diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30524.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30524.json new file mode 100644 index 00000000000..829644b667d --- /dev/null +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30524.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30524", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-31T20:15:08.223", + "lastModified": "2024-03-31T20:15:08.223", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RedLettuce Plugins PDF Viewer for Elementor allows Stored XSS.This issue affects PDF Viewer for Elementor: from n/a through 2.9.3.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/pdf-viewer-for-elementor/wordpress-pdf-viewer-for-elementor-plugin-2-9-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30530.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30530.json new file mode 100644 index 00000000000..6b8212bea68 --- /dev/null +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30530.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30530", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-31T20:15:08.490", + "lastModified": "2024-03-31T20:15:08.490", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Sonaar Music MP3 Audio Player for Music, Radio & Podcast by Sonaar allows Stored XSS.This issue affects MP3 Audio Player for Music, Radio & Podcast by Sonaar: from n/a through 5.1.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/mp3-music-player-by-sonaar/wordpress-mp3-audio-player-for-music-radio-podcast-by-sonaar-plugin-5-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30548.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30548.json new file mode 100644 index 00000000000..a6f533a5a16 --- /dev/null +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30548.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30548", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-31T20:15:08.730", + "lastModified": "2024-03-31T20:15:08.730", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Noah Kagan underConstruction allows Stored XSS.This issue affects underConstruction: from n/a through 1.21.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/underconstruction/wordpress-underconstruction-plugin-1-21-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30549.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30549.json new file mode 100644 index 00000000000..7cfa745081b --- /dev/null +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30549.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30549", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-31T20:15:08.977", + "lastModified": "2024-03-31T20:15:08.977", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Cimatti Consulting Contact Forms by Cimatti allows Stored XSS.This issue affects Contact Forms by Cimatti: from n/a through 1.8.0.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/contact-forms/wordpress-contact-forms-by-cimatti-plugin-1-8-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30550.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30550.json new file mode 100644 index 00000000000..b9b7d4a8bcd --- /dev/null +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30550.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30550", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-31T20:15:09.193", + "lastModified": "2024-03-31T20:15:09.193", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpdevart Responsive Image Gallery, Gallery Album allows Reflected XSS.This issue affects Responsive Image Gallery, Gallery Album: from n/a through 2.0.3.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/gallery-album/wordpress-gallery-image-and-video-gallery-with-thumbnails-plugin-2-0-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30551.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30551.json new file mode 100644 index 00000000000..228a742b555 --- /dev/null +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30551.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30551", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-31T20:15:09.450", + "lastModified": "2024-03-31T20:15:09.450", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Toast Plugins Sticky Anything.This issue affects Sticky Anything: from n/a through 2.1.5.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/toast-stick-anything/wordpress-sticky-anything-plugin-2-1-5-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30552.