mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-03-31T22:00:38.484396+00:00
This commit is contained in:
parent
38e3b120bc
commit
2c8a491ac9
55
CVE-2024/CVE-2024-305xx/CVE-2024-30524.json
Normal file
55
CVE-2024/CVE-2024-305xx/CVE-2024-30524.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-30524",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-31T20:15:08.223",
|
||||
"lastModified": "2024-03-31T20:15:08.223",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RedLettuce Plugins PDF Viewer for Elementor allows Stored XSS.This issue affects PDF Viewer for Elementor: from n/a through 2.9.3.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/pdf-viewer-for-elementor/wordpress-pdf-viewer-for-elementor-plugin-2-9-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-305xx/CVE-2024-30530.json
Normal file
55
CVE-2024/CVE-2024-305xx/CVE-2024-30530.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-30530",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-31T20:15:08.490",
|
||||
"lastModified": "2024-03-31T20:15:08.490",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Sonaar Music MP3 Audio Player for Music, Radio & Podcast by Sonaar allows Stored XSS.This issue affects MP3 Audio Player for Music, Radio & Podcast by Sonaar: from n/a through 5.1.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/mp3-music-player-by-sonaar/wordpress-mp3-audio-player-for-music-radio-podcast-by-sonaar-plugin-5-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-305xx/CVE-2024-30548.json
Normal file
55
CVE-2024/CVE-2024-305xx/CVE-2024-30548.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-30548",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-31T20:15:08.730",
|
||||
"lastModified": "2024-03-31T20:15:08.730",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Noah Kagan underConstruction allows Stored XSS.This issue affects underConstruction: from n/a through 1.21.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/underconstruction/wordpress-underconstruction-plugin-1-21-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-305xx/CVE-2024-30549.json
Normal file
55
CVE-2024/CVE-2024-305xx/CVE-2024-30549.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-30549",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-31T20:15:08.977",
|
||||
"lastModified": "2024-03-31T20:15:08.977",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Cimatti Consulting Contact Forms by Cimatti allows Stored XSS.This issue affects Contact Forms by Cimatti: from n/a through 1.8.0.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/contact-forms/wordpress-contact-forms-by-cimatti-plugin-1-8-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-305xx/CVE-2024-30550.json
Normal file
55
CVE-2024/CVE-2024-305xx/CVE-2024-30550.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-30550",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-31T20:15:09.193",
|
||||
"lastModified": "2024-03-31T20:15:09.193",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpdevart Responsive Image Gallery, Gallery Album allows Reflected XSS.This issue affects Responsive Image Gallery, Gallery Album: from n/a through 2.0.3.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/gallery-album/wordpress-gallery-image-and-video-gallery-with-thumbnails-plugin-2-0-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-305xx/CVE-2024-30551.json
Normal file
55
CVE-2024/CVE-2024-305xx/CVE-2024-30551.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-30551",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-31T20:15:09.450",
|
||||
"lastModified": "2024-03-31T20:15:09.450",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Toast Plugins Sticky Anything.This issue affects Sticky Anything: from n/a through 2.1.5.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/toast-stick-anything/wordpress-sticky-anything-plugin-2-1-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-305xx/CVE-2024-30552.json
Normal file
55
CVE-2024/CVE-2024-305xx/CVE-2024-30552.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-30552",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-31T20:15:09.680",
|
||||
