From 504bf0271dd5817cd23e9b634c0b48d4c1511682 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 18 Aug 2024 23:58:18 +0000 Subject: [PATCH] Auto-Update: 2024-08-18T23:55:21.436543+00:00 --- CVE-2021/CVE-2021-368xx/CVE-2021-36821.json | 4 +- CVE-2024/CVE-2024-356xx/CVE-2024-35686.json | 60 +++++++++ CVE-2024/CVE-2024-431xx/CVE-2024-43145.json | 56 ++++++++ CVE-2024/CVE-2024-432xx/CVE-2024-43207.json | 56 ++++++++ CVE-2024/CVE-2024-432xx/CVE-2024-43239.json | 56 ++++++++ CVE-2024/CVE-2024-432xx/CVE-2024-43241.json | 56 ++++++++ CVE-2024/CVE-2024-432xx/CVE-2024-43244.json | 56 ++++++++ CVE-2024/CVE-2024-432xx/CVE-2024-43246.json | 56 ++++++++ CVE-2024/CVE-2024-432xx/CVE-2024-43262.json | 56 ++++++++ CVE-2024/CVE-2024-432xx/CVE-2024-43263.json | 56 ++++++++ CVE-2024/CVE-2024-432xx/CVE-2024-43266.json | 56 ++++++++ CVE-2024/CVE-2024-432xx/CVE-2024-43267.json | 56 ++++++++ CVE-2024/CVE-2024-432xx/CVE-2024-43278.json | 56 ++++++++ CVE-2024/CVE-2024-432xx/CVE-2024-43279.json | 56 ++++++++ CVE-2024/CVE-2024-432xx/CVE-2024-43282.json | 56 ++++++++ CVE-2024/CVE-2024-432xx/CVE-2024-43284.json | 56 ++++++++ CVE-2024/CVE-2024-432xx/CVE-2024-43286.json | 56 ++++++++ CVE-2024/CVE-2024-432xx/CVE-2024-43288.json | 56 ++++++++ CVE-2024/CVE-2024-432xx/CVE-2024-43291.json | 56 ++++++++ CVE-2024/CVE-2024-432xx/CVE-2024-43292.json | 56 ++++++++ CVE-2024/CVE-2024-432xx/CVE-2024-43294.json | 56 ++++++++ CVE-2024/CVE-2024-433xx/CVE-2024-43315.json | 56 ++++++++ CVE-2024/CVE-2024-433xx/CVE-2024-43322.json | 56 ++++++++ CVE-2024/CVE-2024-433xx/CVE-2024-43350.json | 56 ++++++++ CVE-2024/CVE-2024-79xx/CVE-2024-7912.json | 137 ++++++++++++++++++++ CVE-2024/CVE-2024-79xx/CVE-2024-7913.json | 137 ++++++++++++++++++++ CVE-2024/CVE-2024-79xx/CVE-2024-7914.json | 137 ++++++++++++++++++++ CVE-2024/CVE-2024-79xx/CVE-2024-7916.json | 133 +++++++++++++++++++ CVE-2024/CVE-2024-79xx/CVE-2024-7917.json | 137 ++++++++++++++++++++ README.md | 39 ++++-- _state.csv | 36 ++++- 31 files changed, 2038 insertions(+), 14 deletions(-) create mode 100644 CVE-2024/CVE-2024-356xx/CVE-2024-35686.json create mode 100644 CVE-2024/CVE-2024-431xx/CVE-2024-43145.json create mode 100644 CVE-2024/CVE-2024-432xx/CVE-2024-43207.json create mode 100644 CVE-2024/CVE-2024-432xx/CVE-2024-43239.json create mode 100644 CVE-2024/CVE-2024-432xx/CVE-2024-43241.json create mode 100644 CVE-2024/CVE-2024-432xx/CVE-2024-43244.json create mode 100644 CVE-2024/CVE-2024-432xx/CVE-2024-43246.json create mode 100644 CVE-2024/CVE-2024-432xx/CVE-2024-43262.json create mode 100644 CVE-2024/CVE-2024-432xx/CVE-2024-43263.json create mode 100644 CVE-2024/CVE-2024-432xx/CVE-2024-43266.json create mode 100644 CVE-2024/CVE-2024-432xx/CVE-2024-43267.json create mode 100644 CVE-2024/CVE-2024-432xx/CVE-2024-43278.json create mode 100644 CVE-2024/CVE-2024-432xx/CVE-2024-43279.json create mode 100644 CVE-2024/CVE-2024-432xx/CVE-2024-43282.json create mode 100644 CVE-2024/CVE-2024-432xx/CVE-2024-43284.json create mode 100644 CVE-2024/CVE-2024-432xx/CVE-2024-43286.json create mode 100644 CVE-2024/CVE-2024-432xx/CVE-2024-43288.json create mode 100644 CVE-2024/CVE-2024-432xx/CVE-2024-43291.json create mode 100644 CVE-2024/CVE-2024-432xx/CVE-2024-43292.json create mode 100644 CVE-2024/CVE-2024-432xx/CVE-2024-43294.json create mode 100644 CVE-2024/CVE-2024-433xx/CVE-2024-43315.json create mode 100644 CVE-2024/CVE-2024-433xx/CVE-2024-43322.json create mode 100644 CVE-2024/CVE-2024-433xx/CVE-2024-43350.json create mode 100644 CVE-2024/CVE-2024-79xx/CVE-2024-7912.json create mode 100644 CVE-2024/CVE-2024-79xx/CVE-2024-7913.json create mode 100644 CVE-2024/CVE-2024-79xx/CVE-2024-7914.json create mode 100644 CVE-2024/CVE-2024-79xx/CVE-2024-7916.json create mode 100644 CVE-2024/CVE-2024-79xx/CVE-2024-7917.json diff --git a/CVE-2021/CVE-2021-368xx/CVE-2021-36821.json b/CVE-2021/CVE-2021-368xx/CVE-2021-36821.json index ee18dd75bd3..2fb63cb867d 100644 --- a/CVE-2021/CVE-2021-368xx/CVE-2021-36821.json +++ b/CVE-2021/CVE-2021-368xx/CVE-2021-36821.json @@ -2,13 +2,13 @@ "id": "CVE-2021-36821", "sourceIdentifier": "audit@patchstack.com", "published": "2023-03-16T15:15:10.113", - "lastModified": "2024-04-29T09:15:06.850", + "lastModified": "2024-08-18T22:15:07.377", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPMU DEV Forminator \u2013 Contact Form, Payment Form & Custom Form Builder allows Stored XSS.This issue affects Forminator \u2013 Contact Form, Payment Form & Custom Form Builder: from n/a through 1.14.11.\n\n" + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPMU DEV Forminator allows Stored XSS.This issue affects Forminator: from n/a through 1.14.11." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35686.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35686.json new file mode 100644 index 00000000000..f4edc696c10 --- /dev/null +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35686.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-35686", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-18T22:15:07.647", + "lastModified": "2024-08-18T22:15:07.647", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Automattic Sensei LMS, Automattic Sensei Pro (WC Paid Courses).This issue affects Sensei LMS: from n/a through 4.23.1; Sensei Pro (WC Paid Courses): from n/a through 4.23.1.1.23.