mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2024-06-09T20:00:18.845658+00:00
This commit is contained in:
parent
f0a4ce251e
commit
cd4efe9b0f
55
CVE-2024/CVE-2024-312xx/CVE-2024-31275.json
Normal file
55
CVE-2024/CVE-2024-312xx/CVE-2024-31275.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31275",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-09T19:15:50.057",
|
||||
"lastModified": "2024-06-09T19:15:50.057",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Metagauss EventPrime.This issue affects EventPrime: from n/a through 3.3.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/eventprime-event-calendar-management/wordpress-eventprime-plugin-3-3-4-booking-price-manipulation-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-312xx/CVE-2024-31276.json
Normal file
55
CVE-2024/CVE-2024-312xx/CVE-2024-31276.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31276",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-09T19:15:50.300",
|
||||
"lastModified": "2024-06-09T19:15:50.300",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in WPFactory Products, Order & Customers Export for WooCommerce.This issue affects Products, Order & Customers Export for WooCommerce: from n/a through 2.0.8."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/export-woocommerce/wordpress-products-order-customers-export-for-woocommerce-plugin-2-0-8-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-312xx/CVE-2024-31283.json
Normal file
55
CVE-2024/CVE-2024-312xx/CVE-2024-31283.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31283",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-09T19:15:50.527",
|
||||
"lastModified": "2024-06-09T19:15:50.527",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in zorem Advanced Local Pickup for WooCommerce.This issue affects Advanced Local Pickup for WooCommerce: from n/a through 1.6.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/advanced-local-pickup-for-woocommerce/wordpress-advanced-local-pickup-for-woocommerce-plugin-1-6-2-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-312xx/CVE-2024-31284.json
Normal file
55
CVE-2024/CVE-2024-312xx/CVE-2024-31284.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31284",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-09T19:15:50.743",
|
||||
"lastModified": "2024-06-09T19:15:50.743",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in WPDeveloper EmbedPress.This issue affects EmbedPress: from n/a through 3.9.8."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/embedpress/wordpress-embedpress-plugin-3-9-8-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-313xx/CVE-2024-31304.json
Normal file
55
CVE-2024/CVE-2024-313xx/CVE-2024-31304.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31304",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-09T19:15:50.967",
|
||||
"lastModified": "2024-06-09T19:15:50.967",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in MultiVendorX WC Marketplace.This issue affects WC Marketplace: from n/a through 4.1.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/dc-woocommerce-multi-vendor/wordpress-multivendorx-marketplace-4-1-3-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-313xx/CVE-2024-31307.json
Normal file
55
CVE-2024/CVE-2024-313xx/CVE-2024-31307.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31307",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-09T18:15:09.467",
|
||||
"lastModified": "2024-06-09T18:15:09.467",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in appscreo Easy Social Share Buttons.This issue affects Easy Social Share Buttons: from n/a through 9.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/easy-social-share-buttons3/wordpress-easy-social-share-buttons-plugin-9-4-multiple-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-313xx/CVE-2024-31347.json
Normal file
55
CVE-2024/CVE-2024-313xx/CVE-2024-31347.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31347",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-09T18:15:09.710",
|
||||
"lastModified": "2024-06-09T18:15:09.710",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Data443 Tracking Code Manager.This issue affects Tracking Code Manager: from n/a through 2.1.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/tracking-code-manager/wordpress-tracking-code-manager-plugin-2-1-0-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-313xx/CVE-2024-31350.json
Normal file
55
CVE-2024/CVE-2024-313xx/CVE-2024-31350.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31350",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-09T18:15:09.943",
