From 5f0c31a3357b300588d6a423a4bb6ef4b4b3ec8a Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sat, 9 Nov 2024 15:03:22 +0000 Subject: [PATCH] Auto-Update: 2024-11-09T15:00:19.457683+00:00 --- CVE-2024/CVE-2024-108xx/CVE-2024-10837.json | 68 ++++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51611.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51612.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51613.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51614.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51616.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51618.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51622.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51623.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51627.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51628.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51629.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51630.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51647.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51662.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51663.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51664.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51668.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51670.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51673.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51674.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51675.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51676.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51689.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51690.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51691.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51692.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51693.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51694.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51695.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51696.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51697.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51698.json | 56 ++++++ CVE-2024/CVE-2024-516xx/CVE-2024-51699.json | 56 ++++++ CVE-2024/CVE-2024-517xx/CVE-2024-51701.json | 56 ++++++ CVE-2024/CVE-2024-517xx/CVE-2024-51702.json | 56 ++++++ CVE-2024/CVE-2024-517xx/CVE-2024-51703.json | 56 ++++++ CVE-2024/CVE-2024-517xx/CVE-2024-51704.json | 56 ++++++ CVE-2024/CVE-2024-517xx/CVE-2024-51705.json | 56 ++++++ CVE-2024/CVE-2024-517xx/CVE-2024-51706.json | 56 ++++++ README.md | 58 +++---- _state.csv | 178 ++++++++++++-------- 42 files changed, 2390 insertions(+), 98 deletions(-) create mode 100644 CVE-2024/CVE-2024-108xx/CVE-2024-10837.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51611.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51612.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51613.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51614.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51616.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51618.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51622.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51623.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51627.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51628.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51629.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51630.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51647.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51662.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51663.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51664.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51668.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51670.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51673.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51674.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51675.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51676.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51689.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51690.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51691.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51692.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51693.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51694.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51695.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51696.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51697.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51698.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51699.json create mode 100644 CVE-2024/CVE-2024-517xx/CVE-2024-51701.json create mode 100644 CVE-2024/CVE-2024-517xx/CVE-2024-51702.json create mode 100644 CVE-2024/CVE-2024-517xx/CVE-2024-51703.json create mode 100644 CVE-2024/CVE-2024-517xx/CVE-2024-51704.json create mode 100644 CVE-2024/CVE-2024-517xx/CVE-2024-51705.json create mode 100644 CVE-2024/CVE-2024-517xx/CVE-2024-51706.json diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10837.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10837.json new file mode 100644 index 00000000000..debbb94c074 --- /dev/null +++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10837.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-10837", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-11-09T13:15:04.737", + "lastModified": "2024-11-09T13:15:04.737", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The SysBasics Customize My Account for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018tab\u2019 parameter in all versions up to, and including, 2.7.29 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/customize-my-account-for-woocommerce/tags/2.7.19/phppoet-checkout-fields/include/admin/pcfme_admin_settings.php#L840", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3183607/", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/customize-my-account-for-woocommerce/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0ced1c79-97fe-4841-9a02-ffb9f336212a?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51611.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51611.json new file mode 100644 index 00000000000..96986085e80 --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51611.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51611", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T14:15:14.537", + "lastModified": "2024-11-09T14:15:14.537", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Miguel Peixe WP Feature Box allows Stored XSS.This issue affects WP Feature Box: from n/a through 0.1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-feature-box/wordpress-wp-feature-box-plugin-0-1-3-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51612.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51612.json new file mode 100644 index 00000000000..c3a0140b84c --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51612.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51612", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T14:15:14.770", + "lastModified": "2024-11-09T14:15:14.770", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ken Charity Reftagger Shortcode allows Stored XSS.This issue affects Reftagger Shortcode: from n/a through 1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/reftagger-shortcode/wordpress-reftagger-shortcode-plugin-1-1-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51613.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51613.json new file mode 100644 index 00000000000..13355a9d32a --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51613.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51613", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T14:15:14.990", + "lastModified": "2024-11-09T14:15:14.990", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Andrew Connell TradeMe widgets allows Stored XSS.This issue affects TradeMe widgets: from n/a through 1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/trademe-widget/wordpress-trademe-widgets-plugin-1-2-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51614.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51614.json new file mode 100644 index 00000000000..06520b476b8 --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51614.