cb8f96862b25663caad3,2024-12-09T13:15:37.933000 CVE-2023-4986,0,0,100813a9a4293cff17dafa3d1cf01bc351379aaa18e262aa931f8b5cbbaa4356,2024-11-21T08:36:24.563000 CVE-2023-49860,0,0,8345d104c24d058b8fe3dc4dc0a87f8e177960342bb83898566af1ebafe02284,2024-11-21T08:33:57.683000 +CVE-2023-49861,1,1,0b3310a3f2209af9f9fc22d78971a061015907e4ab68d6ada12f43101db410e0,2024-12-09T13:15:38.060000 CVE-2023-49862,0,0,e61b5d73f673f93dee6c9dc82de7ee18e5cfe05a21ba235537897748fd9197ba,2024-11-21T08:33:57.810000 CVE-2023-49863,0,0,9df22afda611be175c3f67a673b566109684bae13be47e8578b58da06e4d781b,2024-11-21T08:33:57.940000 CVE-2023-49864,0,0,d96615429de459aa1b3efae11554adf94bc85efbc42b2aa4829eeaf055ba26bd,2024-11-21T08:33:58.063000 @@ -238118,7 +238255,9 @@ CVE-2023-5037,0,0,18256ed380f452ee88ef138121922998d7aeeb85becf1257e3306cf01ab495 CVE-2023-50370,0,0,26e3e7c4fce704100e63de5ba2ab9237ea10ebc0c341bda883a3b1c4236f66c2,2024-11-21T08:36:55.127000 CVE-2023-50371,0,0,67a103d488bdf61cfbd2b233460bc4f0263bc63f7cb847cbc82e11deae334351,2024-11-21T08:36:55.253000 CVE-2023-50372,0,0,0a8fd8d22e5b7f0d29f49564dced6ac009dd8c9df146957b56749152dd2c1738,2024-11-21T08:36:55.380000 +CVE-2023-50373,1,1,781e1f7e369ae82a33e6a2d14b5c1414b613f79f496450a7c9155d1b78d072a9,2024-12-09T13:15:38.190000 CVE-2023-50374,0,0,ca46c0809399b59e1269abfe3993e0834908a69d275805080cd96f8d114e61f7,2024-11-21T08:36:55.520000 +CVE-2023-50375,1,1,94d75a9f8ebf65347195d7fcccf2f19ea9f5752d0f56fb0f45a767ad48fcf3dc,2024-12-09T13:15:38.330000 CVE-2023-50376,0,0,6219f0a1b5020dc263ca9d80f55d956e938800cc2109137a90734f7414e121a7,2024-11-21T08:36:55.650000 CVE-2023-50377,0,0,bcb1707188137c848bab5c72a514d965415abd99b89fa9f25bce8ab9402671e6,2024-11-21T08:36:55.783000 CVE-2023-50378,0,0,0454eb883a7466b810642c469a3a15f6ba9e92155bb9f1e7524280e2f82c443b,2024-11-21T08:36:55.923000 @@ -238369,14 +238508,19 @@ CVE-2023-50872,0,0,39764704288457e01fc1813b8eeb51c2bfd108b99d0f7283261b185c5e33b CVE-2023-50873,0,0,71efc4d1e1cce44215879205086d05b20a91655d2dd439f51572a51cf92780eb,2024-11-21T08:37:27.350000 CVE-2023-50874,0,0,6648e50cabf1184c190a61d6f7dfc46a177d7aca3c3e02c7992491844f127465,2024-11-21T08:37:27.480000 CVE-2023-50875,0,0,e02f8fc29aee7e66391c87261f72e3826f69f8f0ef44a90be6f0b68c996630f7,2024-11-21T08:37:27.593000 +CVE-2023-50876,1,1,026408795b5a1775b909c28f8973e48c791e0d3b6f71d24ad4f81b73d8511932,2024-12-09T13:15:38.460000 +CVE-2023-50877,1,1,1163e1df7149121c36563eaffbcc11abe0bc11e0404882c7348e17e5c839d02f,2024-12-09T13:15:38.590000 CVE-2023-50878,0,0,7b0da3869ea0d9147a8e709568f18667ee6f2cd508a223ff6872e03a054cc442,2024-11-21T08:37:27.737000 CVE-2023-50879,0,0,12ad653eeb3d83a09b8af0715727aab69ef8f625ad061faa8758dda3077e1da1,2024-11-21T08:37:27.867000 CVE-2023-5088,0,0,b09273453ef250c17d595afe8c302eb567901ba85301eb295076874a219a898e,2024-11-21T08:41:02.500000 CVE-2023-50880,0,0,03b19b8ffde9034992245c5e3db5f806db412d7773169e428a103a0f801d474d,2024-11-21T08:37:28 CVE-2023-50881,0,0,f53caa4314173d2055e74528eebc60ad0b67c787beac58687b6c4c5d1ddd034c,2024-11-21T08:37:28.123000 +CVE-2023-50882,1,1,0887e49ce15fcd86f8fcf5e2c374548a667efa06ea8998c7f2d2888093758efc,2024-12-09T13:15:38.720000 CVE-2023-50883,0,0,672a8f063fa55652697bbe3f1d6a011a8767cdb491bd712a91e4f7f54e570f92,2024-09-20T15:18:06.593000 +CVE-2023-50884,1,1,474d1b2afc4fd881f26e8472f3d189b22ea96ccce074b7c0f4aa4b0812b783f4,2024-12-09T13:15:38.850000 CVE-2023-50885,0,0,58f7e8a74f1a0d0ed773a3974d954683724942e74ec0db395bc222ed861f754e,2024-11-21T08:37:28.540000 CVE-2023-50886,0,0,d78238ddd8b1f9c67a40f95976871812046fede1387f524fb268ef9a75cf5693,2024-11-21T08:37:28.667000 +CVE-2023-50887,1,1,52c4ae6402af0391a7e8e45402154c9ab341ca1eff5382300e9bb1eb1cb86e41,2024-12-09T13:15:38.970000 CVE-2023-50889,0,0,300c9bbdb571fb4806f2db34fd0323778f90e7dba26998a6cedbfb07681de4a8,2024-11-21T08:37:28.800000 CVE-2023-5089,0,0,39022ad8aab1d3b25314f8f4af040beae42bdd3a6d5c322568e099be6754cb35,2024-11-21T08:41:02.673000 CVE-2023-50890,0,0,fe59fbc996b72df080b5ad894798299b23658827aba5b8e3ae419b55f42e215c,2024-11-21T08:37:28.933000 @@ -238387,10 +238531,13 @@ CVE-2023-50894,0,0,5bc77fe2c30b796eeab58d2788624ef16d221f1381a759d7ea40bc13ef60a CVE-2023-50895,0,0,bfc255063c95b66f3198ecbbc17206ffd6246bc9c9a119532111a958ad8b0a09,2024-11-21T08:37:29.717000 CVE-2023-50896,0,0,f13ce46dcba3b593a991097bfc783320e248ec1f54947044ec2ca8345f001e97,2024-11-21T08:37:29.930000 CVE-2023-50898,0,0,4d7f09f82521f7f889eb710ae8d2add5c40b723cd8b69e09c9e6fa8fc4e22425,2024-11-21T08:37:30.070000 +CVE-2023-50899,1,1,dc4b0f57049355fbd2df018016e2fcc7e2998109858792dd1d1765ff21e435a3,2024-12-09T13:15:39.097000 CVE-2023-5090,0,0,f518b2f8d763d7d397e26976e4ed4bf83eb2c9f2d153d34ad7e472d4c1117386,2024-11-21T08:41:02.793000 CVE-2023-50900,0,0,b7ab39426fcc06e2bc51cb2d908838ea8ec06db1d269072da0ca5a9dd5397669,2024-11-21T08:37:30.193000 CVE-2023-50901,0,0,f88ea1f23c1fd588e6fb66db25b147b7383406bb987e1f4e8f9828266457f025,2024-11-21T08:37:30.333000 CVE-2023-50902,0,0,e763391ef59f9091b25350ebe8e0782038f8061564dce9931fe4e02ed37ad4d9,2024-11-21T08:37:30.467000 +CVE-2023-50903,1,1,3fa39dc38762562804b11d7de8a76ce8c37c187505318c2992c59bc03cf635e1,2024-12-09T13:15:39.233000 +CVE-2023-50904,1,1,f93402b8c2d38f076f809b872a587a3eb637d7d4b9464cb3c4a545e44060d8f8,2024-12-09T13:15:39.360000 CVE-2023-50905,0,0,65070ee50cd677079288302c2ef7be4463199f179e536057085dd5d4415679d8,2024-11-21T08:37:30.600000 CVE-2023-5091,0,0,76e90fb12920cf8eb3c06980010aa42cc3b519c0b400c871e57db3605c7f9697,2024-11-21T08:41:02.960000 CVE-2023-50913,0,0,cb4c279f202d601f67995e11904e2c0b22bcf9081de109192fb2e8cd8035366a,2024-12-05T20:15:20.983000 @@ -238597,11 +238744,17 @@ CVE-2023-5133,0,0,0018a6a351ee401af2daab5bec3a8b6563a0922f375ff71fcd99140986e7d0 CVE-2023-5134,0,0,4883dceb94c3f0cc4b1b00f2283b580de20b785803ef8febb697d90c06bd591d,2024-11-21T08:41:07.850000 CVE-2023-5135,0,0,877454aba62f703a281ed8cbe6f67c849efb5f5f63261252e74d9df5c2c3773f,2024-11-21T08:41:07.980000 CVE-2023-51350,0,0,3e6b1a93404e3494b28f6f9c928c88f04bb91fa7582d839166c6383b89c1b64d,2024-11-21T08:37:56.867000 +CVE-2023-51353,1,1,9b7be202b9be380cb48c1dc5271d32398178a4c4869b444a86a433d6d0c033ac,2024-12-09T13:15:39.513000 CVE-2023-51354,0,0,0357124601559fe288a24d9b461c2c9bdca27b8447d33dfecd31d6c267973134,2024-11-21T08:37:57.030000 +CVE-2023-51355,1,1,2b515286d2b4ac8febb744640fb3bed66077179bda6dbe066773b6b1603dffc1,2024-12-09T13:15:39.650000 CVE-2023-51356,0,0,0c338ccdcc36826e4261bb2d65b363156e88e8f2d31d7f5f3ac98f0991e9c93c,2024-11-21T08:37:57.153000 +CVE-2023-51357,1,1,2cffa027d3ab90a7a61334556de857373107f761ade55b7a33b41f201498b60c,2024-12-09T13:15:39.773000 CVE-2023-51358,0,0,a39f80c666cfe20d4921d419cc21168cb56b1e792369d8cbd0f79e7e524aa5ea,2024-11-21T08:37:57.270000 +CVE-2023-51359,1,1,6a42f726e9850d044d991d92f5c7feb37179ed3fc65dfa3aa4a94baf62797c3b,2024-12-09T13:15:39.920000 CVE-2023-5136,0,0,7273ff22f0e2accd512ee99ad682c65422501bc1bb9a2f070bf448d981e446b8,2024-11-21T08:41:08.100000 +CVE-2023-51360,1,1,1be0b663aac196162e28c61d85ab2eb3e06cc80564a0cd90e2b309ee101929c0,2024-12-09T13:15:40.047000 CVE-2023-51361,0,0,1a416561a6d01060c5cc09d719f73b3557176ce13168f357b65d6f712633a11b,2024-11-21T08:37:57.393000 +CVE-2023-51362,1,1,5ebc19c9e19a80db8f78e72313b098d23d3460c24ba5ef04981a01fa8472a3d2,2024-12-09T13:15:40.170000 