|
||||
"lastModified": "2024-06-09T18:15:09.943",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in AWP Classifieds Team AWP Classifieds.This issue affects AWP Classifieds: from n/a through 4.3.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/another-wordpress-classifieds-plugin/wordpress-awp-classifieds-plugin-4-3-1-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-313xx/CVE-2024-31352.json
Normal file
55
CVE-2024/CVE-2024-313xx/CVE-2024-31352.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31352",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-09T18:15:10.170",
|
||||
"lastModified": "2024-06-09T18:15:10.170",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Email Subscribers & Newsletters.This issue affects Email Subscribers & Newsletters: from n/a through 5.7.13."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/email-subscribers/wordpress-icegram-express-plugin-5-7-13-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-313xx/CVE-2024-31359.json
Normal file
55
CVE-2024/CVE-2024-313xx/CVE-2024-31359.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31359",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-09T18:15:10.387",
|
||||
"lastModified": "2024-06-09T18:15:10.387",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Premmerce Premmerce Product Filter for WooCommerce.This issue affects Premmerce Product Filter for WooCommerce: from n/a through 3.7.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/premmerce-woocommerce-product-filter/wordpress-premmerce-product-filter-for-woocommerce-plugin-3-7-2-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-314xx/CVE-2024-31423.json
Normal file
55
CVE-2024/CVE-2024-314xx/CVE-2024-31423.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-31423",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-09T18:15:10.617",
|
||||
"lastModified": "2024-06-09T18:15:10.617",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Alex Volkov WP Accessibility Helper (WAH).This issue affects WP Accessibility Helper (WAH): from n/a through 0.6.2.5."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-accessibility-helper/wordpress-wp-accessibility-helper-wah-plugin-0-6-2-5-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-320xx/CVE-2024-32081.json
Normal file
55
CVE-2024/CVE-2024-320xx/CVE-2024-32081.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-32081",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-09T19:15:51.203",
|
||||
"lastModified": "2024-06-09T19:15:51.203",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Websupporter Filter Custom Fields & Taxonomies Light.This issue affects Filter Custom Fields & Taxonomies Light: from n/a through 1.05."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/filter-custom-fields-taxonomies-light/wordpress-filter-custom-fields-taxonomies-light-plugin-1-05-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-327xx/CVE-2024-32701.json
Normal file
55
CVE-2024/CVE-2024-327xx/CVE-2024-32701.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-32701",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-09T18:15:10.823",
|
||||
"lastModified": "2024-06-09T18:15:10.823",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in InstaWP Team InstaWP Connect.This issue affects InstaWP Connect: from n/a through 0.1.0.24."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/instawp-connect/wordpress-instawp-connect-plugin-0-1-0-24-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-327xx/CVE-2024-32703.json
Normal file
55
CVE-2024/CVE-2024-327xx/CVE-2024-32703.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-32703",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-09T18:15:11.047",
|
||||
"lastModified": "2024-06-09T18:15:11.047",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in reputeinfosystems ARForms.This issue affects ARForms: from n/a through 6.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.7,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/arforms/wordpress-arforms-plugin-6-4-subscriber-arbitrary-file-deletion-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-327xx/CVE-2024-32704.json
Normal file
55
CVE-2024/CVE-2024-327xx/CVE-2024-32704.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-32704",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-09T18:15:11.263",
|
||||
"lastModified": "2024-06-09T18:15:11.263",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in reputeinfosystems ARForms.This issue affects ARForms: from n/a through 6.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/arforms/wordpress-arforms-plugin-6-4-subscriber-arbitrary-wordpress-options-removal-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-327xx/CVE-2024-32705.json