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/sensei-lms/wordpress-sensei-lms-plugin-4-23-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + }, + { + "url": "https://patchstack.com/database/vulnerability/woothemes-sensei/wordpress-sensei-pro-wc-paid-courses-plugin-4-23-1-1-23-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43145.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43145.json new file mode 100644 index 00000000000..dacdee50daa --- /dev/null +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43145.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43145", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-18T22:15:07.880", + "lastModified": "2024-08-18T22:15:07.880", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AyeCode Ltd GeoDirectory.This issue affects GeoDirectory: from n/a through 2.3.61." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 8.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/geodirectory/wordpress-geodirectory-plugin-2-3-61-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43207.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43207.json new file mode 100644 index 00000000000..de7e6d8c8eb --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43207.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43207", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-18T22:15:08.090", + "lastModified": "2024-08-18T22:15:08.090", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Valiano Unite Gallery Lite.This issue affects Unite Gallery Lite: from n/a through 1.7.62." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 8.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/unite-gallery-lite/wordpress-unite-gallery-lite-plugin-1-7-62-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43239.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43239.json new file mode 100644 index 00000000000..e1899a6f170 --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43239.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43239", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-18T22:15:08.277", + "lastModified": "2024-08-18T22:15:08.277", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Authorization Bypass Through User-Controlled Key vulnerability in Masteriyo Masteriyo - LMS.This issue affects Masteriyo - LMS: from n/a through 1.11.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/learning-management-system/wordpress-masteriyo-lms-plugin-1-11-4-insecure-direct-object-reference-idor-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43241.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43241.json new file mode 100644 index 00000000000..7ebd2fb6dad --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43241.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43241", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-18T22:15:08.483", + "lastModified": "2024-08-18T22:15:08.483", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in azzaroco Ultimate Membership Pro allows Reflected XSS.This issue affects Ultimate Membership Pro: from n/a through 12.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/indeed-membership-pro/wordpress-indeed-ultimate-membership-pro-plugin-12-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43244.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43244.json new file mode 100644 index 00000000000..53b4eafcdd4 --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43244.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43244", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-18T22:15:08.680", + "lastModified": "2024-08-18T22:15:08.680", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in favethemes Houzez allows Reflected XSS.This issue affects Houzez: from n/a through 3.2.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/houzez/wordpress-houzez-theme-by-favethemes-themeforest-theme-2-8-6-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43246.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43246.json new file mode 100644 index 00000000000..0d16f98bbc2 --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43246.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43246", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-18T22:15:08.877", + "lastModified": "2024-08-18T22:15:08.877", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in creativeon WHMpress allows Reflected XSS.This issue affects WHMpress: from n/a through 6.2-revision-5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/whmpress/wordpress-whmpress-plugin-6-2-revision-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43262.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43262.json new file mode 100644 index 00000000000..8e879be7c58 --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43262.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43262", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-18T22:15:09.070", + "lastModified": "2024-08-18T22:15:09.070", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in webriti Busiprof allows Stored XSS.This issue affects Busiprof: from n/a through 2.4.