Auto-Update: 2024-06-09T14:00:18.381009+00:00

This commit is contained in:
cad-safe-bot 2024-06-09 14:03:10 +00:00
parent d508929a7b
commit fc33147cc3
42 changed files with 2292 additions and 42 deletions

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-45188",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-06-09T13:15:49.537",
"lastModified": "2024-06-09T13:15:49.537",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "IBM Engineering Lifecycle Optimization Publishing 7.0.2 and 7.03 could allow a remote attacker to upload arbitrary files, caused by the improper validation of file extensions. By sending a specially crafted request, a remote attacker could exploit this vulnerability to upload a malicious file, which could allow the attacker to execute arbitrary code on the vulnerable system. IBM X-Force ID: 268751."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/268751",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7156757",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-31243",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T12:15:09.190",
"lastModified": "2024-06-09T12:15:09.190",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Bricksforge.This issue affects Bricksforge: from n/a through 2.0.17."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/bricksforge/wordpress-bricksforge-plugin-2-0-17-unauthenticated-arbitrary-wordpress-setting-deletion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-31244",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T12:15:09.570",
"lastModified": "2024-06-09T12:15:09.570",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Bricksforge.This issue affects Bricksforge: from n/a through 2.0.17."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/bricksforge/wordpress-bricksforge-plugin-2-0-17-unauthenticated-arbitrary-wordpress-settings-change-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-31248",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T12:15:09.890",
"lastModified": "2024-06-09T12:15:09.890",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Team Plugins360 All-in-One Video Gallery.This issue affects All-in-One Video Gallery: from n/a through 3.5.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/all-in-one-video-gallery/wordpress-all-in-one-video-gallery-plugin-3-5-2-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-31252",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T12:15:10.260",
"lastModified": "2024-06-09T12:15:10.260",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in dFactory Responsive Lightbox.This issue affects Responsive Lightbox: from n/a through 2.4.6."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/responsive-lightbox/wordpress-responsive-lightbox-gallery-plugin-2-4-6-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-31261",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T12:15:10.557",
"lastModified": "2024-06-09T12:15:10.557",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Aakash Chakravarthy Announcer \u2013 Notification & message bars.This issue affects Announcer \u2013 Notification & message bars: from n/a through 6.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/announcer/wordpress-announcer-notification-message-bars-plugin-6-0-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-31267",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T12:15:10.810",
"lastModified": "2024-06-09T12:15:10.810",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in WP Desk Flexible Checkout Fields for WooCommerce.This issue affects Flexible Checkout Fields for WooCommerce: from n/a through 4.1.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/flexible-checkout-fields/wordpress-flexible-checkout-fields-for-woocommerce-plugin-4-1-2-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-31273",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T12:15:11.077",
"lastModified": "2024-06-09T12:15:11.077",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in JS Help Desk JS Help Desk \u2013 Best Help Desk & Support Plugin.This issue affects JS Help Desk \u2013 Best Help Desk & Support Plugin: from n/a through 2.8.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/js-support-ticket/wordpress-js-help-desk-plugin-2-8-3-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-31274",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T12:15:11.323",
"lastModified": "2024-06-09T12:15:11.323",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in WPDeveloper EmbedPress.This issue affects EmbedPress: from n/a through 3.9.11."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/embedpress/wordpress-embedpress-plugin-3-9-11-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32777",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T13:15:49.860",
"lastModified": "2024-06-09T13:15:49.860",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in BizSwoop a CPF Concepts, LLC Brand BizPrint.This issue affects BizPrint: from n/a through 4.3.39."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/print-google-cloud-print-gcp-woocommerce/wordpress-bizprint-plugin-4-3-39-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32778",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T13:15:50.080",
"lastModified": "2024-06-09T13:15:50.080",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Contest Gallery.This issue affects Contest Gallery: from n/a through 21.3.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/contest-gallery/wordpress-contest-gallery-plugin-21-3-4-arbitrary-file-deletion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32779",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T13:15:50.300",
"lastModified": "2024-06-09T13:15:50.300",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Avirtum Vision Interactive.This issue affects Vision Interactive: from n/a through 1.7.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/vision/wordpress-vision-image-map-builder-plugin-1-7-1-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32783",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T13:15:50.550",