"lastModified": "2024-03-31T20:15:09.680",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wppdf.Org Responsive flipbook allows Stored XSS.This issue affects Responsive flipbook: from n/a through 1.0.0.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wppdf/wordpress-responsive-flipbook-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-305xx/CVE-2024-30553.json
Normal file
55
CVE-2024/CVE-2024-305xx/CVE-2024-30553.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-30553",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-31T20:15:09.927",
|
||||
"lastModified": "2024-03-31T20:15:09.927",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Joby Joseph WP Twitter Mega Fan Box Widget allows Stored XSS.This issue affects WP Twitter Mega Fan Box Widget : from n/a through 1.0.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-twitter-mega-fan-box/wordpress-wp-twitter-mega-fan-box-widget-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-305xx/CVE-2024-30554.json
Normal file
55
CVE-2024/CVE-2024-305xx/CVE-2024-30554.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-30554",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-31T20:15:10.153",
|
||||
"lastModified": "2024-03-31T20:15:10.153",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Wouter Dijkstra DD Rating allows Stored XSS.This issue affects DD Rating: from n/a through 1.7.1.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/dd-rating/wordpress-dd-rating-plugin-1-7-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-305xx/CVE-2024-30555.json
Normal file
55
CVE-2024/CVE-2024-305xx/CVE-2024-30555.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-30555",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-31T20:15:10.417",
|
||||
"lastModified": "2024-03-31T20:15:10.417",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Sayan Datta Ultimate Social Comments \u2013 Email Notification & Lazy Load allows Stored XSS.This issue affects Ultimate Social Comments \u2013 Email Notification & Lazy Load: from n/a through 1.4.8.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/ultimate-facebook-comments/wordpress-ultimate-social-comments-plugin-1-4-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-305xx/CVE-2024-30556.json
Normal file
55
CVE-2024/CVE-2024-305xx/CVE-2024-30556.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-30556",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-31T20:15:10.650",
|
||||
"lastModified": "2024-03-31T20:15:10.650",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MightyThemes Mighty Classic Pros And Cons allows Stored XSS.This issue affects Mighty Classic Pros And Cons: from n/a through 2.0.9.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/joomdev-wp-pros-cons/wordpress-mighty-classic-pros-and-cons-plugin-2-0-9-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-305xx/CVE-2024-30557.json
Normal file
55
CVE-2024/CVE-2024-305xx/CVE-2024-30557.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-30557",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-31T20:15:10.853",
|
||||
"lastModified": "2024-03-31T20:15:10.853",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Aesopinteractive Aesop Story Engine allows Stored XSS.This issue affects Aesop Story Engine: from n/a through 2.3.2.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/aesop-story-engine/wordpress-aesop-story-engine-plugin-2-3-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-305xx/CVE-2024-30558.json
Normal file
55
CVE-2024/CVE-2024-305xx/CVE-2024-30558.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-30558",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-31T20:15:11.090",
|
||||
"lastModified": "2024-03-31T20:15:11.090",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Michael Simpson Add Shortcodes Actions And Filters allows Reflected XSS.This issue affects Add Shortcodes Actions And Filters: from n/a through 2.10.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/add-actions-and-filters/wordpress-add-shortcodes-actions-and-filters-plugin-2-10-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-305xx/CVE-2024-30559.json
Normal file
55
CVE-2024/CVE-2024-305xx/CVE-2024-30559.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-30559",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-31T20:15:11.350",
|
||||