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51614", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T14:15:15.187", + "lastModified": "2024-11-09T14:15:15.187", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Aajoda Aajoda Testimonials allows Stored XSS.This issue affects Aajoda Testimonials: from n/a through 2.2.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/aajoda-testimonials/wordpress-aajoda-testimonials-plugin-2-2-2-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51616.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51616.json new file mode 100644 index 00000000000..0c6ebcb8748 --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51616.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51616", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T14:15:15.417", + "lastModified": "2024-11-09T14:15:15.417", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Nazmul Hasan Rupok AwesomePress allows Stored XSS.This issue affects AwesomePress: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/awesomepress/wordpress-awesomepress-plugin-1-0-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51618.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51618.json new file mode 100644 index 00000000000..c22baa61f3f --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51618.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51618", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T14:15:15.630", + "lastModified": "2024-11-09T14:15:15.630", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in DuoGeek Custom Admin Menu allows Stored XSS.This issue affects Custom Admin Menu: from n/a through 1.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/custom-admin-menu/wordpress-custom-admin-menu-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51622.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51622.json new file mode 100644 index 00000000000..d3f1a8dc050 --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51622.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51622", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T14:15:15.853", + "lastModified": "2024-11-09T14:15:15.853", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Experts Team WP EASY RECIPE allows Stored XSS.This issue affects WP EASY RECIPE: from n/a through 1.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-easy-recipe/wordpress-wp-easy-recipe-plugin-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51623.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51623.json new file mode 100644 index 00000000000..dd0deda9cc1 --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51623.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51623", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T14:15:16.133", + "lastModified": "2024-11-09T14:15:16.133", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mehrdad Farahani WP EIS allows SQL Injection.This issue affects WP EIS: from n/a through 1.3.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 8.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-eis/wordpress-wp-eis-plugin-1-3-3-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51627.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51627.json new file mode 100644 index 00000000000..54677a8c008 --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51627.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51627", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T14:15:16.373", + "lastModified": "2024-11-09T14:15:16.373", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kaedinger Audio Comparison Lite audio-comparison-lite allows Stored XSS.This issue affects Audio Comparison Lite: from n/a through 3.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/audio-comparison-lite/wordpress-audio-comparison-lite-plugin-3-1-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51628.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51628.json new file mode 100644 index 00000000000..1bcd55231c9 --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51628.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51628", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T14:15:16.617", + "lastModified": "2024-11-09T14:15:16.617", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in EzyOnlineBookings EzyOnlineBookings Online Booking System Widget allows DOM-Based XSS.This issue affects EzyOnlineBookings Online Booking System Widget: from n/a through 1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/ezyonlinebookings-online-booking-system/wordpress-ezyonlinebookings-online-booking-system-widget-plugin-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51629.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51629.json new file mode 100644 index 00000000000..8d8540f85e2 --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51629.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51629", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T14:15:16.853", + "lastModified": "2024-11-09T14:15:16.853", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in MetricThemes Header Footer Composer for Elementor allows DOM-Based XSS.This issue affects Header Footer Composer for Elementor: from n/a through 1.0.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/header-footer-composer/wordpress-header-footer-composer-for-elementor-plugin-1-0-4-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51630.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51630.json new file mode 100644 index 00000000000..3e2ef010121 --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51630.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51630", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T14:15:17.087", + "lastModified": "2024-11-09T14:15:17.087", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Lars Schenk Responsive Flickr Gallery allows Stored XSS.This issue affects Responsive Flickr Gallery: from n/a through 1.3.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/responsive-flickr-gallery/wordpress-responsive-flickr-gallery-plugin-1-3-1-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51647.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51647.json new file mode 100644 index 00000000000..094c8a0e6b3 --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51647.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51647", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T14:15:17.350", + "lastModified": "2024-11-09T14:15:17.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Chaser324 Featured Posts Scroll allows Stored XSS.This issue affects Featured Posts Scroll: from n/a through 1.25." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/featured-posts-scroll/wordpress-featured-posts-scroll-plugin-1-25-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51662.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51662.json new file mode 100644 index 00000000000..992f59cd903 --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51662.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51662", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T14:15:17.617", + "lastModified": "2024-11-09T14:15:17.617", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Modernaweb Studio Black Widgets For Elementor allows Stored XSS.This issue affects Black Widgets For Elementor: from n/a through 1.3.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/black-widgets/wordpress-black-widgets-for-elementor-plugin-1-3-6-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51663.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51663.json new file mode 100644 index 00000000000..4883cd1f0c5 --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51663.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51663", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T14:15:17.847", + "lastModified": "2024-11-09T14:15:17.847", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Bricksable Bricksable for Bricks Builder allows Stored XSS.This issue affects Bricksable for Bricks Builder: from n/a through 1.6.59." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/bricksable/wordpress-bricksable-for-bricks-builder-plugin-1-6-59-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51664.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51664.json new file mode 100644 index 00000000000..6d5dd58697d --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51664.