CVE-2023-51363,0,0,f4a3bb5a030de694d5865d970b8fcf3c8b98dc66e20355d0cacbbe44dd522f78,2024-11-21T08:37:57.513000 CVE-2023-51364,0,0,aea0d540350d97fa30f343da9647452d4cc8136fb1b2ec33c520d8d048e79b22,2024-11-21T08:37:57.637000 CVE-2023-51365,0,0,2b465a41608afd423c9178a7b06551d04a0cfecabb3b43f3514ccd33d3fe2340,2024-11-21T08:37:57.760000 @@ -239580,13 +239733,13 @@ CVE-2023-52537,0,0,eddda6dd6d9e592d90f3ac894438d9da57b3618bdf6199acf73d4ee174cfb CVE-2023-52538,0,0,90e43d3e3a5c463edf4d812e54601242eb8a1e9363e68973b9691ab0678cb5be,2024-11-21T08:39:59.820000 CVE-2023-52539,0,0,e9b0ee192f3443a1a82fe74ff499fbd849048428d7ba9b64e71c1360d744d167,2024-11-21T08:40:00.003000 CVE-2023-5254,0,0,3d8c29978f6800ebb58594bf362c10ef5c6c2cad50b6606299b48138c0adda36,2024-11-21T08:41:22.973000 -CVE-2023-52540,0,0,ecf9418f7978e8a0624691421669aa40ea4feab878516b459bd9b6754cd69291,2024-11-21T08:40:00.210000 +CVE-2023-52540,0,1,a090b1c1af9c1dd578ae10371b38d872026dc18aa6353ff056f933a568be5d59,2024-12-09T14:12:49.007000 CVE-2023-52541,0,0,7862e246830bffc6141b156329a198c1913f2ec62e541d569cdc3f04de22d8c5,2024-11-21T08:40:00.333000 CVE-2023-52542,0,0,23611773558685d5e74575fa59c4f83f8a95cbdbeb9e0dc7cfa2328d941938e7,2024-12-06T21:15:05.653000 CVE-2023-52543,0,0,5283d1b3068666f9df1d4bd34373b734822e71b72480090d12dd8445b86c1095,2024-11-21T08:40:00.710000 CVE-2023-52544,0,0,406148b07c3e067d8a9476be53ce0c11d92291c013d48a8edbe35d723499379b,2024-11-21T08:40:00.890000 CVE-2023-52545,0,0,9a8fc8901aa644cde1d29ca0a0573e4a085058e72b5ee8839f817feebb241a74,2024-11-21T08:40:01.073000 -CVE-2023-52546,0,0,b6d1241416b4512ac5ecb3e0015a0bfd6bf49e8b40a2fcd32b8bf55cb60bfae9,2024-11-21T08:40:01.263000 +CVE-2023-52546,0,1,595e1c1b42c7971cff7132e9cb85749c3833d2ddda52158da49cbfedf79cf606,2024-12-09T13:54:48.487000 CVE-2023-52547,0,0,dea146192349d1d2cd37200319a3be97b4569e9d0865461e95a964ee33c3de43,2024-11-21T08:40:01.370000 CVE-2023-52548,0,0,f0792580a3497e5e9473dba47b498b4ce823bc21046535c975ad80ddfde174dd,2024-11-21T08:40:01.510000 CVE-2023-52549,0,0,ee9009133fbe9f80d74dff5352f9b88a18a64ffd6ce72d5c26cd7d7807302fcc,2024-11-21T08:40:01.647000 @@ -239996,7 +240149,7 @@ CVE-2023-52917,0,0,ad07ff99d1b6f5c28213275a00a82b217dcc6f45e2e5c6b28e6f348e60140 CVE-2023-52918,0,0,b756056ec028a3f8dbe95359b4e6a9ee9c3aee022710af984fbcd888a01bb989,2024-10-24T03:55:26.737000 CVE-2023-52919,0,0,428ae0b617ce1503b5cd1e233daf56322f531cad4cdc2d0ff04fec45c15d021d,2024-10-24T03:53:16.377000 CVE-2023-5292,0,0,053cd6bdc838ec8e58310af23c6d4e5e608dfbec5f41437eefe04e4d3a1ca985,2024-11-21T08:41:27.907000 -CVE-2023-52920,0,0,5d128c8f5f7b6282651b70dae5618f92f28fe4ba5b72c9ac37ba01b4359b245e,2024-11-07T19:31:31.217000 +CVE-2023-52920,0,1,5ccb706522b2bb61a4ff93701c4ce4aef0cd273aa2a0286f242c66a94d5b4a5d,2024-12-09T11:15:05.403000 CVE-2023-52921,0,0,2ab56b205ca4683a8dfe1c1d2041b0495ba5496b1ce1fbb0ad171c5facf70d10,2024-11-21T20:49:54.030000 CVE-2023-52922,0,0,e7092611f6d9115a9713c0e3e80e6e2edf8ee94e7dbc30ddd1c7f11e718cb99d,2024-11-28T15:15:17.260000 CVE-2023-5293,0,0,2ab12f953bcab8d32935fa01b57edeb209bb6e98a2ae0077b834e165d686a9d4,2024-11-21T08:41:28.027000 @@ -244210,9 +244363,9 @@ CVE-2024-12270,0,0,39bcf28b0c7f0c2cc7925c4c71867c3d58c667f7e488518c8c9808ae3acf4 CVE-2024-1228,0,0,02a2d35b9c29d8600ba5afee210d0e6465f5ee41eb5d9edcafc9d5f9e15f44ef,2024-11-21T08:50:06.280000 CVE-2024-1229,0,0,8ad8bfe76844e757ec6d08a1bad2f097b99b608e965943a6e4928e217dfee4df,2024-11-21T08:50:06.520000 CVE-2024-1230,0,0,4e58704ea3cd6d96f1b95bf7630f56ca27fd7e9cf7f7c464007165035f04082e,2024-11-21T08:50:06.710000 -CVE-2024-12305,1,1,591beb549e2fd130a4eb51689f906f54cfd4f9ef094b292b5ebd58de367d8b56,2024-12-09T09:15:04.970000 -CVE-2024-12306,1,1,7a6ad19881298b2491617643bd5219a8f3696a7257d332ef3f9d18eb332eeb87,2024-12-09T09:15:05.293000 -CVE-2024-12307,1,1,23aacf8c044133a030d70d78a0f87e6b3da2eadc1bf68e4a395d80d759eab88c,2024-12-09T09:15:05.433000 +CVE-2024-12305,0,0,591beb549e2fd130a4eb51689f906f54cfd4f9ef094b292b5ebd58de367d8b56,2024-12-09T09:15:04.970000 +CVE-2024-12306,0,0,7a6ad19881298b2491617643bd5219a8f3696a7257d332ef3f9d18eb332eeb87,2024-12-09T09:15:05.293000 +CVE-2024-12307,0,0,23aacf8c044133a030d70d78a0f87e6b3da2eadc1bf68e4a395d80d759eab88c,2024-12-09T09:15:05.433000 CVE-2024-1231,0,0,b14e8b0a07bc5ec367647c5978c3a1256f30a8a16700580e77b0e0e8d9654fdc,2024-11-21T08:50:06.870000 CVE-2024-1232,0,0,0724dcbb02c95ade7614aaa3e49113b53bf4da94f0e9ec3c91efd2f39f26e0e2,2024-11-21T08:50:07.030000 CVE-2024-12326,0,0,f960296d4c7a80b2aa28fc7f84f75a77ad31211d0d7e9b5df25b051a57e66633,2024-12-06T21:15:05.957000 @@ -247512,10 +247665,10 @@ CVE-2024-23259,0,0,de4d07b1cdc1aa8f4aedd24e50dc05ad4b880c62dea44d1945e6e26412505 CVE-2024-2326,0,0,d09d4fc0a3fe2b3bbc5a1e657d32fe82b3fbf461a6d335455eaa162e70e203ea,2024-11-21T09:09:30.590000 CVE-2024-23260,0,0,86bee0d3b6e536addbecc74ccb792fb0e6df91f3c5ef6f2caee278d7f60aa344,2024-12-06T15:21:05.480000 CVE-2024-23261,0,0,e3d079aeae084ce00b784250816edd4a5b3e0b3c058d3918e25850cd4defbfe1,2024-11-21T08:57:20.073000 -CVE-2024-23262,0,0,dd6ee7924088414adb0ccac383959a34a2ff1ce3a57b1a2773cb9754c008a63e,2024-11-21T15:15:27.280000 -CVE-2024-23263,0,0,5a1dbd73e78c98c9b77aef45febf56310d44c9736405d438f0a840c74fcf82dd,2024-11-21T08:57:20.367000 -CVE-2024-23264,0,0,952a6d9e9aea8e2a5e0d170b3791729d5ffaad8ec33320097c06c048212d37b9,2024-11-21T20:15:39.470000 -CVE-2024-23265,0,0,29ba526c73c8340ea16cb77ddb942d930c09a6617e4ec2c4ebc1a30158429380,2024-11-21T08:57:20.703000 +CVE-2024-23262,0,1,1535451d12572554b56049bc49912d9cdb50bf6dc852f77d89b358e10c4ee767,2024-12-09T14:38:23.027000 +CVE-2024-23263,0,1,ca6e511dc7fce998e826586ff3e149d6cb416d36b45392c06f61fe9e032798b3,2024-12-09T14:55:47.257000 +CVE-2024-23264,0,1,07fea90b6d99d40cbb083a81e85d4d568769355373ecf03c131cad9e9ace7730,2024-12-09T14:54:57.097000 +CVE-2024-23265,0,1,db4b4c530e76f8ed2d112d0bad1a3bdfddbb6c00b6ad2fb85b63f024c6e528be,2024-12-09T14:53:52.510000 CVE-2024-23266,0,0,31c0ac0539705052f1db5786c19c4eccec4b8d8fa4a8bed465cbfecc626b0de8,2024-11-21T08:57:20.900000 CVE-2024-23267,0,0,7250cfed078af7a6990710e0753b855207716b3ed02df23ae117cc6f0a44e77c,2024-11-21T08:57:21.027000 CVE-2024-23268,0,0,a4c71a604889babee2e216d86343f0529f00ea91abd63d6059a91119c010cb0c,2024-11-21T08:57:21.153000 @@ -247535,23 +247688,23 @@ CVE-2024-2328,0,0,bb3499035182a93f707cdcba0335c8ccddb9563295bc2859816e2ba7e35f79 CVE-2024-23280,0,0,09fe788e24d4a3f86544fff0058ed254d6dcc58242d779773f092933de0dc574,2024-12-07T03:11:21.283000 CVE-2024-23281,0,0,d61c29e2da22db59c8619e2a65e682c844cf4d1f6e653d9f689513c788dee3e8,2024-12-07T03:07:25.667000 CVE-2024-23282,0,0,88d3e5536f6addd2d1f14c05b4f0e8c379cea58dcc47137ddddd0c1ab1405198,2024-11-21T08:57:23.883000 -CVE-2024-23283,0,0,5367d60ab564664b47d5a5b0b7a01891a1a8848eaf5707c129483e54b12b9615,2024-11-21T08:57:24.143000 -CVE-2024-23284,0,0,b14917408e2b7a14ba338c6458bd0eee58c29f47faa41ea05a11c01d3f9f2165,2024-11-21T08:57:24.343000 +CVE-2024-23283,0,1,56c1072b318c48ebe90ef1b2a7c35423384b947c5be3d10aead909c331a35c36,2024-12-09T14:52:10.927000 +CVE-2024-23284,0,1,64e1b746275252c2e6db8a2371702dce20ada41dcc77ab0ece12b869a60da267,2024-12-09T14:51:06.673000 CVE-2024-23285,0,0,5d521a8a7f9096026de4df0fec44cd3b3cc78d026fd3cb300322ad04bf5d3016,2024-12-07T03:15:00.420000 -CVE-2024-23286,0,0,1dd4e21542d0f0d87739e1dbef505e20e6430ee63125a7d7cc877f30954588a4,2024-11-21T08:57:24.690000 -CVE-2024-23287,0,0,1ce54d80ef01707c551119067b9982335010039befa6800bf091b16117a17cf1,2024-11-21T08:57:24.907000 -CVE-2024-23288,0,0,568a66811144ff9b29ddff9c497fcd3b3ac871886628b7144a681887b386607d,2024-11-21T08:57:25.027000 -CVE-2024-23289,0,0,9307098a906bc7129f02449c20f9f9ebb636ddb0432c97a3d600b92b62791543,2024-11-21T08:57:25.220000 +CVE-2024-23286,0,1,86fd4ad2c5a71a9e9333a5fa3fe83f4efc355920ccf4b53da834c2b36662b39b,2024-12-09T14:46:04.583000 +CVE-2024-23287,0,1,b9fc4e887a745b8cc10e29eb7f9ffbfe2353d513d58ed1415bd5a652403645a7,2024-12-09T14:45:36.460000 +CVE-2024-23288,0,1,ba0b84f301c5ff600dbc7631e1af9aacfb9ae7dc39eddcd006c669da21e7d825,2024-12-09T14:44:52.763000 +CVE-2024-23289,0,1,99ce082a630c26052fbc7b3df93b3152e86ed23c613214fbe1e50792959af49e,2024-12-09T14:43:14.650000 CVE-2024-2329,0,0,c472c56af83ede4ff6dbe12bdecc2fd77c4f73580e83ea55ebdd9db6ae395ca8,2024-11-21T09:09:30.960000 -CVE-2024-23290,0,0,08ee60fff2601235fba9de81c30bf78e907a0907fd3e0b46e5df224c64272dd2,2024-12-04T18:15:13.557000 -CVE-2024-23291,0,0,6c8e13e49c56996eef4858d7a2731b15aee531f692dc6bc9285bc7cc62f566b4,2024-11-21T08:57:25.537000 -CVE-2024-23292,0,0,2387a0214bf181f95d810880ae87b70b55ad5e4d8b9dd42e1656378b112e6d3d,2024-11-21T08:57:25.730000 +CVE-2024-23290,0,1,5f2cb9f63febc3183c4545b31771397a8bd37a4b321ee9286f926f123fca54d5,2024-12-09T14:51:21.537000 +CVE-2024-23291,0,1,d99c154998215bddb9fca72a77eb17762f4b5c062f2ea35eac6a14df0d0810cd,2024-12-09T14:41:40.010000 +CVE-2024-23292,0,1,bc50b53ba7fc65e1b34d769e31ab336ca0f8e999265f13d76265950343381436,2024-12-09T14:39:31.653000 CVE-2024-23293,0,0,1d752928ef781ac63d4aece9ca41c77ae25a928c761bde4a2753a40e7fa34f65,2024-11-22T16:15:21.753000 CVE-2024-23294,0,0,e9085d402353f9645711cb6b808bdbee24e9fdc19cf8676896b0876ae62488a9,2024-11-21T08:57:26.043000 CVE-2024-23295,0,0,3f9ac0086ed19867e3def02e30e0112180d0daf7e659702a937485b56a7edd2d,2024-11-21T08:57:26.240000 CVE-2024-23296,0,0,a165defb5fb358d9bdbb4a0d0914eb6506b00c6e96be9d339a3b3ffed7f126c7,2024-11-21T08:57:26.477000 CVE-2024-23297,0,0,d3262d6865ce345000885ced4233f1dc0afa2fe68243f4dae0378818c31c4d2e,2024-11-21T08:57:26.733000 -CVE-2024-23298,0,0,e72c48baddfba439a816068028014adca9ad32310af9d7cb2d83fbc71eeb08f1,2024-11-21T08:57:26.953000 +CVE-2024-23298,0,1,801dc4397d9cb442b2a863f1bc826d70b8fd4009aa54eb2ce4e4f0bf9137623d,2024-12-09T14:44:22.810000 CVE-2024-23299,0,0,a4c59975d9e4debf492651a9710e74c1d53dab4df40f27acc3fdd4d1a0a06c1a,2024-11-21T08:57:27.153000 CVE-2024-2330,0,0,cdcec8973933eb0cc3358dc4fd7944cf2c999cfac8dfe75d740b313d9c04bdc5,2024-11-21T09:09:31.107000 CVE-2024-23300,0,0,d872c3062daebe35ac139fa350e79430e21e8abfa531faee9acc0e86deff3849,2024-11-21T08:57:27.380000 @@ -249943,7 +250096,7 @@ CVE-2024-26682,0,0,ae08326ed6f4f94b7d4441b8371ec4fc915d6ef349f9889c87cd67d72b6a2 CVE-2024-26683,0,0,82a032838d30c03d148c2319ce64c196816ce4daed29ea76b4c514fe7196cf45,2024-11-21T09:02:50.280000 CVE-2024-26684,0,0,7aa60e463942f2c72d93ddfc8a0b68ac9056fa18048f70d6c381cb5fe86818ac,2024-11-21T09:02:50.390000 CVE-2024-26685,0,0,d788863551b13aca79bd9e91f7defc379df7538a66da57b8c8f0d772600cb03c,2024-11-21T09:02:50.510000 -CVE-2024-26686,0,0,09be2b0aedc74f5ea9641bb8124079b810d301cc18ac7e3ee19f7aa7cb5ae8fb,2024-11-21T09:02:50.707000 +CVE-2024-26686,0,1,c1cdfdf069774f9f1a258f3fcde20f093223b3fed9526d89f0a4d95e2acb3a5a,2024-12-09T13:10:00.537000 CVE-2024-26687,0,0,55d2e164366a53f2463770b85dedb6b40cdbd484c5c1068cd2bbd41cd0d1cb60,2024-11-21T09:02:50.820000 CVE-2024-26688,0,0,2d3bf5721d0821a5b92d7cc11d5dd7313b5c89213c2e9bdc19b591cbd2c7d5ab,2024-11-21T09:02:50.947000 CVE-2024-26689,0,0,3990e6568ef2171cfa776ff7d235c6bb3e88f3ec5aa2c29b003efb5d71ec2178,2024-11-21T09:02:51.073000 @@ -251612,7 +251765,7 @@ CVE-2024-2882,0,0,333fd9d275143597f26940ece50997e4a4481fa0b5437e262b02e1fcdb16b0 CVE-2024-28820,0,0,b232a03190cb616eb28fecfff85ba43194ebecadfca338777cd7d20082523274,2024-11-21T09:06:59.737000 CVE-2024-28823,0,0,f4058169eaa2cbb5ea873fb202ec66f60f010eefff5d9ae8b4847e9c03c883fd,2024-11-21T09:06:59.977000 CVE-2024-28824,0,0,cde433b5885911b7789fdfdbd34a44f8766b9cc8e82862fff5faf5f350d4d4d7,2024-12-04T16:47:59.480000 -CVE-2024-28825,0,0,bc1b4db09b2d4f20c239e868c176a84baf41b328c9af200ef3bc286d4a2b09ae,2024-11-21T09:07:00.360000 +CVE-2024-28825,0,1,7add152ac0906831b113bdc513a679ccac22b147047d4009770d12d74cd5b396,2024-12-09T13:43:48.223000 CVE-2024-28826,0,0,077e8e0b407c9d0f41b5a56fc0a8c8515e3139f57d73c98dd94b70c9a5246b32,2024-12-04T16:32:38.107000 CVE-2024-28827,0,0,20a0a6c1eea7a3a4639aae044c1bd574f322bb4d2a2d3d499f43bf40de5de771,2024-12-04T15:32:27.407000 CVE-2024-28828,0,0,8f248f1744f3a4fd045374ac6f438339f19f7c0ee7413ec5c33c7ffcf52c5330,2024-11-21T09:07:00.780000 @@ -260562,7 +260715,7 @@ CVE-2024-40961,0,0,c323f131dac03e8f3736a795ce92c772336b6ee895d5ed1507aa424851c01 CVE-2024-40962,0,0,b1e2d11392cbf11d471eb0806bcfdab7b9da04b2514d474914b1ece02804736a,2024-11-21T09:31:57.560000 CVE-2024-40963,0,0,c843adbb2e11ca70f14a76d9f2283ec92ebfc91029cb9c0ca45fa23dfccbddc3,2024-11-21T09:31:57.677000 CVE-2024-40964,0,0,c910de534f63857a534d4a6d6bc0df1c126902b754988ebd232d1222d98e8703,2024-11-21T09:31:57.803000 -CVE-2024-40965,0,0,405754d64c11097a6080200757f545cb9d3eff876d852b24de69e0265f31e32c,2024-11-21T09:31:57.930000 +CVE-2024-40965,0,1,f8d0a45c787c53552589ec6b6dd6d65da2df46381e3d5301192fc08e266a5574,2024-12-09T13:10:01.363000 CVE-2024-40966,0,0,88d749e96ac5dedf1b15084599163dfbcea1d5fb2efb0d55f54a391ae6004392,2024-11-21T09:31:58.050000 CVE-2024-40967,0,0,6845339d81fcc50920d33d9fef5466e37ff56e51a43c44a32a3232413a6a97d5,2024-11-21T09:31:58.160000 CVE-2024-40968,0,0,18cabec4281f9f3109c52640b7bb33422982c3c82e3ce307d2342bbb5c020645,2024-11-21T09:31:58.297000 @@ -260573,7 +260726,7 @@ CVE-2024-40971,0,0,604d56931c3387a7fa332d2b88d504a7175928f4e84d73064a010be7e7355 CVE-2024-40972,0,0,40fef17dae23ae168511c58652ef52e106fda524389cdcd971cc5f4572605a96,2024-11-21T09:31:58.800000 CVE-2024-40973,0,0,6294b18460ef7514ce928be54d821826732b56b0e5313e7c7b2fbf639665332b,2024-11-21T09:31:58.917000 CVE-2024-40974,0,0,b6a51bc421f4858319d1d11b535e9f0c7c1e0cc032cbf31bdaa70aca77cf9b0d,2024-11-21T09:31:59.047000 -CVE-2024-40975,0,0,c168118078700da81b3818117611525ffee66d52a0ae80c3ce751eb526a1f8a8,2024-11-21T09:31:59.193000 +CVE-2024-40975,0,1,c95634b99ac5de870c313480d060cfdc3b3cfad72080543bf85013daecfbc46e,2024-12-09T13:10:01.607000 CVE-2024-40976,0,0,9d6f95cbcd7cc30b63959e63e7cf081c28a7c5898438c1286ef736954c419546,2024-11-21T09:31:59.313000 CVE-2024-40977,0,0,0dde76738061c1e28e1cd3523f99ea3235f7a0cd6ee92d527cb9e6f12483f5d3,2024-11-21T09:31:59.437000 CVE-2024-40978,0,0,706aec6402652db0246e676eb88156691d676041d7564d31a9f0ad22a4083efb,2024-11-21T09:31:59.570000 @@ -260615,7 +260768,7 @@ CVE-2024-41010,0,0,7d2daef6e7d0ee3e0487437fe1a45624bf889ddd16049d1a5a89a934f340e CVE-2024-41011,0,0,9f4ff30565fcca32f4ad6c1fcd8959c5c6e4a1ef7a7a74225d8f93f4f9f215c1,2024-11-21T09:32:03.737000 CVE-2024-41012,0,0,eb5eeba32dbc20c53f5d8ec529e31bdb298f6fa48fa5e0e88492ead04150e399,2024-11-21T09:32:03.867000 CVE-2024-41013,0,0,5fa1c4fa94fddd2444f8dc7d47309ecc02ad8b4b9ee85ca85add02664e1574f5,2024-11-21T09:32:04 -CVE-2024-41014,0,0,7d3efbcc0b01cf0916c1d3233c44f3e95ad635d3a62d74a686bc99325e0e7679,2024-11-21T09:32:04.100000 +CVE-2024-41014,0,1,893090b1e9081bef7fef028cc5e44d66e0f0e07ccf422dc8638117fa2c1156a6,2024-12-09T13:10:01.833000 CVE-2024-41015,0,0,9b3ae1f79342e0b13e2fef94889a75a92c8d75d0a17ab7cd43a433c966ccfd17,2024-11-21T09:32:04.217000 CVE-2024-41016,0,0,8df47623ea6d364b67b323c6874ead4a0fb1cdd6a839c86e81c3f8df2e89dd14,2024-11-21T09:32:04.357000 CVE-2024-41017,0,0,3fd60b423aa4c60ee66b8bf5eeacf56b9cd985844d17ae8be2e46577f1ee5370,2024-11-21T09:32:04.487000 @@ -261384,7 +261537,7 @@ CVE-2024-42119,0,0,03ea2af429e4e38171757ef1550057411fe944ad3248dd0045fd7f062df6b CVE-2024-4212,0,0,c62640835c43c048feb1765a0a4e1463421eccc68dc4de682d0a44a17f4638b5,2024-11-21T09:42:23.860000 CVE-2024-42120,0,0,c55507381d2dbda42ba1186aae324969076618a383d70d402103e69c7c75737d,2024-11-21T09:33:38.673000 CVE-2024-42121,0,0,bf6415bde3191c5f5fcd25ffd10af7590ee25a7ffb8661d1b1bd658227b8f687,2024-11-21T09:33:38.810000 -CVE-2024-42122,0,0,3e7e821219c8689015eadbc3f3410e1a9060e8d5a408fc17708bb877ab8313ee,2024-11-21T09:33:38.937000 +CVE-2024-42122,0,1,8f80f34dcee523cc5df99cdb9e0b5f5fb6ff4777f77fd53a4e265209d3244689,2024-12-09T13:10:02.027000 CVE-2024-42123,0,0,ca40270975193cea9fadaaf2824034ae49ab2d88be452d1b1b4900086515933a,2024-11-21T09:33:39.073000 CVE-2024-42124,0,0,e781b41b494e8934a80a32a55c31968231f9fdd1547ac2aaa22704f3a0904455,2024-11-21T09:33:39.203000 CVE-2024-42125,0,0,90cc0dfb50e96857183724b2521e3da28104dd3eb493dbebf5655d7efa8e7960,2024-11-21T09:33:39.327000 @@ -261421,7 +261574,7 @@ CVE-2024-42152,0,0,5f342bb1abae967d8438d0676a236529f5bc24d1fe1ff3e973c831d0977ae CVE-2024-42153,0,0,1496a95f10a9235d8eddf46404b21246b0e7d154663f9513c0b659aae2790b66,2024-11-21T09:33:42.667000 CVE-2024-42154,0,0,4bab38ef943fefcbf9b995eac8d2c37b166d794783490e0bf5217aa6ae896550,2024-11-21T09:33:42.803000 CVE-2024-42155,0,0,aa794d479aac396a7a3b5e6890e14db73c36119882d589d476729407756ebd4f,2024-11-21T09:33:42.953000 -CVE-2024-42156,0,0,58f0f1f468fd7d5c115fbf2d756b5d97faa86e5759d878b7a385f5fd43b911db,2024-11-21T09:33:43.093000 +CVE-2024-42156,0,1,a9a8e622c5b8a4d30b8799273ff38304daa31026eb6d50026c414e77c572f2b2,2024-12-09T13:10:02.267000 CVE-2024-42157,0,0,3e03481799a20d5c21f14f337275e58ec07b307f6caab50657ad6e50617090aa,2024-11-21T09:33:43.217000 CVE-2024-42158,0,0,d4d5e108ac5412e6f2f85c11a24d6cdcca6e4d686f46c032e5c9f25238f6f131,2024-11-21T09:33:43.357000 CVE-2024-42159,0,0,aa8c62cc6eaa25b0d6a303d64629b4ac0d87b050b22849fb74535056ce43858f,2024-11-21T09:33:43.480000 @@ -261477,7 +261630,7 @@ CVE-2024-42249,0,0,3e2aac603ccdfd52ea7ba545e102453ba3f0cdc8a5aba5fb1d48319bb46ff CVE-2024-4225,0,0,8cadba8c4e3c0aeb41ae12eb8faa436d946b01c35628e6c482ef0c0c3107fb89,2024-11-21T09:42:25.453000 CVE-2024-42250,0,0,13674d558c299305d90e1483bf3da03b1a24b7a9797e8299ec96f3ed0f3ae2ca,2024-08-08T20:55:19.780000 CVE-2024-42251,0,0,b4ae2de19c16819db7eb66f87755641c175d64050a3dfb520cf56f30452dcf2d,2024-09-06T13:21:23.203000 -CVE-2024-42252,0,0,01e3533f77a93bdc13ff289854ea525c42b55e502179858fce25bfaca12e3edd,2024-09-06T13:37:31.460000 +CVE-2024-42252,0,1,d2af1b15d6ce3d0efc7dc47f1f09b434f215d70300bbfd2e80f8ae4c8603f4d4,2024-12-09T13:10:02.447000 CVE-2024-42253,0,0,61aad415d57b3a57d157accbc9c47ac17aefb439739b3a08dfea5aa4b1627d07,2024-09-06T13:38:36.103000 CVE-2024-42254,0,0,70143eba0366a80d3872f5bf49ecae15542bff37b403377495a9423b9f70ffaf,2024-09-06T13:40:04.737000 CVE-2024-42255,0,0,697a772ae954e936429b8aa8501069d5ebc75ae9617a6bab2596c3d6556b2c5a,2024-09-06T13:41:30.843000 @@ -261547,7 +261700,7 @@ CVE-2024-42315,0,0,23cbe9990bbe4d59f4d13ef3d6aa09d34cbe49a21987fd5ce337dbc10ba81 CVE-2024-42316,0,0,e9b5b0d0f4f95ade997361b5915edc776fd4ec09db7884f57717bbcd218424f1,2024-08-22T15:52:38.520000 CVE-2024-42317,0,0,44f472938e0f5464917f6f6f19a154afd8a7d285193dd7544e55d6415831a573,2024-08-19T12:59:59.177000 CVE-2024-42318,0,0,1205365676af872ffbceb0073efcdb4012b3eb2e9c5d9c518786ac318b16b4f1,2024-11-21T09:33:52.177000 -CVE-2024-42319,0,0,eb5fc32e810c02d0e4bc3b0d9ebaf0ea35abaefd35cea63e1339820db2a46ad1,2024-08-19T12:59:59.177000 +CVE-2024-42319,0,1,39c4a37df12007f395d13fb17e160ec489cf5c03452071f10272dbc6f8b1ef8a,2024-12-09T13:10:02.630000 CVE-2024-4232,0,0,d3e4ae38e531eb4da0c4d9238343807bde195bfb3237301a6354cd47a10fa42a,2024-11-21T09:42:26.013000 CVE-2024-42320,0,0,87317ab2141acd008e043c8eaa6dab96445c25e2aa2979d6ebc74ae4a136b6b7,2024-09-30T12:54:12.897000 CVE-2024-42321,0,0,1716db5db6c984bf2ebbd691b80440a9181fa253c6bc8c5d00954d830484e312,2024-08-19T12:59:59.177000 @@ -262134,6 +262287,7 @@ CVE-2024-43219,0,0,bc89c1a1e6ce307adcf92ae27635e024a9ced0b5d750954b55bcd81d6e935 CVE-2024-4322,0,0,6f535e4301c4177292e8b193dfad1e892d877195cdd8805de5a65bc48139f7d7,2024-11-21T09:42:37.400000 CVE-2024-43220,0,0,a5e6bc2b73e869859a6306037ab4ac04781878e232202a6168b0e4a37cb70884,2024-08-13T12:58:25.437000 CVE-2024-43221,0,0,52bf4703a192c3b5d3768eaf3c73879eb2cdcf3e5ce777a1d149ec7c0bd8a2ed,2024-08-19T18:36:20.123000 +CVE-2024-43222,1,1,859ed03e53c410d3587fbff134e5ac7c05890b8de2b75028bcd4deef787b85fb,2024-12-09T13:15:40.300000 CVE-2024-43223,0,0,10b1f46ac57b6e18c1724b971411da9b7b101822770632c9686f7c2694bf43fb,2024-11-01T20:24:53.730000 CVE-2024-43224,0,0,d567ed7362ff738e465a90827beca5137f9f3a243f17be25954e3a800c4e0eb6,2024-08-13T12:58:25.437000 CVE-2024-43225,0,0,ba4cc5f0a185ec79a06b1af32b38d62edf190927098d0c1fd69523c1b37f66a7,2024-08-13T12:58:25.437000 @@ -262683,7 +262837,7 @@ CVE-2024-43853,0,0,9240a70320e1631db24f041c17d50c1e8436ae6a4f7937cc59b0ff905a394 CVE-2024-43854,0,0,c0c335210316ec7fb2ec9f45d3499721e9c06ded5495f2d6bef774d674c67b35,2024-09-12T12:15:49.423000 CVE-2024-43855,0,0,6037002dea6915719620c190ca45b2914b53673ead8eec6810806035f71b919b,2024-08-22T17:48:09.100000 CVE-2024-43856,0,0,1ce9dbb6ce960bf0eefff79e46d8342c577302d38b7d50b18f1c66fb191333b6,2024-08-22T17:57:08.640000 -CVE-2024-43857,0,0,f4cb3714e98f944068744659ed5773ac6e6ae168bc6ab59ca58f430f67f9e1d7,2024-08-22T17:38:21.003000 +CVE-2024-43857,0,1,f3a8947332f280c30b8ea6bab16d3e96d13bf90add7d921c56501b4d86b62f87,2024-12-09T13:10:02.783000 CVE-2024-43858,0,0,5077404735cf9ecb905d92b62ddf17466cfe457ed8dcc84e84bf753c178415fe,2024-08-22T17:40:11.663000 CVE-2024-43859,0,0,ba8f5a01f9760498fbf0f57e83f8b5c8ab1459863643a2e9662f4a4c55fd9238,2024-09-08T08:15:12.960000 CVE-2024-4386,0,0,54a90b5b7f9adcb3ab883ff3856f21e7a8791912f2bda7cdf746e2c28d61849e,2024-11-21T09:42:44.827000 @@ -262745,7 +262899,7 @@ CVE-2024-4391,0,0,5c99ed317cb10fad7f2152393848b60a10c79a471d7e38be2dc89a11676757 CVE-2024-43910,0,0,f09792e52923a702137c77836c509e81bd123178796b2db869e8028c46dbd737,2024-09-05T18:30:23.437000 CVE-2024-43911,0,0,20c6e5eef3dcc934fa499bebf9dc436656bf40bb76e7e9eefe4334ad2b410795,2024-11-08T16:15:22.483000 CVE-2024-43912,0,0,b045133d294e4fa9817b7cc6e1963575a481178f8d5aa121f3202846d1b4ef09,2024-09-05T18:19:17.067000 -CVE-2024-43913,0,0,96cbd6e97a51c7af8e51205ddfa3a4d32650b4b07cce8970b00d6d18c2e14634,2024-09-05T18:12:55.680000 +CVE-2024-43913,0,1,c1c655bf98a245b739b6bae86ffd25e2929e2c6be651f6c884a5a07e5e42c724,2024-12-09T13:10:03.003000 CVE-2024-43914,0,0,2295c4b85c720f6aa521d0d441f8fa3541ee5bbad0e5cc835a8e46f08f8be0dd,2024-09-05T18:03:49.997000 CVE-2024-43915,0,0,bda9683059f91afc02ad46ce04605da44ad5f4bae68563e54b39ab5b3b13a5d8,2024-08-28T17:44:45.193000 