"lastModified": "2024-03-31T20:15:11.350",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Maurice Spin 360 deg and 3D Model Viewer allows Stored XSS.This issue affects Spin 360 deg and 3D Model Viewer: from n/a through 1.2.7.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/spin360/wordpress-spin-360-deg-and-3d-model-viewer-plugin-1-2-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-305xx/CVE-2024-30561.json
Normal file
55
CVE-2024/CVE-2024-305xx/CVE-2024-30561.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-30561",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-31T20:15:11.560",
|
||||
"lastModified": "2024-03-31T20:15:11.560",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Scientech It Solution Appointment Calendar allows Reflected XSS.This issue affects Appointment Calendar: from n/a through 2.9.6.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/appointment-calendar/wordpress-appointment-calendar-plugin-2-9-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-310xx/CVE-2024-31084.json
Normal file
55
CVE-2024/CVE-2024-310xx/CVE-2024-31084.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31084",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-31T20:15:11.807",
|
||||
"lastModified": "2024-03-31T20:15:11.807",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pulsar Web Design Weekly Class Schedule allows Reflected XSS.This issue affects Weekly Class Schedule: from n/a through 3.19.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/weekly-class-schedule/wordpress-weekly-class-schedule-plugin-3-19-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-310xx/CVE-2024-31085.json
Normal file
55
CVE-2024/CVE-2024-310xx/CVE-2024-31085.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31085",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-31T20:15:12.070",
|
||||
"lastModified": "2024-03-31T20:15:12.070",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rob Marsh, SJ Post-Plugin Library allows Reflected XSS.This issue affects Post-Plugin Library: from n/a through 2.6.2.1.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/post-plugin-library/wordpress-post-plugin-library-plugin-2-6-2-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-310xx/CVE-2024-31087.json
Normal file
55
CVE-2024/CVE-2024-310xx/CVE-2024-31087.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31087",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-31T20:15:12.327",
|
||||
"lastModified": "2024-03-31T20:15:12.327",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Joel Starnes pageMash > Page Management allows Reflected XSS.This issue affects pageMash > Page Management: from n/a through 1.3.0.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/pagemash/wordpress-pagemash-plugin-1-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-310xx/CVE-2024-31089.json
Normal file
55
CVE-2024/CVE-2024-310xx/CVE-2024-31089.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31089",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-31T20:15:12.553",
|
||||
"lastModified": "2024-03-31T20:15:12.553",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Techblissonline.Com (Rajesh) Platinum SEO allows Stored XSS.This issue affects Platinum SEO: from n/a through 2.4.0.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/platinum-seo-pack/wordpress-platinum-seo-plugin-2-4-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-310xx/CVE-2024-31090.json
Normal file
55
CVE-2024/CVE-2024-310xx/CVE-2024-31090.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31090",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-31T20:15:12.797",
|
||||
"lastModified": "2024-03-31T20:15:12.797",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in \u8352\u91ce\u65e0\u706f Hacklog Down As PDF allows Reflected XSS.This issue affects Hacklog Down As PDF: from n/a through 2.3.6.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/down-as-pdf/wordpress-hacklog-down-as-pdf-plugin-2-3-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-310xx/CVE-2024-31091.json
Normal file
55
CVE-2024/CVE-2024-310xx/CVE-2024-31091.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31091",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-31T20:15:13.013",
|
||||