Normal file
55
CVE-2024/CVE-2024-327xx/CVE-2024-32705.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-32705",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-09T18:15:11.483",
|
||||
"lastModified": "2024-06-09T18:15:11.483",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in reputeinfosystems ARForms.This issue affects ARForms: from n/a through 6.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/arforms/wordpress-arforms-plugin-6-4-subscriber-arbitrary-plugin-activation-deactivation-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-327xx/CVE-2024-32713.json
Normal file
55
CVE-2024/CVE-2024-327xx/CVE-2024-32713.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-32713",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-09T18:15:11.723",
|
||||
"lastModified": "2024-06-09T18:15:11.723",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in AutoWriter AI Post Generator | AutoWriter.This issue affects AI Post Generator | AutoWriter: from n/a through 3.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/ai-post-generator/wordpress-ai-post-generator-autowriter-plugin-3-3-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-348xx/CVE-2024-34802.json
Normal file
55
CVE-2024/CVE-2024-348xx/CVE-2024-34802.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-34802",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-09T19:15:51.423",
|
||||
"lastModified": "2024-06-09T19:15:51.423",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in AdFoxly AdFoxly \u2013 Ad Manager, AdSense Ads & Ads.Txt.This issue affects AdFoxly \u2013 Ad Manager, AdSense Ads & Ads.Txt: from n/a through 1.8.5."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/adfoxly/wordpress-adfoxly-plugin-1-8-5-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-356xx/CVE-2024-35661.json
Normal file
55
CVE-2024/CVE-2024-356xx/CVE-2024-35661.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-35661",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-09T19:15:51.653",
|
||||
"lastModified": "2024-06-09T19:15:51.653",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in SoftLab Upload Fields for WPForms.This issue affects Upload Fields for WPForms: from n/a through 1.0.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/upload-fields-for-wpforms/wordpress-upload-fields-for-wpforms-plugin-1-0-2-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-356xx/CVE-2024-35662.json
Normal file
55
CVE-2024/CVE-2024-356xx/CVE-2024-35662.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-35662",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-09T19:15:51.870",
|
||||
"lastModified": "2024-06-09T19:15:51.870",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Andreas Sofantzis Simple COD Fees for WooCommerce.This issue affects Simple COD Fees for WooCommerce: from n/a through 2.0.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/simple-cod-fee-for-woocommerce/wordpress-simple-cod-fees-for-woocommerce-plugin-2-0-2-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-357xx/CVE-2024-35748.json
Normal file
55
CVE-2024/CVE-2024-357xx/CVE-2024-35748.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-35748",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-09T19:15:52.093",
|
||||
"lastModified": "2024-06-09T19:15:52.093",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in OPMC WooCommerce Dropshipping.This issue affects WooCommerce Dropshipping: from n/a through 5.0.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/woocommerce-dropshipping/wordpress-woocommerce-dropshipping-plugin-5-0-4-unauthenticated-arbitrary-email-sending-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-375xx/CVE-2024-37568.json
Normal file
20
CVE-2024/CVE-2024-375xx/CVE-2024-37568.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-37568",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-09T19:15:52.323",
|
||||
"lastModified": "2024-06-09T19:15:52.323",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "lepture Authlib before 1.3.1 has algorithm confusion with asymmetric public keys. Unless an algorithm is specified in a jwt.decode call, HMAC verification is allowed with any asymmetric public key. (This is similar to CVE-2022-29217 and CVE-2024-33663.)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/lepture/authlib/issues/654",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2024/CVE-2024-54xx/CVE-2024-5458.json
Normal file
43