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/busiprof/wordpress-busiprof-theme-2-4-8-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43263.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43263.json new file mode 100644 index 00000000000..ea358bc9638 --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43263.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43263", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-18T22:15:09.270", + "lastModified": "2024-08-18T22:15:09.270", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Visual Composer Visual Composer Starter allows Stored XSS.This issue affects Visual Composer Starter: from n/a through 3.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/visual-composer-starter/wordpress-visual-composer-starter-theme-3-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43266.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43266.json new file mode 100644 index 00000000000..f43f339241a --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43266.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43266", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-18T22:15:09.463", + "lastModified": "2024-08-18T22:15:09.463", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Authorization Bypass Through User-Controlled Key vulnerability in WP Job Portal.This issue affects WP Job Portal: from n/a through 2.1.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-job-portal/wordpress-wp-job-portal-a-complete-job-board-plugin-2-1-6-insecure-direct-object-references-idor-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43267.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43267.json new file mode 100644 index 00000000000..77b996d0b67 --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43267.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43267", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-18T22:15:09.663", + "lastModified": "2024-08-18T22:15:09.663", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Qamar Sheeraz, Nasir Ahmad, GenialSouls Mega Addons For Elementor allows Stored XSS.This issue affects Mega Addons For Elementor: from n/a through 1.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/ultimate-addons-for-elementor/wordpress-mega-addons-for-elementor-plugin-1-9-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43278.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43278.json new file mode 100644 index 00000000000..b3af497e87e --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43278.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43278", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-18T22:15:09.860", + "lastModified": "2024-08-18T22:15:09.860", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Phi Phan Meta Field Block allows Stored XSS.This issue affects Meta Field Block: from n/a through 1.2.13." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/display-a-meta-field-as-block/wordpress-meta-field-block-plugin-1-2-13-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43279.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43279.json new file mode 100644 index 00000000000..cb058b23578 --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43279.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43279", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-18T22:15:10.060", + "lastModified": "2024-08-18T22:15:10.060", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Tribulant Newsletters allows Reflected XSS.This issue affects Newsletters: from n/a through 4.9.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/newsletters-lite/wordpress-newsletters-plugin-4-9-8-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43282.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43282.json new file mode 100644 index 00000000000..22651f91603 --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43282.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43282", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-18T22:15:10.250", + "lastModified": "2024-08-18T22:15:10.250", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Themeum Tutor LMS.This issue affects Tutor LMS: from n/a through 2.7.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/tutor/wordpress-tutor-lms-plugin-2-7-2-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43284.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43284.json new file mode 100644 index 00000000000..74e0bbae2e3 --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43284.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43284", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-18T22:15:10.440", + "lastModified": "2024-08-18T22:15:10.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Travel WP Travel Gutenberg Blocks allows Stored XSS.This issue affects WP Travel Gutenberg Blocks: from n/a through 3.5.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-travel-blocks/wordpress-wp-travel-gutenberg-blocks-plugin-3-5-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43286.