"lastModified": "2024-03-31T20:15:13.013",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SparkWeb Interactive, Inc. Custom Field Bulk Editor allows Reflected XSS.This issue affects Custom Field Bulk Editor: from n/a through 1.9.1.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/custom-field-bulk-editor/wordpress-custom-field-bulk-editor-plugin-1-9-1-cross-site-scripting-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-310xx/CVE-2024-31092.json
Normal file
55
CVE-2024/CVE-2024-310xx/CVE-2024-31092.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31092",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-31T20:15:13.240",
|
||||
"lastModified": "2024-03-31T20:15:13.240",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Philip M. Hofer (Frumph) Comic Easel allows Reflected XSS.This issue affects Comic Easel: from n/a through 1.15.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/comic-easel/wordpress-comic-easel-plugin-1-15-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-310xx/CVE-2024-31097.json
Normal file
55
CVE-2024/CVE-2024-310xx/CVE-2024-31097.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31097",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-31T20:15:13.463",
|
||||
"lastModified": "2024-03-31T20:15:13.463",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Stephan Spencer SEO Title Tag allows Reflected XSS.This issue affects SEO Title Tag: from n/a through 3.5.9.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/seo-title-tag/wordpress-seo-title-tag-plugin-3-5-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-311xx/CVE-2024-31101.json
Normal file
55
CVE-2024/CVE-2024-311xx/CVE-2024-31101.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31101",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-31T20:15:13.733",
|
||||
"lastModified": "2024-03-31T20:15:13.733",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in August Infotech AI Twitter Feeds (Twitter widget & shortcode) allows Stored XSS.This issue affects AI Twitter Feeds (Twitter widget & shortcode): from n/a through 2.4.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/ai-twitter-feeds/wordpress-ai-twitter-feeds-twitter-widget-shortcode-plugin-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-311xx/CVE-2024-31102.json
Normal file
55
CVE-2024/CVE-2024-311xx/CVE-2024-31102.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31102",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-31T20:15:13.963",
|
||||
"lastModified": "2024-03-31T20:15:13.963",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Scimone Ignazio Prenotazioni allows Stored XSS.This issue affects Prenotazioni: from n/a through 1.7.4.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/prenotazioni/wordpress-prenotazioni-plugin-1-7-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-311xx/CVE-2024-31103.json
Normal file
55
CVE-2024/CVE-2024-311xx/CVE-2024-31103.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31103",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-31T20:15:14.200",
|
||||
"lastModified": "2024-03-31T20:15:14.200",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kanban for WordPress Kanban Boards for WordPress allows Reflected XSS.This issue affects Kanban Boards for WordPress: from n/a through 2.5.21.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/kanban/wordpress-kanban-boards-for-wordpress-plugin-2-5-21-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-311xx/CVE-2024-31104.json
Normal file
55
CVE-2024/CVE-2024-311xx/CVE-2024-31104.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31104",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-31T20:15:14.417",
|
||||
"lastModified": "2024-03-31T20:15:14.417",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in GetResponse GetResponse for WordPress allows Stored XSS.This issue affects GetResponse for WordPress: from n/a through 5.5.33.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/getresponse-integration/wordpress-getresponse-for-wordpress-plugin-5-5-33-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
58
README.md
58
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-03-31T20:00:38.381515+00:00
|
||||
2024-03-31T22:00:38.484396+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-03-31T19:15:50.163000+00:00