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51664", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T14:15:18.067", + "lastModified": "2024-11-09T14:15:18.067", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Mark Kinchin Beds24 Online Booking allows Stored XSS.This issue affects Beds24 Online Booking: from n/a through 2.0.25." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/beds24-online-booking/wordpress-beds24-online-booking-plugin-2-0-25-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51668.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51668.json new file mode 100644 index 00000000000..5a8c998345c --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51668.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51668", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T14:15:18.297", + "lastModified": "2024-11-09T14:15:18.297", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Mark Tilly MyCurator Content Curation allows Stored XSS.This issue affects MyCurator Content Curation: from n/a through 3.78." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/mycurator/wordpress-mycurator-content-curation-plugin-3-78-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51670.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51670.json new file mode 100644 index 00000000000..5a46e6fa3ff --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51670.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51670", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T13:15:05.007", + "lastModified": "2024-11-09T13:15:05.007", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in JS Help Desk JS Help Desk \u2013 Best Help Desk & Support Plugin allows Stored XSS.This issue affects JS Help Desk \u2013 Best Help Desk & Support Plugin: from n/a through 2.8.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/js-support-ticket/wordpress-js-help-desk-plugin-2-8-7-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51673.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51673.json new file mode 100644 index 00000000000..8c4520f2052 --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51673.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51673", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T13:15:05.230", + "lastModified": "2024-11-09T13:15:05.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in HasThemes HT Politic allows DOM-Based XSS.This issue affects HT Politic: from n/a through 2.4.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-politic/wordpress-ht-politic-plugin-2-4-4-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51674.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51674.json new file mode 100644 index 00000000000..8536d20dd6b --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51674.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51674", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T13:15:05.450", + "lastModified": "2024-11-09T13:15:05.450", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in TemplatesCoder Sastra Essential Addons for Elementor allows DOM-Based XSS.This issue affects Sastra Essential Addons for Elementor: from n/a through 1.0.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/sastra-essential-addons-for-elementor/wordpress-sastra-essential-addons-for-elementor-plugin-1-0-5-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51675.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51675.json new file mode 100644 index 00000000000..97be61d1119 --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51675.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51675", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T13:15:05.683", + "lastModified": "2024-11-09T13:15:05.683", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in aThemes aThemes Addons for Elementor allows DOM-Based XSS.This issue affects aThemes Addons for Elementor: from n/a through 1.0.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/athemes-addons-for-elementor-lite/wordpress-athemes-addons-for-elementor-plugin-1-0-7-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51676.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51676.json new file mode 100644 index 00000000000..596ae05f38b --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51676.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51676", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T13:15:05.927", + "lastModified": "2024-11-09T13:15:05.927", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Delicious Delisho allows Reflected XSS.This issue affects Delisho: from n/a through 1.0.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/dr-widgets-blocks/wordpress-delisho-plugin-1-0-6-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51689.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51689.json new file mode 100644 index 00000000000..e245916c809 --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51689.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51689", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T13:15:06.187", + "lastModified": "2024-11-09T13:15:06.187", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Tobias Conrad CF7 WOW Styler allows Reflected XSS.This issue affects CF7 WOW Styler: from n/a through 1.6.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/cf7-styler/wordpress-cf7-wow-styler-plugin-1-6-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51690.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51690.json new file mode 100644 index 00000000000..e4b139226b2 --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51690.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51690", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T13:15:06.407", + "lastModified": "2024-11-09T13:15:06.407", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Neelam Samariya Thakor Wp Slide Categorywise allows Reflected XSS.This issue affects Wp Slide Categorywise: from n/a through 1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-slide-categorywise/wordpress-wp-slide-categorywise-plugin-1-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51691.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51691.json new file mode 100644 index 00000000000..00f55d03de3 --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51691.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51691", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T13:15:06.640", + "lastModified": "2024-11-09T13:15:06.640", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Aryan Duntley Admin Amplify allows Reflected XSS.This issue affects Admin Amplify: from n/a through 1.3.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wpr-admin-amplify/wordpress-admin-amplify-plugin-1-3-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51692.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51692.json new file mode 100644 index 00000000000..27bacde76e4 --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51692.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51692", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T13:15:06.883", + "lastModified": "2024-11-09T13:15:06.883", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Askew Brook Bing Search API Integration allows Reflected XSS.This issue affects Bing Search API Integration: from n/a through 0.3.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/abbs-bing-search/wordpress-bing-search-api-integration-plugin-0-3-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51693.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51693.json new file mode 100644 index 00000000000..286d5a23ae7 --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51693.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51693", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T13:15:07.107", + "lastModified": "2024-11-09T13:15:07.107", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in laboratorio d\u2019Avanguardia Search order by product SKU for WooCommerce allows Reflected XSS.This issue affects Search order by product SKU for WooCommerce: from n/a through 0.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/search-order-by-product-sku-for-woocommerce/wordpress-search-order-by-product-sku-for-woocommerce-plugin-0-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51694.