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30552.json new file mode 100644 index 00000000000..1583457b0e7 --- /dev/null +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30552.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30552", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-31T20:15:09.680", + "lastModified": "2024-03-31T20:15:09.680", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wppdf.Org Responsive flipbook allows Stored XSS.This issue affects Responsive flipbook: from n/a through 1.0.0.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wppdf/wordpress-responsive-flipbook-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30553.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30553.json new file mode 100644 index 00000000000..5d0e4326161 --- /dev/null +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30553.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30553", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-31T20:15:09.927", + "lastModified": "2024-03-31T20:15:09.927", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Joby Joseph WP Twitter Mega Fan Box Widget allows Stored XSS.This issue affects WP Twitter Mega Fan Box Widget : from n/a through 1.0.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-twitter-mega-fan-box/wordpress-wp-twitter-mega-fan-box-widget-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30554.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30554.json new file mode 100644 index 00000000000..06211bfd3e8 --- /dev/null +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30554.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30554", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-31T20:15:10.153", + "lastModified": "2024-03-31T20:15:10.153", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Wouter Dijkstra DD Rating allows Stored XSS.This issue affects DD Rating: from n/a through 1.7.1.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/dd-rating/wordpress-dd-rating-plugin-1-7-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30555.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30555.json new file mode 100644 index 00000000000..ccbcf86c469 --- /dev/null +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30555.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30555", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-31T20:15:10.417", + "lastModified": "2024-03-31T20:15:10.417", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Sayan Datta Ultimate Social Comments \u2013 Email Notification & Lazy Load allows Stored XSS.This issue affects Ultimate Social Comments \u2013 Email Notification & Lazy Load: from n/a through 1.4.8.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/ultimate-facebook-comments/wordpress-ultimate-social-comments-plugin-1-4-8-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30556.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30556.json new file mode 100644 index 00000000000..b969b4b21f4 --- /dev/null +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30556.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30556", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-31T20:15:10.650", + "lastModified": "2024-03-31T20:15:10.650", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MightyThemes Mighty Classic Pros And Cons allows Stored XSS.This issue affects Mighty Classic Pros And Cons: from n/a through 2.0.9.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/joomdev-wp-pros-cons/wordpress-mighty-classic-pros-and-cons-plugin-2-0-9-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30557.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30557.json new file mode 100644 index 00000000000..36940ee1449 --- /dev/null +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30557.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30557", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-31T20:15:10.853", + "lastModified": "2024-03-31T20:15:10.853", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Aesopinteractive Aesop Story Engine allows Stored XSS.This issue affects Aesop Story Engine: from n/a through 2.3.2.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/aesop-story-engine/wordpress-aesop-story-engine-plugin-2-3-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30558.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30558.json new file mode 100644 index 00000000000..90cc609e208 --- /dev/null +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30558.