"lastModified": "2024-06-09T13:15:50.550",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in wpcreativeidea Advanced Testimonial Carousel for Elementor.This issue affects Advanced Testimonial Carousel for Elementor: from n/a through 3.0.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/advanced-testimonial-carousel-for-elementor/wordpress-advanced-testimonial-carousel-for-elementor-plugin-3-0-0-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32784",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T13:15:50.780",
"lastModified": "2024-06-09T13:15:50.780",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in CookieHub.This issue affects CookieHub: from n/a through 1.1.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/cookiehub/wordpress-cookiehub-plugin-1-1-0-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32787",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T13:15:51.003",
"lastModified": "2024-06-09T13:15:51.003",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Copy Content Protection Team Secure Copy Content Protection and Content Locking.This issue affects Secure Copy Content Protection and Content Locking: from n/a through 3.7.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/secure-copy-content-protection/wordpress-secure-copy-content-protection-and-content-locking-plugin-3-7-1-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32792",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T13:15:51.217",
"lastModified": "2024-06-09T13:15:51.217",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in WPMU DEV Hummingbird.This issue affects Hummingbird: from n/a through 3.7.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/hummingbird-performance/wordpress-hummingbird-plugin-3-7-3-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32797",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T13:15:51.433",
"lastModified": "2024-06-09T13:15:51.433",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Martin Gibson WP LinkedIn Auto Publish.This issue affects WP LinkedIn Auto Publish: from n/a through 8.11."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-linkedin-auto-publish/wordpress-wp-linkedin-auto-publish-plugin-8-11-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32798",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T13:15:51.663",
"lastModified": "2024-06-09T13:15:51.663",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in WP Travel Engine.This issue affects WP Travel Engine: from n/a through 5.8.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-travel-engine/wordpress-wp-travel-engine-plugin-5-8-0-price-manipulation-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32799",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T13:15:51.880",
"lastModified": "2024-06-09T13:15:51.880",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Merv Barrett Easy Property Listings.This issue affects Easy Property Listings: from n/a through 3.5.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/easy-property-listings/wordpress-easy-property-listings-plugin-3-5-3-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32804",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T13:15:52.093",
"lastModified": "2024-06-09T13:15:52.093",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Martin Gibson WP GoToWebinar.This issue affects WP GoToWebinar: from n/a through 14.46."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-gotowebinar/wordpress-wp-gotowebinar-plugin-14-46-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32805",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T13:15:52.297",
"lastModified": "2024-06-09T13:15:52.297",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Social Snap.This issue affects Social Snap: from n/a through 1.3.5."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/socialsnap/wordpress-social-snap-plugin-1-3-5-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32811",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T13:15:52.500",
"lastModified": "2024-06-09T13:15:52.500",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Insertion of Sensitive Information into Log File vulnerability in Octolize USPS Shipping for WooCommerce \u2013 Live Rates.This issue affects USPS Shipping for WooCommerce \u2013 Live Rates: from n/a through 1.9.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/flexible-shipping-usps/wordpress-usps-shipping-for-woocommerce-live-rates-plugin-1-9-4-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32813",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T13:15:52.727",
"lastModified": "2024-06-09T13:15:52.727",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in SoftLab Integrate Google Drive.This issue affects Integrate Google Drive: from n/a through 1.3.9."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/integrate-google-drive/wordpress-integrate-google-drive-plugin-1-3-9-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32814",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T13:15:52.960",
"lastModified": "2024-06-09T13:15:52.960",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Zorem Advanced Local Pickup for WooCommerce.This issue affects Advanced Local Pickup for WooCommerce: from n/a through 1.6.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/advanced-local-pickup-for-woocommerce/wordpress-advanced-local-pickup-for-woocommerce-plugin-1-6-1-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32818",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T13:15:53.173",
"lastModified": "2024-06-09T13:15:53.173",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in realmag777 WordPress Meta Data and Taxonomies Filter (MDTF).This issue affects WordPress Meta Data and Taxonomies Filter (MDTF): from n/a through 1.3.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-meta-data-filter-and-taxonomy-filter/wordpress-mdtf-meta-data-and-taxonomies-filter-plugin-1-3-3-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32820",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T13:15:53.390",