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43286.json new file mode 100644 index 00000000000..e8c6a769dea --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43286.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43286", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-18T22:15:10.637", + "lastModified": "2024-08-18T22:15:10.637", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Squirrly SEO Plugin by Squirrly SEO.This issue affects SEO Plugin by Squirrly SEO: from n/a through 12.3.19." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 8.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/squirrly-seo/wordpress-squirrly-seo-plugin-12-3-19-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43288.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43288.json new file mode 100644 index 00000000000..330859df0d7 --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43288.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43288", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-18T22:15:10.833", + "lastModified": "2024-08-18T22:15:10.833", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Authorization Bypass Through User-Controlled Key vulnerability in gVectors Team wpForo Forum.This issue affects wpForo Forum: from n/a through 2.3.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wpforo/wordpress-wpforo-forum-plugin-2-3-4-insecure-direct-object-references-idor-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43291.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43291.json new file mode 100644 index 00000000000..345fecd2652 --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43291.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43291", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-18T22:15:11.023", + "lastModified": "2024-08-18T22:15:11.023", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in voidCoders Void Contact Form 7 Widget For Elementor Page Builder allows Stored XSS.This issue affects Void Contact Form 7 Widget For Elementor Page Builder: from n/a through 2.4.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/cf7-widget-elementor/wordpress-void-contact-form-7-widget-for-elementor-page-builder-plugin-2-4-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43292.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43292.json new file mode 100644 index 00000000000..ea666f302b0 --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43292.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43292", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-18T22:15:11.213", + "lastModified": "2024-08-18T22:15:11.213", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in EnvoThemes Envo's Elementor Templates & Widgets for WooCommerce allows Stored XSS.This issue affects Envo's Elementor Templates & Widgets for WooCommerce: from n/a through 1.4.16." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/envo-elementor-for-woocommerce/wordpress-envo-s-elementor-templates-widgets-for-woocommerce-plugin-1-4-16-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43294.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43294.json new file mode 100644 index 00000000000..80c2a9639f4 --- /dev/null +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43294.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43294", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-18T22:15:11.443", + "lastModified": "2024-08-18T22:15:11.443", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in BoldThemes Bold Timeline Lite allows Stored XSS.This issue affects Bold Timeline Lite: from n/a through 1.2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/bold-timeline-lite/wordpress-bold-timeline-lite-plugin-1-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43315.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43315.json new file mode 100644 index 00000000000..034fb16770a --- /dev/null +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43315.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43315", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-18T22:15:11.650", + "lastModified": "2024-08-18T22:15:11.650", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Authorization Bypass Through User-Controlled Key vulnerability in Checkout Plugins Stripe Payments For WooCommerce by Checkout.This issue affects Stripe Payments For WooCommerce by Checkout: from n/a through 1.9.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/checkout-plugins-stripe-woo/wordpress-stripe-payments-for-woocommerce-plugin-1-9-1-insecure-direct-object-references-idor-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43322.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43322.json new file mode 100644 index 00000000000..7755aa98db3 --- /dev/null +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43322.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43322", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-18T22:15:11.840", + "lastModified": "2024-08-18T22:15:11.840", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Authorization Bypass Through User-Controlled Key vulnerability in Dylan James Zephyr Project Manager.This issue affects Zephyr Project Manager: from n/a through 3.3.100." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/zephyr-project-manager/wordpress-zephyr-project-manager-plugin-3-3-100-insecure-direct-object-references-idor-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43350.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43350.json new file mode 100644 index 00000000000..c777804e2b8 --- /dev/null +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43350.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43350", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-08-18T22:15:12.033", + "lastModified": "2024-08-18T22:15:12.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Authorization Bypass Through User-Controlled Key vulnerability in Propovoice Propovoice CRM.This issue affects Propovoice CRM: from n/a through 1.7.6.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/propovoice/wordpress-propovoice-crm-plugin-1-7-6-4-insecure-direct-object-references-idor-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7912.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7912.json new file mode 100644 index 00000000000..4f8c30002bb --- /dev/null +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7912.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7912", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-18T22:15:12.223", + "lastModified": "2024-08-18T22:15:12.223", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in CodeAstro Online Railway Reservation System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/assets/. The manipulation leads to exposure of information through directory listing. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-548" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/CYB84/CVE_Writeup/blob/main/Online%20Railway%20Reservation%20System/Directory%20Listing.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.275038", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.275038", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.391658", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7913.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7913.json new file mode 100644 index 00000000000..beca70214d5 --- /dev/null +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7913.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7913", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-18T22:15:12.480", + "lastModified": "2024-08-18T22:15:12.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in itsourcecode Billing System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /addclient1.php. The manipulation of the argument lname/fname/mi/address/contact/meterReader leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/ppp-src/a/issues/4", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.275039", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.275039", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.391841", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7914.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7914.json new file mode 100644 index 00000000000..ac305bd726e --- /dev/null +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7914.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7914", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-18T22:15:12.737", + "lastModified": "2024-08-18T22:15:12.737", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic has been found in SourceCodester Yoga Class Registration System 1.0. Affected is an unknown function of the file /php-ycrs/classes/SystemSettings.php. The manipulation of the argument address leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Wsstiger/cve/blob/main/Yoga_xss2.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.275040", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.275040", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.392193", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7916.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7916.json new file mode 100644 index 00000000000..f6d8a06c63d --- /dev/null +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7916.json @@ -0,0 +1,133 @@ +{ + "id": "CVE-2024-7916", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-18T23:15:03.780", + "lastModified": "2024-08-18T23:15:03.780", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in nafisulbari/itsourcecode Insurance Management System 1.0. Affected by this vulnerability is an unknown functionality of the file addNominee.php of the component Add Nominee Page. The manipulation of the argument Nominee-Client ID leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.275041", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.275041", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.388905", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7917.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7917.json new file mode 100644 index 00000000000..3818a1696d4 --- /dev/null +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7917.