|
||||
2024-03-31T20:15:14.417000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,38 +33,38 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
243479
|
||||
243506
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `25`
|
||||
Recently added CVEs: `27`
|
||||
|
||||
- [CVE-2024-30489](CVE-2024/CVE-2024-304xx/CVE-2024-30489.json) (`2024-03-31T19:15:46.030`)
|
||||
- [CVE-2024-30523](CVE-2024/CVE-2024-305xx/CVE-2024-30523.json) (`2024-03-31T19:15:46.277`)
|
||||
- [CVE-2024-30526](CVE-2024/CVE-2024-305xx/CVE-2024-30526.json) (`2024-03-31T19:15:46.497`)
|
||||
- [CVE-2024-30533](CVE-2024/CVE-2024-305xx/CVE-2024-30533.json) (`2024-03-31T19:15:46.707`)
|
||||
- [CVE-2024-30535](CVE-2024/CVE-2024-305xx/CVE-2024-30535.json) (`2024-03-31T19:15:46.907`)
|
||||
- [CVE-2024-30536](CVE-2024/CVE-2024-305xx/CVE-2024-30536.json) (`2024-03-31T19:15:47.113`)
|
||||
- [CVE-2024-30541](CVE-2024/CVE-2024-305xx/CVE-2024-30541.json) (`2024-03-31T19:15:47.310`)
|
||||
- [CVE-2024-30543](CVE-2024/CVE-2024-305xx/CVE-2024-30543.json) (`2024-03-31T19:15:47.510`)
|
||||
- [CVE-2024-31094](CVE-2024/CVE-2024-310xx/CVE-2024-31094.json) (`2024-03-31T18:15:47.697`)
|
||||
- [CVE-2024-31095](CVE-2024/CVE-2024-310xx/CVE-2024-31095.json) (`2024-03-31T19:15:47.717`)
|
||||
- [CVE-2024-31096](CVE-2024/CVE-2024-310xx/CVE-2024-31096.json) (`2024-03-31T19:15:47.800`)
|
||||
- [CVE-2024-31100](CVE-2024/CVE-2024-311xx/CVE-2024-31100.json) (`2024-03-31T19:15:47.997`)
|
||||
- [CVE-2024-31106](CVE-2024/CVE-2024-311xx/CVE-2024-31106.json) (`2024-03-31T19:15:48.197`)
|
||||
- [CVE-2024-31107](CVE-2024/CVE-2024-311xx/CVE-2024-31107.json) (`2024-03-31T19:15:48.390`)
|
||||
- [CVE-2024-31108](CVE-2024/CVE-2024-311xx/CVE-2024-31108.json) (`2024-03-31T19:15:48.603`)
|
||||
- [CVE-2024-31110](CVE-2024/CVE-2024-311xx/CVE-2024-31110.json) (`2024-03-31T19:15:48.793`)
|
||||
- [CVE-2024-31112](CVE-2024/CVE-2024-311xx/CVE-2024-31112.json) (`2024-03-31T19:15:48.987`)
|
||||
- [CVE-2024-31114](CVE-2024/CVE-2024-311xx/CVE-2024-31114.json) (`2024-03-31T18:15:47.810`)
|
||||
- [CVE-2024-31115](CVE-2024/CVE-2024-311xx/CVE-2024-31115.json) (`2024-03-31T18:15:48.013`)
|
||||
- [CVE-2024-31116](CVE-2024/CVE-2024-311xx/CVE-2024-31116.json) (`2024-03-31T19:15:49.180`)
|
||||
- [CVE-2024-31117](CVE-2024/CVE-2024-311xx/CVE-2024-31117.json) (`2024-03-31T19:15:49.377`)
|
||||
- [CVE-2024-31120](CVE-2024/CVE-2024-311xx/CVE-2024-31120.json) (`2024-03-31T19:15:49.573`)
|
||||
- [CVE-2024-31121](CVE-2024/CVE-2024-311xx/CVE-2024-31121.json) (`2024-03-31T19:15:49.777`)
|
||||
- [CVE-2024-31122](CVE-2024/CVE-2024-311xx/CVE-2024-31122.json) (`2024-03-31T19:15:49.967`)
|
||||
- [CVE-2024-31123](CVE-2024/CVE-2024-311xx/CVE-2024-31123.json) (`2024-03-31T19:15:50.163`)
|
||||
- [CVE-2024-30548](CVE-2024/CVE-2024-305xx/CVE-2024-30548.json) (`2024-03-31T20:15:08.730`)
|
||||
- [CVE-2024-30549](CVE-2024/CVE-2024-305xx/CVE-2024-30549.json) (`2024-03-31T20:15:08.977`)
|
||||
- [CVE-2024-30550](CVE-2024/CVE-2024-305xx/CVE-2024-30550.json) (`2024-03-31T20:15:09.193`)
|
||||
- [CVE-2024-30551](CVE-2024/CVE-2024-305xx/CVE-2024-30551.json) (`2024-03-31T20:15:09.450`)
|
||||
- [CVE-2024-30552](CVE-2024/CVE-2024-305xx/CVE-2024-30552.json) (`2024-03-31T20:15:09.680`)
|
||||
- [CVE-2024-30553](CVE-2024/CVE-2024-305xx/CVE-2024-30553.json) (`2024-03-31T20:15:09.927`)
|
||||
- [CVE-2024-30554](CVE-2024/CVE-2024-305xx/CVE-2024-30554.json) (`2024-03-31T20:15:10.153`)
|
||||
- [CVE-2024-30555](CVE-2024/CVE-2024-305xx/CVE-2024-30555.json) (`2024-03-31T20:15:10.417`)
|
||||
- [CVE-2024-30556](CVE-2024/CVE-2024-305xx/CVE-2024-30556.json) (`2024-03-31T20:15:10.650`)
|
||||
- [CVE-2024-30557](CVE-2024/CVE-2024-305xx/CVE-2024-30557.json) (`2024-03-31T20:15:10.853`)
|
||||
- [CVE-2024-30558](CVE-2024/CVE-2024-305xx/CVE-2024-30558.json) (`2024-03-31T20:15:11.090`)
|
||||
- [CVE-2024-30559](CVE-2024/CVE-2024-305xx/CVE-2024-30559.json) (`2024-03-31T20:15:11.350`)
|
||||
- [CVE-2024-30561](CVE-2024/CVE-2024-305xx/CVE-2024-30561.json) (`2024-03-31T20:15:11.560`)
|
||||
- [CVE-2024-31084](CVE-2024/CVE-2024-310xx/CVE-2024-31084.json) (`2024-03-31T20:15:11.807`)
|
||||
- [CVE-2024-31085](CVE-2024/CVE-2024-310xx/CVE-2024-31085.json) (`2024-03-31T20:15:12.070`)