CVE-2024/CVE-2024-54xx/CVE-2024-5458.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2024-5458",
|
||||
"sourceIdentifier": "security@php.net",
|
||||
"published": "2024-06-09T19:15:52.397",
|
||||
"lastModified": "2024-06-09T19:15:52.397",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In PHP versions\u00a08.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, due to a code logic error, filtering functions such as filter_var when validating URLs\u00a0(FILTER_VALIDATE_URL) for certain types of URLs the function will result in invalid user information (username + password part of URLs) being treated as valid user information. This may lead to the downstream code accepting invalid URLs as valid and parsing them incorrectly."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@php.net",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/php/php-src/security/advisories/GHSA-w8qr-v226-r27w",
|
||||
"source": "security@php.net"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-55xx/CVE-2024-5585.json
Normal file
59
CVE-2024/CVE-2024-55xx/CVE-2024-5585.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-5585",
|
||||
"sourceIdentifier": "security@php.net",
|
||||
"published": "2024-06-09T19:15:52.597",
|
||||
"lastModified": "2024-06-09T19:15:52.597",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In PHP versions\u00a08.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, the fix for\u00a0CVE-2024-1874 does not work if the command name includes trailing spaces. Original issue:\u00a0when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@php.net",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.7,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@php.net",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-116"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/php/php-src/security/advisories/GHSA-9fcc-425m-g385",
|
||||
"source": "security@php.net"
|
||||
}
|
||||
]
|
||||
}
|
35
README.md
35
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-06-09T18:00:18.068019+00:00
|
||||
2024-06-09T20:00:18.845658+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-06-09T17:15:49.380000+00:00
|
||||
2024-06-09T19:15:52.597000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,16 +33,37 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
253176
|
||||
253200
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `3`
|
||||
Recently added CVEs: `24`
|
||||
|
||||
- [CVE-2024-32714](CVE-2024/CVE-2024-327xx/CVE-2024-32714.json) (`2024-06-09T17:15:49.040`)
|
||||
- [CVE-2024-32715](CVE-2024/CVE-2024-327xx/CVE-2024-32715.json) (`2024-06-09T17:15:49.270`)
|
||||
- [CVE-2024-32725](CVE-2024/CVE-2024-327xx/CVE-2024-32725.json) (`2024-06-09T17:15:49.380`)
|
||||
- [CVE-2024-31275](CVE-2024/CVE-2024-312xx/CVE-2024-31275.json) (`2024-06-09T19:15:50.057`)
|
||||
- [CVE-2024-31276](CVE-2024/CVE-2024-312xx/CVE-2024-31276.json) (`2024-06-09T19:15:50.300`)
|
||||
- [CVE-2024-31283](CVE-2024/CVE-2024-312xx/CVE-2024-31283.json) (`2024-06-09T19:15:50.527`)
|
||||
- [CVE-2024-31284](CVE-2024/CVE-2024-312xx/CVE-2024-31284.json) (`2024-06-09T19:15:50.743`)
|
||||
- [CVE-2024-31304](CVE-2024/CVE-2024-313xx/CVE-2024-31304.json) (`2024-06-09T19:15:50.967`)
|
||||
- [CVE-2024-31307](CVE-2024/CVE-2024-313xx/CVE-2024-31307.json) (`2024-06-09T18:15:09.467`)
|
||||
- [CVE-2024-31347](CVE-2024/CVE-2024-313xx/CVE-2024-31347.json) (`2024-06-09T18:15:09.710`)
|
||||
- [CVE-2024-31350](CVE-2024/CVE-2024-313xx/CVE-2024-31350.json) (`2024-06-09T18:15:09.943`)
|
||||
- [CVE-2024-31352](CVE-2024/CVE-2024-313xx/CVE-2024-31352.json) (`2024-06-09T18:15:10.170`)
|
||||
- [CVE-2024-31359](CVE-2024/CVE-2024-313xx/CVE-2024-31359.json) (`2024-06-09T18:15:10.387`)
|
||||
- [CVE-2024-31423](CVE-2024/CVE-2024-314xx/CVE-2024-31423.json) (`2024-06-09T18:15:10.617`)
|
||||
- [CVE-2024-32081](CVE-2024/CVE-2024-320xx/CVE-2024-32081.json) (`2024-06-09T19:15:51.203`)
|
||||
- [CVE-2024-32701](CVE-2024/CVE-2024-327xx/CVE-2024-32701.json) (`2024-06-09T18:15:10.823`)
|
||||
- [CVE-2024-32703](CVE-2024/CVE-2024-327xx/CVE-2024-32703.json) (`2024-06-09T18:15:11.047`)
|
||||
- [CVE-2024-32704](CVE-2024/CVE-2024-327xx/CVE-2024-32704.json) (`2024-06-09T18:15:11.263`)
|
||||
- [CVE-2024-32705](CVE-2024/CVE-2024-327xx/CVE-2024-32705.json) (`2024-06-09T18:15:11.483`)
|
||||
- [CVE-2024-32713](CVE-2024/CVE-2024-327xx/CVE-2024-32713.json) (`2024-06-09T18:15:11.723`)
|
||||
- [CVE-2024-34802](CVE-2024/CVE-2024-348xx/CVE-2024-34802.json) (`2024-06-09T19:15:51.423`)
|
||||
- [CVE-2024-35661](CVE-2024/CVE-2024-356xx/CVE-2024-35661.json) (`2024-06-09T19:15:51.653`)