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7917", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-18T23:15:04.047", + "lastModified": "2024-08-18T23:15:04.047", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in DouPHP 1.7 Release 20220822. Affected by this issue is some unknown functionality of the file /admin/system.php of the component Favicon Handler. The manipulation of the argument site_favicon leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 5.8 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 6.4, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.275042", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.275042", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.389296", + "source": "cna@vuldb.com" + }, + { + "url": "https://wiki.shikangsi.com/post/share/5de742ae-e5e6-48ed-876b-dca7e74813cb", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index e8d05e607be..74866e9544c 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-18T22:00:16.698210+00:00 +2024-08-18T23:55:21.436543+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-18T21:15:03.860000+00:00 +2024-08-18T23:15:04.047000+00:00 ``` ### Last Data Feed Release @@ -33,22 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -260429 +260457 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `28` -- [CVE-2024-43303](CVE-2024/CVE-2024-433xx/CVE-2024-43303.json) (`2024-08-18T21:15:03.647`) -- [CVE-2024-43304](CVE-2024/CVE-2024-433xx/CVE-2024-43304.json) (`2024-08-18T21:15:03.860`) -- [CVE-2024-7911](CVE-2024/CVE-2024-79xx/CVE-2024-7911.json) (`2024-08-18T20:15:04.260`) +- [CVE-2024-43239](CVE-2024/CVE-2024-432xx/CVE-2024-43239.json) (`2024-08-18T22:15:08.277`) +- [CVE-2024-43241](CVE-2024/CVE-2024-432xx/CVE-2024-43241.json) (`2024-08-18T22:15:08.483`) +- [CVE-2024-43244](CVE-2024/CVE-2024-432xx/CVE-2024-43244.json) (`2024-08-18T22:15:08.680`) +- [CVE-2024-43246](CVE-2024/CVE-2024-432xx/CVE-2024-43246.json) (`2024-08-18T22:15:08.877`) +- [CVE-2024-43262](CVE-2024/CVE-2024-432xx/CVE-2024-43262.json) (`2024-08-18T22:15:09.070`) +- [CVE-2024-43263](CVE-2024/CVE-2024-432xx/CVE-2024-43263.json) (`2024-08-18T22:15:09.270`) +- [CVE-2024-43266](CVE-2024/CVE-2024-432xx/CVE-2024-43266.json) (`2024-08-18T22:15:09.463`) +- [CVE-2024-43267](CVE-2024/CVE-2024-432xx/CVE-2024-43267.json) (`2024-08-18T22:15:09.663`) +- [CVE-2024-43278](CVE-2024/CVE-2024-432xx/CVE-2024-43278.json) (`2024-08-18T22:15:09.860`) +- [CVE-2024-43279](CVE-2024/CVE-2024-432xx/CVE-2024-43279.json) (`2024-08-18T22:15:10.060`) +- [CVE-2024-43282](CVE-2024/CVE-2024-432xx/CVE-2024-43282.json) (`2024-08-18T22:15:10.250`) +- [CVE-2024-43284](CVE-2024/CVE-2024-432xx/CVE-2024-43284.json) (`2024-08-18T22:15:10.440`) +- [CVE-2024-43286](CVE-2024/CVE-2024-432xx/CVE-2024-43286.json) (`2024-08-18T22:15:10.637`) +- [CVE-2024-43288](CVE-2024/CVE-2024-432xx/CVE-2024-43288.json) (`2024-08-18T22:15:10.833`) +- [CVE-2024-43291](CVE-2024/CVE-2024-432xx/CVE-2024-43291.json) (`2024-08-18T22:15:11.023`) +- [CVE-2024-43292](CVE-2024/CVE-2024-432xx/CVE-2024-43292.json) (`2024-08-18T22:15:11.213`) +- [CVE-2024-43294](CVE-2024/CVE-2024-432xx/CVE-2024-43294.json) (`2024-08-18T22:15:11.443`) +- [CVE-2024-43315](CVE-2024/CVE-2024-433xx/CVE-2024-43315.json) (`2024-08-18T22:15:11.650`) +- [CVE-2024-43322](CVE-2024/CVE-2024-433xx/CVE-2024-43322.json) (`2024-08-18T22:15:11.840`) +- [CVE-2024-43350](CVE-2024/CVE-2024-433xx/CVE-2024-43350.json) (`2024-08-18T22:15:12.033`) +- [CVE-2024-7912](CVE-2024/CVE-2024-79xx/CVE-2024-7912.json) (`2024-08-18T22:15:12.223`) +- [CVE-2024-7913](CVE-2024/CVE-2024-79xx/CVE-2024-7913.json) (`2024-08-18T22:15:12.480`) +- [CVE-2024-7914](CVE-2024/CVE-2024-79xx/CVE-2024-7914.json) (`2024-08-18T22:15:12.737`) +- [CVE-2024-7916](CVE-2024/CVE-2024-79xx/CVE-2024-7916.json) (`2024-08-18T23:15:03.780`) +- [CVE-2024-7917](CVE-2024/CVE-2024-79xx/CVE-2024-7917.json) (`2024-08-18T23:15:04.047`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `1` +- [CVE-2021-36821](CVE-2021/CVE-2021-368xx/CVE-2021-36821.json) (`2024-08-18T22:15:07.377`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 858457bbe7e..bdcde8cda73 100644 --- a/_state.csv +++ b/_state.csv @@ -179312,7 +179312,7 @@ CVE-2021-36818,0,0,6db6ae91199e14f9b8205e5e134c0cbde666a0c738afce112a8ba832916a5 CVE-2021-36819,0,0,127cb3d5dc9f8c3a0a270f14e20a2ff045f2f7c07c362ae48b5442b315d07104,2023-11-07T03:36:50.893000 CVE-2021-3682,0,0,5c2b74aa6652387933a7c180c196b5601b00c6756a1ce1ca1bcfcf2be2ff7166,2023-03-31T18:26:51.630000 CVE-2021-36820,0,0,a2f9c68e0751fda0bdf92ffc70740bf0a8f330e04bc9f66d3c977565604e440f,2023-11-07T03:36:51.130000 -CVE-2021-36821,0,0,309c365990ed12290d83380b55bb0c14de7d63abda390b22e225f69a9c0b6d8d,2024-04-29T09:15:06.850000 +CVE-2021-36821,0,1,890ee664a474f880d3478d1212c96196e7cef68d73350e0ac0e16f1ca8d08d77,2024-08-18T22:15:07.377000 CVE-2021-36823,0,0,6ec5c9d45427e20280294d2a864e16632d7332516c07db56ecb9ff192f20cd12,2024-04-29T09:15:07.020000 CVE-2021-36826,0,0,c130a3648f1d6f5b1d7dfcede1db4f070597b88c6aa5f373527ab2ed96f02cda,2023-11-07T03:36:51.557000 CVE-2021-36827,0,0,25d3529a3c7f2c61c5c9bea68724a04aafe19cbf0354ac822f88805ff15d08f6,2023-11-07T03:36:51.653000 @@ -253461,6 +253461,7 @@ CVE-2024-35682,0,0,e3065bea188f47617d60d5ec78ff5563173441e56553fbc4305bfb9f6b8b0 CVE-2024-35683,0,0,35d7e7c403c9e1a0af5b15ee529f21dfe95dd77d68bca956781c650575c54c30,2024-06-13T18:36:45.417000 CVE-2024-35684,0,0,73ceea3685cab6d12bcc00b1be64bf260bc52647423fb13caa461de77b765285,2024-07-18T19:15:49.853000 CVE-2024-35685,0,0,139851b07c410dda78a8d072ad9e34deae44fbd00bd025834cea54049b4e0532,2024-06-11T13:54:12.057000 +CVE-2024-35686,1,1,5a22997601b50761f662ad642396d132d431daba7441c3116de73d15cc2238dc,2024-08-18T22:15:07.647000 CVE-2024-35687,0,0,79fce35ccd3e930bc208091f41ac29961dccd33e15189a2e1b06f3b46062b830,2024-07-18T19:12:50.843000 CVE-2024-35688,0,0,3002fd4b3fe5cc02b7654ca7bf43c572c5d7c5d95678447c325fe6a4dfea431c,2024-07-18T19:11:38.683000 CVE-2024-35689,0,0,a84697d9194d9eaca216c47abe16f4656da4cd35d0aca0020ad4375947ea31e4,2024-07-18T19:11:09.873000 @@ -257712,6 +257713,7 @@ CVE-2024-43139,0,0,c74c0f3dde7756ee6f145dfa944df2bddeeb719e29cd3b22fb911239d7691 CVE-2024-4314,0,0,5b91c731cc96c112e4837604681a355586cd629f1c71449572dfc7eb6fafd4a6,2024-05-14T16:11:39.510000 CVE-2024-43140,0,0,879ec5b84127dbdf3b24e5badc8e43666af405516e082469bf8472d96501dd05,2024-08-13T12:58:25.437000 CVE-2024-43141,0,0,f29f7de7eae578d120c59b0305acaad325acb97a127ccd6d6289a33a71c747b6,2024-08-13T12:58:25.437000 +CVE-2024-43145,1,1,626b2434bf7c98382edbf5d19da1780ec1f4cf5ac5b687b7f2c3064e36c4e62d,2024-08-18T22:15:07.880000 CVE-2024-43147,0,0,667e4e165f9113b4fe4ef729d1c96bbd751ca2d031ec283022e85cfd98eae7e3,2024-08-13T12:58:25.437000 CVE-2024-43148,0,0,cff5965efef0a90e2b87f245b5b8084669061ce4646f39e1c94e0f70b2166d42,2024-08-13T12:58:25.437000 CVE-2024-43149,0,0,b80bf672b131435d7d08c3c95203fc8f832a533dd6a8944c2404b2b39520a185,2024-08-13T12:58:25.437000 @@ -257735,6 +257737,7 @@ CVE-2024-4318,0,0,7b0a62dc8691f5e6f2210e7e19a78c6d4d5c9f053f662e7593a96cdc8c097a CVE-2024-4319,0,0,7ca0245a01df3d5ced472265b32f90c6f6a22a37af3715d5589379ecac1f6a24,2024-06-11T13:54:12.057000 CVE-2024-43199,0,0,94150f8459e19abf18625a946d8a507867275817cd3d9928084030fcb7fa8330,2024-08-12T12:59:48.253000 CVE-2024-4320,0,0,f21f873c3bfeb896c071276000f6bbe2ae4420d2f2c3184178334c98a666705b,2024-06-07T14:56:05.647000 +CVE-2024-43207,1,1,91d93de5dd1d58805ae0590e5e02570650503a555bce54070ed3eac1e39bab86,2024-08-18T22:15:08.090000 CVE-2024-4321,0,0,9cab2a859d144dd765da27aaa03d49bb12083c0b11abfa900a9b065f4ea718e1,2024-05-16T13:03:05.353000 CVE-2024-43210,0,0,38b1ddd569737ddf84a414c75c09c54bffe5570d779b3b2b7d84160c7c88ff6c,2024-08-13T12:58:25.437000 CVE-2024-43213,0,0,6c696e57f95479918ef25ca22ce88cf027f14ad7abeabc2f23e004d6693a5cce,2024-08-13T12:58:25.437000 @@ -257751,17 +257754,34 @@ CVE-2024-4323,0,0,8795dbc0ef00377d638f97794032c86e045103be19a16a47714b9d0a600885 CVE-2024-43231,0,0,576ae207e6ba8489a6ff51c30718ab9a1cd372eb2df3fcba4d400349b580379a,2024-08-13T12:58:25.437000 CVE-2024-43233,0,0,1b4af7770e832b42b8de9434c8175a113ca03ccd398ae87b3d3135806048f23d,2024-08-13T12:58:25.437000 CVE-2024-43238,0,0,ce7255c1c134cad6a5254a06b54b5fe5157846bb5f240a12571bb3e78a220737,2024-08-18T14:15:06.583000 +CVE-2024-43239,1,1,eb3d06e5266756c8e723bf89f7eb98268e48f59d9a2bbbae6b37943f22110832,2024-08-18T22:15:08.277000 CVE-2024-4324,0,0,fc63521759a8641132ed78ae3099f2b2ca0952db3d329b9ead7b1b38a39cf68e,2024-05-02T18:00:37.360000 +CVE-2024-43241,1,1,58e119d7c91bcfe70091388c719f5f6d49c22bdff966f7ad359b7aa21dd27d30,2024-08-18T22:15:08.483000 +CVE-2024-43244,1,1,b5bcdee1af48c322705de80f8ad924be53950898dd0fcfd72025a3e57eb67cd1,2024-08-18T22:15:08.680000 +CVE-2024-43246,1,1,746f4e3e6c9730295f477b49797010f3909c4c25d3cbdd007bf6a8e138df92fb,2024-08-18T22:15:08.877000 CVE-2024-4325,0,0,76d9bad54216516dac1d03211c486bb781521a024ebba7e9a0e98047a78d0bf5,2024-06-07T14:56:05.647000 CVE-2024-4326,0,0,d965aff3554882d9e9e5ba1861fcd18121a605b5a6347dc41a19bd090bda9a65,2024-05-16T13:03:05.353000 +CVE-2024-43262,1,1,a3edb00027179f42d4fcbfd9c96894d5928f9ee7109ba22cb763ba61ec5855eb,2024-08-18T22:15:09.070000 +CVE-2024-43263,1,1,6745202447f500bb018ddc19e880a3f06051ec288db459126c9bc09d40d6ce59,2024-08-18T22:15:09.270000 +CVE-2024-43266,1,1,3d83a3a3a7ff679dfaeae7b56317aed88af2911851514fe321c09d05daa8db2d,2024-08-18T22:15:09.463000 +CVE-2024-43267,1,1,4537cc3d3ecf4084e01314fa888f95140e8f7f1b5acb9d4c74dc8f33abe1eeeb,2024-08-18T22:15:09.663000 CVE-2024-4327,0,0,9a5f942b6958d2271ac79f44a3dfa6f019a91702ea5bf4b7c110b804ce763bfb,2024-05-17T02:40:22.673000 CVE-2024-43275,0,0,78ead3cb089aaf7c18ceb1d81053b0c408f631313f8368c9da5d02a09209ccb7,2024-08-15T13:01:10.150000 CVE-2024-43276,0,0,1327b07b07996c9ea2c2148b4a57bbf83cde40df49695242a6b4d52226e84136,2024-08-18T14:15:06.787000 +CVE-2024-43278,1,1,2af49c25a30a9dba5ec086ad36ef14db6f90327451a6dff37da3c0c38b6f941b,2024-08-18T22:15:09.860000 +CVE-2024-43279,1,1,47b4ca584f9cae457549b0ca00f096f7c240bc293649736bfda12c48a6e5ee97,2024-08-18T22:15:10.060000 CVE-2024-4328,0,0,243566e1cc6bca4cb71823d7b7f30591e3ccaa89bb4c9ba718cf8de1f025e822,2024-06-12T19:33:00.527000 +CVE-2024-43282,1,1,5f54f98543c20de255eac387764c66857cadfb4b5393222d5a74bb7e7f400ac1,2024-08-18T22:15:10.250000 +CVE-2024-43284,1,1,48093a5b579e3c127053a188dde7bd8fa914aeb3037699805e2d23f48ecc341a,2024-08-18T22:15:10.440000 +CVE-2024-43286,1,1,08961bfff07dbc16743176b1132c8a5ad7a5c76f7be3d67c745e5a19d9a700eb,2024-08-18T22:15:10.637000 +CVE-2024-43288,1,1,2b443b5d152e79372d1cc3f4de544528d2b7b4aaa48b29a5f770adb95cc794a5,2024-08-18T22:15:10.833000 CVE-2024-4329,0,0,915fdd462793e35dddcb6a188ef6774a9ebc56a526b1b0698bddaf3c23ba3b77,2024-05-14T16:11:39.510000 +CVE-2024-43291,1,1,2a9e2e85570880614837bb539af3a7dc9cee96cc84aecaaeaea465622f89a7e6,2024-08-18T22:15:11.023000 +CVE-2024-43292,1,1,c8ba7d51783bc736b61011d0094bed3835aba478c902bb0e881c059fc1c4920f,2024-08-18T22:15:11.213000 +CVE-2024-43294,1,1,83b694cd8d87cd0899cbd8be12f8343e27c3fd053694cae359dfee882f10a26f,2024-08-18T22:15:11.443000 CVE-2024-4330,0,0,fc15b5e6e8f2f0c0d6f88562ddea62a293dcb49ee86f17536355ec11fc8680c3,2024-05-30T18:19:11.743000 -CVE-2024-43303,1,1,519b513483e722de876e8c5cc38a1fdc3c50dad8a8e6e2e6d61c6e45bbc333cf,2024-08-18T21:15:03.647000 -CVE-2024-43304,1,1,33c756a9b95351263e96765f2269c64aca0a7c8286663f51a1cc9408dc987899,2024-08-18T21:15:03.860000 +CVE-2024-43303,0,0,519b513483e722de876e8c5cc38a1fdc3c50dad8a8e6e2e6d61c6e45bbc333cf,2024-08-18T21:15:03.647000 +CVE-2024-43304,0,0,33c756a9b95351263e96765f2269c64aca0a7c8286663f51a1cc9408dc987899,2024-08-18T21:15:03.860000 CVE-2024-43305,0,0,9fd98bb7d48477ddbf9f1b10a6ec28752b423d821908baff2191f5d92b81ba9f,2024-08-18T15:15:03.320000 CVE-2024-43306,0,0,c162cc879c38af0ff6ff430290e806b67f6106e77f71856ef233366846e5edda,2024-08-18T15:15:03.523000 CVE-2024-43307,0,0,28f6bcbe7ef6126b298409cdbb1de3962dd527765ec65de7dfbaa9be794b5105,2024-08-18T15:15:03.720000 @@ -257769,10 +257789,12 @@ CVE-2024-43308,0,0,cc1218affded6df6733cd6e6243d85a9b7c149caac0e64148014f977b1b2d CVE-2024-43309,0,0,6a6641f301d22a4a49ef14bd4948e4eb2ad8fdc01b0b78446732e53b57213ee2,2024-08-18T15:15:04.110000 CVE-2024-4331,0,0,f83a1d11dfb2c744e38bc97e75352f54247538f697e111d3b125724e343ab75a,2024-07-03T02:07:25.070000 CVE-2024-43313,0,0,9f016e11abc51c162cbb68def428d2301e20425131f0ceed6a98db33d449ccf2,2024-08-18T15:15:04.310000 +CVE-2024-43315,1,1,c630cd9516c386f346984650ea73ad7cfac83df9c8cc80312438bc3ea6b29117,2024-08-18T22:15:11.650000 CVE-2024-43318,0,0,b3eec787ca00cc1277ca41c66d7b3f354b16e0d89114bb90efb1de3f373dbe4f,2024-08-18T15:15:04.500000 CVE-2024-4332,0,0,229e2a44f62342d9fecf4d77bd1ae1368633da9c89a437515cafc4b1ffcbd9b7,2024-06-03T19:23:17.807000 CVE-2024-43320,0,0,951d5aa8f8321f3bbb08736a83f3b5bb2eb023b49c477596a49570897ee3b4bb,2024-08-18T15:15:04.693000 CVE-2024-43321,0,0,412b667b57584a1a850b6b935ee963a15ff05a90781256cbfb41b1fb974714dc,2024-08-18T15:15:04.897000 +CVE-2024-43322,1,1,aa26f929bd945a2d78f2846549dcfd61fada59d5663006cd7849ed1ed1978082,2024-08-18T22:15:11.840000 CVE-2024-43324,0,0,76cf3f26ac0f3fd153a1ce482effef994d5f8372f2b8fa48c7537ba455385109,2024-08-18T14:15:06.990000 CVE-2024-43327,0,0,f0dc6fa187f7a0536637007cafd249bc2c6e88cf46e7662b6ca51a2214d0052c,2024-08-18T14:15:07.197000 CVE-2024-43329,0,0,f2dddc3cc1cf66278244805f602d67f1c448cec8f86f9a645594d7c450004cef,2024-08-18T14:15:07.400000 @@ -257787,6 +257809,7 @@ CVE-2024-43347,0,0,151804af95c9ae28497f46dd877847b750672a82239dc83fdae21aa765b4e CVE-2024-43348,0,0,6a37677082f2247ee5c2620ee069bb780a9e39d79f9379f6908d0805a34f2cee,2024-08-18T14:15:08.793000 CVE-2024-43349,0,0,90d696d5b6e861a834162335ad7d1b0695397514fe0b751b2c66b44a72e77f51,2024-08-18T14:15:08.993000 CVE-2024-4335,0,0,0ca058a6a5d3d4471e4538114fc6d3ccf52ed0e69923cf2c5461b8aef31c87bc,2024-05-14T16:11:39.510000 +CVE-2024-43350,1,1,677f68079ec597fb14b85e77dac056665f60bc48ecf2a4416ac2f2c5b917f7c9,2024-08-18T22:15:12.033000 CVE-2024-43351,0,0,9f14d9d85581aedf9e6daae162bb0a2a0f46734d33ad2208e90c8bb2eee02bd3,2024-08-18T14:15:09.187000 CVE-2024-43352,0,0,e83e0c41595f85fcfebebb84fc3a271a645f1df8a676f95c21b46f5a73ce6fa6,2024-08-18T14:15:09.380000 CVE-2024-43353,0,0,b36e57f698bbcecaaa53e730e555a16c07221c30e4dda17b92fa02b775f2b264,2024-08-18T13:15:03.637000 @@ -260427,4 +260450,9 @@ CVE-2024-7907,0,0,5bd33617054e621be930cb2c35c92b8532c16eb2e040b69ae37e2ca570c5a2 CVE-2024-7908,0,0,133a52c6ebfb4ea2c1f15ca6a2d6f8c429c4c93fd4d765a6aecaafe6d76bfecb,2024-08-18T17:15:03.557000 CVE-2024-7909,0,0,15ed970d3c5bd799326dadec69a0260bcf483327873a398cf1647a5dfde46cd9,2024-08-18T18:15:04.290000 CVE-2024-7910,0,0,ca5afb1cb656577865c0466038bc9fbbe19513240326cee97766752e4b67f30e,2024-08-18T19:15:05.003000 -CVE-2024-7911,1,1,29bc2e1d3c2f679a026cf5addc4bd652ca6c6f74f0de43a212e31351b68eb5e9,2024-08-18T20:15:04.260000 +CVE-2024-7911,0,0,29bc2e1d3c2f679a026cf5addc4bd652ca6c6f74f0de43a212e31351b68eb5e9,2024-08-18T20:15:04.260000 +CVE-2024-7912,1,1,28e91949464341969be22cc5a7160eb7f609c0f446037628cc09a48db9b999b0,2024-08-18T22:15:12.223000 +CVE-2024-7913,1,1,553a11741d443f553fe263cbec7577dc08e9c057f22cb110d971cb9b1a2ae28b,2024-08-18T22:15:12.480000 +CVE-2024-7914,1,1,08fe806ec42c620b812e207c98df7ee04a63e0692534482aa64c33a7eb26ea71,2024-08-18T22:15:12.737000 +CVE-2024-7916,1,1,6d34b0bd172e96a1475b506a90dffbc217f42556fa54e261bdb4257c11df69d2,2024-08-18T23:15:03.780000 +CVE-2024-7917,1,1,a07c4036ed843a9ce8a234f70e0aa3853fd710edff91c384ddb42010efd8817a,2024-08-18T23:15:04.047000