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30558", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-31T20:15:11.090", + "lastModified": "2024-03-31T20:15:11.090", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Michael Simpson Add Shortcodes Actions And Filters allows Reflected XSS.This issue affects Add Shortcodes Actions And Filters: from n/a through 2.10.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/add-actions-and-filters/wordpress-add-shortcodes-actions-and-filters-plugin-2-10-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30559.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30559.json new file mode 100644 index 00000000000..0b41ef4feb7 --- /dev/null +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30559.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30559", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-31T20:15:11.350", + "lastModified": "2024-03-31T20:15:11.350", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Maurice Spin 360 deg and 3D Model Viewer allows Stored XSS.This issue affects Spin 360 deg and 3D Model Viewer: from n/a through 1.2.7.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/spin360/wordpress-spin-360-deg-and-3d-model-viewer-plugin-1-2-7-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30561.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30561.json new file mode 100644 index 00000000000..cd9a92ddbb2 --- /dev/null +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30561.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30561", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-31T20:15:11.560", + "lastModified": "2024-03-31T20:15:11.560", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Scientech It Solution Appointment Calendar allows Reflected XSS.This issue affects Appointment Calendar: from n/a through 2.9.6.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/appointment-calendar/wordpress-appointment-calendar-plugin-2-9-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31084.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31084.json new file mode 100644 index 00000000000..7fe343dd965 --- /dev/null +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31084.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-31084", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-31T20:15:11.807", + "lastModified": "2024-03-31T20:15:11.807", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pulsar Web Design Weekly Class Schedule allows Reflected XSS.This issue affects Weekly Class Schedule: from n/a through 3.19.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/weekly-class-schedule/wordpress-weekly-class-schedule-plugin-3-19-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31085.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31085.json new file mode 100644 index 00000000000..742e2b7eb46 --- /dev/null +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31085.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-31085", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-31T20:15:12.070", + "lastModified": "2024-03-31T20:15:12.070", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rob Marsh, SJ Post-Plugin Library allows Reflected XSS.This issue affects Post-Plugin Library: from n/a through 2.6.2.1.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/post-plugin-library/wordpress-post-plugin-library-plugin-2-6-2-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31087.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31087.json new file mode 100644 index 00000000000..09737b448e7 --- /dev/null +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31087.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-31087", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-31T20:15:12.327", + "lastModified": "2024-03-31T20:15:12.327", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Joel Starnes pageMash > Page Management allows Reflected XSS.This issue affects pageMash > Page Management: from n/a through 1.3.0.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/pagemash/wordpress-pagemash-plugin-1-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31089.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31089.json new file mode 100644 index 00000000000..12455adf1f2 --- /dev/null +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31089.