"lastModified": "2024-06-09T13:15:53.390",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Social Share Pro Social Share Icons & Social Share Buttons.This issue affects Social Share Icons & Social Share Buttons: from n/a through 3.6.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ultimate-social-media-plus/wordpress-social-share-icons-social-share-buttons-plugin-3-6-2-broken-access-control-lead-to-notice-dismissal-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32821",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T13:15:53.593",
"lastModified": "2024-06-09T13:15:53.593",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in TotalSuite Total Poll Lite.This issue affects Total Poll Lite: from n/a through 4.9.9."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/totalpoll-lite/wordpress-total-poll-lite-plugin-4-9-9-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32824",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T13:15:53.817",
"lastModified": "2024-06-09T13:15:53.817",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Evergreen Content Poster.This issue affects Evergreen Content Poster: from n/a through 1.4.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/evergreen-content-poster/wordpress-evergreen-content-poster-plugin-1-4-2-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33543",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T12:15:11.560",
"lastModified": "2024-06-09T12:15:11.560",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in CodePeople WP Time Slots Booking Form.This issue affects WP Time Slots Booking Form: from n/a through 1.2.06."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-time-slots-booking-form/wordpress-wp-time-slots-booking-form-plugin-1-2-06-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33545",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T12:15:11.813",
"lastModified": "2024-06-09T12:15:11.813",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in AA-Team WZone.This issue affects WZone: from n/a through 14.0.10."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/woozone/wordpress-wzone-plugin-14-0-10-unauthenticated-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33547",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T12:15:12.080",
"lastModified": "2024-06-09T12:15:12.080",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in AA-Team WZone.This issue affects WZone: from n/a through 14.0.10."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/woozone/wordpress-wzone-plugin-14-0-10-site-wide-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33555",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T12:15:12.330",
"lastModified": "2024-06-09T12:15:12.330",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in 8theme XStore Core.This issue affects XStore Core: from n/a through 5.3.8."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/et-core-plugin/wordpress-xstore-core-plugin-5-3-5-multiple-authenticated-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33561",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T12:15:12.567",
"lastModified": "2024-06-09T12:15:12.567",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in 8theme XStore.This issue affects XStore: from n/a through 9.3.8."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/xstore/wordpress-xstore-theme-9-3-5-unauthenticated-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33563",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T12:15:12.800",
"lastModified": "2024-06-09T12:15:12.800",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in 8theme XStore.This issue affects XStore: from n/a through 9.3.8."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 7.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/xstore/wordpress-xstore-theme-9-3-5-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33564",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T12:15:13.030",
"lastModified": "2024-06-09T12:15:13.030",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in 8theme XStore.This issue affects XStore: from n/a through 9.3.8."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/xstore/wordpress-xstore-theme-9-3-5-arbitrary-option-update-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33565",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T12:15:13.247",
"lastModified": "2024-06-09T12:15:13.247",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in UkrSolution Barcode Scanner with Inventory & Order Manager.This issue affects Barcode Scanner with Inventory & Order Manager: from n/a through 1.5.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders/wordpress-barcode-scanner-with-inventory-order-manager-plugin-1-5-3-unauthenticated-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33572",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T12:15:13.470",
"lastModified": "2024-06-09T12:15:13.470",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in POSIMYTH The Plus Blocks for Block Editor | Gutenberg.This issue affects The Plus Blocks for Block Editor | Gutenberg: from n/a through 3.2.5."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/the-plus-addons-for-block-editor/wordpress-the-plus-blocks-for-block-editor-gutenberg-plugin-3-2-5-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-34435",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T12:15:13.703",
"lastModified": "2024-06-09T12:15:13.703",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in CodeRevolution Aiomatic.This issue affects Aiomatic: from n/a through 1.9.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/aiomatic-automatic-ai-content-writer/wordpress-aiomatic-plugin-1-9-3-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-35660",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T12:15:13.953",