|
||||
- [CVE-2024-35662](CVE-2024/CVE-2024-356xx/CVE-2024-35662.json) (`2024-06-09T19:15:51.870`)
|
||||
- [CVE-2024-35748](CVE-2024/CVE-2024-357xx/CVE-2024-35748.json) (`2024-06-09T19:15:52.093`)
|
||||
- [CVE-2024-37568](CVE-2024/CVE-2024-375xx/CVE-2024-37568.json) (`2024-06-09T19:15:52.323`)
|
||||
- [CVE-2024-5458](CVE-2024/CVE-2024-54xx/CVE-2024-5458.json) (`2024-06-09T19:15:52.397`)
|
||||
- [CVE-2024-5585](CVE-2024/CVE-2024-55xx/CVE-2024-5585.json) (`2024-06-09T19:15:52.597`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
30
_state.csv
30
_state.csv
@ -248927,6 +248927,8 @@ CVE-2024-31271,0,0,d8228662c1440f14ee742f57032f82398c2055e3f352f6a0fc3cc42050b1d
|
||||
CVE-2024-31272,0,0,cd2f0ad40b656f4b3504a130655e8227ea71f55dca7e33bbe56d00f117fbeb5f,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31273,0,0,54cfd405600d9b80574298d7595776d581beaf2ba258029862c9e909ccea4872,2024-06-09T12:15:11.077000
|
||||
CVE-2024-31274,0,0,a75d17244e4fe5b3993298379f7de1c8d03343755297548614436ffcf2037bc2,2024-06-09T12:15:11.323000
|
||||
CVE-2024-31275,1,1,b171278642d6ea88ca106067167366666c30e3a413673cd8b137d556d072f60a,2024-06-09T19:15:50.057000
|
||||
CVE-2024-31276,1,1,abd68199927cbe8514a7e2f08688c33ff72e72efad4ee671ec05517145c9b53e,2024-06-09T19:15:50.300000
|
||||
CVE-2024-31277,0,0,6d9f95169e2f33c46b0cc3384ba6f4f8c5335f74523b1231fd7b9d9c4e3271a9,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31278,0,0,5fca286ba4fb85e19d6f2aa20a43535dfb21ddcf27d77966f9785126691400ad,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31279,0,0,c6d8bd339bd2ef8cd38712a588298a0f78c3dc186c2fc6521788bff4f268fee2,2024-04-15T13:15:51.577000
|
||||
@ -248934,6 +248936,8 @@ CVE-2024-3128,0,0,f39d99f2e7d2dabe7ec55277ccd5294314e54f0a06e3a55cf6f87ea7b8435d
|
||||
CVE-2024-31280,0,0,9e9b815bd712cdeca69ca5173415a6797e0b892c1fe0c623b9d101db7359150a,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31281,0,0,340770aaf2cf81edafbbc434c8cf22905fdf1fca0d2f34fb89973361804aa57a,2024-05-17T18:36:05.263000
|
||||
CVE-2024-31282,0,0,5936d2319178c50c30843c7ee4db925608db08d53e49d6aed7a5d5b8f4adeca5,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31283,1,1,cfd3c9063cf0fe4b759eb54c72e1049957ee46a4bcd961ddcd148777e5e5ebcc,2024-06-09T19:15:50.527000
|
||||
CVE-2024-31284,1,1,75049ce903dc68cccc499a079cd7b23422daa4e2cd7a7f9c2f6c0ed07a8686ae,2024-06-09T19:15:50.743000
|
||||
CVE-2024-31285,0,0,fbfb894bd06ff971ae688901838c64fa61bd6d98fae23eaccff9aa0a03fb58f3,2024-04-11T13:30:38
|
||||
CVE-2024-31286,0,0,e1da10ca58ecb94e30ee69cf28bc9450f2f10eb7f9a84a3b3e2823a17dee6482,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31287,0,0,d3b9f66c99b69110f7dd9854d4eaa18fbf3158907931625a02e30c57de0c45d1,2024-04-10T19:49:51.183000
|
||||
@ -248955,8 +248959,10 @@ CVE-2024-31300,0,0,73651a51499dbd34fff9bc790d260a55179d673a63dd4b07cfd6c69ca5f8c
|
||||
CVE-2024-31301,0,0,e8b5a65c9bef0175cce9b38c58156669c86eda140a6de06960e3677447078479,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31302,0,0,ad7b89f44c563df0fab516a81ccb333cd5bd91cc34eabce911e6630db7354401,2024-04-26T15:55:30.873000
|
||||
CVE-2024-31303,0,0,d19e52c3a72788fe575094c8a039fb48a18dd4ce5551eec3595ac2f9937f5778,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31304,1,1,b4fc23eecc2746d207064c79e1e097b443a69068394d68886fb64b145ade3738,2024-06-09T19:15:50.967000
|
||||
CVE-2024-31305,0,0,3d21fe974a7fd87dcf727b7a30275d72689da091f046f5ccadceaab06b2bdb9d,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31306,0,0,8b51fcbcc9a456d52c739540d0a41682a94a82657203d9841ed70dd111575cfa,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31307,1,1,924bc505a18580189c1c903bb7141da0268e4485d69337462eb8256bdcc32f76,2024-06-09T18:15:09.467000
|
||||
CVE-2024-31308,0,0,5e2ae5593f1ea9760ae6e8cbc575821053a6196641c6e6bb427e79b97acb4828,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31309,0,0,fffcb118c29828b67d952cb185f5d9b9c1e5391db0b01186447338db555819d8,2024-05-01T18:15:23.233000
|
||||
CVE-2024-3131,0,0,c743c524a4c8650f09bc83876c03caf128d010267bf94a845848caa55c9a8038,2024-05-17T02:39:44.143000
|
||||
@ -248969,16 +248975,20 @@ CVE-2024-31343,0,0,07130367d283f095e3c4a097fcb374b7f0ee04a0481c3dc18f14571141420
|
||||
CVE-2024-31344,0,0,e0ca2da61833234a90b054de95f2f160bbebd4a497bc87a3e17ec60ef242d468,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31345,0,0,c859189c3b3107b07d10bea32bcd00363efe87690798f404d3b6d54b355ed2ba,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31346,0,0,2d1e98ecfdeadb3523494e02b9eb42f9bcc66ecdd22c3cc2efc458ade5b5c930,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31347,1,1,dfe4b92e5f411c5d47adf40342d8741a44ad195f65d28f6c1e43afae8a503b20,2024-06-09T18:15:09.710000