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51694.json new file mode 100644 index 00000000000..3f10b45b5f9 --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51694.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51694", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T13:15:07.343", + "lastModified": "2024-11-09T13:15:07.343", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Digfish Geotagged Media allows Reflected XSS.This issue affects Geotagged Media: from n/a through 0.3.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/geotagged-media/wordpress-geotagged-media-plugin-0-3-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51695.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51695.json new file mode 100644 index 00000000000..f12b48a5ab7 --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51695.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51695", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T13:15:07.563", + "lastModified": "2024-11-09T13:15:07.563", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Fabrica Fabrica Synced Pattern Instances allows Reflected XSS.This issue affects Fabrica Synced Pattern Instances: from n/a through 1.0.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/fabrica-reusable-block-instances/wordpress-fabrica-synced-pattern-instances-plugin-1-0-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51696.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51696.json new file mode 100644 index 00000000000..5968836e7d4 --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51696.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51696", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T13:15:07.803", + "lastModified": "2024-11-09T13:15:07.803", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Benjamin Moody Content Syndication Toolkit Reader allows Reflected XSS.This issue affects Content Syndication Toolkit Reader: from n/a through 1.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/content-syndication-toolkit-reader/wordpress-content-syndication-toolkit-reader-plugin-1-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51697.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51697.json new file mode 100644 index 00000000000..608a63fb384 --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51697.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51697", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T13:15:08.033", + "lastModified": "2024-11-09T13:15:08.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Doofinder allows Reflected XSS.This issue affects Doofinder: from n/a through 0.5.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/doofinder/wordpress-doofinder-plugin-0-5-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51698.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51698.json new file mode 100644 index 00000000000..b91d6552b6d --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51698.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51698", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T13:15:08.273", + "lastModified": "2024-11-09T13:15:08.273", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Luis Rock Master Bar allows Reflected XSS.This issue affects Master Bar: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/master-bar/wordpress-master-bar-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51699.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51699.json new file mode 100644 index 00000000000..e30cba7a9a7 --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51699.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51699", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T13:15:08.500", + "lastModified": "2024-11-09T13:15:08.500", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Buooy Buooy Sticky Header allows Reflected XSS.This issue affects Buooy Sticky Header: from n/a through 0.5.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/buooy-sticky-header/wordpress-buooy-sticky-header-plugin-0-5-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-517xx/CVE-2024-51701.json b/CVE-2024/CVE-2024-517xx/CVE-2024-51701.json new file mode 100644 index 00000000000..f1a734f356a --- /dev/null +++ b/CVE-2024/CVE-2024-517xx/CVE-2024-51701.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51701", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T13:15:08.713", + "lastModified": "2024-11-09T13:15:08.713", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Mahesh Waghmare MG Post Contributors allows Reflected XSS.This issue affects MG Post Contributors: from n/a through 1.3.." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/mg-post-contributors/wordpress-mg-post-contributors-plugin-1-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-517xx/CVE-2024-51702.json b/CVE-2024/CVE-2024-517xx/CVE-2024-51702.json new file mode 100644 index 00000000000..0801d46e267 --- /dev/null +++ b/CVE-2024/CVE-2024-517xx/CVE-2024-51702.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51702", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T13:15:08.940", + "lastModified": "2024-11-09T13:15:08.940", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Benjamin Moody, Eric Holmes SrcSet Responsive Images for WordPress allows Reflected XSS.This issue affects SrcSet Responsive Images for WordPress: from n/a through 1.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/truenorth-srcset/wordpress-srcset-responsive-images-for-wordpress-plugin-1-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-517xx/CVE-2024-51703.json b/CVE-2024/CVE-2024-517xx/CVE-2024-51703.json new file mode 100644 index 00000000000..dd39109ffb8 --- /dev/null +++ b/CVE-2024/CVE-2024-517xx/CVE-2024-51703.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51703", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T13:15:09.173", + "lastModified": "2024-11-09T13:15:09.173", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Genethick WP-Basics allows Reflected XSS.This issue affects WP-Basics: from n/a through 2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-basics/wordpress-wp-basics-plugin-2-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-517xx/CVE-2024-51704.json b/CVE-2024/CVE-2024-517xx/CVE-2024-51704.json new file mode 100644 index 00000000000..ca34a838618 --- /dev/null +++ b/CVE-2024/CVE-2024-517xx/CVE-2024-51704.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51704", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T13:15:09.410", + "lastModified": "2024-11-09T13:15:09.410", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Hanusek imPress allows Reflected XSS.This issue affects imPress: from n/a through 0.1.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-js-impress/wordpress-impress-plugin-0-1-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-517xx/CVE-2024-51705.json b/CVE-2024/CVE-2024-517xx/CVE-2024-51705.json new file mode 100644 index 00000000000..d716f03f3ab --- /dev/null +++ b/CVE-2024/CVE-2024-517xx/CVE-2024-51705.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51705", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T13:15:09.617", + "lastModified": "2024-11-09T13:15:09.617", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in James Bruner WP MMenu Lite allows Reflected XSS.This issue affects WP MMenu Lite: from n/a through 1.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-mmenu-lite/wordpress-wp-mmenu-lite-plugin-1-0-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-517xx/CVE-2024-51706.json b/CVE-2024/CVE-2024-517xx/CVE-2024-51706.json new file mode 100644 index 00000000000..96c68932088 --- /dev/null +++ b/CVE-2024/CVE-2024-517xx/CVE-2024-51706.