CVE-2024-43916,0,0,133cf9e3a07f413266ec27769018cedbc776518a74f26baefc2c4a383b75759b,2024-09-12T16:21:19.030000 @@ -263318,12 +263472,12 @@ CVE-2024-44947,0,0,8f801ba5159e9b8f9b3c4016ab8510468b13ef5ef3423053d9ce1c290e857 CVE-2024-44948,0,0,b6624809fc4e7fad2ef29d7ebf62dc5527a907fa09ba4a21a20058ddaf98aede,2024-09-05T12:53:21.110000 CVE-2024-44949,0,0,952b07da19f55defd87da121fc76298fdf7cce76720aac9cb044b19e5fd9e140,2024-12-02T08:15:06.897000 CVE-2024-4495,0,0,2c130c223b9972e591566196e9584b086727f4fd658b1edaeec00471e6f0d275,2024-11-21T09:42:56.860000 -CVE-2024-44950,0,0,59905dc049e28d1c03fb4605b15e9fe6cc6875c50c484821b5083cf544f14923,2024-10-09T14:21:16.773000 +CVE-2024-44950,0,1,1afe55f12c446c1f0d9f50a722e2376b8297cb711b93c0896cd10a33c297f44b,2024-12-09T13:10:03.227000 CVE-2024-44951,0,0,aa685e9643193f2a430154fe7087e89f1644d56a299d0e03a2a9efed4e0cdb0e,2024-10-09T14:27:43.973000 CVE-2024-44952,0,0,6075a53e4a12ab3edde68b2f32d76123b685c2ffd8a80a3e387b8f8a1b55017c,2024-11-09T10:15:04.710000 CVE-2024-44953,0,0,4dded2bb37acfb6eff4acd77c8806d5d13ef508d26de37379bffc5ecd90fdbbd,2024-09-06T16:37:33.650000 CVE-2024-44954,0,0,ca1483f1bc80b6fc317dee185ca5bfaca3fb71a4e1bb2be04aaa089f77305fa8,2024-10-10T18:02:42.307000 -CVE-2024-44955,0,0,b86ad472b1d954d161c0948342672e535476f560e0a188bf33bb4782a280e116,2024-10-10T17:57:00.267000 +CVE-2024-44955,0,1,2bc6b0d941fdfccf3c93972ebd5efd5058cb7c721673095ebdd7739bcf15a6cb,2024-12-09T13:10:03.600000 CVE-2024-44956,0,0,86920dddd41f37c850fb3187de0d04345b34edcff9616626c578c463883b545f,2024-09-06T16:37:11.777000 CVE-2024-44957,0,0,1cf763e8c9a7c6633066ea97c4cd268591794ba04e060d517e94af511c95351c,2024-09-06T16:37:00.077000 CVE-2024-44958,0,0,10ffa07c682ea617924ba9d633879bcec7023ba11be7e36066d5dd8fd1f703a6,2024-10-10T17:56:24.467000 @@ -263332,7 +263486,7 @@ CVE-2024-4496,0,0,89836cb5696552b2de7a5143c3db83023897a4c3c8b38a6bbafc268be5ab4b CVE-2024-44960,0,0,dbf4acb7acd9f476aa036d54245f001e746c769d7cbaabee1b8cc99064697647,2024-10-04T16:44:05.497000 CVE-2024-44961,0,0,16377c52fd1e3305714d5f046527b5c9372e5016153fb6e263221a353e000d79,2024-10-04T16:39:39.300000 CVE-2024-44962,0,0,56b46f2c55a0815cb473bf33124ffd494414fa1f3858cd5c765de327b0bc0217,2024-10-04T16:20:34.550000 -CVE-2024-44963,0,0,89de59afe54218cd8f30203128b88cddc619dd4af9ca7ddb139be6f8e03b40c1,2024-10-04T16:19:20.770000 +CVE-2024-44963,0,1,ab94a18224b54160dc8704f32cb95c9de5e39cee19a416309c29f42df727294a,2024-12-09T13:10:03.787000 CVE-2024-44964,0,0,c342cfd7dd0fbdf969e6116ec91f625f7c891ab688a384d9874410e2f6eb6e56,2024-09-06T16:36:45.137000 CVE-2024-44965,0,0,4ea6a3c7f5b4f6796d4e624a73a7c30137e46c546edd52a5a29cf24a5230e262,2024-10-04T16:17:15.230000 CVE-2024-44966,0,0,a8e55f1b3074e6ecd6c0a4e417ae86a4f68c14d37643ed6ae5b46e2113e3e399,2024-10-04T16:15:30.047000 @@ -263826,7 +263980,7 @@ CVE-2024-45606,0,0,f88eeaafbe4e34535d2566ccfb49124a2ca9b64fe89d892b197f27c94bd83 CVE-2024-45607,0,0,8d23f01e65c8505afd5eb159488140d137dd7c8eb026fd7f8cb552f7e147e96c,2024-09-19T02:05:28.707000 CVE-2024-45608,0,0,c9f197c8f122c9a7c3fa83d139f4836eb6d5f6341804c474c0e4073b6abc1082,2024-11-20T15:20:27.390000 CVE-2024-45609,0,0,56bbf004920c03ad5028641dca7a07dd4f44194cfda48e907d4bc41104d472ca,2024-11-19T21:22:06.043000 -CVE-2024-4561,0,0,c3377782c8f818931dfcf1b6331f97a12d208858fcacdefafe1b008c01f32c77,2024-11-21T09:43:06.663000 +CVE-2024-4561,0,1,d73d716b2a1b9e48f3fb4f9b2ef9279c1b68f0570dec5297abafc24a68764359,2024-12-09T13:31:41.683000 CVE-2024-45610,0,0,63330bbc699d5f42b02f19e8a783fcfc1c5884671ed3ced9898132031b0f6674,2024-11-19T21:07:46.790000 CVE-2024-45611,0,0,2d60414d30f6599b27297722a97b3090427d4316fa2969d9d663025fd35b2411,2024-11-19T20:57:21.473000 CVE-2024-45612,0,0,6782209bc5546d1b46cd5a017728b71430c501b66453aaf5ed3c2e5dd2b7f010,2024-09-23T19:33:04.650000 @@ -263837,7 +263991,7 @@ CVE-2024-45616,0,0,1085539023e4e5b89570d6ae0eeb36345f56862519ec2d3828fdfdb4094c3 CVE-2024-45617,0,0,19610115cdc30d39d46b78744575fe09f3e6d1f4808ae6cff78fbd6e07ff3834,2024-09-13T19:21:08.633000 CVE-2024-45618,0,0,568c90c57b7ee930d8a3481e22bb2d280889dcfd3fb3b6bd7af44366182a800c,2024-09-13T16:30:27.693000 CVE-2024-45619,0,0,1e46faca13c19c2f5a641e3f79bdbabb7b7948476e71fa88fbdf683636a0dac1,2024-09-23T23:26:14.460000 -CVE-2024-4562,0,0,aac42bc527eb13d39ba118d9b5eb2fa487244d6170f4993cc401c66cc21ca377,2024-11-21T09:43:06.807000 +CVE-2024-4562,0,1,1d8c94d2c9e951f1ce39add830e97b604d004eed2906b0c427e620795ace9b12,2024-12-09T13:40:22.660000 CVE-2024-45620,0,0,c9c0e188f9138f80a3a74c030b14451e2b57736bb7ee176eabf96a25853636b9,2024-09-19T19:21:38.653000 CVE-2024-45621,0,0,ac12b11e9ee38c1675227b959e3f6dea489aa432edadcfa5df8bccf96f70b623,2024-09-16T17:28:53.437000 CVE-2024-45622,0,0,b710e3973bc54105a6c52433711f835588415a56a038ced9ed7020c8b95caa25,2024-09-03T16:35:09.647000 @@ -264475,7 +264629,7 @@ CVE-2024-46838,0,0,2313649d2bb4c43ee622efe5bed9a416eac9f8e174baea91084cb8d876861 CVE-2024-46839,0,0,7b51c4cc9b8a1c4a261c35ca96d6737e1e24401d36c8422399074bd4a21b2f9b,2024-10-01T14:15:06.340000 CVE-2024-4684,0,0,23c4fd8b770ea90a1bbf2c7b970994ff2b4b848556c888322f3e7565795bf6d8,2024-11-21T09:43:22.593000 CVE-2024-46840,0,0,10f4de1ba39bd910dbc113cdc641cc37828c148b17e52f302faf6fa910c4bc00,2024-10-08T18:15:07.857000 -CVE-2024-46841,0,0,6251bf9f33933da1f266ea85e2e56a7338eca3736d2647b7ef044bc9db318a52,2024-10-08T18:17:07.870000 +CVE-2024-46841,0,1,1dd6181da4211a037a5a182f7847dda3b46a6f17f78630ea42b5393ba3d789e2,2024-12-09T13:10:03.940000 CVE-2024-46842,0,0,e4b59ca477b0099d444a7b6796be401e0085fcbcd09469e9e5bed25346868cb5,2024-10-08T18:22:24.997000 CVE-2024-46843,0,0,e241a21397d4c338063226f391b0bdb7e22144c325d0a74c3f6178a6b8fda114,2024-10-08T18:23:52.423000 CVE-2024-46844,0,0,d2537288e943cc5343cd217590b8edd30b4417fb3bd3f47b035f9114d5e2d4f0,2024-10-02T14:22:50.533000 @@ -264524,7 +264678,7 @@ CVE-2024-46894,0,0,660a6a786100344b5f43ffde9caf0642aadcc1bde7c503739d45a779b89d9 CVE-2024-46897,0,0,9eec647173e555f13f51f2e584fda49a1d135ce40040a9da0ee91e1e29d63bf6,2024-10-22T14:09:46.913000 CVE-2024-46898,0,0,74a42c689ae857f92ce7afe6487c46863603ab1bd0de02bba2a7de3bdb05fd52,2024-10-17T17:52:00.700000 CVE-2024-4690,0,0,bb8f79ed0583008c6d1a8b7baa189bdee4f903e95decde129ba88c5ca1cc909d,2024-10-21T15:51:10.467000 -CVE-2024-46901,1,1,778e3a78b0a0c0b313c791de12da1d2ad79afe30cbdf13dafabd89544fdbbff3,2024-12-09T10:15:05.230000 +CVE-2024-46901,0,0,778e3a78b0a0c0b313c791de12da1d2ad79afe30cbdf13dafabd89544fdbbff3,2024-12-09T10:15:05.230000 CVE-2024-46902,0,0,0bdfa1eb869c55e45367b5082ce67aea2b425ced2b12b2f9b88a74fa27645d77,2024-10-25T14:50:23.897000 CVE-2024-46903,0,0,0512918367af2ee2f0cd2397d5e67b3466e68a5555c79f764b82e67b03d2fac2,2024-11-01T19:35:27.957000 CVE-2024-46905,0,0,c91d8022b40d8ed89db934fe241e50799d39fb19b15c2092d3067ee42632b758,2024-12-03T20:00:17.570000 @@ -266303,34 +266457,34 @@ CVE-2024-49887,0,0,8aa50029850af30c621864d51654e7d63b1f6cf3a3b570b632a2315213e53 CVE-2024-49888,0,0,d509e8d13bbc6d5dde53b299d774de2b9732fcd670d129ad4a0bb027fb2cd2ef,2024-11-13T14:54:25.787000 CVE-2024-49889,0,0,1e4fd4217a04628cbc7b13e5090232c2119c1e4ad9ca5639a0ba814166306944,2024-10-25T14:37:34.400000 CVE-2024-49890,0,0,ccd782ccf758d02e7fd055745edacededf53edb1f47eb7a798b0348e9fd43d69,2024-10-25T14:41:41.680000 -CVE-2024-49891,0,0,ad7e35b5c2a196dafc526ba5439149bc03040753b01c550a2a8460b41dd86062,2024-10-25T14:42:27.193000 +CVE-2024-49891,0,1,eb3ec0c470e70b6513b59bc7744bdb728b0a6923c2be091346584d563fb078a8,2024-12-09T13:10:04.093000 CVE-2024-49892,0,0,21c64b24770086509a748b1087bd246dbc2c525828a555a64ce0dc8d97df696d,2024-11-08T16:15:30.637000 CVE-2024-49893,0,0,f7d430c62d363260323aed1934b490fe15ac7fb1986615cf23e96a3545390363,2024-10-25T14:32:44.987000 CVE-2024-49894,0,0,0d394e670e679c271da28afb3e44ea1153f7feb6cadb34eb44916a04851c8223,2024-11-08T16:15:30.823000 CVE-2024-49895,0,0,0e740d3a1542b648f9466e1395fb246eb11962e56b5ffab4ea023806dcdca67e,2024-10-25T14:35:35.013000 CVE-2024-49896,0,0,4608f4ad6e42fc06461da5fe65db12307f9fbe5bfa7303d6f5fcef17c6b605c0,2024-11-08T16:15:30.957000 -CVE-2024-49897,0,0,5a0e609157466ea136ac04dd6be9e2063702c3b96add47b3f5bb2d5b7684bda0,2024-11-01T14:55:46.557000 -CVE-2024-49898,0,0,5f41e38760900c4d871dc8b917b20ef8bbf583aac600371a985f0947242f6a8b,2024-10-24T03:43:20.723000 -CVE-2024-49899,0,0,ee400e247e8fb64e01355ea4c1fb70c0a1e8d34c599c1b42ff36ad44e42e2dc3,2024-10-25T14:35:52.620000 +CVE-2024-49897,0,1,9fe9bd0b5cf90d5640bbeafdad3e4f4b1203a32b74370cf5806bd95267a69d62,2024-12-09T13:10:04.243000 +CVE-2024-49898,0,1,23839293e12c79c82d6fc68e109774dfb6f3d4a608c53a9be76d6c67481bc5b0,2024-12-09T13:10:04.373000 +CVE-2024-49899,0,1,75e22f2e5fb611f26f7a41551a694924f59bd6113266718a21ecf7c6dbb9cc4d,2024-12-09T13:10:04.517000 CVE-2024-49900,0,0,be46534a57a20d58cec505e48cd7d8142f6ce9dcfbd590e163062dad5e7a918e,2024-11-08T16:15:31.090000 CVE-2024-49901,0,0,449600b0174e94289f7aaeaf2eda13e5e7905c5d31ce1024a439b0b5127bb706,2024-10-25T14:05:16.967000 CVE-2024-49902,0,0,fcf302aa2f436b65d2da6d0a300010a8c5652bc11fcc195dad9599c58d20adcf,2024-11-13T13:47:16.923000 CVE-2024-49903,0,0,6805b541fbc182e8ad4d1ddb5b996127fd0442db4ea7357133ca75112acc3456,2024-11-08T16:15:31.467000 CVE-2024-49904,0,0,38d08f21f46258733cb29326ebb050b69b1b194ab384cf63179a8711611f6ca9,2024-10-25T15:54:47.737000 CVE-2024-49905,0,0,bbc536e4cbfe72863f57b3e8358f88d74cdb52d483ef9628cc82043a8c6234fb,2024-10-24T03:43:35.477000 -CVE-2024-49906,0,0,ef54b8d4c94a06574b39beb99090345c8f3a4c832045fc8be4c42ac12b059221,2024-10-24T03:43:55.397000 +CVE-2024-49906,0,1,2e86e7f87728418d0dc23619c0f3b17e67a5b60615366bc6296c5d4ce214d110,2024-12-09T13:10:04.640000 CVE-2024-49907,0,0,807ba909df7d810562bb48d560b127ca68d4f225b3f1a54f54a5b20c5df8098b,2024-10-24T03:42:38.270000 CVE-2024-49908,0,0,ed9a7dc5687398882d7dfd2fafbefe760fd39af9a8fab29ab62f1b817c2b40ba,2024-10-24T03:42:50.683000 -CVE-2024-49909,0,0,ddfacd715d28ac8549af88e88fc6f5962a7fb6e6b7f14589e2485b2a00bb2863,2024-10-24T02:57:36.467000 +CVE-2024-49909,0,1,71bb2d26ab850a33e862b38310c3da593cb0e78e8765f16befede50ddba6409c,2024-12-09T13:10:04.777000 CVE-2024-4991,0,0,a0c726f5428f28817704ee25caddc6881c08448748c9869a0f6ff30960c8d300,2024-11-21T09:44:00.670000 CVE-2024-49910,0,0,47a3b3987fdaeac21f1e0c8bf05895f53a71e0a7efd4a13060d1bc477c729946,2024-10-24T02:58:00.223000 -CVE-2024-49911,0,0,7583689af829ae60eab9d17244889906a7627f567186c0514d7712be6090ca2f,2024-10-24T03:19:10.477000 +CVE-2024-49911,0,1,ea54dfbb8b4a5f23ac34aa2ba490b85c3b046193e4221a832c58aeb4b106226b,2024-12-09T13:10:04.947000 CVE-2024-49912,0,0,6332f84d6856d879f0a796270777c6666d06f2538e3a6a83825b088f34637c08,2024-10-24T17:10:24.853000 CVE-2024-49913,0,0,60b4b5531c5107316cd539e2ff429fce712f7290fb8749b01f337621b7f175f7,2024-10-24T14:39:18.017000 -CVE-2024-49914,0,0,4a57eb26a0b55c28765b36ef8a1e498ff2aff57a5911ffcfd9863fd8085765f8,2024-10-24T17:09:50.003000 -CVE-2024-49915,0,0,1a0c99f527bd57ff94623525f5be10f5cced1de5ddb66df0e0acb4df096ed342,2024-10-24T17:08:04.020000 +CVE-2024-49914,0,1,5908deb429c7df4ab922874fe51b60545c1d8354b4c7db56702aa74e803ba8cc,2024-12-09T13:10:05.087000 +CVE-2024-49915,0,1,fafb8be7e6fef44f97b74c892d1069c8c1d513ac85ccef80786be961b1ff543c,2024-12-09T13:10:05.233000 CVE-2024-49916,0,0,1a7a169d61ef72224f66f7e32d73a1e9bbf613855dd00b112ca7b359b0441b18,2024-10-24T17:03:19.457000 -CVE-2024-49917,0,0,69200c33f9c58d587b58127c3d8cba6af6b917176ed288b3e8802fbc3c174639,2024-10-24T16:54:05.930000 +CVE-2024-49917,0,1,a5c70d26898d3b507719c186af0536ac36044d00f073eb49c2767d069baba569,2024-12-09T13:10:05.430000 CVE-2024-49918,0,0,2aa408debf7cf8df4a7ba355380f4a6c543bc7ce879d853fcf9198caf80f0e26,2024-10-24T16:49:57.453000 CVE-2024-49919,0,0,3c67c30512a0690c47af891444a4c6f5690b1cc96f77e186d84d9bdb43cebee9,2024-10-25T14:55:47.027000 CVE-2024-4992,0,0,c064672a88f1fb3d2db909f67615dd586902b6b9bb36ca6f17a613b084b201f8,2024-11-21T09:44:00.787000 @@ -266349,7 +266503,7 @@ CVE-2024-49930,0,0,47ab30c3aad787559cadb406b6bee36bbf20835e8e3661843f340dac8363f CVE-2024-49931,0,0,7b25631c69202359dc17163b87818d9d947ec15a3a7e55b447dcbed12a94728e,2024-10-25T15:16:07.980000 CVE-2024-49932,0,0,0de9460e3a083a926aa82cbd3105ead8f3a7d8f424389ea79b1be606dfc1a0a8,2024-11-13T15:01:49.790000 CVE-2024-49933,0,0,07137378479a59eeab8a0ddf2b9c1a90265b04e8a93ec1e64b4f078c554a2be6,2024-11-13T15:09:09.597000 -CVE-2024-49934,0,0,7dba1000f0f1f21a24f865b11eb2ef5d631092288fe7d1bd4cb0bf83dbd37491,2024-11-13T15:18:14.487000 +CVE-2024-49934,0,1,25ec0c871b27d46c883a6fa7b65c9276f3b337a3c093d46e1e2b9e8c1162593c,2024-12-09T13:10:05.653000 CVE-2024-49935,0,0,6752cc4bd6c531de56c2bd6fff1889f4ecd40aac374b92da86718773819db6f0,2024-11-13T15:21:55.297000 CVE-2024-49936,0,0,dbdbde733135654773279664b519094306face54c5d5718aa1bb3a5b1ef7acf2,2024-10-25T15:16:22.713000 CVE-2024-49937,0,0,d3bfe7ae901d444bcafda30aa3284f7884d2af01ff717c089589b3a9d59adde2,2024-11-13T17:02:28.620000 @@ -267969,11 +268123,13 @@ CVE-2024-52381,0,0,7108accb537eda6e72befaa584b13a29b863a0e93c4ecb0e8c68a1298a34b CVE-2024-52382,0,0,765a60dadccd98bc21799c5bee0a2458054534e500a4494115e72fca61a80591,2024-11-15T13:58:08.913000 CVE-2024-52383,0,0,5e7f5fa013f63b36c227df0827d042e3f869844f8898efc8c98de298e74caa16,2024-11-15T13:58:08.913000 CVE-2024-52384,0,0,fbb82f25aaa4aae30675182bd85859833f64b1365f6b4a49bc01512ac5b82a84,2024-11-15T13:58:08.913000 +CVE-2024-52385,1,1,66c3192b9e8e541af233a14241f6dd52ebf5894d550b7ca69c566434755b7257,2024-12-09T14:15:11.590000 CVE-2024-52386,0,0,050a6ca0e40daaa1d5796015659bfe9b1cca7a3bc620faba1dcae9245cbda598,2024-11-18T17:11:17.393000 CVE-2024-52388,0,0,3e7020b931f7723bed5d8d7ceff458e11950c7e36411adecc13d14fecba8643d,2024-11-19T21:56:45.533000 CVE-2024-52389,0,0,d474fd48f345330aad426ddf7992e0495f0e72771e5ef0e934a08aea9e116e01,2024-11-19T21:57:32.967000 CVE-2024-5239,0,0,baaa0659a749e35908fe270b25230601bf169a7fae8d9030c60889382780ceb9,2024-11-21T09:47:15.157000 CVE-2024-52390,0,0,d286733650509300a9b1c496741296c8d5ebe4568f1b8119b356d19db5a927a1,2024-11-19T21:57:32.967000 +CVE-2024-52391,1,1,9eefe4e876808ebe93ccfe9cc82fcbc4ba1c027aa2de652dc1ecdd321023dd78,2024-12-09T14:15:11.740000 CVE-2024-52392,0,0,9479fca3822e4813ddacdab7164b8b6d53a9a6836cfa7c72ca610f7a82ad221f,2024-11-25T14:37:05.867000 CVE-2024-52393,0,0,ce967ee0cc341667443cefbbca02f029741f0fccac2c916b7c57bf3581e5075d,2024-11-15T13:58:08.913000 CVE-2024-52394,0,0,b2b67fd1c4cda743b9285a3c837df9afb19ae4912ee1c29b2cb7e97b8eafe6a7,2024-11-19T21:57:32.967000 @@ -268071,6 +268227,7 @@ CVE-2024-52477,0,0,cfdccd390456e1e612c0c240f65460d864d7e47d48b5f51918a1e28f49944 CVE-2024-52478,0,0,28f482d45a1d73ea5b9dc17984cf2bb93592ba848434052234e1ba336678aca0,2024-12-02T14:15:09.327000 