|
||||
CVE-2024-31348,0,0,cfc095c1fc0e4b141af08e05231276cb08ae09886eb38442cb07d948f68e6eab,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31349,0,0,8d1bd13d7c4f34f460e790c462e1e7791a20313dfd6a20b06dc021131d4e0db2,2024-04-08T18:48:40.217000
|
||||
CVE-2024-3135,0,0,4a052858c93477b13b9d768cf5477bd490d84e3575939137539871d799ba9b77,2024-04-16T12:15:10.367000
|
||||
CVE-2024-31350,1,1,bdf72b4ffa1d42286f292bd6357814bd446cd082744c6c4e85a511ad35ce0da3,2024-06-09T18:15:09.943000
|
||||
CVE-2024-31351,0,0,f1b27c31a54c00ab3416c138cea7550d6a2bb99c76b71a4867325e611ed76168,2024-05-17T18:36:05.263000
|
||||
CVE-2024-31352,1,1,174e44c22fe1f03ccc9fa1100d4e5660018187e53760adc5ca527b09338e4e01,2024-06-09T18:15:10.170000
|
||||
CVE-2024-31353,0,0,deed9427e1b791886e9d65485b3d8718a3ea4d28502758d0cfb3a16dbc07bd56,2024-04-19T19:25:34.677000
|
||||
CVE-2024-31354,0,0,b5b94d42db07b1271ef9654eb9ffa890368f3a9210deb1f8fedc988973151d2e,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31355,0,0,a5dea31bb77e2304134bdb1d51afef23705a4ddfdf5cc895a42a4a0b3df4a7e3,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31356,0,0,d1fb89c74ef35b55d35626ff0b96164cf14f53f3d140d53e498a9c6cfdf37218,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31357,0,0,6d1a7933989bbcdba28fa02b8be4705197f66c46746bd7fe377d13c6e2cc0304,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31358,0,0,6558c715d0691fb109d69acf906c307579e6fb555e946d8884919d7438b5b765,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31359,1,1,16b2c85b72eaab4210157a7391d4b3c984b0ad42f5018d7b1fa14f39c53e3ab1,2024-06-09T18:15:10.387000
|
||||
CVE-2024-3136,0,0,b36b01230f305cae55ccda83bfac11de31c616e423c2feb1e1e74724ea6567ea,2024-04-10T13:23:38.787000
|
||||
CVE-2024-31360,0,0,d34af9daf75ce1b225adca047a39b3ab768e2d7314b3e1459a0a7d9b94b91dfc,2024-04-15T13:15:51.577000
|
||||
CVE-2024-31361,0,0,54b7a8e25813717c94d5927287f93d481a46dd500982f29ec2be0642b1f9b5bc,2024-04-11T13:30:38
|
||||
@ -249032,6 +249042,7 @@ CVE-2024-3142,0,0,d72c9fc602405d276968d5eddee02def25c25f0696a122ca36beea9d48f994
|
||||
CVE-2024-31420,0,0,5d7e593d118cd1f41577542846ec46b792c74358a1c27af2e9295870ce46a7f7,2024-04-03T17:24:18.150000
|
||||
CVE-2024-31421,0,0,e370fb8ea44331555944235b2fd1b7c5dff31c81598412ae4f64694edf2ff3ca,2024-04-15T13:15:31.997000
|
||||
CVE-2024-31422,0,0,9d05b90ac7eb05b3315a52c454aceadf521dfe2d7798187e0db071b0b4b207aa,2024-04-15T13:15:31.997000
|
||||
CVE-2024-31423,1,1,1d139d7ad5386c3f22b25c9f5db481d259c4082ff8e38a4ecd84342740363325,2024-06-09T18:15:10.617000
|
||||
CVE-2024-31424,0,0,d8343bb4d43fba5750996301f0987a15b68ea08687160014b0d749dd36411ef8,2024-04-15T13:15:31.997000
|
||||
CVE-2024-31425,0,0,3f5cd7851cef6dace808d1a645c76f77fb0497234951a08577851140e62c06e7,2024-04-15T13:15:31.997000
|
||||
CVE-2024-31426,0,0,d8fabacf380afba0ad2e99af8054991653c6cdc715370d6dbd528418cbc65b8a,2024-04-15T13:15:31.997000
|
||||
@ -249385,6 +249396,7 @@ CVE-2024-32078,0,0,0f07685f266e5b1bb051418b95d7b61437410571a052898e8971424c6a585
|
||||
CVE-2024-32079,0,0,da7c5fc89984eb26823f30faeb9a07fc0733d153f127ad026564ff0d33e59be6,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3208,0,0,196d70ee776274b946f575baf309c4bfb9847b021c77ef0e52b4db8b7b04672f,2024-04-10T13:23:38.787000
|
||||
CVE-2024-32080,0,0,befbebb6328b80f5ec4f8b2580b01e6e757ff2b9e89cbe3767b36fd22bbf0322,2024-04-11T12:47:44.137000
|
||||
CVE-2024-32081,1,1,d61cd02d5c8a1724666f80fe6d07d2238309e4d3ebca47beb21dd8abb8c575df,2024-06-09T19:15:51.203000
|
||||
CVE-2024-32082,0,0,d6793a42d63a5b66bd996e80396a9a30335e882106f6c04be804aa2a3936f3a5,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32083,0,0,e66e40e26022a1e0763bc878bbdc8feaffe474b54f57196f3136bd80c107b035,2024-04-11T13:30:38
|
||||
CVE-2024-32084,0,0,471e7516d00607c85169133c360fc6ced518260327467ed3a794c748685f3d51,2024-04-15T13:15:31.997000
|
||||
@ -249805,7 +249817,11 @@ CVE-2024-32698,0,0,62d9323bbf42a20a367a2bf88d0f3ecbf462ca871e0485b99440a7338327b
|
||||
CVE-2024-32699,0,0,445360642dcc3c18004d28d0ff54224d5a41bfbc1025e36f7cf78bff1b611ad5,2024-04-24T17:16:50.397000
|
||||
CVE-2024-3270,0,0,8f52a439b6114fc5656a05f2074671df643abe1d20ce495cfa3394c4b7de8953,2024-05-17T02:39:49.333000
|
||||
CVE-2024-32700,0,0,caed05a04983af36ff140bfd42f0359a8f0bc1fe1dabbe14d8ce714eb93bd6d4,2024-05-17T09:15:39.783000
|
||||
CVE-2024-32701,1,1,c34c2cd83d1db4caff7966425f260dcaf78efe0fe435a66e583cc7dc9d8af4ae,2024-06-09T18:15:10.823000
|
||||