|
||||
- [CVE-2024-31087](CVE-2024/CVE-2024-310xx/CVE-2024-31087.json) (`2024-03-31T20:15:12.327`)
|
||||
- [CVE-2024-31089](CVE-2024/CVE-2024-310xx/CVE-2024-31089.json) (`2024-03-31T20:15:12.553`)
|
||||
- [CVE-2024-31090](CVE-2024/CVE-2024-310xx/CVE-2024-31090.json) (`2024-03-31T20:15:12.797`)
|
||||
- [CVE-2024-31091](CVE-2024/CVE-2024-310xx/CVE-2024-31091.json) (`2024-03-31T20:15:13.013`)
|
||||
- [CVE-2024-31092](CVE-2024/CVE-2024-310xx/CVE-2024-31092.json) (`2024-03-31T20:15:13.240`)
|
||||
- [CVE-2024-31097](CVE-2024/CVE-2024-310xx/CVE-2024-31097.json) (`2024-03-31T20:15:13.463`)
|
||||
- [CVE-2024-31101](CVE-2024/CVE-2024-311xx/CVE-2024-31101.json) (`2024-03-31T20:15:13.733`)
|
||||
- [CVE-2024-31102](CVE-2024/CVE-2024-311xx/CVE-2024-31102.json) (`2024-03-31T20:15:13.963`)
|
||||
- [CVE-2024-31103](CVE-2024/CVE-2024-311xx/CVE-2024-31103.json) (`2024-03-31T20:15:14.200`)
|
||||
- [CVE-2024-31104](CVE-2024/CVE-2024-311xx/CVE-2024-31104.json) (`2024-03-31T20:15:14.417`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
77
_state.csv
77
_state.csv
@ -243353,7 +243353,7 @@ CVE-2024-30483,0,0,b9bae397d346f9d15d8aa455fac8a9a4b71c06ccfbb38644d1b4aae39ab9e
|
||||
CVE-2024-30486,0,0,87c7c0f6eebc8e570654e8e531d3719727026d666dde67361fc4a33bb9496aec,2024-03-29T14:15:10.720000
|
||||
CVE-2024-30487,0,0,a0b5457489e3c773a06917b07a9bee442e0b0aacaca250499eb026cb0fd1463b,2024-03-29T14:15:10.960000
|
||||
CVE-2024-30488,0,0,69e7754452e3c1f64e9867e00a31e30e3ca7845150cc1162f7d977a437ae591f,2024-03-29T14:15:11.247000
|
||||
CVE-2024-30489,1,1,d44957e53ab4af54b5e619604704f8ab4d2ee328f1f621a181ee3365da7e3fa7,2024-03-31T19:15:46.030000
|
||||
CVE-2024-30489,0,0,d44957e53ab4af54b5e619604704f8ab4d2ee328f1f621a181ee3365da7e3fa7,2024-03-31T19:15:46.030000
|
||||
CVE-2024-30490,0,0,2d962a323d97777863513fe426a95c53e5ebfffade57d8f8a57263db39bfa9c5,2024-03-29T14:15:11.500000
|
||||
CVE-2024-30491,0,0,2adc738edadf33742d8b922d2c16b52eb93409925aaa91d5ed2f8952e97b2956,2024-03-29T14:15:11.777000
|
||||
CVE-2024-30492,0,0,d1cdfe17d536c31be8c5441b0019c6c7a13bcfe6fc5f2cd44256271d81839b8b,2024-03-29T16:15:10.197000
|
||||
@ -243381,13 +243381,28 @@ CVE-2024-30518,0,0,041e0c521f72fc9bfd62696fcd7b822b4b1d88708592fbed4617cdd4adaae
|
||||
CVE-2024-30519,0,0,2100c7798d2014af5ae23074e044b065689f8c03b6231e2353ed503e4ae33762,2024-03-29T13:28:22.880000
|
||||
CVE-2024-30520,0,0,194291321ee08f27596f77b46df7ac3ffd4878f9281e691a5c258adea17d20c0,2024-03-29T13:28:22.880000
|
||||
CVE-2024-30521,0,0,e8d26784614ad395d5a47f0e2ccfbec93867295aa131471a914ea1e9181f2fff,2024-03-29T16:15:11.420000
|
||||
CVE-2024-30523,1,1,46865e10cc4a7187f2f238025cd3f6c181201f8d515d64498d6413005423007b,2024-03-31T19:15:46.277000
|
||||
CVE-2024-30526,1,1,1bf518b37fb3254d6aaae40f5ae1475c23e52e92b1b549252e7fb862cd40b6a7,2024-03-31T19:15:46.497000
|
||||
CVE-2024-30533,1,1,f568215859200370804cf243976322cd4fac8e240cb8879812f3ba719aaecca8,2024-03-31T19:15:46.707000
|
||||
CVE-2024-30535,1,1,591618b4bb0253347d421530b8166b3021d470ef638c757eb65cf243b27bbcd2,2024-03-31T19:15:46.907000
|
||||
CVE-2024-30536,1,1,206753a1027eebd12457ac7aa0b73b5ade021fe85cde5439650ee42cfcfafe8a,2024-03-31T19:15:47.113000
|
||||
CVE-2024-30541,1,1,c26c9c14ec957c18b04b65cf5b3ad544125ce2749edb7d7cd4589b22b70824d2,2024-03-31T19:15:47.310000
|
||||
CVE-2024-30543,1,1,14f4b6434f9e75ee5b30f8fb234ee863068cac757b7a39abe165ca1cd91ecf1a,2024-03-31T19:15:47.510000
|
||||
CVE-2024-30523,0,0,46865e10cc4a7187f2f238025cd3f6c181201f8d515d64498d6413005423007b,2024-03-31T19:15:46.277000
|
||||
CVE-2024-30524,1,1,2c28c4f70ff8115639c2677839d4ab865e2355433a2eba85d89e97d76101643e,2024-03-31T20:15:08.223000
|
||||
CVE-2024-30526,0,0,1bf518b37fb3254d6aaae40f5ae1475c23e52e92b1b549252e7fb862cd40b6a7,2024-03-31T19:15:46.497000
|
||||
CVE-2024-30530,1,1,6a29b64a59c440aa4db4b791fa259d3a4817edc463e87a701e2a65d21e268da6,2024-03-31T20:15:08.490000
|
||||
CVE-2024-30533,0,0,f568215859200370804cf243976322cd4fac8e240cb8879812f3ba719aaecca8,2024-03-31T19:15:46.707000
|
||||
CVE-2024-30535,0,0,591618b4bb0253347d421530b8166b3021d470ef638c757eb65cf243b27bbcd2,2024-03-31T19:15:46.907000
|
||||
CVE-2024-30536,0,0,206753a1027eebd12457ac7aa0b73b5ade021fe85cde5439650ee42cfcfafe8a,2024-03-31T19:15:47.113000