"lastModified": "2024-06-09T12:15:13.953",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Jewel Theme Master Addons for Elementor.This issue affects Master Addons for Elementor: from n/a through 2.0.5.4.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/master-addons/wordpress-master-addons-for-elementor-plugin-2-0-5-4-1-broken-access-control-on-api-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-35669",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T12:15:14.197",
"lastModified": "2024-06-09T12:15:14.197",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Bowo Debug Log Manager.This issue affects Debug Log Manager: from n/a through 2.3.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/debug-log-manager/wordpress-debug-log-manager-plugin-2-3-1-broken-access-control-vulnerability-2?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-06-09T12:00:18.480121+00:00
2024-06-09T14:00:18.381009+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-06-09T11:15:52.677000+00:00
2024-06-09T13:15:53.817000+00:00
```
### Last Data Feed Release
@ -33,32 +33,38 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
253131
253171
```
### CVEs added in the last Commit
Recently added CVEs: `19`
Recently added CVEs: `40`
- [CVE-2023-23639](CVE-2023/CVE-2023-236xx/CVE-2023-23639.json) (`2024-06-09T10:15:08.370`)
- [CVE-2023-23640](CVE-2023/CVE-2023-236xx/CVE-2023-23640.json) (`2024-06-09T10:15:09.217`)
- [CVE-2023-31080](CVE-2023/CVE-2023-310xx/CVE-2023-31080.json) (`2024-06-09T10:15:09.510`)
- [CVE-2023-34003](CVE-2023/CVE-2023-340xx/CVE-2023-34003.json) (`2024-06-09T11:15:49.240`)
- [CVE-2024-24716](CVE-2024/CVE-2024-247xx/CVE-2024-24716.json) (`2024-06-09T11:15:49.493`)
- [CVE-2024-25092](CVE-2024/CVE-2024-250xx/CVE-2024-25092.json) (`2024-06-09T11:15:49.720`)
- [CVE-2024-25929](CVE-2024/CVE-2024-259xx/CVE-2024-25929.json) (`2024-06-09T11:15:49.947`)
- [CVE-2024-30464](CVE-2024/CVE-2024-304xx/CVE-2024-30464.json) (`2024-06-09T11:15:50.200`)
- [CVE-2024-30465](CVE-2024/CVE-2024-304xx/CVE-2024-30465.json) (`2024-06-09T11:15:50.430`)
- [CVE-2024-30466](CVE-2024/CVE-2024-304xx/CVE-2024-30466.json) (`2024-06-09T11:15:50.660`)
- [CVE-2024-30467](CVE-2024/CVE-2024-304xx/CVE-2024-30467.json) (`2024-06-09T11:15:50.890`)
- [CVE-2024-30470](CVE-2024/CVE-2024-304xx/CVE-2024-30470.json) (`2024-06-09T11:15:51.123`)
- [CVE-2024-30481](CVE-2024/CVE-2024-304xx/CVE-2024-30481.json) (`2024-06-09T11:15:51.357`)
- [CVE-2024-30485](CVE-2024/CVE-2024-304xx/CVE-2024-30485.json) (`2024-06-09T11:15:51.560`)
- [CVE-2024-30512](CVE-2024/CVE-2024-305xx/CVE-2024-30512.json) (`2024-06-09T11:15:51.780`)
- [CVE-2024-30515](CVE-2024/CVE-2024-305xx/CVE-2024-30515.json) (`2024-06-09T11:15:52.010`)
- [CVE-2024-30517](CVE-2024/CVE-2024-305xx/CVE-2024-30517.json) (`2024-06-09T11:15:52.233`)
- [CVE-2024-30529](CVE-2024/CVE-2024-305xx/CVE-2024-30529.json) (`2024-06-09T11:15:52.450`)
- [CVE-2024-30544](CVE-2024/CVE-2024-305xx/CVE-2024-30544.json) (`2024-06-09T11:15:52.677`)
- [CVE-2024-32792](CVE-2024/CVE-2024-327xx/CVE-2024-32792.json) (`2024-06-09T13:15:51.217`)
- [CVE-2024-32797](CVE-2024/CVE-2024-327xx/CVE-2024-32797.json) (`2024-06-09T13:15:51.433`)
- [CVE-2024-32798](CVE-2024/CVE-2024-327xx/CVE-2024-32798.json) (`2024-06-09T13:15:51.663`)
- [CVE-2024-32799](CVE-2024/CVE-2024-327xx/CVE-2024-32799.json) (`2024-06-09T13:15:51.880`)
- [CVE-2024-32804](CVE-2024/CVE-2024-328xx/CVE-2024-32804.json) (`2024-06-09T13:15:52.093`)
- [CVE-2024-32805](CVE-2024/CVE-2024-328xx/CVE-2024-32805.json) (`2024-06-09T13:15:52.297`)
- [CVE-2024-32811](CVE-2024/CVE-2024-328xx/CVE-2024-32811.json) (`2024-06-09T13:15:52.500`)
- [CVE-2024-32813](CVE-2024/CVE-2024-328xx/CVE-2024-32813.json) (`2024-06-09T13:15:52.727`)
- [CVE-2024-32814](CVE-2024/CVE-2024-328xx/CVE-2024-32814.json) (`2024-06-09T13:15:52.960`)
- [CVE-2024-32818](CVE-2024/CVE-2024-328xx/CVE-2024-32818.json) (`2024-06-09T13:15:53.173`)
- [CVE-2024-32820](CVE-2024/CVE-2024-328xx/CVE-2024-32820.json) (`2024-06-09T13:15:53.390`)
- [CVE-2024-32821](CVE-2024/CVE-2024-328xx/CVE-2024-32821.json) (`2024-06-09T13:15:53.593`)
- [CVE-2024-32824](CVE-2024/CVE-2024-328xx/CVE-2024-32824.json) (`2024-06-09T13:15:53.817`)
- [CVE-2024-33543](CVE-2024/CVE-2024-335xx/CVE-2024-33543.json) (`2024-06-09T12:15:11.560`)
- [CVE-2024-33545](CVE-2024/CVE-2024-335xx/CVE-2024-33545.json) (`2024-06-09T12:15:11.813`)
- [CVE-2024-33547](CVE-2024/CVE-2024-335xx/CVE-2024-33547.json) (`2024-06-09T12:15:12.080`)
- [CVE-2024-33555](CVE-2024/CVE-2024-335xx/CVE-2024-33555.json) (`2024-06-09T12:15:12.330`)
- [CVE-2024-33561](CVE-2024/CVE-2024-335xx/CVE-2024-33561.json) (`2024-06-09T12:15:12.567`)
- [CVE-2024-33563](CVE-2024/CVE-2024-335xx/CVE-2024-33563.json) (`2024-06-09T12:15:12.800`)
- [CVE-2024-33564](CVE-2024/CVE-2024-335xx/CVE-2024-33564.json) (`2024-06-09T12:15:13.030`)
- [CVE-2024-33565](CVE-2024/CVE-2024-335xx/CVE-2024-33565.json) (`2024-06-09T12:15:13.247`)
- [CVE-2024-33572](CVE-2024/CVE-2024-335xx/CVE-2024-33572.json) (`2024-06-09T12:15:13.470`)
- [CVE-2024-34435](CVE-2024/CVE-2024-344xx/CVE-2024-34435.json) (`2024-06-09T12:15:13.703`)
- [CVE-2024-35660](CVE-2024/CVE-2024-356xx/CVE-2024-35660.json) (`2024-06-09T12:15:13.953`)
- [CVE-2024-35669](CVE-2024/CVE-2024-356xx/CVE-2024-35669.json) (`2024-06-09T12:15:14.197`)
### CVEs modified in the last Commit

View File

@ -217070,9 +217070,9 @@ CVE-2023-23635,0,0,cf9b810a3f79dc922231dcf3465c5dc0ad8688d4d8bed157e0418c42b4d74
CVE-2023-23636,0,0,d16ee464acec828d4a1dbefa73f256808a7c3138ec8ded8a48773ade93fe59a3,2023-02-09T18:17:10.097000
CVE-2023-23637,0,0,f99ed0b1856c7c3cb69af59a920fbc3d4035b24c22770287ffe6221f5dab85f8,2023-01-25T02:29:20.367000
CVE-2023-23638,0,0,67547f7296679971e7ccb27ce5f6504b56f3eb1033613599237f6f2c8a8d0496,2023-11-07T04:07:50.990000
CVE-2023-23639,1,1,0abc7083b78790249a1dc328a97f3f6b48ff58403567d29f58408ea13e22558b,2024-06-09T10:15:08.370000
CVE-2023-23639,0,0,0abc7083b78790249a1dc328a97f3f6b48ff58403567d29f58408ea13e22558b,2024-06-09T10:15:08.370000