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51706", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-09T13:15:09.853", + "lastModified": "2024-11-09T13:15:09.853", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Upeksha Wisidagama UW Freelancer allows Reflected XSS.This issue affects UW Freelancer: from n/a through 0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/uw-freelancer/wordpress-uw-freelancer-plugin-0-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 340deb35299..f72972ff2a0 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-11-09T13:00:19.930716+00:00 +2024-11-09T15:00:19.457683+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-11-09T12:15:20.603000+00:00 +2024-11-09T14:15:18.297000+00:00 ``` ### Last Data Feed Release @@ -33,38 +33,38 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -268861 +268901 ``` ### CVEs added in the last Commit -Recently added CVEs: `69` +Recently added CVEs: `40` -- [CVE-2024-50253](CVE-2024/CVE-2024-502xx/CVE-2024-50253.json) (`2024-11-09T11:15:11.043`) -- [CVE-2024-50254](CVE-2024/CVE-2024-502xx/CVE-2024-50254.json) (`2024-11-09T11:15:11.113`) -- [CVE-2024-50255](CVE-2024/CVE-2024-502xx/CVE-2024-50255.json) (`2024-11-09T11:15:11.183`) -- [CVE-2024-50256](CVE-2024/CVE-2024-502xx/CVE-2024-50256.json) (`2024-11-09T11:15:11.263`) -- [CVE-2024-50257](CVE-2024/CVE-2024-502xx/CVE-2024-50257.json) (`2024-11-09T11:15:11.340`) -- [CVE-2024-50258](CVE-2024/CVE-2024-502xx/CVE-2024-50258.json) (`2024-11-09T11:15:11.413`) -- [CVE-2024-50259](CVE-2024/CVE-2024-502xx/CVE-2024-50259.json) (`2024-11-09T11:15:11.483`) -- [CVE-2024-50260](CVE-2024/CVE-2024-502xx/CVE-2024-50260.json) (`2024-11-09T11:15:11.550`) -- [CVE-2024-50261](CVE-2024/CVE-2024-502xx/CVE-2024-50261.json) (`2024-11-09T11:15:11.610`) -- [CVE-2024-50262](CVE-2024/CVE-2024-502xx/CVE-2024-50262.json) (`2024-11-09T11:15:11.687`) -- [CVE-2024-51707](CVE-2024/CVE-2024-517xx/CVE-2024-51707.json) (`2024-11-09T12:15:17.690`) -- [CVE-2024-51708](CVE-2024/CVE-2024-517xx/CVE-2024-51708.json) (`2024-11-09T12:15:17.927`) -- [CVE-2024-51709](CVE-2024/CVE-2024-517xx/CVE-2024-51709.json) (`2024-11-09T12:15:18.137`) -- [CVE-2024-51710](CVE-2024/CVE-2024-517xx/CVE-2024-51710.json) (`2024-11-09T12:15:18.347`) -- [CVE-2024-51711](CVE-2024/CVE-2024-517xx/CVE-2024-51711.json) (`2024-11-09T12:15:18.553`) -- [CVE-2024-51712](CVE-2024/CVE-2024-517xx/CVE-2024-51712.json) (`2024-11-09T12:15:18.763`) -- [CVE-2024-51713](CVE-2024/CVE-2024-517xx/CVE-2024-51713.json) (`2024-11-09T12:15:18.967`) -- [CVE-2024-51714](CVE-2024/CVE-2024-517xx/CVE-2024-51714.json) (`2024-11-09T12:15:19.177`) -- [CVE-2024-51716](CVE-2024/CVE-2024-517xx/CVE-2024-51716.json) (`2024-11-09T12:15:19.380`) -- [CVE-2024-51717](CVE-2024/CVE-2024-517xx/CVE-2024-51717.json) (`2024-11-09T12:15:19.590`) -- [CVE-2024-51718](CVE-2024/CVE-2024-517xx/CVE-2024-51718.json) (`2024-11-09T12:15:19.797`) -- [CVE-2024-51719](CVE-2024/CVE-2024-517xx/CVE-2024-51719.json) (`2024-11-09T12:15:20.000`) -- [CVE-2024-51759](CVE-2024/CVE-2024-517xx/CVE-2024-51759.json) (`2024-11-09T12:15:20.200`) -- [CVE-2024-51760](CVE-2024/CVE-2024-517xx/CVE-2024-51760.json) (`2024-11-09T12:15:20.403`) -- [CVE-2024-51761](CVE-2024/CVE-2024-517xx/CVE-2024-51761.json) (`2024-11-09T12:15:20.603`) +- [CVE-2024-51663](CVE-2024/CVE-2024-516xx/CVE-2024-51663.json) (`2024-11-09T14:15:17.847`) +- [CVE-2024-51664](CVE-2024/CVE-2024-516xx/CVE-2024-51664.json) (`2024-11-09T14:15:18.067`) +- [CVE-2024-51668](CVE-2024/CVE-2024-516xx/CVE-2024-51668.json) (`2024-11-09T14:15:18.297`) +- [CVE-2024-51670](CVE-2024/CVE-2024-516xx/CVE-2024-51670.json) (`2024-11-09T13:15:05.007`) +- [CVE-2024-51673](CVE-2024/CVE-2024-516xx/CVE-2024-51673.json) (`2024-11-09T13:15:05.230`) +- [CVE-2024-51674](CVE-2024/CVE-2024-516xx/CVE-2024-51674.json) (`2024-11-09T13:15:05.450`) +- [CVE-2024-51675](CVE-2024/CVE-2024-516xx/CVE-2024-51675.json) (`2024-11-09T13:15:05.683`) +- [CVE-2024-51676](CVE-2024/CVE-2024-516xx/CVE-2024-51676.json) (`2024-11-09T13:15:05.927`) +- [CVE-2024-51689](CVE-2024/CVE-2024-516xx/CVE-2024-51689.json) (`2024-11-09T13:15:06.187`) +- [CVE-2024-51690](CVE-2024/CVE-2024-516xx/CVE-2024-51690.json) (`2024-11-09T13:15:06.407`) +- [CVE-2024-51691](CVE-2024/CVE-2024-516xx/CVE-2024-51691.json) (`2024-11-09T13:15:06.640`) +- [CVE-2024-51692](CVE-2024/CVE-2024-516xx/CVE-2024-51692.json) (`2024-11-09T13:15:06.883`) +- [CVE-2024-51693](CVE-2024/CVE-2024-516xx/CVE-2024-51693.json) (`2024-11-09T13:15:07.107`) +- [CVE-2024-51694](CVE-2024/CVE-2024-516xx/CVE-2024-51694.json) (`2024-11-09T13:15:07.343`) +- [CVE-2024-51695](CVE-2024/CVE-2024-516xx/CVE-2024-51695.json) (`2024-11-09T13:15:07.563`) +- [CVE-2024-51696](CVE-2024/CVE-2024-516xx/CVE-2024-51696.json) (`2024-11-09T13:15:07.803`) +- [CVE-2024-51697](CVE-2024/CVE-2024-516xx/CVE-2024-51697.json) (`2024-11-09T13:15:08.033`) +- [CVE-2024-51698](CVE-2024/CVE-2024-516xx/CVE-2024-51698.json) (`2024-11-09T13:15:08.273`) +- [CVE-2024-51699](CVE-2024/CVE-2024-516xx/CVE-2024-51699.json) (`2024-11-09T13:15:08.500`) +- [CVE-2024-51701](CVE-2024/CVE-2024-517xx/CVE-2024-51701.json) (`2024-11-09T13:15:08.713`) +- [CVE-2024-51702](CVE-2024/CVE-2024-517xx/CVE-2024-51702.json) (`2024-11-09T13:15:08.940`) +- [CVE-2024-51703](CVE-2024/CVE-2024-517xx/CVE-2024-51703.json) (`2024-11-09T13:15:09.173`) +- [CVE-2024-51704](CVE-2024/CVE-2024-517xx/CVE-2024-51704.json) (`2024-11-09T13:15:09.410`) +- [CVE-2024-51705](CVE-2024/CVE-2024-517xx/CVE-2024-51705.json) (`2024-11-09T13:15:09.617`) +- [CVE-2024-51706](CVE-2024/CVE-2024-517xx/CVE-2024-51706.json) (`2024-11-09T13:15:09.853`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index f323d1857ca..79d161919fa 100644 --- a/_state.csv +++ b/_state.csv @@ -242545,7 +242545,7 @@ CVE-2024-1024,0,0,d47b3d3840cd70db883d335219cea52b6b4fa0e3fdfc3f4d41efc4b833dff6 CVE-2024-10241,0,0,ae512d639185a0ae3de570db96ee11e8b4269e6da724c94a52e42eddaeb0b4fe,2024-10-29T14:34:04.427000 CVE-2024-10250,0,0,8accb693817c35c7e4f9fa710076ead819720d8653e5052fbeeec31b3a5b47d2,2024-10-25T16:37:32.777000 CVE-2024-1026,0,0,e127bb5d00442b36eed0e6ff6513a3a42c45706876a3a5f2167365447fb898e7,2024-05-17T02:35:11.320000 -CVE-2024-10261,1,1,f7de3caa14777c134bde9728a3a9cd2add83d6035ac273a737fc1b44550f614b,2024-11-09T12:15:16.800000 +CVE-2024-10261,0,0,f7de3caa14777c134bde9728a3a9cd2add83d6035ac273a737fc1b44550f614b,2024-11-09T12:15:16.800000 CVE-2024-10263,0,0,d8274159492686a2b3c754959bfc4509f9c9201a502006a3dee5515647626798,2024-11-08T15:59:41.633000 CVE-2024-10266,0,0,c93db2a67de792a64ad3b8f3ae10accf6f21ac600e94cc18aca994ed95268502,2024-10-29T14:34:04.427000 CVE-2024-10269,0,0,52654717b4b93a8e333771abfdcd93e402d393cb11d01db52c12e8f4aa3192bf,2024-11-08T19:01:03.880000 @@ -242606,7 +242606,7 @@ CVE-2024-10349,0,0,8d5c3da9bdcdc8f86a503a14ddc6c01f002b6d511310d252a1bc3bc26cccb CVE-2024-1035,0,0,792864ab2b0f8151b262ffe209c5f075ae9ac530a32ee5bddc4609b3d7d6306a,2024-05-17T02:35:12.253000 CVE-2024-10350,0,0,1eff377645f31addadbf2a414de92964c33d8decf15f763410afce73538f2275,2024-10-30T14:29:55.480000 CVE-2024-10351,0,0,d96465bc197904e1c8467ab1c779dca90857f09f2fd46dfb7e44741dfd94bb7e,2024-11-01T16:15:23.800000 -CVE-2024-10352,1,1,3dfc943728889bd98229f238edbc29e877f11936482cfea9b544110ce1042004,2024-11-09T12:15:17.243000 +CVE-2024-10352,0,0,3dfc943728889bd98229f238edbc29e877f11936482cfea9b544110ce1042004,2024-11-09T12:15:17.243000 CVE-2024-10353,0,0,e06260810ab2f8d83e8148f12eacebfdfa4f171568dc8f755f0a84d5679240e8,2024-10-30T16:21:35.113000 CVE-2024-10354,0,0,b93bbc475560ddb322fc6987c8bb9a496754455b51c6de71617d975e234845da,2024-10-30T16:32:48.453000 CVE-2024-10355,0,0,2602c2076153349e7adf5f2683fe39bdc0cb3abdcbf15a26de13daaf9ad9d066,2024-10-30T17:13:02.417000 @@ -242776,7 +242776,7 @@ CVE-2024-10626,0,0,6d58889cc1776c251fcff5acafd40468c012021cde62e83a4f58b9ed3fa5d CVE-2024-10627,0,0,8bf46ad29d7d718412718d8d0d30d4476eceff6262628bc15a906e2c63bf33fb,2024-11-09T04:15:04.053000 CVE-2024-1063,0,0,74a897918202555ab7dea6b1737e329d32a036051a3381cf0244644b537611c7,2024-02-05T18:25:57.167000 CVE-2024-1064,0,0,f25346ba7587521e1585b34f9b82a63a0a8099891451ea7215e7704632eec54a,2024-02-12T18:42:14.777000 -CVE-2024-10640,1,1,a9e3d9a3ce710c425ce59b20e7e4410457c782cd914e20dac6b7d92fec114068,2024-11-09T12:15:17.460000 +CVE-2024-10640,0,0,a9e3d9a3ce710c425ce59b20e7e4410457c782cd914e20dac6b7d92fec114068,2024-11-09T12:15:17.460000 CVE-2024-10647,0,0,d9ba6608fa541fc383d43441f89db693ddba6534bf6884ce75536f94bd98d4ae,2024-11-08T21:20:50.847000 CVE-2024-1065,0,0,6b929e111558868b0121ca43ebc298de03b6cbdcab98142e875670ec0e17e759,2024-07-03T01:44:57.727000 CVE-2024-10651,0,0,4020d234a4dc20eeefa40d62db04df21d3fc130e9d8122bd0290808c2b4b15c0,2024-11-01T12:57:03.417000 @@ -242877,6 +242877,7 @@ CVE-2024-10824,0,0,6eb650dcc5948040831c411456d27fae52cd783d32ad30faaf04938565b81 CVE-2024-10826,0,0,e7caea17df9e50303e84eb12f606f4531bb8bb9449a87b4576ba355c7a719f34,2024-11-06T18:17:17.287000 CVE-2024-10827,0,0,c533f4c70607df301dc68c381588fa8b3325a3d893bbcbb9a6092f250e2c41fa,2024-11-06T18:17:17.287000 