CVE-2024-32702,0,0,a51d1cb9ee0b7ca832367fdb4d887937602e0f0784d18168b73c7a071f5fa689,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32703,1,1,de1adcefe55fd5db287065139aa09586f56a20af65248ab45ccb10aa55dc2df9,2024-06-09T18:15:11.047000
|
||||
CVE-2024-32704,1,1,5d378c5c3e8b1617bb11a8c5999b8cf8d9cc6a3dcf27918cd333f93c99912165,2024-06-09T18:15:11.263000
|
||||
CVE-2024-32705,1,1,3fb43dc7e4bd1164e62d4dfdbf08e94936302844cb80945e0c9d34e597b21e31,2024-06-09T18:15:11.483000
|
||||
CVE-2024-32706,0,0,9f6db51b735605006291209028eca5f51b85019537d505dd70563bfd14c13c71,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32707,0,0,2f5093e1b05e825471c887dbea123536d43bfdc5a1a93c0402748a653810ca35,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32708,0,0,10a917099a341bfd5e0181a16245f1e9a8206ba281f1db80ba9a5a6db5680c94,2024-05-17T18:35:35.070000
|
||||
@ -249814,8 +249830,9 @@ CVE-2024-3271,0,0,427448d66ebe59002a93ad233a5fbd2b2253db3687d924fc6f5652a183f66e
|
||||
CVE-2024-32710,0,0,236cf5fb5048c92da0e9da0c7a79872306efe3e5c78f334943a650b31b0ee8be,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32711,0,0,ee4fc6f8776e161cd18a75901753219a17a7dc9e2259a04b6086ad21e170fb15,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32712,0,0,6cf3429c270426b91d6e245efb30946e3059e3ca7d973be6876a8f4441282d9c,2024-05-14T16:12:23.490000
|
||||
CVE-2024-32714,1,1,5c3375edb92cfee75e0f5eb3cfbdb11a8ebbcb2402122ae6b2e266e97a7fe591,2024-06-09T17:15:49.040000
|
||||
CVE-2024-32715,1,1,7e21b61581052950bca8faad0382dd6524fa7ca9a3b82934ab6d829dacdb02e6,2024-06-09T17:15:49.270000
|
||||
CVE-2024-32713,1,1,975c91ffb3c65038da712c6982d5aca4b2cd3c7de6c0f00d413c96156801dca1,2024-06-09T18:15:11.723000
|
||||
CVE-2024-32714,0,0,5c3375edb92cfee75e0f5eb3cfbdb11a8ebbcb2402122ae6b2e266e97a7fe591,2024-06-09T17:15:49.040000
|
||||
CVE-2024-32715,0,0,7e21b61581052950bca8faad0382dd6524fa7ca9a3b82934ab6d829dacdb02e6,2024-06-09T17:15:49.270000
|
||||
CVE-2024-32716,0,0,ef35512837a2eb385a00af812a4bd8ccb8fac7830ef81ad43aacfa3308965000,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32717,0,0,41fbfea18ca587f0b377a8ff08e3cedda799120e644b260bc7c5bf7bd95a593f,2024-05-14T16:12:23.490000
|
||||
CVE-2024-32718,0,0,ac6094c004934613811f62cb54322c782e73ecaf784adcb8253ff40feadd2cda,2024-04-24T13:39:42.883000
|
||||
@ -249826,7 +249843,7 @@ CVE-2024-32721,0,0,a2233fe9c4251c9373094548c77926df84a412b40d9b22eb54dd2e4b2b2e5
|
||||
CVE-2024-32722,0,0,48ae26859b2b5b55014d7a0adb8477f1ef5dfb94d230cd27ad810ef0567e4392,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32723,0,0,9cf77ce32aed9923f5362ddd9820f0128e11fb90d86d1e685c774c7fb3a6e464,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32724,0,0,724d2a8f26930c920800979f44338a45ea9974ec444b7589426e70fcd89b821f,2024-05-14T16:12:23.490000
|
||||
CVE-2024-32725,1,1,8c06b5ae6daf51cb54cda0a13f64aaa171d3b26cb7011177f02f43984d621512,2024-06-09T17:15:49.380000
|
||||
CVE-2024-32725,0,0,8c06b5ae6daf51cb54cda0a13f64aaa171d3b26cb7011177f02f43984d621512,2024-06-09T17:15:49.380000
|
||||
CVE-2024-32726,0,0,bb601a310def86682bd269dff87c17e9f340507b2044b21ebddf2d3bcecfbeae,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32727,0,0,6c9e5eda6fc2f76abe06ca696e58f19f42b0626d3fb4e9619b7d5abe31b6e733,2024-06-09T15:16:00.667000
|
||||
CVE-2024-32728,0,0,bd2bab844630decb87bf708aa2ff96890fbec18a578a77e7147769c3b0f70bae,2024-04-24T17:16:50.397000
|
||||
@ -250890,6 +250907,7 @@ CVE-2024-34797,0,0,cf396b1b8577b4bd0c748175260c813f43f5827b156e3d0f0af7ad04e6370
|
||||
CVE-2024-34798,0,0,6d770a55bfc357f6f232a0f0b39ad44e4cb20dea0c406817afd6955b6b153194,2024-06-03T14:46:24.250000
|
||||
CVE-2024-3480,0,0,efd268116762f9a268444b69dedc6b75682706697867d3d93c2c71f376810267,2024-05-03T15:32:19.637000
|
||||
CVE-2024-34801,0,0,0b1a4ab0468bb98a950b8edf087ff2c536030eeba11e5be47337600f37c39c40,2024-06-03T14:46:24.250000
|
||||
CVE-2024-34802,1,1,d2e7742e5d80d4535cece858a07f2bb78998cf9885e4be04030a49d5a25b043b,2024-06-09T19:15:51.423000
|
||||
CVE-2024-34803,0,0,3bacd90aafced0596a908c7bddcf15434c904fd7688d7a7dfb5d78f5281cf184,2024-06-03T14:46:24.250000
|
||||
CVE-2024-34805,0,0,4db06c40a60d0ea9fc68ae0b74b3d16b7df09b33205e3b40409d2383df796279,2024-05-17T18:36:31.297000
|
||||
CVE-2024-34806,0,0,3b1b6563ba887546de6e8afcda84fbe0c4e88d6cd4a9afa2164171d94fd3a99a,2024-05-17T18:35:35.070000
|
||||
@ -251218,6 +251236,8 @@ CVE-2024-35657,0,0,b495f6eb6f600a15a4f0633d9ef74d133f633540bac91d9a975a3fc73c99d
|
||||
CVE-2024-35659,0,0,08837d467eb2c4f6f42cf294692520fdde74cc9e93dd0f8f269796baf7c9422c,2024-06-08T16:15:09.103000
|
||||