CVE-2023-2364,0,0,a1713494c5d50d38f7eeb31f78259a11116100613ef9a9f6610e8d0cf58758b5,2024-05-17T02:22:53.063000
CVE-2023-23640,1,1,5185e1c168f56349e603db3c81fc1d84e0bc166a1b425639749e8912bb24af51,2024-06-09T10:15:09.217000
CVE-2023-23640,0,0,5185e1c168f56349e603db3c81fc1d84e0bc166a1b425639749e8912bb24af51,2024-06-09T10:15:09.217000
CVE-2023-23641,0,0,b53ecf42e12fe18f163f4bf83fc84c8dd36cd220c15bc2486edd8e7e2ff90157,2023-05-22T20:02:44.160000
CVE-2023-23645,0,0,842817beeb662adc22162593e06115ed283e723d3baca5c0dcdcd2ed114ba50c,2024-05-17T18:36:05.263000
CVE-2023-23646,0,0,86dfdc088c5f9e631c4a39e16c336cf4d59a4c17a4f6d19f089cee53166a3716,2023-07-26T01:11:44.107000
@ -222948,7 +222948,7 @@ CVE-2023-31077,0,0,a500fadd6e1d230d8f2ca0f5022ecd3ef4c3c44a15a9abf86b8311fa59752
CVE-2023-31078,0,0,ccd47d8795f04721601e8396c3be90c16d8a352718a9a56d700751a9e517f11b,2023-11-15T18:54:15.437000
CVE-2023-31079,0,0,f19d2f5c9226a26d7c166cf8d7a942c776137ab2f56f3f8c90120b918649a925,2023-08-22T00:57:29.870000
CVE-2023-3108,0,0,6efc68f4367f279511ed87fbde347306555580c2ae0ebcb0a43dc43dc7efd079,2023-07-20T01:56:37.593000
CVE-2023-31080,1,1,b04f1710e16465c9462a62a62a672d487fbe95fe9b63bde846b1b6c70777c89e,2024-06-09T10:15:09.510000
CVE-2023-31080,0,0,b04f1710e16465c9462a62a62a672d487fbe95fe9b63bde846b1b6c70777c89e,2024-06-09T10:15:09.510000
CVE-2023-31081,0,0,8873a2b53bc1dc3f6c7e67381bc34db67cb8a00308af743c24cff8b4f761909c,2024-03-25T01:15:53.953000
CVE-2023-31082,0,0,4efb4b09de6bf54f6bffe0350a0900e99ae1bb3026bc72130a2bc7efafe19bfa,2024-05-17T02:23:48.123000
CVE-2023-31083,0,0,7327711c549f7ab563431c90871f9caa88dc4b6fbcb6cde04502b7e065d20212,2024-03-25T01:15:54.100000
@ -225177,7 +225177,7 @@ CVE-2023-33997,0,0,68dd4190c70b14c4557b252b9672976a4b57dd4068e65f19bccdddfd2e247
CVE-2023-34000,0,0,202e4e8a5d21f847f5e161a832a00d2166e7c29a0e7c605b6d72b86a1ff9b158,2023-06-21T21:06:14.600000
CVE-2023-34001,0,0,b362a19d88c221d76b8c80656538323614af6f1d3ccde2580f057c42e9a160da,2024-06-04T16:57:41.053000
CVE-2023-34002,0,0,a47dd36f741977aade219b203ed7ad7d9c459d1a42f8b92c4e19e2e9c9c34d35,2023-11-15T02:26:37.500000
CVE-2023-34003,1,1,e6fbc07d72a61f8fe0b8a60304581e0c5cc1484fd6e9e9a0d379ba27201ee5fe,2024-06-09T11:15:49.240000
CVE-2023-34003,0,0,e6fbc07d72a61f8fe0b8a60304581e0c5cc1484fd6e9e9a0d379ba27201ee5fe,2024-06-09T11:15:49.240000
CVE-2023-34004,0,0,6e3a7aae2809a7c82c8dd6119a8862bf9c46939f51ba3871b787b6424edcbe60,2023-09-01T12:20:23.520000
CVE-2023-34005,0,0,4ad211f818e3675ad21909ccb555e25640cf8a91940dba183772f650ed6b9abe,2023-07-26T00:37:17.753000
CVE-2023-34006,0,0,596fed1bad2dc8cd198c36e7fe99eb9ba3f6967c69faddba38c67ce633966b15,2023-06-28T07:21:30.410000
@ -233154,6 +233154,7 @@ CVE-2023-45184,0,0,f1eedadbff5dc51b5e8f42a6854f850bad28882789c53e915e203abde3681
CVE-2023-45185,0,0,453e977b637e9cbc0c84d3298472241ba382e9475ac9df0112394d009026daf8,2024-04-30T15:15:50.887000
CVE-2023-45186,0,0,f30cab305410a046b708a1ac19e2ccb475140d338248fe680975bbd7c39e8a30,2024-04-12T12:43:57.400000
CVE-2023-45187,0,0,50fe3917bef6f155de7c2ef7d4d38b62123ce4c23e74e434f5c6a36d50e039ba,2024-02-15T04:41:06.543000
CVE-2023-45188,1,1,81a248bed4fc49a4c59afd9729a16e38a39d9691c4907761211430882510ad59,2024-06-09T13:15:49.537000
CVE-2023-45189,0,0,df153b6d1053e0ec8ad7a75797868a0b23f8c9deecf4676d70e63dec9cc0990b,2023-11-09T20:27:56.003000
CVE-2023-45190,0,0,ee5cdff23ea1c9c51b85b56e05c245a9158fa23b5938ef53dd8353ecb5eef64c,2024-02-15T04:41:35.763000
CVE-2023-45191,0,0,0471d71b4e832eeadfce865b6a4a3f21dfa7a9078549997d149920fc7d734d05,2024-02-15T04:43:16.217000
@ -244670,7 +244671,7 @@ CVE-2024-24712,0,0,3eb883409ceb5cd8ab7cfb2c23165937e7138a0fdba93206148a8d8c39991
CVE-2024-24713,0,0,016796105eec4ced1aaab79578ed2b6dc8b6c4a64b21f9341804bb78b76a15f2,2024-02-16T15:48:04.237000
CVE-2024-24714,0,0,d617ec82ff3658c728f436f5c87a6a276f2d9050b0f9f382d24881c4c8a62a0e,2024-02-26T16:32:25.577000
CVE-2024-24715,0,0,e6125d0e3ae55f492b4060bce1bba713cebb6082ff8f701112f1e24674d9d911,2024-05-17T18:36:05.263000
CVE-2024-24716,1,1,42d87832e07e16e38a266fbd5f24aa9f8d37e840e4557886b392fd0dd77071ae,2024-06-09T11:15:49.493000
CVE-2024-24716,0,0,42d87832e07e16e38a266fbd5f24aa9f8d37e840e4557886b392fd0dd77071ae,2024-06-09T11:15:49.493000
CVE-2024-24717,0,0,147b72859f44e71d91234d2c3714411052617c05a0596c74544e6604ed4559a3,2024-02-16T15:52:02.283000
CVE-2024-24718,0,0,2395ab18411838ec546d4c3f172ab2648b8bbab2becc81c1d1d378407035be33,2024-03-26T12:55:05.010000
CVE-2024-24719,0,0,5ddfa362f830a2279ba9f58c10d4ddc6202965de7281d667863ad96f042f01d2,2024-03-26T12:55:05.010000
@ -244949,7 +244950,7 @@ CVE-2024-25083,0,0,ecc895ce722780048524674e78ace2df40ec2c99910e00911749a5ffd9d0d
CVE-2024-25089,0,0,5efabd2c26974f37d1846cb1668b5b36df31dff51c549d5b8d4c512bfb0c7d05,2024-02-13T00:38:12.137000
CVE-2024-2509,0,0,d87071763c3f045575858adf9ceada540509d3a47b1787f91e2dde65a0044380,2024-04-08T18:15:08.580000
CVE-2024-25091,0,0,01b357047b564e780ed13b7e87b2fb8ec79ae12ad4e744cc9437e3dc74a94964,2024-03-01T14:04:04.827000
CVE-2024-25092,1,1,9959fe4f254f2dce84e7e82133442f88e4593a9a9a9e235fee13b40bc26c01b7,2024-06-09T11:15:49.720000
CVE-2024-25092,0,0,9959fe4f254f2dce84e7e82133442f88e4593a9a9a9e235fee13b40bc26c01b7,2024-06-09T11:15:49.720000
CVE-2024-25093,0,0,c29d732f68144a1dd5d537415c8d51940073ac1e6ff114431aa6a52d78b263f0,2024-02-29T13:49:29.390000
CVE-2024-25094,0,0,6ba9f5c53aa4aac51446efc522144ae35e985d8a070a664685b43e0df39aa007,2024-02-29T13:49:29.390000
CVE-2024-25095,0,0,d50260ce1eb68a89304be0cc47242941649c4e7bcb7248c9d2bd3f43f1fe68cf,2024-06-05T12:53:50.240000
@ -245454,7 +245455,7 @@ CVE-2024-25925,0,0,82d957b757a9a6d1fdcc74598b42ef2704a1b9fe963dd50d48ef8264fc879
CVE-2024-25926,0,0,a204994523df9b30b0668bf02b40e244c5082d74f1a5f398b1221a8cff9b190e,2024-03-27T12:29:30.307000
CVE-2024-25927,0,0,70ec221cb23fdd951e839b39a19a816e5c7a4881399308a30cbec9cd2c6f2d65,2024-02-28T14:06:45.783000
CVE-2024-25928,0,0,a6060327df403c3c616b275f710271564f7f2534d45ed96b3571c5b2e5121575,2024-02-23T16:14:43.447000