CVE-2024-1083,0,0,f65354685ac9d5e6ec0c7d89ef33fa98a96cad0e23da0316206039cbd9c94fda,2024-03-13T18:16:18.563000 +CVE-2024-10837,1,1,3839d7b67701f0472781da38593edcf1ecea3aba141955aa03c60ab7658fd081,2024-11-09T13:15:04.737000 CVE-2024-10839,0,0,959999d7d9e7ad6c83b2a659b5f94ea06306dfe2c58a8ebc0b6485e885f4cafa,2024-11-08T19:01:03.880000 CVE-2024-1084,0,0,b38be98d35d4290a3ce2408da5081c91dd802a2448815858b2cd8d2247674e10,2024-10-17T15:46:42.330000 CVE-2024-10840,0,0,3088ecb88b6f610106137e52cd92a9df0637e9f9f20cd58417274c10e35a041a,2024-11-06T22:49:12.173000 @@ -264549,61 +264550,61 @@ CVE-2024-50209,0,0,8a8805a93a7ad4720dce18e0fc6a19c9829749a589bcab3a3e272b745ce15 CVE-2024-5021,0,0,38505cbaa011793e28d7950a2ea2daf96aac6ed3db846bcaf517334c4dc7fa50,2024-06-20T12:44:01.637000 CVE-2024-50210,0,0,39887cb7f7dc73362120106f57cbc0747a59b3d51e3a41b9091d50f5c44af891,2024-11-08T19:01:03.880000 CVE-2024-50211,0,0,789a6df7d2c02bd672dc452fcbc42c98aa068123f2fd8cc57a38a73d58fa13ac,2024-11-08T19:01:03.880000 -CVE-2024-50212,1,1,8077d1171418ca9bc9860647456940aeb5c16059ffd13b0fd8715b7d60c11459,2024-11-09T11:15:04.940000 -CVE-2024-50213,1,1,a32bab53a71793c08dddb8f7f865e54824fbfa96901995c3b6fe811063e0e84d,2024-11-09T11:15:06.650000 -CVE-2024-50214,1,1,8b8c33745112fd2676515d8eae5fa19e36aab72b9a92708d4eed07cf18d02ae8,2024-11-09T11:15:06.777000 -CVE-2024-50215,1,1,51deedf9e51b9010196feb8434c74c41c571fa0dfa190b3bcc95c654d401acfa,2024-11-09T11:15:06.893000 -CVE-2024-50216,1,1,dd18627c652b541fcc71e8055f8b9b54a97ee1c452f87671395ddb6c7c0effe5,2024-11-09T11:15:06.987000 -CVE-2024-50217,1,1,f1f9a2585721ca44599dff7237e3c4e7abb72e154ac4bfb5a6e8176e15581aa4,2024-11-09T11:15:07.103000 -CVE-2024-50218,1,1,a1e0ddbb039c77513f3d3ef127e35268d6a74599810a96ae07cfefd1c53ddc78,2024-11-09T11:15:07.213000 -CVE-2024-50219,1,1,06813312321501feccb3f75265b5fab72869e03153e4e88d16e6d98c0d01b70a,2024-11-09T11:15:07.373000 +CVE-2024-50212,0,0,8077d1171418ca9bc9860647456940aeb5c16059ffd13b0fd8715b7d60c11459,2024-11-09T11:15:04.940000 +CVE-2024-50213,0,0,a32bab53a71793c08dddb8f7f865e54824fbfa96901995c3b6fe811063e0e84d,2024-11-09T11:15:06.650000 +CVE-2024-50214,0,0,8b8c33745112fd2676515d8eae5fa19e36aab72b9a92708d4eed07cf18d02ae8,2024-11-09T11:15:06.777000 +CVE-2024-50215,0,0,51deedf9e51b9010196feb8434c74c41c571fa0dfa190b3bcc95c654d401acfa,2024-11-09T11:15:06.893000 +CVE-2024-50216,0,0,dd18627c652b541fcc71e8055f8b9b54a97ee1c452f87671395ddb6c7c0effe5,2024-11-09T11:15:06.987000 +CVE-2024-50217,0,0,f1f9a2585721ca44599dff7237e3c4e7abb72e154ac4bfb5a6e8176e15581aa4,2024-11-09T11:15:07.103000 +CVE-2024-50218,0,0,a1e0ddbb039c77513f3d3ef127e35268d6a74599810a96ae07cfefd1c53ddc78,2024-11-09T11:15:07.213000 +CVE-2024-50219,0,0,06813312321501feccb3f75265b5fab72869e03153e4e88d16e6d98c0d01b70a,2024-11-09T11:15:07.373000 CVE-2024-5022,0,0,b83f09821687b900e7e3c962c3fdf76320d3bf46277a4004f5c59e7ba07e152d,2024-10-28T21:35:22.210000 -CVE-2024-50220,1,1,3378fdb1fc18a5a841a545e889b5ac91573032b494633fa4e5ccfb9c04f87e68,2024-11-09T11:15:07.487000 -CVE-2024-50221,1,1,6b968bc1e5c76dac654c3003b7e391fdfa86fc18c244cdd09f5cb172c0577127,2024-11-09T11:15:07.600000 -CVE-2024-50222,1,1,4af868e3b94779bb868e11631b27a5e2635974de163fee1d4c95f8dbd6460ef6,2024-11-09T11:15:07.700000 -CVE-2024-50223,1,1,5c85f3afc4741b7eaf9669048aa4b33f46cfa947143c99a6d00df2e0eaec0285,2024-11-09T11:15:07.807000 -CVE-2024-50224,1,1,813cae4da8216fd8e00c8a03218dbe83b5863378706477601975cb8e03ae17eb,2024-11-09T11:15:07.893000 -CVE-2024-50225,1,1,c82e16ac542a9af8c5e044f89e8f77a5a7afb38021a48ad600b7a5a0850e1e58,2024-11-09T11:15:07.990000 -CVE-2024-50226,1,1,ce6d1c13b3fafb5708c88b7c697b5ae368d9adbf1627b886256cec133a3b324e,2024-11-09T11:15:08.117000 -CVE-2024-50227,1,1,490b02f25fed55ec4e384f954960b8334385b22f7454547e4fb9211ca7521b82,2024-11-09T11:15:08.383000 -CVE-2024-50228,1,1,f6ccbb60be51c0481743111e8d58adb17b37650ba7b3969d3547b1e2977000da,2024-11-09T11:15:08.650000 -CVE-2024-50229,1,1,2aca73c691f60076ce4df5eef25d96247951e9dbc0435c48b9fc1f48d9e63582,2024-11-09T11:15:08.890000 +CVE-2024-50220,0,0,3378fdb1fc18a5a841a545e889b5ac91573032b494633fa4e5ccfb9c04f87e68,2024-11-09T11:15:07.487000 +CVE-2024-50221,0,0,6b968bc1e5c76dac654c3003b7e391fdfa86fc18c244cdd09f5cb172c0577127,2024-11-09T11:15:07.600000 +CVE-2024-50222,0,0,4af868e3b94779bb868e11631b27a5e2635974de163fee1d4c95f8dbd6460ef6,2024-11-09T11:15:07.700000 +CVE-2024-50223,0,0,5c85f3afc4741b7eaf9669048aa4b33f46cfa947143c99a6d00df2e0eaec0285,2024-11-09T11:15:07.807000 +CVE-2024-50224,0,0,813cae4da8216fd8e00c8a03218dbe83b5863378706477601975cb8e03ae17eb,2024-11-09T11:15:07.893000 +CVE-2024-50225,0,0,c82e16ac542a9af8c5e044f89e8f77a5a7afb38021a48ad600b7a5a0850e1e58,2024-11-09T11:15:07.990000 +CVE-2024-50226,0,0,ce6d1c13b3fafb5708c88b7c697b5ae368d9adbf1627b886256cec133a3b324e,2024-11-09T11:15:08.117000 +CVE-2024-50227,0,0,490b02f25fed55ec4e384f954960b8334385b22f7454547e4fb9211ca7521b82,2024-11-09T11:15:08.383000 +CVE-2024-50228,0,0,f6ccbb60be51c0481743111e8d58adb17b37650ba7b3969d3547b1e2977000da,2024-11-09T11:15:08.650000 +CVE-2024-50229,0,0,2aca73c691f60076ce4df5eef25d96247951e9dbc0435c48b9fc1f48d9e63582,2024-11-09T11:15:08.890000 CVE-2024-5023,0,0,63ebd4218020d01998ceddb622d35154b9496df68f9db12eb6b4711fe09e7d24,2024-05-17T18:36:31.297000 -CVE-2024-50230,1,1,b1030d37cdd6dd94d5dde8c89212704508451083b02860d01223b7d985e1a76c,2024-11-09T11:15:08.973000 -CVE-2024-50231,1,1,9ff4d0e8dae8de4efa29491884b222a2506e0382b2168d130562a0793a909150,2024-11-09T11:15:09.057000 -CVE-2024-50232,1,1,5412ad8e1520f7405d750b3c73c7d1b18aa7b03fe116351cf5c60ba6c18f3756,2024-11-09T11:15:09.137000 -CVE-2024-50233,1,1,4d6018cd600e899f71a94a1c3da045a0c8393611729bc5550bf7a411e40f0422,2024-11-09T11:15:09.210000 -CVE-2024-50234,1,1,bdceae74d3e2375dc925505ef947e489cfa4c4d0d150b5c1bf7896bffd356609,2024-11-09T11:15:09.280000 -CVE-2024-50235,1,1,c81a7333c5a504d7631902dad859f9fef2fb88ba8e3b25e151e5cf3525984ff2,2024-11-09T11:15:09.367000 -CVE-2024-50236,1,1,d9e357738cd5ea32ab595ecc1ea6cb0b23f08a385fa3429aedb09038a975ad67,2024-11-09T11:15:09.447000 -CVE-2024-50237,1,1,35b3d189d649a32933f01edb35a2bfe5df5c7fa19e24977af5b7275b5ef8ce28,2024-11-09T11:15:09.530000 -CVE-2024-50238,1,1,05e1cf7974d5cb452aa83b22071a35e0221a77e7768b05885fa922f79a4e5936,2024-11-09T11:15:09.613000 -CVE-2024-50239,1,1,ddae09347815c4f530d00390e1fab021f407b0adb0200a8a1b192f48228963af,2024-11-09T11:15:09.680000 +CVE-2024-50230,0,0,b1030d37cdd6dd94d5dde8c89212704508451083b02860d01223b7d985e1a76c,2024-11-09T11:15:08.973000 +CVE-2024-50231,0,0,9ff4d0e8dae8de4efa29491884b222a2506e0382b2168d130562a0793a909150,2024-11-09T11:15:09.057000 +CVE-2024-50232,0,0,5412ad8e1520f7405d750b3c73c7d1b18aa7b03fe116351cf5c60ba6c18f3756,2024-11-09T11:15:09.137000 +CVE-2024-50233,0,0,4d6018cd600e899f71a94a1c3da045a0c8393611729bc5550bf7a411e40f0422,2024-11-09T11:15:09.210000 +CVE-2024-50234,0,0,bdceae74d3e2375dc925505ef947e489cfa4c4d0d150b5c1bf7896bffd356609,2024-11-09T11:15:09.280000 +CVE-2024-50235,0,0,c81a7333c5a504d7631902dad859f9fef2fb88ba8e3b25e151e5cf3525984ff2,2024-11-09T11:15:09.367000 +CVE-2024-50236,0,0,d9e357738cd5ea32ab595ecc1ea6cb0b23f08a385fa3429aedb09038a975ad67,2024-11-09T11:15:09.447000 +CVE-2024-50237,0,0,35b3d189d649a32933f01edb35a2bfe5df5c7fa19e24977af5b7275b5ef8ce28,2024-11-09T11:15:09.530000 +CVE-2024-50238,0,0,05e1cf7974d5cb452aa83b22071a35e0221a77e7768b05885fa922f79a4e5936,2024-11-09T11:15:09.613000 +CVE-2024-50239,0,0,ddae09347815c4f530d00390e1fab021f407b0adb0200a8a1b192f48228963af,2024-11-09T11:15:09.680000 CVE-2024-5024,0,0,9dd3417f324a3df55f488e05c68d1854a15dd73bd49fdda06475c54e037a76e5,2024-09-04T14:33:57.200000 -CVE-2024-50240,1,1,8def74ba3546996afe2e98416087b83dfde794c17094c1a1edb94c0ee9929488,2024-11-09T11:15:09.753000 -CVE-2024-50241,1,1,9b313ad9cd2221c353daa6fdc312f5394d26c653771cfc2df1c133307cf9d5bc,2024-11-09T11:15:09.823000 -CVE-2024-50242,1,1,defa5cdfc14d7d3c38f22d4481681b52752452739d8a0842fc4c3aed56d22535,2024-11-09T11:15:09.920000 -CVE-2024-50243,1,1,5b0a31a05f6390cefad0d512aaf61e3897d7f4a7b04ccf34e7e5671e92c0e1a4,2024-11-09T11:15:10.120000 -CVE-2024-50244,1,1,9a6f131e67ada4b3e4f166c85072709bbf85d08d8623bf1ef6c5f94ea4a31762,2024-11-09T11:15:10.300000 -CVE-2024-50245,1,1,d689f37b2b7084d66bab419ba63fb22eefad70765e1aa3584c78be85513cb273,2024-11-09T11:15:10.470000 -CVE-2024-50246,1,1,bca25d9b05a6530e04bde0aa15f4a1e650b69576838e244a1c38449d9dc30657,2024-11-09T11:15:10.537000 -CVE-2024-50247,1,1,3ff9592197d0a69e4a721dfc0ca7c06c1c1a3d224075e1a1610ec4ba42a85283,2024-11-09T11:15:10.600000 -CVE-2024-50248,1,1,8d68f6871ec9a896816708387e921b695440b483dc015561a17c7d9a4dd55803,2024-11-09T11:15:10.670000 -CVE-2024-50249,1,1,2787e19040b86ef61a17292c4727a9cd1a7320a53c7e8783f3202d62e7b99e26,2024-11-09T11:15:10.743000 +CVE-2024-50240,0,0,8def74ba3546996afe2e98416087b83dfde794c17094c1a1edb94c0ee9929488,2024-11-09T11:15:09.753000 +CVE-2024-50241,0,0,9b313ad9cd2221c353daa6fdc312f5394d26c653771cfc2df1c133307cf9d5bc,2024-11-09T11:15:09.823000 +CVE-2024-50242,0,0,defa5cdfc14d7d3c38f22d4481681b52752452739d8a0842fc4c3aed56d22535,2024-11-09T11:15:09.920000 +CVE-2024-50243,0,0,5b0a31a05f6390cefad0d512aaf61e3897d7f4a7b04ccf34e7e5671e92c0e1a4,2024-11-09T11:15:10.120000 +CVE-2024-50244,0,0,9a6f131e67ada4b3e4f166c85072709bbf85d08d8623bf1ef6c5f94ea4a31762,2024-11-09T11:15:10.300000 +CVE-2024-50245,0,0,d689f37b2b7084d66bab419ba63fb22eefad70765e1aa3584c78be85513cb273,2024-11-09T11:15:10.470000 +CVE-2024-50246,0,0,bca25d9b05a6530e04bde0aa15f4a1e650b69576838e244a1c38449d9dc30657,2024-11-09T11:15:10.537000 +CVE-2024-50247,0,0,3ff9592197d0a69e4a721dfc0ca7c06c1c1a3d224075e1a1610ec4ba42a85283,2024-11-09T11:15:10.600000 +CVE-2024-50248,0,0,8d68f6871ec9a896816708387e921b695440b483dc015561a17c7d9a4dd55803,2024-11-09T11:15:10.670000 +CVE-2024-50249,0,0,2787e19040b86ef61a17292c4727a9cd1a7320a53c7e8783f3202d62e7b99e26,2024-11-09T11:15:10.743000 CVE-2024-5025,0,0,5975a4de967bb092ff1a32c8663c734972c139617eb709a92a7c0cc78b284359,2024-05-22T12:46:53.887000 -CVE-2024-50250,1,1,5b5f0987e77a7545be56b88f55d490c77533b850be58230756bc92ff0855ad5f,2024-11-09T11:15:10.833000 -CVE-2024-50251,1,1,213e4710b796ac6849b81a53d98178d07bfa8b0434fd5e9b5b6d53cd62fadd27,2024-11-09T11:15:10.900000 -CVE-2024-50252,1,1,40979785dd8717fd660eb563cd6f37e3f35694df67b7482afe142afa151c8607,2024-11-09T11:15:10.973000 -CVE-2024-50253,1,1,d8ece0020a8de28080908d909d19d960079ac0f17ba3de47d875329fb6fe5283,2024-11-09T11:15:11.043000 -CVE-2024-50254,1,1,b5a36fa5df5dd8ead6f85b2f703292a91ec905dfe967afd72215f703937817d1,2024-11-09T11:15:11.113000 -CVE-2024-50255,1,1,1379b52d61bac3c3046f1f6031c0303258f75780099f49b1a9e5c6c3c2f6d39f,2024-11-09T11:15:11.183000 -CVE-2024-50256,1,1,b36d838eed10003c0b6e62b6c345d6885dca60af9da07a56a7d206a74d78ac7c,2024-11-09T11:15:11.263000 -CVE-2024-50257,1,1,3eb4f2f83c793a3549f90ed4e5a7a7914935fc5d93a1d2c81d74e2f2b0c1839a,2024-11-09T11:15:11.340000 -CVE-2024-50258,1,1,fbc285d5405aba24b340ad8d9628bcce9f3ff786152928bd3a053e82d6481224,2024-11-09T11:15:11.413000 -CVE-2024-50259,1,1,9505f119d634507830457a8481da367105cd2d69e5a787778823d77383895c6e,2024-11-09T11:15:11.483000 -CVE-2024-50260,1,1,fc4cef5cf9d349d410ca1c97d5743d6a1870d568c5b285bfc5df24088371adb6,2024-11-09T11:15:11.550000 -CVE-2024-50261,1,1,c7b0c5cb53afcfabb0ce1805397f6b93d637df35741bb2601e07e11bb4679803,2024-11-09T11:15:11.610000 -CVE-2024-50262,1,1,3571cc23e83cb0fd0612ed425e1b46385cde83393258e2fe4bbbc81ff1ef3dba,2024-11-09T11:15:11.687000 +CVE-2024-50250,0,0,5b5f0987e77a7545be56b88f55d490c77533b850be58230756bc92ff0855ad5f,2024-11-09T11:15:10.833000 +CVE-2024-50251,0,0,213e4710b796ac6849b81a53d98178d07bfa8b0434fd5e9b5b6d53cd62fadd27,2024-11-09T11:15:10.900000 +CVE-2024-50252,0,0,40979785dd8717fd660eb563cd6f37e3f35694df67b7482afe142afa151c8607,2024-11-09T11:15:10.973000 +CVE-2024-50253,0,0,d8ece0020a8de28080908d909d19d960079ac0f17ba3de47d875329fb6fe5283,2024-11-09T11:15:11.043000 +CVE-2024-50254,0,0,b5a36fa5df5dd8ead6f85b2f703292a91ec905dfe967afd72215f703937817d1,2024-11-09T11:15:11.113000 +CVE-2024-50255,0,0,1379b52d61bac3c3046f1f6031c0303258f75780099f49b1a9e5c6c3c2f6d39f,2024-11-09T11:15:11.183000 +CVE-2024-50256,0,0,b36d838eed10003c0b6e62b6c345d6885dca60af9da07a56a7d206a74d78ac7c,2024-11-09T11:15:11.263000 +CVE-2024-50257,0,0,3eb4f2f83c793a3549f90ed4e5a7a7914935fc5d93a1d2c81d74e2f2b0c1839a,2024-11-09T11:15:11.340000 +CVE-2024-50258,0,0,fbc285d5405aba24b340ad8d9628bcce9f3ff786152928bd3a053e82d6481224,2024-11-09T11:15:11.413000 +CVE-2024-50259,0,0,9505f119d634507830457a8481da367105cd2d69e5a787778823d77383895c6e,2024-11-09T11:15:11.483000 +CVE-2024-50260,0,0,fc4cef5cf9d349d410ca1c97d5743d6a1870d568c5b285bfc5df24088371adb6,2024-11-09T11:15:11.550000 +CVE-2024-50261,0,0,c7b0c5cb53afcfabb0ce1805397f6b93d637df35741bb2601e07e11bb4679803,2024-11-09T11:15:11.610000 +CVE-2024-50262,0,0,3571cc23e83cb0fd0612ed425e1b46385cde83393258e2fe4bbbc81ff1ef3dba,2024-11-09T11:15:11.687000 CVE-2024-5028,0,0,6e4747168a055d3478d0389157f1378a0e5efd7245fc9814fa65e0cf7f805db7,2024-08-01T13:59:38.360000 CVE-2024-50307,0,0,6d2dcfccb50c0c30fd7d9bda3b36490982da8110db31d087befc4509a1d360cd,2024-10-28T13:58:09.230000 CVE-2024-5031,0,0,5b0fce1eabb88a37a871d927606cb4ca5166c3808ddca60f777848c692bab12e,2024-05-22T12:46:53.887000 @@ -265052,19 +265053,41 @@ CVE-2024-51601,0,0,f8b0bc7018ab4fb0f5b29df67ee6a52450a85971ea8523f8447f639564764 CVE-2024-51602,0,0,65910ca8054ba2d0ef40813e9d218a919298c86ebf4463cb39fe4d811225069d,2024-11-09T09:15:04.403000 CVE-2024-51607,0,0,28fe43e9d11499b5739098fd9475a33578baad8f3faf8e60106ba9d94e101c47,2024-11-09T09:15:04.723000 CVE-2024-5161,0,0,f120c7db938e25c7983d6c400da502880d5ffbc93ab4e5e05351c3fca8fbd038,2024-07-24T17:54:42.387000 +CVE-2024-51611,1,1,a1c7b55632766f999c50ceb474bf5f93e764cbd367cb56a7927e094170189144,2024-11-09T14:15:14.537000 +CVE-2024-51612,1,1,d8d2e5a1952fe97366d1c883146d86d637e6ae1be4513530a155b064f5a4e97a,2024-11-09T14:15:14.770000 +CVE-2024-51613,1,1,48814c5d9d29b48337bf1136921b5b454eeba534aa2d124ee032c8ef2d29bc5b,2024-11-09T14:15:14.990000 +CVE-2024-51614,1,1,66b5ee90c0b302197539773507e7f0338f93673fb5307ab2361bdf419f940792,2024-11-09T14:15:15.187000 +CVE-2024-51616,1,1,653099b3f9d615e96ef521899bb7255853291da598e979248b6eb7d01eb685bb,2024-11-09T14:15:15.417000 +CVE-2024-51618,1,1,d976054d82d5bb3ea7ea0958fb4ecf5aa799039b69fa23f94f32ba3245df268b,2024-11-09T14:15:15.630000 CVE-2024-51619,0,0,7b9adbce50334715f82819683106fe3ca0247002f17902275c59943d46b23204,2024-11-09T09:15:04.983000 CVE-2024-5162,0,0,b916c521cfe3c1fb21956086b784f2a8541eeb514496e084206ecc726f921efe,2024-07-24T17:53:33.277000 CVE-2024-51620,0,0,7d0acc8ee40b0da77b9bec95101bf225073669c749a76a9d899e37667b64ff78,2024-11-09T09:15:05.247000 CVE-2024-51621,0,0,59ea035e973ab580040b393bdf2cc624eec820b33cf6034f0d0943109bf96201,2024-11-09T09:15:05.497000 +CVE-2024-51622,1,1,1eada15ab74d6261ce50edc6dcbfbbc53df4041acde919713e1b3c1c4c9cfa9b,2024-11-09T14:15:15.853000 +CVE-2024-51623,1,1,36aebd755c038291ef97f2f2dedb04a62422773ef73ec688924e7594d7d8d6e7,2024-11-09T14:15:16.133000 CVE-2024-51625,0,0,8f6ea3e64ef4e03be272a1ab231fad97165aa74a282a4b2739c0a669e23c823d,2024-11-09T09:15:05.733000 CVE-2024-51626,0,0,1464c1c98efb870dcd3b5a35eb6a7feff3782c73b32d47b788148d4cc3703554,2024-11-06T22:10:20.517000 +CVE-2024-51627,1,1,3987fc7e4b19f279249f81a7a5f92b4edd1a83e7e27f219ba58783bbc955f955,2024-11-09T14:15:16.373000 +CVE-2024-51628,1,1,9683a1b51e2141c5aaea7f5761bcf5dc62b4f3a87a9f899c4d886daf8202a64f,2024-11-09T14:15:16.617000 +CVE-2024-51629,1,1,f7dfaa256319ab8c464cbdac1af7606f7a9e1e9ed1f1c4211e59d3588749a149,2024-11-09T14:15:16.853000 CVE-2024-5163,0,0,1f45f157a740def8c3f1c2e097025198bc2166983108f63600058e7c57408d30,2024-08-21T06:15:07.277000 +CVE-2024-51630,1,1,fc67eb80447636da8d65b0e2386d7d6d62133ea4a85bea96b3f40f61f9d84b9b,2024-11-09T14:15:17.087000 +CVE-2024-51647,1,1,6cee56c73700c88b2e5e771d2e4006f6b88cbe6ef680926f4cf2d1a45e661d28,2024-11-09T14:15:17.350000 CVE-2024-5165,0,0,2b7469c3d25cc1e03e7fcca1607bc78daf489d82c018a0fbc4f3b815c328cf85,2024-05-24T01:15:30.977000 CVE-2024-5166,0,0,5c544eab21844e01fabd3874ed7776a55145987bd3a510311ad16f12f33bd2bc,2024-05-22T18:59:20.240000 CVE-2024-51661,0,0,7f81708d1fd43600536029afc897b01b4855aee3d2fe39c5692b8132139274de,2024-11-08T15:02:08.660000 +CVE-2024-51662,1,1,225d29dd5640c7c45c1e26d4498f88ea1e5653b3e37bd0ad4bb7ee0e586c445c,2024-11-09T14:15:17.617000 +CVE-2024-51663,1,1,e065d28cbd78e5d78380c9b6924808f93eead066733fc551ee2f95335b54ca02,2024-11-09T14:15:17.847000 +CVE-2024-51664,1,1,fd4da8775bbcd91f9ae362b4499b35e9d20c4835f76cb62ca1138161e341e89a,2024-11-09T14:15:18.067000 CVE-2024-51665,0,0,836ecda2a38ee75dca042d09339ec8247ed79262a6a8d01bd25035a2e84a5ce0,2024-11-06T22:07:10.707000 +CVE-2024-51668,1,1,45893e8ee84b50abf282ca7d929600355d535d1e7526c2e5bb9fec883bd0859a,2024-11-09T14:15:18.297000 