CVE-2024-52479,0,0,f5f95fe97e0497ae20ba803077a6b05da8a1c9402e82918fec388fbc2cf67d11,2024-12-02T14:15:09.467000 CVE-2024-5248,0,0,bfb71f6f520eed49e1123a15a675a0e9880d180378204f6d86b02a123f0a8d1e,2024-11-21T09:47:16.293000 +CVE-2024-52480,1,1,4a0967c47fc1f2ab11ef7a67b3dd14b9f4b21aa2277f0e1a3d2bcbb296b8a06f,2024-12-09T14:15:11.873000 CVE-2024-52481,0,0,a7309831bf78d36e2ea1cd8b30d3ef08bb169830c7beaff56276c63bc5fd7169,2024-11-28T11:15:49.610000 CVE-2024-52482,0,0,fe3f09e5e14bd802eba12c8c9f67e8414b606975733469038e3912792e967fa2,2024-12-02T14:15:09.603000 CVE-2024-52483,0,0,b3f8c3a0b11741f29ce99b7a7e45ec466bf2e703c6eae60631e7734657eb12df,2024-12-02T14:15:09.740000 @@ -268338,7 +268495,7 @@ CVE-2024-53081,0,0,494d629ca516b5b4db6b9980f8938e11f2c142ff9c2899ebea88d56f8aadc CVE-2024-53082,0,0,fc31cd8f6fb7708465ca1f19762f33fe99db63a39877ed3ef3c6b3fa5f125136,2024-11-25T13:35:34.083000 CVE-2024-53083,0,0,55982879061f1201c3e7c8b0a9106bad767e8ab007c8fffff0751fa2f70ebe5b,2024-11-27T20:09:36.897000 CVE-2024-53084,0,0,cb3b6939b6882404f852f45b867667d6212d2b34b4b6e02f55b45c1cc6fa5e94,2024-11-27T19:41:38.923000 -CVE-2024-53085,0,0,09c806d516f798d9fc3d239ea133df5f5dcd471997b41ce53ea8e9125d461752,2024-11-27T19:59:54.767000 +CVE-2024-53085,0,1,db43a23aa4ea866f3b074e07a4671e81f0c60fcc3d0c3938a1539ef4f61192a5,2024-12-09T13:10:05.850000 CVE-2024-53086,0,0,d0c5a6f9b29805135a822175817c12952cd90be4f8038231a7f1f3bfc58b499c,2024-11-27T20:01:08.447000 CVE-2024-53087,0,0,88c97ca951e6c20d6fd1b05e32b4816c3d191c0660b87da1f2fcce849343a92f,2024-11-27T20:08:11.740000 CVE-2024-53088,0,0,3659c4c077779826813a306fcbf4f887f3021a3495c6459af271d6e6ba52437a,2024-11-25T13:38:07.723000 @@ -268400,8 +268557,8 @@ CVE-2024-53138,0,0,ba78ca1c93add90c82edf24c335a0a199acf6c3df53cd342e3d62dd82c6af CVE-2024-53139,0,0,cfe4b7c940db8146ca281d7f10e309400b247c6b403bd5c2e345cfc63527bcd2,2024-12-04T15:15:15.643000 CVE-2024-5314,0,0,3f9bafe97657efc7f668c5d897662a9659297ed1c2230826ab18be8ba9a6342b,2024-11-21T09:47:24.810000 CVE-2024-53140,0,0,97a42857cf07e6c73d5157878eaab6055c0a598352b9e5348ceaa16cdcbd0dc1,2024-12-05T12:15:19.703000 -CVE-2024-53141,0,0,8dcf63cfdc9cf4d0527b568647b1a6489fcae499da26312159d8d87ad0e79349,2024-12-06T10:15:06.050000 -CVE-2024-53142,0,0,50b6b64348c1d5bb40e5d9bac14bede9a65147157b83dfb4254c83dd923b1b4a,2024-12-06T10:15:06.203000 +CVE-2024-53141,0,1,7b5d09b2c3a21c5f993cbb55ccf99a4d61b3e7d4d93da88666ff76baa12912e0,2024-12-09T13:10:06.060000 +CVE-2024-53142,0,1,bd7c5de2015adb6e1955e53c313310ef9a0e9dd4a41b4e550ca8519e866e5e82,2024-12-09T13:10:06.213000 CVE-2024-53143,0,0,58aea596a92f51ecb8e396a2e6f1085ce03cd820c5355e9f3433d5e31dfbde48,2024-12-07T07:15:03.780000 CVE-2024-5315,0,0,cfc4383f1c53119936ccfb248038372daec91d7a497e742b345000be072ec700,2024-11-21T09:47:24.927000 CVE-2024-5317,0,0,c2af981f2442def6d43cf11dee826712fdb79df4e8b131d1c0815426b050d563,2024-11-21T09:47:25.040000 @@ -268612,17 +268769,21 @@ CVE-2024-53781,0,0,378231745e3f8b5461290c112c2e08bb2b8439ee0c6c0ada6dac34e197ca0 CVE-2024-53782,0,0,79a15b8a3e8d8f4fe7648393febbc9637f12b94d303bfc5ed3877bf5eff651a7,2024-12-02T14:15:19.050000 CVE-2024-53783,0,0,0585b53a4c3ad7055262991bed62dd4eea8b9dc614f4ee6a3aa3c34e1799acff,2024-11-30T21:15:15.927000 CVE-2024-53784,0,0,bba9b16a11fc4502991a634011101909376fc52409be5e758648e9242a9e1d4d,2024-12-02T14:15:19.190000 +CVE-2024-53785,1,1,e23fd77814a74c913eda05ec0581ac507b8420f4014f119ddf6a959758099ad9,2024-12-09T13:15:40.547000 CVE-2024-53786,0,0,35ae0e7fec6706183d6f26d27ad5b846c4f6fccad013c9f5f6c11ae5a8f3fa10,2024-11-30T22:15:19.427000 CVE-2024-53787,0,0,b83be4ca168bd62b569d610392574adb1a96f7eed7da29034381251d1a89a060,2024-11-30T21:15:16.077000 CVE-2024-53788,0,0,574579f926f6b64d2fa3ea76f9227af4be383b90a7f352cb9534ecf6deba9a1b,2024-11-30T21:15:16.233000 CVE-2024-53789,0,0,3c067b373794e9b7e9d12f793ad0eb342a64a71c5314b185c3b9de9d8b309e5f,2024-12-02T14:15:19.327000 CVE-2024-5379,0,0,30fa1a5ddb02b46a924d51cceafe2535552e4687101abcc3c303f5d05a7aa6be,2024-11-21T09:47:32.413000 +CVE-2024-53790,1,1,f9392e4c85766cae4b45313fa21fd901242d679fff32c6a1e8b00049f4b0c191,2024-12-09T13:15:40.673000 +CVE-2024-53791,1,1,1d87df451a193c4a03691fc222d7714d6ddb0cdf725c631f0c6cc6630079ca11,2024-12-09T13:15:40.800000 CVE-2024-53792,0,0,5c82eb1f8b13dd05491c87a39aa89e01a0904fb242c154724f0f2e5004b03f8c,2024-12-02T14:15:19.460000 CVE-2024-53793,0,0,471f5b61daba42899f2865d9a43fe8571b3439d86d8853c40ee71d386cc47473,2024-12-02T14:15:19.587000 CVE-2024-53794,0,0,de4129c472d4b0c18aebf717223a3b07a6c1966e196572988d226d33aa7d7c9c,2024-12-06T14:15:21.567000 CVE-2024-53795,0,0,db7d4487331aae4b5d5436434c6382215dd0dddf05b8d69253c02d1227321451,2024-12-06T14:15:21.737000 CVE-2024-53796,0,0,3940b9aec5f8eb8d096778a0ca386d0abf80c6d5c20801a9e51de8f324bbc6ea,2024-12-06T14:15:21.910000 CVE-2024-53797,0,0,1ef85d2754c881c38d7db701645316297e3b39c75001dc7074af0b3581a9f9a4,2024-12-06T14:15:22.040000 +CVE-2024-53798,1,1,c07184c51175620d5054f7f33c8fd1a7fee10e1a6cc89e1be9b971fdf5536ff3,2024-12-09T13:15:40.930000 CVE-2024-53799,0,0,9bdd5c6f0d17386ab439b7d4bda2bf946de53ddc1565a72c71d408bbc8cb5996,2024-12-06T14:15:22.170000 CVE-2024-5380,0,0,226318c98a74a19f1dd2a14061de91ef6b8613a700730137544bc16df39ee24e,2024-11-21T09:47:32.550000 CVE-2024-53801,0,0,b8493c5da7e4969312ab16bcb21ccef974bb339cb3975e9d70844ec730654afd,2024-12-06T14:15:22.303000 @@ -268639,11 +268800,16 @@ CVE-2024-53810,0,0,32520d335986d53a1399d630c9c630028dd52a8dc0c9e5574dec93e75e60f CVE-2024-53811,0,0,844f029398f5d92d55e156dfe21810da51db12804d733ca861f862523816217a,2024-12-06T14:15:23.657000 CVE-2024-53812,0,0,b3504ef9ad392f9b7a2f2ab19940e26f3dfa93b535ffee4d93b26b563b69a4ac,2024-12-06T14:15:23.810000 CVE-2024-53813,0,0,844a5d84686ddb1970f619c40de7cf7b0bd5d2ea56456a37f32c20deb5603bf2,2024-12-06T14:15:23.947000 +CVE-2024-53814,1,1,456f59713130510312426db45da9fde8fd91d514954371da6c058d0a5f3a5868,2024-12-09T14:15:12.003000 CVE-2024-53815,0,0,ff1b17b98a7e70f178d0132d18bbfc7cf807c0c7a9bfb95b659bc9c60c46f832,2024-12-06T14:15:24.083000 +CVE-2024-53816,1,1,4c80f77e60e2a0ccf8c97d6c5a4071da8c0b32188999038e028c2bfb55e269d3,2024-12-09T13:15:41.060000 CVE-2024-53817,0,0,96bb48c0166e589bbeca975b95f628a186c352e3c0e603fbcf1428355ceae865,2024-12-06T14:15:24.217000 +CVE-2024-53818,1,1,f074de875c4abd0e1ad087d79c0368546b20dec0f563ce24170831c33174f33d,2024-12-09T13:15:41.193000 +CVE-2024-53819,1,1,fa420d775e91cbcbec2283e8a5cf7e031c70cf08b434976ea73003bcfa53e309,2024-12-09T13:15:41.370000 CVE-2024-5382,0,0,982d72d529ccd66519b67386aa3c771b9bb562c465d212187c897d2e77497f4e,2024-11-21T09:47:32.833000 CVE-2024-53820,0,0,8b9cc45352ae33c8291ea20192bb5c333426151aa7fee21c72522cb15feb811c,2024-12-06T14:15:24.360000 -CVE-2024-53821,0,0,792a507641fa360dafbc8e4c4c28bb769ff57668bbc0d7c484e269b74f713bd7,2024-12-06T14:15:24.497000 +CVE-2024-53821,0,1,c86d6c89516e968f7bdad298b110ca4d16fbb5ab53062e0f641fb36d11499f55,2024-12-09T14:15:12.167000 +CVE-2024-53822,1,1,62f7da59f8a59dbfd7a2ff106043ce67d9f4efb19998ba5a377ae11986748dd0,2024-12-09T13:15:41.507000 CVE-2024-53823,0,0,0882c95e9e54ea387f4e94129da2452bec1445de5ad272b72ac6b7fdbd8fb723,2024-12-06T14:15:24.653000 CVE-2024-53824,0,0,cacff643e180235d604123615cc52f6b2ea1485fb2d03e2dfc7beecfeccdaade,2024-12-06T14:15:24.800000 CVE-2024-53825,0,0,a935473ac9480ea7a4ce7e03aa3b09420e04eb2d14d6df25b05c05b7ca30b9d4,2024-12-06T14:15:24.937000 @@ -268697,6 +268863,9 @@ CVE-2024-53939,0,0,63ec4d4d8a57c7e9203228b0cd3c3c84ff0fa6ec3d0f30c37967d23e20f39 CVE-2024-5394,0,0,04fdfaf576eb17b0d9b483c3599357ed4f0bd1d9cf3555eb1f4cda3cdac58300,2024-11-21T09:47:34.153000 CVE-2024-53940,0,0,04215bb77d44b273e9849b212da1715e4a88663d0a04d658e8b426292d6b2d3d,2024-12-03T19:15:12.910000 CVE-2024-53941,0,0,958fbab1dcd158d91125ecb71056e34e403404760a1ce78a6e1b2e3ede2a0630,2024-12-03T19:15:13.113000 +CVE-2024-53947,1,1,f3f49f507fdd673942647045e7a6129704131798f17f201931ae5ff94b2539cc,2024-12-09T14:15:12.267000 +CVE-2024-53948,1,1,2bf672f2a8b7b1f906952cdb41854a87e773420a592672207dba1a730e04cfc2,2024-12-09T14:15:12.483000 +CVE-2024-53949,1,1,ca28ec2f88fa8f82be9fbdd7cd1551490715f8ba191cbb329b68f6bb2774aae6,2024-12-09T14:15:12.647000 CVE-2024-5395,0,0,aa518ac6cc2e8e3e116d2e709097641ebff6dab87bd1ab80d2e397c0f6317f19,2024-11-21T09:47:34.290000 CVE-2024-5396,0,0,a2e12a462b12b592c06259ea229afce64d9cb2b529021eb0ae1f63c97dd38d23,2024-11-21T09:47:34.430000 CVE-2024-5397,0,0,1c1b9f46c7fae3545f6c6bff25b88c782d3838975abd0364f3776c48ef8d8b3f,2024-11-21T09:47:34.563000 @@ -268778,14 +268947,33 @@ CVE-2024-54210,0,0,f4f44d3701fa2c6fcf1fb1113c2c566f9155fa87b9bc77146f80549babfae CVE-2024-54211,0,0,f866d1158577c70f45f842f22608c81b9da82d9a18e2293d3b6464146e40e26e,2024-12-06T14:15:26.093000 CVE-2024-54212,0,0,292626600c7dae2b694bfd536bb8292fb4759fb620deaa0072a7fc74ad2c8c47,2024-12-06T14:15:26.223000 CVE-2024-54213,0,0,7c355a6808801514e249faf953226ca9a5caba2aefb006a99b068e6277c1b58e,2024-12-06T14:15:26.373000 -CVE-2024-54214,0,0,7ad731127d45b8cf7c73d8da88aac9805afcbfafe4a0067f6b23851fd2858ed2,2024-12-06T14:15:26.507000 -CVE-2024-54216,0,0,b62aa2dfa0260d35b7a24603d0b2a7e7ab63f3ee82818bd636894d8d89128c10,2024-12-06T14:15:26.633000 +CVE-2024-54214,0,1,546fa5601e5c7cd9d5e851ca67a476f0595b8a679a2539eeb2ec8acd6b7faa6a,2024-12-09T13:15:41.657000 +CVE-2024-54215,1,1,714b122060bd8f64f045806e5ed180e417d17406f4fec3a58449b85ad5a01875,2024-12-09T13:15:41.760000 +CVE-2024-54216,0,1,46064011e355ffcb0d6d4de8d4107237a638d23fea11cdd709126ea07cae01bc,2024-12-09T13:15:41.900000 +CVE-2024-54217,1,1,488095f6a4dcf5cf01b1a10e732c94ae75c72672e15a733c7014c104a56a7df2,2024-12-09T13:15:41.997000 +CVE-2024-54218,1,1,5a4e6ef0cb57e9acad70e658006b208971e1bd43ac9b0b6afd0f47353f645420,2024-12-09T14:15:12.813000 +CVE-2024-54219,1,1,022800dcc3f9531a2b7e8b695a092f225aa79cbe5ca1b5ff909b715bcb475db3,2024-12-09T13:15:42.130000 CVE-2024-5422,0,0,b4baff1a013ff22faf74e6ac900ee649f0ff858804910f1fd686fa6c426e5c4d,2024-11-21T09:47:37.447000 +CVE-2024-54220,1,1,5f682c8a3f0c4345cfeb563a4946564ecb2acc7549421044c54373b0c2418b7d,2024-12-09T13:15:42.257000 CVE-2024-54221,0,0,2d54c3720cb1b4520ade85573de8a9c71ac793b9986236bbad8e6d309beb5464,2024-12-05T00:15:19.200000 +CVE-2024-54223,1,1,9ee2cf5ef1ad7646a0e063f4b94840aa73275cfb26dde4de05c9a98f1dfa1a5c,2024-12-09T13:15:42.397000 +CVE-2024-54224,1,1,21deaa13f4e60ad8f5defe3a95b4d3786808a09744ddb306174d40e328f5d339,2024-12-09T13:15:42.530000 +CVE-2024-54225,1,1,763dabbed175619d75525adac18dbd2e5940f44993355d5f38a97af6bd94ff58,2024-12-09T13:15:42.660000 +CVE-2024-54226,1,1,c527f45cf96f79d6cd31b598fa4a830cff7287c50c7f98d56c92ff971a9fea92,2024-12-09T13:15:42.787000 +CVE-2024-54227,1,1,9924fa554b317349bc3fbaf9ab20da37447fd9017d4881f7626550e1f84e21d0,2024-12-09T13:15:42.910000 +CVE-2024-54228,1,1,b1dbf71b16ca2fbcd42304faa500ad40f491fef6bf2c84bf42a06909d01f52e0,2024-12-09T13:15:43.030000 CVE-2024-5423,0,0,7a628fbcf4260b47e4020abba26bee837e84024c4fe4430cc553749e9117b851,2024-08-29T15:41:13.247000 +CVE-2024-54230,1,1,d3a29aa7b0619c3c591bf8ea5e089eca536c3330001e56fc9ff514f747a0440d,2024-12-09T13:15:43.163000 +CVE-2024-54232,1,1,f86887bf6c9a6cec7d42f72c4cf9a3f0d6069ed07b0ceac0155a27962460c404,2024-12-09T13:15:43.297000 CVE-2024-5424,0,0,526e52a8fa80d17cad0de05f63323aba0f134395493685f6f5d3614ca502e8e8,2024-11-21T09:47:37.627000 +CVE-2024-54247,1,1,3c9d9125f5d41538970b332ef2dbf6c1d275e6968fdd261955595700bd034984,2024-12-09T13:15:43.440000 CVE-2024-5425,0,0,39c2f07d9a14a501f6a62a9467f6ca87f9b63c1b18438a7bf6cb3ddf24a3b17c,2024-11-21T09:47:37.743000 +CVE-2024-54251,1,1,9b921f783a46a6ceb38784f06abae949ea8bdf4d4d61e9ae69b0e2a8447386ca,2024-12-09T13:15:43.587000 +CVE-2024-54253,1,1,acd49c211ac1ef7035677f692536644703e94fa31f78459954ddf69425f9143f,2024-12-09T13:15:43.720000 +CVE-2024-54254,1,1,6bd242e91a77ad9f90586d1c5e750c7c7ef35caa4861ebccd75667e5bfdd8de6,2024-12-09T13:15:43.860000 +CVE-2024-54255,1,1,d518bbc292d8d1ed45e1085d8351cd8eb89783a225379287ae001a806a27b758,2024-12-09T13:15:44.007000 CVE-2024-5426,0,0,5ea29bfa6e12ae428a874da685da80617819a2a2873f1c2f03b3a2184d9a719d,2024-11-21T09:47:37.890000 +CVE-2024-54260,1,1,77b8fbae5dfcc4dde97d03f134d079c69e76d5819885d9eb9375c0c7f0405e6d,2024-12-09T13:15:44.153000 CVE-2024-5427,0,0,0e5a4a243a6c356d48858411e10959c0d2b5ef3e2a4a055bc1bad76f470ca7d5,2024-11-21T09:47:38.020000 CVE-2024-5428,0,0,06a6af0ea059e8ad46dbcee5c94c2e59c137e0dda4452c4c98f5a228289a7e09,2024-11-21T09:47:38.130000 CVE-2024-5429,0,0,c5c127d3962dc4b6ee503ad5fd97fce8ef1325aee9713e37b6918218af05ded4,2024-10-18T12:53:04.627000 @@ -268854,7 +269042,10 @@ CVE-2024-5489,0,0,6c00a6a2badf83516471ea1d81b619bbe482cb4a54de89ffa7bd06f7fa1ffa CVE-2024-5490,0,0,7e66a0f19af78ba5ab311e474f6c7a834b406cb5857b42d263e55e1190767452,2024-08-27T14:36:10.033000 CVE-2024-5491,0,0,e331b82e31ebdfe13500034914a1c37ca8ae8114dde41994ac12e59a5b4284ca,2024-11-21T09:47:47.017000 CVE-2024-5492,0,0,bef41c141414e91a737f6b5c4fcaf83f2ee31e6e95a9e2405d6f4dc30a93092c,2024-11-21T09:47:47.140000 +CVE-2024-54929,1,1,d94cf7eb96b8426121e4a80e08610af572f918c35c4473b2cc9e9b9437f4d3f3,2024-12-09T14:15:12.957000 CVE-2024-5493,0,0,934df9c05abfa1e1b0f50d724dbce11e7e01bba7d9ae25f41fb3a41d6fcaa53b,2024-11-21T09:47:47.260000 +CVE-2024-54936,1,1,63a4476ed80c341d8e9fa071a5d0d6ad16e6755f93727892078630b752492e54,2024-12-09T14:15:13.127000 +CVE-2024-54937,1,1,312b4a37fa3077036ba5d69390e81c3676cc63d0ee2244761932e8c35d7b3985,2024-12-09T14:15:13.303000 CVE-2024-5494,0,0,8cf1519a61ea4a6a4f006eea5f9156b6b849d9688fc3df3baf2171897301c8ac,2024-11-21T09:47:47.450000 CVE-2024-5495,0,0,e8211ab29f4239a9e0c9017a1df13982e259112697e44dda84f6d2c28e9245ea,2024-11-21T09:47:48.493000 CVE-2024-5496,0,0,f986035b64f7dc76a56e3fca405856ceb7f8c6befcec053ce74d6fb508f6d2f9,2024-11-21T09:47:48.673000 @@ -271265,6 +271456,7 @@ CVE-2024-8253,0,0,fc41b6505185d053ad6636245c39f09b54bbdbf799cea1a82678de8b2acef1 CVE-2024-8254,0,0,942a14d7630124eb518b0a4afc4fc0d5a7d0c55fcf9cb143f0c2c9d16a735b9a,2024-10-08T19:08:41.690000 CVE-2024-8255,0,0,5d2845ec8e88416cc6e8a7f932062f58b18cb10d3792252a3bd4e24bfdb68a91,2024-09-06T22:53:34.187000 CVE-2024-8258,0,0,f677c900ed296a6df7da1749e81be4ee8adc676fc5218d5f619ab1c8ff2ca2c9,2024-09-27T18:56:41.140000 +CVE-2024-8259,1,1,78b0535758cd3679809e4485435e243c879da9935c9d2d83457d42646f79e66e,2024-12-09T14:15:13.473000 CVE-2024-8260,0,0,1a5d0d9640e33b2f7c9f22aba5e11715bf32bcc340f2c05d167a5a396b68ca4a,2024-09-19T16:08:58.863000 CVE-2024-8263,0,0,02859751230be0f2362a72baf7f14e3ca8afcc9ef6f11a007d2edecd96369c0f,2024-09-30T15:57:26.213000 CVE-2024-8264,0,0,2d0f7550734ab3870107734db176c89529f357d12409e5b5d0288029aba420c5,2024-10-17T14:06:39.420000