CVE-2024-3566,0,0,e417ef1ceca67d3a9a8ba800520d4a9974bcf4eba2e3e6325dafdfbfe6af8d6b,2024-04-10T19:49:51.183000
|
||||
CVE-2024-35660,0,0,b4444f7c4ec69c7e1b1b06684ca2907205afa90c86f4142e7e61f131a19f66b1,2024-06-09T12:15:13.953000
|
||||
CVE-2024-35661,1,1,57d6cfafa5b6a99d2c16488d6deb671cb7a8241faa8a32e6caa8d1ceee260708,2024-06-09T19:15:51.653000
|
||||
CVE-2024-35662,1,1,63ca2e18517c97fe8fac53a3146411f4199ad79196a8754df782e89dfe55e7c7,2024-06-09T19:15:51.870000
|
||||
CVE-2024-35664,0,0,d0ccb41b020f67bf412b857dae6270e1516e989b566d9599ae1771894ea37eb6,2024-06-05T20:24:24.730000
|
||||
CVE-2024-35666,0,0,5e133046a1ca74936bb3d36f8c7ff239458fb6b767b78411013c1064b6040b1e,2024-06-05T19:56:00.610000
|
||||
CVE-2024-35668,0,0,e28d20c2d98d1a373b031e13d9cabba896a6e448df914921afbea8281107f77c,2024-06-05T19:55:05.997000
|
||||
@ -251279,6 +251299,7 @@ CVE-2024-35738,0,0,50eb27decedbd60f4bf188c7d2a7e54e8c272287c5228ed771c42f560d1c0
|
||||
CVE-2024-35739,0,0,707dc0e914a581dde6c79562ece05de14b7ccaace04c87e048564f44c169d6cc,2024-06-08T13:15:56.660000
|
||||
CVE-2024-3574,0,0,a6cc99c8a389ea7db1c37fe05b40106752b73810cdac85caab18aeb26d6bc576,2024-04-16T13:24:07.103000
|
||||
CVE-2024-35740,0,0,c7b15495ca75021a0f3ae856348840f0df6e7628338c252bbcb913e6f43d990d,2024-06-08T13:15:56.910000
|
||||
CVE-2024-35748,1,1,859ab043bddbec853c1fc422fd77db47a64193b031e18978aafaca44c49efe49,2024-06-09T19:15:52.093000
|
||||
CVE-2024-3575,0,0,59be73eca5c53cbbcf99414bd65c6b74b4dff22ff5983c2d091439c46f610b22,2024-04-16T13:24:07.103000
|
||||
CVE-2024-35750,0,0,18b23d32a06a11540e6102be3499b0c8e2e94e7d4a2cd6a0e378b9c4e0f6c3f1,2024-06-08T13:15:57.137000
|
||||
CVE-2024-35751,0,0,a592cf7a13db9e1979a7c2b43c01d3c996c69c3852da1c78eb5ab8dce059226e,2024-06-08T13:15:57.370000
|
||||
@ -251928,6 +251949,7 @@ CVE-2024-3752,0,0,06a3522f543993aef42f352f0c011207c560c2e5a1d63c9d8ccc34a87adab0
|
||||
CVE-2024-37535,0,0,bd454e0fcc912157e5323613160bb422388727ccfdce2d01c2c3ed53ca1b2b78,2024-06-09T15:16:00.940000
|
||||
CVE-2024-3755,0,0,255cc63bdc34aca663119fb8f6757a7da5a9acef7ecda034d88dc05babf4b05b,2024-05-06T12:44:56.377000
|
||||
CVE-2024-3756,0,0,978b8204ea279199334a4c8c549150dc6420f24480b5effb717e8509749d66aa,2024-05-06T12:44:56.377000
|
||||
CVE-2024-37568,1,1,792c5701b5fb7885400af7f4a334831f13c3230a30fb2699482e05f86e58a680,2024-06-09T19:15:52.323000
|
||||
CVE-2024-3757,0,0,62301a2775fcbfb9e8b5b1aa90b79aa074cd639699f2863765d338333af4b798,2024-05-07T13:39:32.710000
|
||||
CVE-2024-3758,0,0,3ea9ecbea279ca1eb1159e542db09b1cab2d2435be79c6a6a563dc4d73ca4285,2024-05-07T13:39:32.710000
|
||||
CVE-2024-3759,0,0,20211226ea875c33805e71e9c0afa18c7ce1ad112702c8859afd48ee84347f62,2024-05-07T13:39:32.710000
|
||||
@ -253091,6 +253113,7 @@ CVE-2024-5439,0,0,abaad0f03a42ef683e08fa0b9e3df38062d4c8e86744ed6e348d5f6378ac05
|
||||
CVE-2024-5449,0,0,98f03fd41a859602711a787e6c6738ac5b4c6552335bab31c9f953ba2b79cc72,2024-06-06T14:17:35.017000
|
||||
CVE-2024-5452,0,0,27a87c5d81b8c2c688ae4d039463a5b6ff5c5d7de26437cd334595b44d7597a4,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5453,0,0,7c8641ed8daae70878106ab21b3cb2696b56b68c7012b2cceeb0fd9522a96b5d,2024-06-05T12:53:50.240000
|
||||
CVE-2024-5458,1,1,d8377ed398e4a41deef164a52143b572ac25c1aee06396f797a1bac7317cc5b9,2024-06-09T19:15:52.397000
|
||||
CVE-2024-5459,0,0,9ffec4e6ddf7de8eef808a13af7e4d67efb473b64a2ed4688c4272492e191c2e,2024-06-06T14:17:35.017000
|
||||
CVE-2024-5463,0,0,a83ead02d534db419d64d9a246adc999062f3a690f2d2cbba14bffeb9debf0f5,2024-06-04T16:57:41.053000
|
||||
CVE-2024-5478,0,0,cbce39d40f4102e26dfaf35e6a6b20bf349245ad3d94d864b4543f6f43a9d245,2024-06-07T14:56:05.647000
|
||||
@ -253135,6 +253158,7 @@ CVE-2024-5552,0,0,12abaaddd513e722275738643d6cd32f6bb9e257da98294dd5bedf4ad4cbf5
|
||||
CVE-2024-5564,0,0,cd961630c6982ea90916e9cc290067a2c4a02a79292d87af6b0ec76760478ca9,2024-06-03T14:46:24.250000
|
||||
CVE-2024-5565,0,0,830316f5c713618fdad4a0eda5b7296c22d5d93c87a8813197db3ff9cf28c4ee,2024-05-31T19:14:47.793000
|
||||
CVE-2024-5571,0,0,5bd1fe120d21671f33dde8145e3554ed59688f09b1ce68450c982cea21578a28,2024-06-05T12:53:50.240000
|
||||
CVE-2024-5585,1,1,938404eade5f583d661c14d5340c84791ff95d5317caee11d699bb3958a46f59,2024-06-09T19:15:52.597000
|
||||
CVE-2024-5587,0,0,9180b0762a5a5a7a17ce70cd861bdf25e955d88caf903bee442f7c48a0a2a218,2024-06-03T14:46:24.250000
|
||||
CVE-2024-5588,0,0,21589c4423d1fee081cb695dd8009f3bd5a36bd74dae1713c28449f0da1cd8d1,2024-06-04T19:21:10.267000
|
||||
CVE-2024-5589,0,0,dc63c38434ce5bb089af0d0f8aa09f6a46f1fae34dd45c15f4542741dea047b7,2024-06-03T14:46:24.250000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user