|
||||
CVE-2024-30541,0,0,c26c9c14ec957c18b04b65cf5b3ad544125ce2749edb7d7cd4589b22b70824d2,2024-03-31T19:15:47.310000
|
||||
CVE-2024-30543,0,0,14f4b6434f9e75ee5b30f8fb234ee863068cac757b7a39abe165ca1cd91ecf1a,2024-03-31T19:15:47.510000
|
||||
CVE-2024-30548,1,1,f74ee971e3d856c262bd7f5fdc748de3e3da859de691dd5b637a321383a9418a,2024-03-31T20:15:08.730000
|
||||
CVE-2024-30549,1,1,79c899dc9967b069dcb43993fa27f7b05dee45997101c3eef4c771fbf26a9567,2024-03-31T20:15:08.977000
|
||||
CVE-2024-30550,1,1,32e22e93b00723be58570b9d1142fde4000cc10cec96dbc106c59ed0dbb79051,2024-03-31T20:15:09.193000
|
||||
CVE-2024-30551,1,1,22cdd3e468d29258fb64f98c1070cebfc7d1197dcc0f831be43ceb8364871bbd,2024-03-31T20:15:09.450000
|
||||
CVE-2024-30552,1,1,b1d36f4a04bbb6cbdfc83396611737c522a4f815a1ba10bbf6e28171f6675890,2024-03-31T20:15:09.680000
|
||||
CVE-2024-30553,1,1,ab8db79c9f5333e7b9409792dc44d6880cfb1cecdc539fa1550c36d5fed55147,2024-03-31T20:15:09.927000
|
||||
CVE-2024-30554,1,1,eac80af46b94dccd5ef0dccb46c6f51c1172b48513b98a4ff0d1062325424e0f,2024-03-31T20:15:10.153000
|
||||
CVE-2024-30555,1,1,78926b0317724e0b31347f7c11fcf6fa9ad1ab5fade4b805b99524808d1f60a2,2024-03-31T20:15:10.417000
|
||||
CVE-2024-30556,1,1,ed6d2eb6fb5d11895614307b39075e7f00067ba9d09aa2c344bf8b65a569ef0a,2024-03-31T20:15:10.650000
|
||||
CVE-2024-30557,1,1,7f4c43bb54ba11d87c4ed126fcf86ba0258a6ad99fdd321ab563f1df9e1eb298,2024-03-31T20:15:10.853000
|
||||
CVE-2024-30558,1,1,e883f56f3462bf2d4518b145b354d6c5cb2a252d851d001f2d36babe56dfc2a9,2024-03-31T20:15:11.090000
|
||||
CVE-2024-30559,1,1,49d54ab943f26a9a63d77d60693ef041da8018118e7b5787a8305c480e987832,2024-03-31T20:15:11.350000
|
||||
CVE-2024-30561,1,1,d4c9c6233918b5ad393efd73fb240bf0957d3752ca7c040b7754b63465fffd89,2024-03-31T20:15:11.560000
|
||||
CVE-2024-30583,0,0,90e06b2d765278ac0f3bc4028344fdf483d30ea530d1cc273b94886fa84d52bd,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30584,0,0,35ddda2305ed50d97f06df7df7b733486405aa80385b935162c6180d1fe62320,2024-03-28T16:07:30.893000
|
||||
CVE-2024-30585,0,0,7e78a86bcf687f746816842e948af254246fdc173fd94674915f1ec2e6a3c749,2024-03-28T16:07:30.893000
|
||||
@ -243452,23 +243467,35 @@ CVE-2024-31062,0,0,952fafab14c88ef7f6d1b1ec6a2fcadf9629e538f73b776826c7478ea44a0
|
||||
CVE-2024-31063,0,0,9b72fd99a3101526692574476be1476465954178b1aef1969020564a9dc62025,2024-03-28T20:53:20.813000
|
||||
CVE-2024-31064,0,0,fab0c130af02ab0ee8ef728c8a3a74b625a68f67b1d9e16e96dee36bc79c0e55,2024-03-28T20:53:20.813000
|
||||
CVE-2024-31065,0,0,255e255b9c92081fe223d505f2b49fcf2e2689e950cf84a4256404373a46d62b,2024-03-28T20:53:20.813000
|
||||
CVE-2024-31094,1,1,ab3ebdced90c7017d12305fa8fc90025d0e3c66ec45d1c5d99d9090e025f920a,2024-03-31T18:15:47.697000
|
||||
CVE-2024-31095,1,1,6ba5a8aff91ff15528ac0e8e16e22fa05739fff976914f77ece554cada426217,2024-03-31T19:15:47.717000
|
||||
CVE-2024-31096,1,1,a89b30f3063d1cc370448a34bf5687321d993096ac22151d3c78fc72692ecb3d,2024-03-31T19:15:47.800000
|
||||
CVE-2024-31100,1,1,8d10fd659ab9ac31330b38c3a1439c29efe71164326dd6853771c85bacc420de,2024-03-31T19:15:47.997000
|
||||
CVE-2024-31106,1,1,842d65e3f7f8df65276fe965841d7276df3cfafa247cdd4b7be3acbab94f0d27,2024-03-31T19:15:48.197000
|
||||
CVE-2024-31107,1,1,783c6ab6dc9082ef6e5ac5650500b818788d3063997eb59639f0e325e11bbc5f,2024-03-31T19:15:48.390000
|
||||
CVE-2024-31108,1,1,1b3828c9c778dc25596046ba95b3c3ada7361c4a50783708b80fd803de94ca49,2024-03-31T19:15:48.603000
|
||||
CVE-2024-31110,1,1,cb9424d5d2d80377d05849c8beb3d6dbded6fc7d024930f4920123d4470171ad,2024-03-31T19:15:48.793000
|
||||
CVE-2024-31112,1,1,ce50fc40ade16ea1404e4268de022dd2e6aa91dd99551bf5e47934c3c3b072e1,2024-03-31T19:15:48.987000
|
||||
CVE-2024-31114,1,1,06a3646510967a9fb95869380d7b685da01cbfe839055bc3b25ee925e3972030,2024-03-31T18:15:47.810000
|
||||
CVE-2024-31115,1,1,2cf0158dcc840c91ee5e9a27c850873fda56b28216b6b61dc2552110033d9228,2024-03-31T18:15:48.013000
|
||||
CVE-2024-31116,1,1,68bd6efadd9260f1cfe39383f978aa20c66216bde4883a451905f7dd7ae416de,2024-03-31T19:15:49.180000
|
||||
CVE-2024-31117,1,1,4837561ed65ba59f7c26d76e793c4b3d49d2b7f68a91603575741a90375101d9,2024-03-31T19:15:49.377000
|
||||
CVE-2024-31120,1,1,aac94c17146ae6347e51cf5c4b7e1991cbf66fe25d9ba57ddc47a7e8543fcde4,2024-03-31T19:15:49.573000