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-31089", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-31T20:15:12.553", + "lastModified": "2024-03-31T20:15:12.553", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Techblissonline.Com (Rajesh) Platinum SEO allows Stored XSS.This issue affects Platinum SEO: from n/a through 2.4.0.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/platinum-seo-pack/wordpress-platinum-seo-plugin-2-4-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31090.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31090.json new file mode 100644 index 00000000000..557b2114221 --- /dev/null +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31090.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-31090", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-31T20:15:12.797", + "lastModified": "2024-03-31T20:15:12.797", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in \u8352\u91ce\u65e0\u706f Hacklog Down As PDF allows Reflected XSS.This issue affects Hacklog Down As PDF: from n/a through 2.3.6.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/down-as-pdf/wordpress-hacklog-down-as-pdf-plugin-2-3-6-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31091.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31091.json new file mode 100644 index 00000000000..cf788445bc7 --- /dev/null +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31091.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-31091", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-31T20:15:13.013", + "lastModified": "2024-03-31T20:15:13.013", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SparkWeb Interactive, Inc. Custom Field Bulk Editor allows Reflected XSS.This issue affects Custom Field Bulk Editor: from n/a through 1.9.1.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/custom-field-bulk-editor/wordpress-custom-field-bulk-editor-plugin-1-9-1-cross-site-scripting-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31092.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31092.json new file mode 100644 index 00000000000..f030b596395 --- /dev/null +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31092.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-31092", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-31T20:15:13.240", + "lastModified": "2024-03-31T20:15:13.240", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Philip M. Hofer (Frumph) Comic Easel allows Reflected XSS.This issue affects Comic Easel: from n/a through 1.15.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/comic-easel/wordpress-comic-easel-plugin-1-15-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31097.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31097.json new file mode 100644 index 00000000000..1a701fabcc8 --- /dev/null +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31097.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-31097", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-31T20:15:13.463", + "lastModified": "2024-03-31T20:15:13.463", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Stephan Spencer SEO Title Tag allows Reflected XSS.This issue affects SEO Title Tag: from n/a through 3.5.9.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/seo-title-tag/wordpress-seo-title-tag-plugin-3-5-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-311xx/CVE-2024-31101.json b/CVE-2024/CVE-2024-311xx/CVE-2024-31101.json new file mode 100644 index 00000000000..64f9d1cae1e --- /dev/null +++ b/CVE-2024/CVE-2024-311xx/CVE-2024-31101.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-31101", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-31T20:15:13.733", + "lastModified": "2024-03-31T20:15:13.733", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in August Infotech AI Twitter Feeds (Twitter widget & shortcode) allows Stored XSS.This issue affects AI Twitter Feeds (Twitter widget & shortcode): from n/a through 2.4.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/ai-twitter-feeds/wordpress-ai-twitter-feeds-twitter-widget-shortcode-plugin-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-311xx/CVE-2024-31102.json b/CVE-2024/CVE-2024-311xx/CVE-2024-31102.json new file mode 100644 index 00000000000..b4f78f05527 --- /dev/null +++ b/CVE-2024/CVE-2024-311xx/CVE-2024-31102.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-31102", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-31T20:15:13.963", + "lastModified": "2024-03-31T20:15:13.963", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Scimone Ignazio Prenotazioni allows Stored XSS.This issue affects Prenotazioni: from n/a through 1.7.4.