CVE-2024-5167,0,0,a26d674346a63d8730649864e3fcc22e33fb8b5877ed990bcd49874aef8d8c48,2024-08-01T13:59:41.660000 +CVE-2024-51670,1,1,b19e521288dd022fe50273909f6653592a16ca8567641be8ee6fdb5e7121e770,2024-11-09T13:15:05.007000 CVE-2024-51672,0,0,14a5ef0a87d874231b0f786642aa34aa9f0064d5c86f2b9992f4fe90d62559ab,2024-11-06T22:08:22.747000 +CVE-2024-51673,1,1,b94093fc96f19a118bd1c1dc2b0b7d8b44f195b9d68e7545de95134408948336,2024-11-09T13:15:05.230000 +CVE-2024-51674,1,1,293a8b97cc6ca1872e02037fb85f982a489a3d079d796603861223dd6f457ab1,2024-11-09T13:15:05.450000 +CVE-2024-51675,1,1,e723fdf261b084ca50aa87431a61db2993a12441ad55fce02442a070690ca250,2024-11-09T13:15:05.683000 +CVE-2024-51676,1,1,2972f05834e68f749c184700880499939a46d588904a5070d0cc6d018cd24023,2024-11-09T13:15:05.927000 CVE-2024-51677,0,0,8b0f7a3853108bd14021b832cd2914a4bbd49dc774029c03bf84670c6d192320,2024-11-06T22:10:31.677000 CVE-2024-51678,0,0,ce4086679232add4ebc40be30bdc12f20f02b66e38c181d2556e9473603941fd,2024-11-06T22:10:45.103000 CVE-2024-5168,0,0,cbe1b6c96aef7b506dd526cf00951c936dfc5233fd9563b4af0bf7fdab7a5899,2024-05-24T01:15:30.977000 @@ -265073,21 +265096,38 @@ CVE-2024-51681,0,0,6987ab81beb2df0eaa9da220f2d791ed5d8df3f0e18bd37d9a9b390a4eaf5 CVE-2024-51682,0,0,aaba0581a3d811571ae104155388a45dd47ae531ed284c6ab0022efdb152fbe5,2024-11-06T22:12:02.353000 CVE-2024-51683,0,0,f59d50717ee7305489d521abf4c5c1ef491e4436568b0e3c6dd145e0ad77427b,2024-11-06T22:12:19.803000 CVE-2024-51685,0,0,3ec6f589ce8427b20bd90f3e3168669c47fda17fa0f474f038e9a6e94e0e60b9,2024-11-06T19:34:31.590000 +CVE-2024-51689,1,1,4b02db191a01a74ea86a20ac2c12d173860ae323c11060fa4a313fcb0453e005,2024-11-09T13:15:06.187000 CVE-2024-5169,0,0,882a6aa1fee4c71f4df51ce353ec6b27431ae776e2b2b23b3c5ba8c59ca21797,2024-08-02T15:00:10.200000 +CVE-2024-51690,1,1,a1107b226e64bd8a908e28eb408c5982aace0252b481e97fd57be8894f1c30b3,2024-11-09T13:15:06.407000 +CVE-2024-51691,1,1,c67cdc2a1abf2c7c4c1d4ff938df5febaf90fa6c1949d81699057299ad6f4285,2024-11-09T13:15:06.640000 +CVE-2024-51692,1,1,a880e41212d7b5b763eee1de97a818edc7a8a29179032edbdf2a42a3114c3fc3,2024-11-09T13:15:06.883000 +CVE-2024-51693,1,1,01e90e0e11252f65a521f9a56f79f2f323f24dad6966ca78613a4279984a854d,2024-11-09T13:15:07.107000 +CVE-2024-51694,1,1,58a390e719eac00c6f2787f5b67aff47ecebdfc6251e88d15164c55f83ff2d52,2024-11-09T13:15:07.343000 +CVE-2024-51695,1,1,b0a09db47190280a5dc7f1c5e286bed66536118f7e4451e0712c3c5fee574e7b,2024-11-09T13:15:07.563000 +CVE-2024-51696,1,1,92afedba171f3d4ddf64acb30522d5031fa65f3b67af374beeeae463bdd58421,2024-11-09T13:15:07.803000 +CVE-2024-51697,1,1,9a339e1dc9a4848222f6f3c6fd2ca6085d4d93bf386bd07c519c33e06d03cb9c,2024-11-09T13:15:08.033000 +CVE-2024-51698,1,1,534d63ca17301e528996b2d0ff4607777e9379646bac1df9bbd4206cce01cc42,2024-11-09T13:15:08.273000 +CVE-2024-51699,1,1,f1589a26184c0455635d6264964baec6d9fd1ad1f758c7701da30f834eea9a37,2024-11-09T13:15:08.500000 CVE-2024-5170,0,0,0357b8fbab1b76f01ca0dd625bf87ec8b80f7fd2d35927c69b68200ba07a11a4,2024-09-27T18:23:43.833000 -CVE-2024-51707,1,1,653f48822186a64063468afd41d498eebdde5e1d2b8592a130c66947f4a92df7,2024-11-09T12:15:17.690000 -CVE-2024-51708,1,1,a7e8a22091fee396d12d24a7e749dabf3bd134ce26fe9f343f076641c7efbae0,2024-11-09T12:15:17.927000 -CVE-2024-51709,1,1,1f69180db7eba60804bb79547de0f2a15b9310b317034b0ad4b978de84b58adf,2024-11-09T12:15:18.137000 +CVE-2024-51701,1,1,9903779181d3ee22d28c36badb8c727977596ad7caac2b315b723982fa61e725,2024-11-09T13:15:08.713000 +CVE-2024-51702,1,1,fd0ec083eac61a5afa0c154f404694818eb529a317ba50c6f6c36f9ded067a2c,2024-11-09T13:15:08.940000 +CVE-2024-51703,1,1,e5ccbcdc94e42b283eeeec72c694f620a16b7a7d570b633a95e0c93014ed80d8,2024-11-09T13:15:09.173000 +CVE-2024-51704,1,1,a25d6e4498cf769bf1566fe966d1b5015fca03630bc854be0e89f88d1f280a89,2024-11-09T13:15:09.410000 +CVE-2024-51705,1,1,f71f41e5339efd5f196e87b48dac24788bf2b41543f86cbb336e4509ee07004d,2024-11-09T13:15:09.617000 +CVE-2024-51706,1,1,813245e45ad3eea40151ece807c41aa51abb8072e263faf398baa248fa181b40,2024-11-09T13:15:09.853000 +CVE-2024-51707,0,0,653f48822186a64063468afd41d498eebdde5e1d2b8592a130c66947f4a92df7,2024-11-09T12:15:17.690000 +CVE-2024-51708,0,0,a7e8a22091fee396d12d24a7e749dabf3bd134ce26fe9f343f076641c7efbae0,2024-11-09T12:15:17.927000 +CVE-2024-51709,0,0,1f69180db7eba60804bb79547de0f2a15b9310b317034b0ad4b978de84b58adf,2024-11-09T12:15:18.137000 CVE-2024-5171,0,0,dd574bf92e93c62d270c5e3b0cb384556e01dba1d43a5b9db2a02845fa564cb4,2024-07-23T18:09:56.753000 -CVE-2024-51710,1,1,220fbd3a528c2f19f231ce759e770ab137210f7dac5492b6f005a3fdee38f8fc,2024-11-09T12:15:18.347000 -CVE-2024-51711,1,1,915726a9568184d9abdb5d0b92953dd48d47aaa655a4869fa852283752ca87b2,2024-11-09T12:15:18.553000 -CVE-2024-51712,1,1,a80f52a7eae350133502d6f08945a55b810de8f7f507e39d5ad73d1bf36a6e24,2024-11-09T12:15:18.763000 -CVE-2024-51713,1,1,1cecb4cac8ca7d8a219204b75de29f844bead52141bf8ba2ac7819ac6ef90b4d,2024-11-09T12:15:18.967000 -CVE-2024-51714,1,1,7d4c6ef288b72d0192681b9eb1162922c1d5432c8127699df1200de9fd459d9f,2024-11-09T12:15:19.177000 -CVE-2024-51716,1,1,7e35e8484646b5056cc16d89d501e03529e22ce523c866367012a5f99a8e4bcd,2024-11-09T12:15:19.380000 -CVE-2024-51717,1,1,eb3e9e920809e461fd3f578e6c59f47b96b8f3fa024d68a5bf5d9d2f7790c272,2024-11-09T12:15:19.590000 -CVE-2024-51718,1,1,ee1fbb4ca4fefe2cc34f12d3a47e678291fb8dd4def6ee58c68ce17307ef96df,2024-11-09T12:15:19.797000 -CVE-2024-51719,1,1,ee07ccdb5af63a1703f92f6e8fc87d746aaa1b8abfa642c7f65d118fce1fa1a3,2024-11-09T12:15:20 +CVE-2024-51710,0,0,220fbd3a528c2f19f231ce759e770ab137210f7dac5492b6f005a3fdee38f8fc,2024-11-09T12:15:18.347000 +CVE-2024-51711,0,0,915726a9568184d9abdb5d0b92953dd48d47aaa655a4869fa852283752ca87b2,2024-11-09T12:15:18.553000 +CVE-2024-51712,0,0,a80f52a7eae350133502d6f08945a55b810de8f7f507e39d5ad73d1bf36a6e24,2024-11-09T12:15:18.763000 +CVE-2024-51713,0,0,1cecb4cac8ca7d8a219204b75de29f844bead52141bf8ba2ac7819ac6ef90b4d,2024-11-09T12:15:18.967000 +CVE-2024-51714,0,0,7d4c6ef288b72d0192681b9eb1162922c1d5432c8127699df1200de9fd459d9f,2024-11-09T12:15:19.177000 +CVE-2024-51716,0,0,7e35e8484646b5056cc16d89d501e03529e22ce523c866367012a5f99a8e4bcd,2024-11-09T12:15:19.380000 +CVE-2024-51717,0,0,eb3e9e920809e461fd3f578e6c59f47b96b8f3fa024d68a5bf5d9d2f7790c272,2024-11-09T12:15:19.590000 +CVE-2024-51718,0,0,ee1fbb4ca4fefe2cc34f12d3a47e678291fb8dd4def6ee58c68ce17307ef96df,2024-11-09T12:15:19.797000 +CVE-2024-51719,0,0,ee07ccdb5af63a1703f92f6e8fc87d746aaa1b8abfa642c7f65d118fce1fa1a3,2024-11-09T12:15:20 CVE-2024-5172,0,0,b469524ff2309ced9aec08b056578c23e8b8b5248adb8fcea2b38cb214c81275,2024-07-05T14:05:48.213000 CVE-2024-5173,0,0,e808cbd0ff507575dfa32503bcc3a2123c9461298f1a4a4ef8cd294367da6464,2024-06-26T12:44:29.693000 CVE-2024-51734,0,0,1cd13d8635d39c437cbb33b350735ec8f4fced2309825670ef2275f584df030b,2024-11-05T20:35:26.167000 @@ -265106,10 +265146,10 @@ CVE-2024-51755,0,0,8da46be2050120e871a46966a709a4a6c341c8b76decbe7d2852b8155e882 CVE-2024-51756,0,0,7e7db3439c4e45c36bf53dc70dbe779b982ce3f3056b8757e470dab737dd37ba,2024-11-06T18:17:17.287000 CVE-2024-51757,0,0,4a6a6f5d284f7e398e40f49b0f871e08dca74b70a20c565e444a807f2ff3adcf,2024-11-08T19:01:25.633000 CVE-2024-51758,0,0,f380eb8d34567367d647061664429271d9307b0015af8f1ccfbeb527fa9b8011,2024-11-08T19:01:03.880000 -CVE-2024-51759,1,1,98bdf5795d7a0eadca8c3afd625aff6f9233ca8dad759d07aa9aeecda3e9a6f0,2024-11-09T12:15:20.200000 +CVE-2024-51759,0,0,98bdf5795d7a0eadca8c3afd625aff6f9233ca8dad759d07aa9aeecda3e9a6f0,2024-11-09T12:15:20.200000 CVE-2024-5176,0,0,095b03ddd1cdcd739bbe8693b41d7d6e416f60f9815e0be55e0b3850508434d9,2024-06-05T15:15:12.620000 -CVE-2024-51760,1,1,b8e9214872eebcd60586af94fe883c7493376439ef5fe1e8b433c29e59855952,2024-11-09T12:15:20.403000 -CVE-2024-51761,1,1,6b6fdae550e73c7050138825e6043c31fb6c4c070dd2a6d7c4c7cd4f029d2afe,2024-11-09T12:15:20.603000 +CVE-2024-51760,0,0,b8e9214872eebcd60586af94fe883c7493376439ef5fe1e8b433c29e59855952,2024-11-09T12:15:20.403000 +CVE-2024-51761,0,0,6b6fdae550e73c7050138825e6043c31fb6c4c070dd2a6d7c4c7cd4f029d2afe,2024-11-09T12:15:20.603000 CVE-2024-51762,0,0,ca079a1d49593526d88752ec0ce9c376b73175b8636f57cd56a98ed1c41ac65f,2024-11-09T10:15:06.593000 CVE-2024-51763,0,0,445f6974f545868d7470c2814a22283c917440732d4fef8fbde8ccbf6e0070a3,2024-11-09T10:15:06.930000 CVE-2024-5177,0,0,4596ccdb96b84f0f6003dc91187b58acc558e0743564be9aa6ad28db4e46749c,2024-05-24T01:15:30.977000