CVE-2024-25929,1,1,99a78c8ad3d6ca0cf1713c55aaf5e7fd4d4fea1c749143660f14128de472c7a0,2024-06-09T11:15:49.947000
CVE-2024-25929,0,0,99a78c8ad3d6ca0cf1713c55aaf5e7fd4d4fea1c749143660f14128de472c7a0,2024-06-09T11:15:49.947000
CVE-2024-2593,0,0,01b65e909e6089e83d99d5b5b680ad312732071d94371d890adbb9973ac995e4,2024-03-18T19:40:00.173000
CVE-2024-25930,0,0,2b173292b99bf990b44991f1b3d0d5093a9f41028ae431c81e582b61a91befc8,2024-02-29T13:49:29.390000
CVE-2024-25931,0,0,dbc93c692e0e8096c2e969bd5040b00d8aee97ce766af5beed5a9f2566bb3710,2024-02-29T13:49:29.390000
@ -248444,24 +248445,24 @@ CVE-2024-3046,0,0,f5e052c1ea891df75a0fe667fc4295d772a2daf5c23e7fc1339c4348c40758
CVE-2024-30460,0,0,60239bce124e04867e82f31e5cfb960c5f3a93584351525e2543cdd96d5ccb22,2024-04-01T01:12:59.077000
CVE-2024-30462,0,0,d59392c9106e622ed8a8be18c11749718bba226bfa2a23231020ec7d96976f3a,2024-04-01T01:12:59.077000
CVE-2024-30463,0,0,417553a6f74795aba1e180f9fa11122fb72f60b63e441eca3940c7cd28530a48,2024-04-01T01:12:59.077000
CVE-2024-30464,1,1,4279b04a422f9907fc0c354e5278eba7c04854b358aad2c29c73c02e4bb0b9b8,2024-06-09T11:15:50.200000
CVE-2024-30465,1,1,8671a1e3d3289320eccd6f207b9f78ba7ba7b360d2ac0673b8b2e64927f7e90a,2024-06-09T11:15:50.430000
CVE-2024-30466,1,1,5947ec96b0c1aed8856e3e051d725262047a1fa462172eb2d79a56f8abf2c3ee,2024-06-09T11:15:50.660000
CVE-2024-30467,1,1,44e527054e329426a0439753ac6beaf400234a0302d9782cb422e350a1d9dc33,2024-06-09T11:15:50.890000
CVE-2024-30464,0,0,4279b04a422f9907fc0c354e5278eba7c04854b358aad2c29c73c02e4bb0b9b8,2024-06-09T11:15:50.200000
CVE-2024-30465,0,0,8671a1e3d3289320eccd6f207b9f78ba7ba7b360d2ac0673b8b2e64927f7e90a,2024-06-09T11:15:50.430000
CVE-2024-30466,0,0,5947ec96b0c1aed8856e3e051d725262047a1fa462172eb2d79a56f8abf2c3ee,2024-06-09T11:15:50.660000
CVE-2024-30467,0,0,44e527054e329426a0439753ac6beaf400234a0302d9782cb422e350a1d9dc33,2024-06-09T11:15:50.890000
CVE-2024-30468,0,0,97a9b2808fcc8915cd24bfaf7f54deaceab99abf59bf935a157c8b40f4b70106,2024-04-01T01:12:59.077000
CVE-2024-30469,0,0,27281734a967c544466176225d5b748c65afaa34ac64dbc81f344b0ba4360d31,2024-04-01T01:12:59.077000
CVE-2024-3047,0,0,7a704b46e98cc1708bf08d4299ad99a8dad9a0911b940d1f5fbcb78bdd933ce2,2024-05-02T18:00:37.360000
CVE-2024-30470,1,1,372f4c40f7fc9689086b067c362ed677c1da0d62f2e59d6ff98a5521d372514d,2024-06-09T11:15:51.123000
CVE-2024-30470,0,0,372f4c40f7fc9689086b067c362ed677c1da0d62f2e59d6ff98a5521d372514d,2024-06-09T11:15:51.123000
CVE-2024-30477,0,0,e57a5e6fa510ec9057ebfdd86316546dd94e1dabae4fad5cc81ff907e6cfb50c,2024-04-01T01:12:59.077000
CVE-2024-30478,0,0,7d7533c1a9dedc51f4ca6100785aae3de1530d7d091146af0639adfb42b6a065,2024-04-01T01:12:59.077000
CVE-2024-30479,0,0,a84e054427a55edb242ff76a50a396831a168adb0d297fc79083a59916639018,2024-05-17T18:36:05.263000
CVE-2024-3048,0,0,4dcedcaa78b591cdd60323c2fe1598a52cf4e06ae133e6cc58809008ef557edf,2024-04-26T12:58:17.720000
CVE-2024-30480,0,0,9546cbc650c6f7e364bcf65bdd8137d4963e25a2443b4557916c31263a8a88d7,2024-05-17T18:36:05.263000
CVE-2024-30481,1,1,edc97f91e5475997280061b6b544cdb4ac6b93c13cec6a51eddc6f64064d3776,2024-06-09T11:15:51.357000
CVE-2024-30481,0,0,edc97f91e5475997280061b6b544cdb4ac6b93c13cec6a51eddc6f64064d3776,2024-06-09T11:15:51.357000
CVE-2024-30482,0,0,570bede6c16b4a7f5e8b36059aeda7f1a299c81f1153ac528a60791c716caf63,2024-04-01T01:12:59.077000
CVE-2024-30483,0,0,6c48131c3767e81f61ec34b0bc223a59e072c0c0b055c8c0e04f20b2876077ea,2024-03-29T13:28:22.880000
CVE-2024-30484,0,0,eb20aa66f0cd80af61832648be8b745cdaefb1471269aac62e47022e01497a78,2024-06-05T12:53:50.240000
CVE-2024-30485,1,1,913fd9c74ebc1e355965d426cfb05bbb422d6fb11dda54b4a577fe1d375ef540,2024-06-09T11:15:51.560000
CVE-2024-30485,0,0,913fd9c74ebc1e355965d426cfb05bbb422d6fb11dda54b4a577fe1d375ef540,2024-06-09T11:15:51.560000
CVE-2024-30486,0,0,3b668ae931cda4b6a387bfa69ea17dffa696817ef5a0dd2b2ba0b8d1d89d01a9,2024-04-01T01:12:59.077000
CVE-2024-30487,0,0,8478a9894c02433324d52a7694bbe43e86c58bc36ce6feb0280d7b18225d7d5b,2024-04-01T01:12:59.077000
CVE-2024-30488,0,0,9fdeb2b805850984cf4d5d3f20362f356c5feecfdc17015a244efcf21ce430a4,2024-04-01T01:12:59.077000
@ -248491,11 +248492,11 @@ CVE-2024-30509,0,0,e9700b8c5350540047e650cc8d8f458cf3e5d059382d8f766eb65c78a5063
CVE-2024-3051,0,0,75704a1433dc2891570ee18e5534da76e15486abbfe9247250e965aaaff3a212,2024-04-29T12:42:03.667000
CVE-2024-30510,0,0,5a644950940e50ac60667456ae9d7008d354df976d23b70ea88670750248c7fb,2024-04-01T01:12:59.077000
CVE-2024-30511,0,0,d0cc98a9fcd4b29c047f03054ac8aade5a24634c83857c79161193efdb1adfcd,2024-04-01T01:12:59.077000
CVE-2024-30512,1,1,30fd1ffad4935929d2592197c1a2d23a575856ff421610658fc3f8f0e6992753,2024-06-09T11:15:51.780000
CVE-2024-30512,0,0,30fd1ffad4935929d2592197c1a2d23a575856ff421610658fc3f8f0e6992753,2024-06-09T11:15:51.780000
CVE-2024-30513,0,0,b4f3b427b5b9eb55223e544136e76b030c119a2fc3a4b518e0d0f0c48a100c09,2024-04-01T01:12:59.077000
CVE-2024-30514,0,0,5b77fe0998b7e11bf79e1b721812a139c6849d1513a8aeeecc1782432ea3302a,2024-04-01T01:12:59.077000
CVE-2024-30515,1,1,5b141a23e1dc80e188f0ff5f77ac5579b9e9c7e5e8a76614746761266a10426f,2024-06-09T11:15:52.010000
CVE-2024-30517,1,1,23245108260b4fe283e5c4ec6b545c6fae57b2070805a37670e6f9414eb0ed3d,2024-06-09T11:15:52.233000
CVE-2024-30515,0,0,5b141a23e1dc80e188f0ff5f77ac5579b9e9c7e5e8a76614746761266a10426f,2024-06-09T11:15:52.010000
CVE-2024-30517,0,0,23245108260b4fe283e5c4ec6b545c6fae57b2070805a37670e6f9414eb0ed3d,2024-06-09T11:15:52.233000
CVE-2024-30518,0,0,e8d4dc9d0a7f93d48badb1cbdec9f19934ca7a332fece613ee9749bc07919401,2024-04-01T01:12:59.077000
CVE-2024-30519,0,0,3b4b984b21c18b55e830dd1af8315299dc669c0add51934a0cf87347bc021e68,2024-03-29T13:28:22.880000
CVE-2024-3052,0,0,0b5788255484802b4039a7afc4d8af6d1c6fd000b39f03ec18c276a79786be6e,2024-04-29T12:42:03.667000
@ -248508,7 +248509,7 @@ CVE-2024-30525,0,0,145abccaf050cbaa27c578b64657ac5fddbc97e2763946d5bb55e393b4220
CVE-2024-30526,0,0,104d793a66172acd99ba27a22d83ba8e2d51aa54cd9b15f3bc6afe8a835c5254,2024-04-01T01:12:59.077000