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/prenotazioni/wordpress-prenotazioni-plugin-1-7-4-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-311xx/CVE-2024-31103.json b/CVE-2024/CVE-2024-311xx/CVE-2024-31103.json new file mode 100644 index 00000000000..d98c5f677dd --- /dev/null +++ b/CVE-2024/CVE-2024-311xx/CVE-2024-31103.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-31103", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-31T20:15:14.200", + "lastModified": "2024-03-31T20:15:14.200", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kanban for WordPress Kanban Boards for WordPress allows Reflected XSS.This issue affects Kanban Boards for WordPress: from n/a through 2.5.21.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/kanban/wordpress-kanban-boards-for-wordpress-plugin-2-5-21-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-311xx/CVE-2024-31104.json b/CVE-2024/CVE-2024-311xx/CVE-2024-31104.json new file mode 100644 index 00000000000..6a1096d9ba5 --- /dev/null +++ b/CVE-2024/CVE-2024-311xx/CVE-2024-31104.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-31104", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-03-31T20:15:14.417", + "lastModified": "2024-03-31T20:15:14.417", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in GetResponse GetResponse for WordPress allows Stored XSS.This issue affects GetResponse for WordPress: from n/a through 5.5.33.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/getresponse-integration/wordpress-getresponse-for-wordpress-plugin-5-5-33-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index a182e1a017b..b8c42f96ea0 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-03-31T20:00:38.381515+00:00 +2024-03-31T22:00:38.484396+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-03-31T19:15:50.163000+00:00 +2024-03-31T20:15:14.417000+00:00 ``` ### Last Data Feed Release @@ -33,38 +33,38 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -243479 +243506 ``` ### CVEs added in the last Commit -Recently added CVEs: `25` +Recently added CVEs: `27` -- [CVE-2024-30489](CVE-2024/CVE-2024-304xx/CVE-2024-30489.json) (`2024-03-31T19:15:46.030`) -- [CVE-2024-30523](CVE-2024/CVE-2024-305xx/CVE-2024-30523.json) (`2024-03-31T19:15:46.277`) -- [CVE-2024-30526](CVE-2024/CVE-2024-305xx/CVE-2024-30526.json) (`2024-03-31T19:15:46.497`) -- [CVE-2024-30533](CVE-2024/CVE-2024-305xx/CVE-2024-30533.json) (`2024-03-31T19:15:46.707`) -- [CVE-2024-30535](CVE-2024/CVE-2024-305xx/CVE-2024-30535.json) (`2024-03-31T19:15:46.907`) -- [CVE-2024-30536](CVE-2024/CVE-2024-305xx/CVE-2024-30536.json) (`2024-03-31T19:15:47.113`) -- [CVE-2024-30541](CVE-2024/CVE-2024-305xx/CVE-2024-30541.json) (`2024-03-31T19:15:47.310`) -- [CVE-2024-30543](CVE-2024/CVE-2024-305xx/CVE-2024-30543.json) (`2024-03-31T19:15:47.510`) -- [CVE-2024-31094](CVE-2024/CVE-2024-310xx/CVE-2024-31094.json) (`2024-03-31T18:15:47.697`) -- [CVE-2024-31095](CVE-2024/CVE-2024-310xx/CVE-2024-31095.json) (`2024-03-31T19:15:47.717`) -- [CVE-2024-31096](CVE-2024/CVE-2024-310xx/CVE-2024-31096.json) (`2024-03-31T19:15:47.800`) -- [CVE-2024-31100](CVE-2024/CVE-2024-311xx/CVE-2024-31100.json) (`2024-03-31T19:15:47.997`) -- [CVE-2024-31106](CVE-2024/CVE-2024-311xx/CVE-2024-31106.json) (`2024-03-31T19:15:48.197`) -- [CVE-2024-31107](CVE-2024/CVE-2024-311xx/CVE-2024-31107.json) (`2024-03-31T19:15:48.390`) -- [CVE-2024-31108](CVE-2024/CVE-2024-311xx/CVE-2024-31108.json) (`2024-03-31T19:15:48.603`) -- [CVE-2024-31110](CVE-2024/CVE-2024-311xx/CVE-2024-31110.json) (`2024-03-31T19:15:48.793`) -- [CVE-2024-31112](CVE-2024/CVE-2024-311xx/CVE-2024-31112.json) (`2024-03-31T19:15:48.987`) -- [CVE-2024-31114](CVE-2024/CVE-2024-311xx/CVE-2024-31114.json) (`2024-03-31T18:15:47.810`) -- [CVE-2024-31115](CVE-2024/CVE-2024-311xx/CVE-2024-31115.json) (`2024-03-31T18:15:48.013`) -- [CVE-2024-31116](CVE-2024/CVE-2024-311xx/CVE-2024-31116.json) (`2024-03-31T19:15:49.180`) -- [CVE-2024-31117](CVE-2024/CVE-2024-311xx/CVE-2024-31117.json) (`2024-03-31T19:15:49.377`) -- [CVE-2024-31120](CVE-2024/CVE-2024-311xx/CVE-2024-31120.json) (`2024-03-31T19:15:49.573`) -- [CVE-2024-31121](CVE-2024/CVE-2024-311xx/CVE-2024-31121.json) (`2024-03-31T19:15:49.777`) -- [CVE-2024-31122](CVE-2024/CVE-2024-311xx/CVE-2024-31122.json) (`2024-03-31T19:15:49.967`) -- [CVE-2024-31123](CVE-2024/CVE-2024-311xx/CVE-2024-31123.json) (`2024-03-31T19:15:50.163`) +- [CVE-2024-30548](CVE-2024/CVE-2024-305xx/CVE-2024-30548.json) (`2024-03-31T20:15:08.730`) +- [CVE-2024-30549](CVE-2024/CVE-2024-305xx/CVE-2024-30549.json) (`2024-03-31T20:15:08.977`) +- [CVE-2024-30550](CVE-2024/CVE-2024-305xx/CVE-2024-30550.json) (`2024-03-31T20:15:09.193`) +- [CVE-2024-30551](CVE-2024/CVE-2024-305xx/CVE-2024-30551.json) (`2024-03-31T20:15:09.450`) +- [CVE-2024-30552](CVE-2024/CVE-2024-305xx/CVE-2024-30552.json) (`2024-03-31T20:15:09.680`) +- [CVE-2024-30553](CVE-2024/CVE-2024-305xx/CVE-2024-30553.json) (`2024-03-31T20:15:09.927`) +- [CVE-2024-30554](CVE-2024/CVE-2024-305xx/CVE-2024-30554.json) (`2024-03-31T20:15:10.153`) +- [CVE-2024-30555](CVE-2024/CVE-2024-305xx/CVE-2024-30555.json) (`2024-03-31T20:15:10.417`) +- [CVE-2024-30556](CVE-2024/CVE-2024-305xx/CVE-2024-30556.json) (`2024-03-31T20:15:10.650`) +- [CVE-2024-30557](CVE-2024/CVE-2024-305xx/CVE-2024-30557.json) (`2024-03-31T20:15:10.853`) +- [CVE-2024-30558](CVE-2024/CVE-2024-305xx/CVE-2024-30558.json) (`2024-03-31T20:15:11.090`) +- [CVE-2024-30559](CVE-2024/CVE-2024-305xx/CVE-2024-30559.json) (`2024-03-31T20:15:11.350`) +- [CVE-2024-30561](CVE-2024/CVE-2024-305xx/CVE-2024-30561.json) (`2024-03-31T20:15:11.560`) +- [CVE-2024-31084](CVE-2024/CVE-2024-310xx/CVE-2024-31084.json) (`2024-03-31T20:15:11.807`) +- [CVE-2024-31085](CVE-2024/CVE-2024-310xx/CVE-2024-31085.json) (`2024-03-31T20:15:12.070`) +- [CVE-2024-31087](CVE-2024/CVE-2024-310xx/CVE-2024-31087.json) (`2024-03-31T20:15:12.327`) +- [CVE-2024-31089](CVE-2024/CVE-2024-310xx/CVE-2024-31089.json) (`2024-03-31T20:15:12.553`) +- [CVE-2024-31090](CVE-2024/CVE-2024-310xx/CVE-2024-31090.json) (`2024-03-31T20:15:12.797`) +- [CVE-2024-31091](CVE-2024/CVE-2024-310xx/CVE-2024-31091.json) (`2024-03-31T20:15:13.013`) +- [CVE-2024-31092](CVE-2024/CVE-2024-310xx/CVE-2024-31092.json) (`2024-03-31T20:15:13.240`) +- [CVE-2024-31097](CVE-2024/CVE-2024-310xx/CVE-2024-31097.json) (`2024-03-31T20:15:13.463`) +- [CVE-2024-31101](CVE-2024/CVE-2024-311xx/CVE-2024-31101.json) (`2024-03-31T20:15:13.733`) +- [CVE-2024-31102](CVE-2024/CVE-2024-311xx/CVE-2024-31102.json) (`2024-03-31T20:15:13.963`) +- [CVE-2024-31103](CVE-2024/CVE-2024-311xx/CVE-2024-31103.json) (`2024-03-31T20:15:14.200`) +- [CVE-2024-31104](CVE-2024/CVE-2024-311xx/CVE-2024-31104.json) (`2024-03-31T20:15:14.417`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index 1f940c85a29..b12661d180e 100644 --- a/_state.csv +++ b/_state.csv @@ -243353,7 +243353,7 @@ CVE-2024-30483,0,0,b9bae397d346f9d15d8aa455fac8a9a4b71c06ccfbb38644d1b4aae39ab9e CVE-2024-30486,0,0,87c7c0f6eebc8e570654e8e531d3719727026d666dde67361fc4a33bb9496aec,2024-03-29T14:15:10.720000 CVE-2024-30487,0,0,a0b5457489e3c773a06917b07a9bee442e0b0aacaca250499eb026cb0fd1463b,2024-03-29T14:15:10.960000 CVE-2024-30488,0,0,69e7754452e3c1f64e9867e00a31e30e3ca7845150cc1162f7d977a437ae591f,2024-03-29T14:15:11.247000 -CVE-2024-30489,1,1,d44957e53ab4af54b5e619604704f8ab4d2ee328f1f621a181ee3365da7e3fa7,2024-03-31T19:15:46.030000 +CVE-2024-30489,0,0,d44957e53ab4af54b5e619604704f8ab4d2ee328f1f621a181ee3365da7e3fa7,2024-03-31T19:15:46.030000 CVE-2024-30490,0,0,2d962a323d97777863513fe426a95c53e5ebfffade57d8f8a57263db39bfa9c5,2024-03-29T14:15:11.500000 CVE-2024-30491,0,0,2adc738edadf33742d8b922d2c16b52eb93409925aaa91d5ed2f8952e97b2956,2024-03-29T14:15:11.777000 CVE-2024-30492,0,0,d1cdfe17d536c31be8c5441b0019c6c7a13bcfe6fc5f2cd44256271d81839b8b,2024-03-29T16:15:10.197000 @@ -243381,13 +243381,28 @@ CVE-2024-30518,0,0,041e0c521f72fc9bfd62696fcd7b822b4b1d88708592fbed4617cdd4adaae CVE-2024-30519,0,0,2100c7798d2014af5ae23074e044b065689f8c03b6231e2353ed503e4ae33762,2024-03-29T13:28:22.880000 CVE-2024-30520,0,0,194291321ee08f27596f77b46df7ac3ffd4878f9281e691a5c258adea17d20c0,2024-03-29T13:28:22.880000 CVE-2024-30521,0,0,e8d26784614ad395d5a47f0e2ccfbec93867295aa131471a914ea1e9181f2fff,2024-03-29T16:15:11.420000 -CVE-2024-30523,1,1,46865e10cc4a7187f2f238025cd3f6c181201f8d515d64498d6413005423007b,2024-03-31T19:15:46.277000 -CVE-2024-30526,1,1,1bf518b37fb3254d6aaae40f5ae1475c23e52e92b1b549252e7fb862cd40b6a7,2024-03-31T19:15:46.497000 -CVE-2024-30533,1,1,f568215859200370804cf243976322cd4fac8e240cb8879812f3ba719aaecca8,2024-03-31T19:15:46.707000 -CVE-2024-30535,1,1,591618b4bb0253347d421530b8166b3021d470ef638c757eb65cf243b27bbcd2,2024-03-31T19:15:46.907000 -CVE-2024-30536,1,1,206753a1027eebd12457ac7aa0b73b5ade021fe85cde5439650ee42cfcfafe8a,2024-03-31T19:15:47.113000 -CVE-2024-30541,1,1,c26c9c14ec957c18b04b65cf5b3ad544125ce2749edb7d7cd4589b22b70824d2,2024-03-31T19:15:47.310000 -CVE-2024-30543,1,1,14f4b6434f9e75ee5b30f8fb234ee863068cac757b7a39abe165ca1cd91ecf1a,2024-03-31T19:15:47.510000 +CVE-2024-30523,0,0,46865e10cc4a7187f2f238025cd3f6c181201f8d515d64498d6413005423007b,2024-03-31T19:15:46.277000 +CVE-2024-30524,1,1,2c28c4f70ff8115639c2677839d4ab865e2355433a2eba85d89e97d76101643e,2024-03-31T20:15:08.223000 +CVE-2024-30526,0,0,1bf518b37fb3254d6aaae40f5ae1475c23e52e92b1b549252e7fb862cd40b6a7,2024-03-31T19:15:46.497000 +CVE-2024-30530,1,1,6a29b64a59c440aa4db4b791fa259d3a4817edc463e87a701e2a65d21e268da6,2024-03-31T20:15:08.490000 +CVE-2024-30533,0,0,f568215859200370804cf243976322cd4fac8e240cb8879812f3ba719aaecca8,2024-03-31T19:15:46.707000 +CVE-2024-30535,0,0,591618b4bb0253347d421530b8166b3021d470ef638c757eb65cf243b27bbcd2,2024-03-31T19:15:46.907000 +CVE-2024-30536,0,0,206753a1027eebd12457ac7aa0b73b5ade021fe85cde5439650ee42cfcfafe8a,2024-03-31T19:15:47.113000 +CVE-2024-30541,0,0,c26c9c14ec957c18b04b65cf5b3ad544125ce2749edb7d7cd4589b22b70824d2,2024-03-31T19:15:47.310000 +CVE-2024-30543,0,0,14f4b6434f9e75ee5b30f8fb234ee863068cac757b7a39abe165ca1cd91ecf1a,2024-03-31T19:15:47.510000 +CVE-2024-30548,1,1,f74ee971e3d856c262bd7f5fdc748de3e3da859de691dd5b637a321383a9418a,2024-03-31T20:15:08.730000 +CVE-2024-30549,1,1,79c899dc9967b069dcb43993fa27f7b05dee45997101c3eef4c771fbf26a9567,2024-03-31T20:15:08.977000 +CVE-2024-30550,1,1,32e22e93b00723be58570b9d1142fde4000cc10cec96dbc106c59ed0dbb79051,2024-03-31T20:15:09.193000 +CVE-2024-30551,1,1,22cdd3e468d29258fb64f98c1070cebfc7d1197dcc0f831be43ceb8364871bbd,2024-03-31T20:15:09.450000 +CVE-2024-30552,1,1,b1d36f4a04bbb6cbdfc83396611737c522a4f815a1ba10bbf6e28171f6675890,2024-03-31T20:15:09.680000 +CVE-2024-30553,1,1,ab8db79c9f5333e7b9409792dc44d6880cfb1cecdc539fa1550c36d5fed55147,2024-03-31T20:15:09.927000 +CVE-2024-30554,1,1,eac80af46b94dccd5ef0dccb46c6f51c1172b48513b98a4ff0d1062325424e0f,2024-03-31T20:15:10.153000 +CVE-2024-30555,1,1,78926b0317724e0b31347f7c11fcf6fa9ad1ab5fade4b805b99524808d1f60a2,2024-03-31T20:15:10.417000 +CVE-2024-30556,1,1,ed6d2eb6fb5d11895614307b39075e7f00067ba9d09aa2c344bf8b65a569ef0a,2024-03-31T20:15:10.650000 +CVE-2024-30557,1,1,7f4c43bb54ba11d87c4ed126fcf86ba0258a6ad99fdd321ab563f1df9e1eb298,2024-03-31T20:15:10.853000 +CVE-2024-30558,1,1,e883f56f3462bf2d4518b145b354d6c5cb2a252d851d001f2d36babe56dfc2a9,2024-03-31T20:15:11.090000 +CVE-2024-30559,1,1,49d54ab943f26a9a63d77d60693ef041da8018118e7b5787a8305c480e987832,2024-03-31T20:15:11.350000 +CVE-2024-30561,1,1,d4c9c6233918b5ad393efd73fb240bf0957d3752ca7c040b7754b63465fffd89,2024-03-31T20:15:11.560000 CVE-2024-30583,0,0,90e06b2d765278ac0f3bc4028344fdf483d30ea530d1cc273b94886fa84d52bd,2024-03-28T16:07:30.893000 CVE-2024-30584,0,0,35ddda2305ed50d97f06df7df7b733486405aa80385b935162c6180d1fe62320,2024-03-28T16:07:30.893000 CVE-2024-30585,0,0,7e78a86bcf687f746816842e948af254246fdc173fd94674915f1ec2e6a3c749,2024-03-28T16:07:30.893000 @@ -243452,23 +243467,35 @@ CVE-2024-31062,0,0,952fafab14c88ef7f6d1b1ec6a2fcadf9629e538f73b776826c7478ea44a0 CVE-2024-31063,0,0,9b72fd99a3101526692574476be1476465954178b1aef1969020564a9dc62025,2024-03-28T20:53:20.813000 CVE-2024-31064,0,0,fab0c130af02ab0ee8ef728c8a3a74b625a68f67b1d9e16e96dee36bc79c0e55,2024-03-28T20:53:20.813000 CVE-2024-31065,0,0,255e255b9c92081fe223d505f2b49fcf2e2689e950cf84a4256404373a46d62b,2024-03-28T20:53:20.813000 -CVE-2024-31094,1,1,ab3ebdced90c7017d12305fa8fc90025d0e3c66ec45d1c5d99d9090e025f920a,2024-03-31T18:15:47.697000 -CVE-2024-31095,1,1,6ba5a8aff91ff15528ac0e8e16e22fa05739fff976914f77ece554cada426217,2024-03-31T19:15:47.717000 -CVE-2024-31096,1,1,a89b30f3063d1cc370448a34bf5687321d993096ac22151d3c78fc72692ecb3d,2024-03-31T19:15:47.800000 -CVE-2024-31100,1,1,8d10fd659ab9ac31330b38c3a1439c29efe71164326dd6853771c85bacc420de,2024-03-31T19:15:47.997000 -CVE-2024-31106,1,1,842d65e3f7f8df65276fe965841d7276df3cfafa247cdd4b7be3acbab94f0d27,2024-03-31T19:15:48.197000 -CVE-2024-31107,1,1,783c6ab6dc9082ef6e5ac5650500b818788d3063997eb59639f0e325e11bbc5f,2024-03-31T19:15:48.390000 -CVE-2024-31108,1,1,1b3828c9c778dc25596046ba95b3c3ada7361c4a50783708b80fd803de94ca49,2024-03-31T19:15:48.603000 -CVE-2024-31110,1,1,cb9424d5d2d80377d05849c8beb3d6dbded6fc7d024930f4920123d4470171ad,2024-03-31T19:15:48.793000 -CVE-2024-31112,1,1,ce50fc40ade16ea1404e4268de022dd2e6aa91dd99551bf5e47934c3c3b072e1,2024-03-31T19:15:48.987000 -CVE-2024-31114,1,1,06a3646510967a9fb95869380d7b685da01cbfe839055bc3b25ee925e3972030,2024-03-31T18:15:47.810000 -CVE-2024-31115,1,1,2cf0158dcc840c91ee5e9a27c850873fda56b28216b6b61dc2552110033d9228,2024-03-31T18:15:48.013000 -CVE-2024-31116,1,1,68bd6efadd9260f1cfe39383f978aa20c66216bde4883a451905f7dd7ae416de,2024-03-31T19:15:49.180000 -CVE-2024-31117,1,1,4837561ed65ba59f7c26d76e793c4b3d49d2b7f68a91603575741a90375101d9,2024-03-31T19:15:49.377000 -CVE-2024-31120,1,1,aac94c17146ae6347e51cf5c4b7e1991cbf66fe25d9ba57ddc47a7e8543fcde4,2024-03-31T19:15:49.573000 -CVE-2024-31121,1,1,0c81bee58ea9fd86ad6e5149c670d64c79a9d431a0221b85f9e7cce6c9fcff07,2024-03-31T19:15:49.777000 -CVE-2024-31122,1,1,58d1f4ef9f076b429310b1a13520694cfc34cbc6b302a687d216c4a60d17c1a8,2024-03-31T19:15:49.967000 -CVE-2024-31123,1,1,d148040cac32b832e3f0049c190f546c264f1e961b311b92446b9d7f5291c5cc,2024-03-31T19:15:50.163000 +CVE-2024-31084,1,1,6f5a8687657f909d53bf7a58df37dbcf07badd37a75c440aa8745c66ea8f9c30,2024-03-31T20:15:11.807000 +CVE-2024-31085,1,1,5e35343ff911288be69b20d68077790cf47f530c63f556ddae88857f40edbabe,2024-03-31T20:15:12.070000 +CVE-2024-31087,1,1,a3034eb53f991b2d5cb44bdc73e06603c11c8bfedc5a3cc93d4ec41d02824cdf,2024-03-31T20:15:12.327000 +CVE-2024-31089,1,1,02e20a8e6d491bae6564420299330154777fcdc2f7273a2f7678b9015faedbc0,2024-03-31T20:15:12.553000 +CVE-2024-31090,1,1,5baca600f8ba6bf466ddbd77d6f93efb40da0d5bec5b7e91498b84b5ca361a3a,2024-03-31T20:15:12.797000 +CVE-2024-31091,1,1,711a4e1c79816f489d8c74501fb750a7bc59cf904efd048f91fd81a06ac1ac3a,2024-03-31T20:15:13.013000 +CVE-2024-31092,1,1,8df7a2110de6e22446217f5ddae3d74d731cf769c99fe9a03762e5d6902631c8,2024-03-31T20:15:13.240000 +CVE-2024-31094,0,0,ab3ebdced90c7017d12305fa8fc90025d0e3c66ec45d1c5d99d9090e025f920a,2024-03-31T18:15:47.697000 +CVE-2024-31095,0,0,6ba5a8aff91ff15528ac0e8e16e22fa05739fff976914f77ece554cada426217,2024-03-31T19:15:47.717000 +CVE-2024-31096,0,0,a89b30f3063d1cc370448a34bf5687321d993096ac22151d3c78fc72692ecb3d,2024-03-31T19:15:47.800000 +CVE-2024-31097,1,1,f4f12da79d635dec8049c58b8737aecd6211e4fc28e37f361ef788a089b9ba85,2024-03-31T20:15:13.463000 +CVE-2024-31100,0,0,8d10fd659ab9ac31330b38c3a1439c29efe71164326dd6853771c85bacc420de,2024-03-31T19:15:47.997000 +CVE-2024-31101,1,1,5295a502a5976acc73a22a8cde3b32366cc05bd20fba72ecdf526a1c55effbb5,2024-03-31T20:15:13.733000 +CVE-2024-31102,1,1,54e60cfe16d3075cb114e6ec728d6757c566964253acf2dc10af3f9ec6a81d62,2024-03-31T20:15:13.963000 +CVE-2024-31103,1,1,ed3d6fc395b10a4550784efbebd47f5e02bcfebbb7f7f57d0f07da76079140bc,2024-03-31T20:15:14.200000 +CVE-2024-31104,1,1,9980154b9818a3e57cadbe61e97af26eb94866a0620fb3ffa450e0104ad5b52d,2024-03-31T20:15:14.417000 +CVE-2024-31106,0,0,842d65e3f7f8df65276fe965841d7276df3cfafa247cdd4b7be3acbab94f0d27,2024-03-31T19:15:48.197000 +CVE-2024-31107,0,0,783c6ab6dc9082ef6e5ac5650500b818788d3063997eb59639f0e325e11bbc5f,2024-03-31T19:15:48.390000 +CVE-2024-31108,0,0,1b3828c9c778dc25596046ba95b3c3ada7361c4a50783708b80fd803de94ca49,2024-03-31T19:15:48.603000 +CVE-2024-31110,0,0,cb9424d5d2d80377d05849c8beb3d6dbded6fc7d024930f4920123d4470171ad,2024-03-31T19:15:48.793000 +CVE-2024-31112,0,0,ce50fc40ade16ea1404e4268de022dd2e6aa91dd99551bf5e47934c3c3b072e1,2024-03-31T19:15:48.987000 +CVE-2024-31114,0,0,06a3646510967a9fb95869380d7b685da01cbfe839055bc3b25ee925e3972030,2024-03-31T18:15:47.810000 +CVE-2024-31115,0,0,2cf0158dcc840c91ee5e9a27c850873fda56b28216b6b61dc2552110033d9228,2024-03-31T18:15:48.013000 +CVE-2024-31116,0,0,68bd6efadd9260f1cfe39383f978aa20c66216bde4883a451905f7dd7ae416de,2024-03-31T19:15:49.180000 +CVE-2024-31117,0,0,4837561ed65ba59f7c26d76e793c4b3d49d2b7f68a91603575741a90375101d9,2024-03-31T19:15:49.377000 +CVE-2024-31120,0,0,aac94c17146ae6347e51cf5c4b7e1991cbf66fe25d9ba57ddc47a7e8543fcde4,2024-03-31T19:15:49.573000 +CVE-2024-31121,0,0,0c81bee58ea9fd86ad6e5149c670d64c79a9d431a0221b85f9e7cce6c9fcff07,2024-03-31T19:15:49.777000 +CVE-2024-31122,0,0,58d1f4ef9f076b429310b1a13520694cfc34cbc6b302a687d216c4a60d17c1a8,2024-03-31T19:15:49.967000 +CVE-2024-31123,0,0,d148040cac32b832e3f0049c190f546c264f1e961b311b92446b9d7f5291c5cc,2024-03-31T19:15:50.163000 CVE-2024-31134,0,0,f3dcd63eca4514e6339c3ec7aeb83c2b308295cdf8ae154e5d9cd1a9c2c8a369,2024-03-28T16:07:30.893000 CVE-2024-31135,0,0,479d4c1f65df6314842af6b85097457f245568f09c6620b6a18268f61c31c90a,2024-03-28T16:07:30.893000 CVE-2024-31136,0,0,59d127dfb07acd2c4587c1beda8f1deaf424906c9b7034466a77403adfd40752,2024-03-28T16:07:30.893000