|
||||
CVE-2024-31121,1,1,0c81bee58ea9fd86ad6e5149c670d64c79a9d431a0221b85f9e7cce6c9fcff07,2024-03-31T19:15:49.777000
|
||||
CVE-2024-31122,1,1,58d1f4ef9f076b429310b1a13520694cfc34cbc6b302a687d216c4a60d17c1a8,2024-03-31T19:15:49.967000
|
||||
CVE-2024-31123,1,1,d148040cac32b832e3f0049c190f546c264f1e961b311b92446b9d7f5291c5cc,2024-03-31T19:15:50.163000
|
||||
CVE-2024-31084,1,1,6f5a8687657f909d53bf7a58df37dbcf07badd37a75c440aa8745c66ea8f9c30,2024-03-31T20:15:11.807000
|
||||
CVE-2024-31085,1,1,5e35343ff911288be69b20d68077790cf47f530c63f556ddae88857f40edbabe,2024-03-31T20:15:12.070000
|
||||
CVE-2024-31087,1,1,a3034eb53f991b2d5cb44bdc73e06603c11c8bfedc5a3cc93d4ec41d02824cdf,2024-03-31T20:15:12.327000
|
||||
CVE-2024-31089,1,1,02e20a8e6d491bae6564420299330154777fcdc2f7273a2f7678b9015faedbc0,2024-03-31T20:15:12.553000
|
||||
CVE-2024-31090,1,1,5baca600f8ba6bf466ddbd77d6f93efb40da0d5bec5b7e91498b84b5ca361a3a,2024-03-31T20:15:12.797000
|
||||
CVE-2024-31091,1,1,711a4e1c79816f489d8c74501fb750a7bc59cf904efd048f91fd81a06ac1ac3a,2024-03-31T20:15:13.013000
|
||||
CVE-2024-31092,1,1,8df7a2110de6e22446217f5ddae3d74d731cf769c99fe9a03762e5d6902631c8,2024-03-31T20:15:13.240000
|
||||
CVE-2024-31094,0,0,ab3ebdced90c7017d12305fa8fc90025d0e3c66ec45d1c5d99d9090e025f920a,2024-03-31T18:15:47.697000
|
||||
CVE-2024-31095,0,0,6ba5a8aff91ff15528ac0e8e16e22fa05739fff976914f77ece554cada426217,2024-03-31T19:15:47.717000
|
||||
CVE-2024-31096,0,0,a89b30f3063d1cc370448a34bf5687321d993096ac22151d3c78fc72692ecb3d,2024-03-31T19:15:47.800000
|
||||
CVE-2024-31097,1,1,f4f12da79d635dec8049c58b8737aecd6211e4fc28e37f361ef788a089b9ba85,2024-03-31T20:15:13.463000
|
||||
CVE-2024-31100,0,0,8d10fd659ab9ac31330b38c3a1439c29efe71164326dd6853771c85bacc420de,2024-03-31T19:15:47.997000
|
||||
CVE-2024-31101,1,1,5295a502a5976acc73a22a8cde3b32366cc05bd20fba72ecdf526a1c55effbb5,2024-03-31T20:15:13.733000
|
||||
CVE-2024-31102,1,1,54e60cfe16d3075cb114e6ec728d6757c566964253acf2dc10af3f9ec6a81d62,2024-03-31T20:15:13.963000
|
||||
CVE-2024-31103,1,1,ed3d6fc395b10a4550784efbebd47f5e02bcfebbb7f7f57d0f07da76079140bc,2024-03-31T20:15:14.200000
|
||||
CVE-2024-31104,1,1,9980154b9818a3e57cadbe61e97af26eb94866a0620fb3ffa450e0104ad5b52d,2024-03-31T20:15:14.417000
|
||||
CVE-2024-31106,0,0,842d65e3f7f8df65276fe965841d7276df3cfafa247cdd4b7be3acbab94f0d27,2024-03-31T19:15:48.197000
|
||||
CVE-2024-31107,0,0,783c6ab6dc9082ef6e5ac5650500b818788d3063997eb59639f0e325e11bbc5f,2024-03-31T19:15:48.390000
|
||||
CVE-2024-31108,0,0,1b3828c9c778dc25596046ba95b3c3ada7361c4a50783708b80fd803de94ca49,2024-03-31T19:15:48.603000
|
||||
CVE-2024-31110,0,0,cb9424d5d2d80377d05849c8beb3d6dbded6fc7d024930f4920123d4470171ad,2024-03-31T19:15:48.793000
|
||||
CVE-2024-31112,0,0,ce50fc40ade16ea1404e4268de022dd2e6aa91dd99551bf5e47934c3c3b072e1,2024-03-31T19:15:48.987000
|
||||
CVE-2024-31114,0,0,06a3646510967a9fb95869380d7b685da01cbfe839055bc3b25ee925e3972030,2024-03-31T18:15:47.810000
|
||||
CVE-2024-31115,0,0,2cf0158dcc840c91ee5e9a27c850873fda56b28216b6b61dc2552110033d9228,2024-03-31T18:15:48.013000
|
||||
CVE-2024-31116,0,0,68bd6efadd9260f1cfe39383f978aa20c66216bde4883a451905f7dd7ae416de,2024-03-31T19:15:49.180000
|
||||
CVE-2024-31117,0,0,4837561ed65ba59f7c26d76e793c4b3d49d2b7f68a91603575741a90375101d9,2024-03-31T19:15:49.377000
|
||||
CVE-2024-31120,0,0,aac94c17146ae6347e51cf5c4b7e1991cbf66fe25d9ba57ddc47a7e8543fcde4,2024-03-31T19:15:49.573000
|
||||
CVE-2024-31121,0,0,0c81bee58ea9fd86ad6e5149c670d64c79a9d431a0221b85f9e7cce6c9fcff07,2024-03-31T19:15:49.777000
|
||||
CVE-2024-31122,0,0,58d1f4ef9f076b429310b1a13520694cfc34cbc6b302a687d216c4a60d17c1a8,2024-03-31T19:15:49.967000
|
||||
CVE-2024-31123,0,0,d148040cac32b832e3f0049c190f546c264f1e961b311b92446b9d7f5291c5cc,2024-03-31T19:15:50.163000
|
||||
CVE-2024-31134,0,0,f3dcd63eca4514e6339c3ec7aeb83c2b308295cdf8ae154e5d9cd1a9c2c8a369,2024-03-28T16:07:30.893000
|
||||
CVE-2024-31135,0,0,479d4c1f65df6314842af6b85097457f245568f09c6620b6a18268f61c31c90a,2024-03-28T16:07:30.893000
|
||||
CVE-2024-31136,0,0,59d127dfb07acd2c4587c1beda8f1deaf424906c9b7034466a77403adfd40752,2024-03-28T16:07:30.893000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user