CVE-2024-30527,0,0,27e4c5629e352d9d487ea96a5699b7f5113e11cf1c874e376c67a5c6e270b939,2024-05-17T18:36:05.263000
CVE-2024-30528,0,0,feabcaefbfdc6daa89a3f4fa509bc5ca62a15926f0c6a3b720a4665d7213fa8d,2024-06-05T12:53:50.240000
CVE-2024-30529,1,1,f5c0fc359ff3f0e17b726a0cba104e2e54de6187ddaa9a164c3f4118d56e12ac,2024-06-09T11:15:52.450000
CVE-2024-30529,0,0,f5c0fc359ff3f0e17b726a0cba104e2e54de6187ddaa9a164c3f4118d56e12ac,2024-06-09T11:15:52.450000
CVE-2024-3053,0,0,229c354cd3a0cecb51dd999b0e615993d2b674b0536a00d5050bf9c52ceb3ac1,2024-04-10T13:23:38.787000
CVE-2024-30530,0,0,dbaedca63c2d0063e70329af2f2e13f2d8eb98748a64909895cfdcfc37f36d33,2024-04-01T01:12:59.077000
CVE-2024-30531,0,0,b09c54bc9b690b21f0b4a0d96b7e8e1d6291d5af0953063c3755ba446b38cd3e,2024-04-02T20:31:58.463000
@ -248525,7 +248526,7 @@ CVE-2024-30540,0,0,9e0acd594b79c3373f59486bddb128a80a243885b6c9fe93fb641f9f76600
CVE-2024-30541,0,0,d78a79d3d88afd14cd20c527bfe41ab0fe37668194e235410187bd48d18e8829,2024-04-01T01:12:59.077000
CVE-2024-30542,0,0,483f1c677bd1908b69ea7275835022f8e5f3ed29e9c82c71faa39d845de9162e,2024-05-17T18:36:05.263000
CVE-2024-30543,0,0,de59888ed56e637b17c319241a16835129df317d943b40d1e6d9bcfa3e0bf401,2024-04-01T01:12:59.077000
CVE-2024-30544,1,1,194cae20165a75656578c22c972d0c5e979b8230f8b58b68b899822380d4e594,2024-06-09T11:15:52.677000
CVE-2024-30544,0,0,194cae20165a75656578c22c972d0c5e979b8230f8b58b68b899822380d4e594,2024-06-09T11:15:52.677000
CVE-2024-30545,0,0,6038867d67c995e883a86525490f0f271cb5fc6f4f0e3fedf213a3bc0350dc09,2024-04-15T13:15:31.997000
CVE-2024-30546,0,0,4af9d439135e31aee32061977c70bc8d2bc207778dce4d3c2778c470fee78f79,2024-04-15T13:15:31.997000
CVE-2024-30548,0,0,88bd7bd1cf2d1002ab9e155734df5d96b2d8cfbbf5bd9c13944c64553d3e002a,2024-04-01T01:12:59.077000
@ -248892,13 +248893,17 @@ CVE-2024-3124,0,0,ebf325dc123548345ec29d3ab9de8cb6e8774aebd06c17ddc5ace254cac029
CVE-2024-31240,0,0,9f07781697aa759fcc59082b4c6f556aee9b7696b0665c6342bdd8006b526b59,2024-04-10T19:49:51.183000
CVE-2024-31241,0,0,a7d99fde72ef29ff1cfd0fe2a269999470568d058381f56a307f35a902159e4c,2024-04-08T18:48:40.217000
CVE-2024-31242,0,0,9ee974fc6556a5b879b5916c73230ef7487ed734210b932a96111b95d6ab825e,2024-04-10T19:49:51.183000
CVE-2024-31243,1,1,67c9372d8c254595908c2345984c6ad595a4795db6f504f26369a38843a3c2fb,2024-06-09T12:15:09.190000
CVE-2024-31244,1,1,c49e91f688d59c645c5f107f53cd7b09633baadfdb13c96b797fe660d97af68d,2024-06-09T12:15:09.570000
CVE-2024-31245,0,0,a6748783471098ea606b7da1fa492f255051d20d67b4ea874b20f32f5f6c40b9,2024-04-10T19:49:51.183000
CVE-2024-31246,0,0,aba338a90df4723614d0f52237646583f6b86fb0ba7a15a5a4e6808934e92090,2024-06-09T09:15:11.393000
CVE-2024-31247,0,0,77f99349b5ee73d1d46417701c14587b13c4fc026bae1e1e3dcacdb5020e8602,2024-04-10T19:49:51.183000
CVE-2024-31248,1,1,b5341d0343cd8d762465c34e3ad26dfea1fcdc063fff3b85cbf97bc9d59a95aa,2024-06-09T12:15:09.890000
CVE-2024-31249,0,0,dc567d0b773bf4b13e4b74ab8b32236d97624056231327aa00701fee632c0a46,2024-04-10T19:49:51.183000
CVE-2024-3125,0,0,5b368671fb29ca77532e96b321edf6dbd6e260736e386b5fd2355575e1bfdbd2,2024-05-17T02:39:43.820000
CVE-2024-31250,0,0,0f0b708cd76e8554c8cbbe221a01cafbf3abf0d876491b3ad91664c869087492,2024-04-15T13:15:51.577000
CVE-2024-31251,0,0,622a30323fe670560899ed04c0815cbb0b2fce0b09ce1a23dd2d8e2a0f57097f,2024-04-15T13:15:51.577000
CVE-2024-31252,1,1,d2a5edcc007564828b29691f164604dd15a24b64b609731c617a579817ba1992,2024-06-09T12:15:10.260000
CVE-2024-31253,0,0,78f0b6a54f0c137e32ddb0cd7f6c5988b22601c8feeeff05dae9f273679d012f,2024-04-10T19:49:51.183000
CVE-2024-31254,0,0,2cf6b97b82b7ca685133f615cf170b585f46cbb63cda146b7e9e2f45b8c4412c,2024-04-10T19:49:51.183000
CVE-2024-31255,0,0,0d883aec778765163539ebaeed6f6c23502d8d98d69421df131277b74161aced,2024-04-08T18:48:40.217000
@ -248908,16 +248913,20 @@ CVE-2024-31258,0,0,70ba64c3e0672c516aea184bf9b51e94fe678827f2f5693d4b3dbfedfe55d
CVE-2024-31259,0,0,efdb49628f40b67578a55906f9ed71383df344a163aa9aaab9057d7f21783b9d,2024-04-10T19:49:51.183000
CVE-2024-3126,0,0,abed2f33a31fa9d44eaba62dcf6e7ca4c66b70bf191854f8eed8245cdc8001f8,2024-05-16T13:03:05.353000
CVE-2024-31260,0,0,7e6454e18ac0aac4dfbd56f1964329148e3fb0d2e57f0c69ea3f924848606c06,2024-04-08T18:48:40.217000
CVE-2024-31261,1,1,247aae56d2e5e2effc6a1c6ed9c1ca038fd980324989d81af871a21effbb96d0,2024-06-09T12:15:10.557000
CVE-2024-31262,0,0,2a9bcea0985fcaddd83893245a1b9fdc06643313b9df1f9c0a4fa4b5530f3f61,2024-04-15T13:15:51.577000
CVE-2024-31263,0,0,8f2890afedcc5d88494c2f6c1c034154cfb17cbd4a58e7b9478e628be5899862,2024-04-15T13:15:51.577000
CVE-2024-31264,0,0,c428617dd4afe9db95ef9b76c24f075b8caced8c4ee5d37fbc0432619eab40a5,2024-04-15T13:15:51.577000
CVE-2024-31265,0,0,73b53303ea2aa4510d95cf2e30536090282921bee1e4ddf1a7938462135cb9c0,2024-04-15T13:15:51.577000
CVE-2024-31266,0,0,f7171832f2bbf1c48f48a13e14cce15186ad868f1fa9f9b4e6a38a27a645802a,2024-04-25T13:18:13.537000
CVE-2024-31267,1,1,3486e6a1c812c892dd318dd014b6fd48972154a641e0ffafc3ec8d43d0c57e87,2024-06-09T12:15:10.810000
CVE-2024-31268,0,0,c260b292f4a0557333471e9a298a56aee0f8adfc83aea133a9470b069de5a2b5,2024-04-15T13:15:51.577000
CVE-2024-31269,0,0,d795c0acb6cd496e9d563a25767f3786288bcffe37844eb18ef033fe012b3b5a,2024-04-15T13:15:51.577000
CVE-2024-31270,0,0,7395b70d7b0a8277374463fe9f86c536d3bc87337182d55cd4f9d80f2292cfd2,2024-05-08T17:05:24.083000
CVE-2024-31271,0,0,d8228662c1440f14ee742f57032f82398c2055e3f352f6a0fc3cc42050b1d28d,2024-04-15T13:15:51.577000
CVE-2024-31272,0,0,cd2f0ad40b656f4b3504a130655e8227ea71f55dca7e33bbe56d00f117fbeb5f,2024-04-15T13:15:51.577000
CVE-2024-31273,1,1,54cfd405600d9b80574298d7595776d581beaf2ba258029862c9e909ccea4872,2024-06-09T12:15:11.077000
CVE-2024-31274,1,1,a75d17244e4fe5b3993298379f7de1c8d03343755297548614436ffcf2037bc2,2024-06-09T12:15:11.323000
CVE-2024-31277,0,0,6d9f95169e2f33c46b0cc3384ba6f4f8c5335f74523b1231fd7b9d9c4e3271a9,2024-04-08T18:48:40.217000
CVE-2024-31278,0,0,5fca286ba4fb85e19d6f2aa20a43535dfb21ddcf27d77966f9785126691400ad,2024-04-10T19:49:51.183000
CVE-2024-31279,0,0,c6d8bd339bd2ef8cd38712a588298a0f78c3dc186c2fc6521788bff4f268fee2,2024-04-15T13:15:51.577000
@ -249846,37 +249855,56 @@ CVE-2024-32773,0,0,cdf6d9113130bad9f64f16e6cbf7c73f3f39d2ec19b8de9aad6ed1b240268
CVE-2024-32774,0,0,8dbbf5bd24cbc04a82b5688823250c2b5b1e045ea3a252123fcfbb63193a0806,2024-05-17T18:35:35.070000
CVE-2024-32775,0,0,37dedaafb650bebb75327fea5ba2a27c54c577e91b0c51ca0d898dd371b5ccab,2024-04-24T13:39:42.883000
CVE-2024-32776,0,0,426e2f00b676f2aa4729f371e35392b970fed99eeff8deeaeff4e60d197d16c3,2024-05-14T16:12:23.490000
CVE-2024-32777,1,1,14627fc07a151cab26bbd0413b1a204e96d1f9e6e69f2764d518e3f1353420f0,2024-06-09T13:15:49.860000
CVE-2024-32778,1,1,1ab84984c7a51264a348930d8ce3eec14383faef5123a3977c3d1ac5a8d727d6,2024-06-09T13:15:50.080000
CVE-2024-32779,1,1,cb71494c1b4945e0213a76e0eb2b734736a2b4f93e590caaeb89f58e43ca4936,2024-06-09T13:15:50.300000
CVE-2024-32780,0,0,66e44fad8bdb872c2274e72c5213a72ef34d54727d02bc1b1f1a1a335313231f,2024-04-24T13:39:42.883000
CVE-2024-32781,0,0,0e777347533e2077e1078a0dd7c0d760b6e0f82cc39355f8acadd0fb9da12509,2024-04-24T13:39:42.883000
CVE-2024-32782,0,0,9ec78dd5ef99c97e9bd446cd4a5709ed6ac5c37449c7bad3c270185caf860b2d,2024-04-24T13:39:42.883000
CVE-2024-32783,1,1,9c7d3d9002db6c0c71e38dc02feca69109ac1ea77e3e421b5c0386d7f6baddd7,2024-06-09T13:15:50.550000
CVE-2024-32784,1,1,38ec13f3f1cac56067fe0cc2e0d5c6017f26b41978ea9424e51e6a72d7d496c0,2024-06-09T13:15:50.780000
CVE-2024-32785,0,0,b6060f7f8115223b269269600f9e784cd416198a918cdea5ea6d6623216b8d99,2024-04-24T13:39:42.883000
CVE-2024-32786,0,0,48458184fdafa0f8c3c418abbf8812e3f4d9ac9a41c01f4f0a4834cf45617812,2024-05-17T18:35:35.070000
CVE-2024-32787,1,1,4efab6ec80c460d04abe0872fdce8b9d0928be8103b3b2b900abdeed4404abfa,2024-06-09T13:15:51.003000
CVE-2024-32788,0,0,40adc8e4342d17d4dd92f3e20596b481f8f7b0b217541f7120bbbb0f8563da80,2024-04-24T13:39:42.883000
CVE-2024-32789,0,0,d6d2a0c6913de061e27dd5514b174461b07e3cc5ce6f4242e09febc129eac204,2024-04-24T13:39:42.883000
CVE-2024-32790,0,0,2a749fca46c606a332dcb07a4fc896ab5d7058ddcf6d2be8ec85327c18c95a6d,2024-05-17T18:36:05.263000
CVE-2024-32791,0,0,93d288963714079cbbe2f8f1bb007e9bc98008a2cb8fe490f528dec52fa65b9e,2024-04-24T13:39:42.883000
CVE-2024-32792,1,1,cbf524cf218df655e916b9f9f85b7c0eb81dfd2c0a293050487199779cb08343,2024-06-09T13:15:51.217000
CVE-2024-32793,0,0,0401f7dd95b92b4af3dcee32342e29d30d2d3f61cc7363bc65938bb767c3da36,2024-04-24T17:16:50.397000
CVE-2024-32794,0,0,af04326430aa58ca3538b2b06900d7134dad884debf7c66f895129df101dc2a3,2024-04-24T17:16:50.397000
CVE-2024-32795,0,0,64f3e792420781d69f50cef2545cc7bb9fa85c0624bbe3b99a02d4e4d983f838,2024-04-24T17:16:50.397000
CVE-2024-32796,0,0,843f023f5500c45cf310f05263a796673694f0181757f7df75501ca87d8b0d28,2024-04-24T13:39:42.883000
CVE-2024-32797,1,1,1ded04c3d7c3a0fcf364104bc2bf2335494dde4ca33e63cd9b716da8edb230b7,2024-06-09T13:15:51.433000
CVE-2024-32798,1,1,66d11a639ff0f3b60999fa858c43cb5357bc335cef8f6a405f89b6bedfd5eece,2024-06-09T13:15:51.663000
CVE-2024-32799,1,1,a2252d17f924e51a2a45c8c17664e5dbed3f9e7b0de21cbf62e6f69670ee3b49,2024-06-09T13:15:51.880000
CVE-2024-3280,0,0,a593231181bad985211047015b79d1b3afd500294c5ded065b21b48713244c73,2024-05-02T13:27:25.103000
CVE-2024-32800,0,0,563e91b0732e0703de98ddc602a6350b19f3d6d9162263125a3569ad3228d96a,2024-05-17T18:36:05.263000
CVE-2024-32801,0,0,4be65ed820d72048b16cb83f60ce532f34668282312680f5d997e7dd9ae65c7e,2024-04-24T13:39:42.883000
CVE-2024-32802,0,0,f4a288d9a3e463b52880d62c9be26446758840a811ee2fe2fdad68e5c06e08bb,2024-05-17T18:35:35.070000
CVE-2024-32803,0,0,87ef628ed36a01981de6b24a9a46f4b15174f60f02a3679855347999c2d8f373,2024-04-24T13:39:42.883000
CVE-2024-32804,1,1,4160807131734ccf95bccdb62e1a501860f45a5b8bffc605dd36b6e7ce311a28,2024-06-09T13:15:52.093000
CVE-2024-32805,1,1,80378a702a422782fe99714d0d916242cdbf2d144581de9d899972b8e5451558,2024-06-09T13:15:52.297000
CVE-2024-32806,0,0,d8037ba4bbb861d02087bc0e815d7d332fc801a9609bcadd59a9397c35ec5a94,2024-04-24T17:16:50.397000
CVE-2024-32807,0,0,8b98e3a6e24cd05e90f910439a7d317947749b7724e6ac17f8b88447230c616a,2024-05-17T10:15:10.997000
CVE-2024-32808,0,0,4a82bef92c296d86caf3ed2592cda4e11078b8b017423c1d319584391f5d5ff2,2024-04-24T13:39:42.883000
CVE-2024-32809,0,0,2e07c7a330a910fa3e04dce4c76f92fa09c8cb55b8e007c7d0b18aa46dc77a2a,2024-05-17T18:35:35.070000
CVE-2024-3281,0,0,b3c51db3aca3b371ad4faa3c1c4537d2c54d8323123f7ae9b26414cd9ee432a6,2024-04-10T13:24:22.187000
CVE-2024-32810,0,0,21d5bc478b6b1dadc923c44303dad9380b4ebf0e9d604a299a3dd25386429d87,2024-05-03T12:48:41.067000
CVE-2024-32811,1,1,977f7e246d0283e0e97f99e120497c81fdcb7a38259bbec62fe128e34cab7f54,2024-06-09T13:15:52.500000
CVE-2024-32812,0,0,a6c0140cb5875c5619d43acc5c77a24a0f3ff7202fb936829a583061f4a5590b,2024-04-24T13:39:42.883000
CVE-2024-32813,1,1,8b49ab5b06db5739ef31ddc046419ddcbf8e459473ca110028431a0c3d7b0fd6,2024-06-09T13:15:52.727000
CVE-2024-32814,1,1,54106d20d328c4cbceee98ebb5f727bbc726b9e7aa09df825ffd5d1bbee43a33,2024-06-09T13:15:52.960000
CVE-2024-32815,0,0,fdfcf6bbe35deb9ef34763a17ff64d385e838875d5c0ab731c71e0463aa8a48a,2024-04-24T13:39:42.883000
CVE-2024-32816,0,0,2fa63efd4ad7910d44e8053cdc5b80901495c5148f9f0b492de6d141c5af6f05,2024-04-24T13:39:42.883000
CVE-2024-32817,0,0,fb6a8208af9f3f3ba08015afd23338dfbfdb74c4a5ad4586cd32f7aa11622335,2024-04-24T13:39:42.883000
CVE-2024-32818,1,1,6bd94b4a919787846f2c903d8f9bee89f1845cbbe466f10cecdf3e7c85acbe06,2024-06-09T13:15:53.173000
CVE-2024-32819,0,0,a76abb5e1cc56a40468c4b4be8e97a0f07832ea680930c394988fc1a87f8b845,2024-04-24T13:39:42.883000
CVE-2024-32820,1,1,3819675dd5a5c3f00358e07fa2698595847543e3b97cea0eb65de8bbb92bd972,2024-06-09T13:15:53.390000
CVE-2024-32821,1,1,c1b196c47bf9cb73086c37e4f8d58396ff7c5775e02de6f65e4bf3f8bb6000fa,2024-06-09T13:15:53.593000
CVE-2024-32822,0,0,c011242a4753695f6a12d712d4490f93ca7eb5fae16fc890abc140c5e4633e56,2024-04-26T12:58:17.720000
CVE-2024-32823,0,0,3cea81c981168df73712e1cbd404f5efa836c789021936f81f7632d48e1a6203,2024-04-24T13:39:42.883000
CVE-2024-32824,1,1,5162b1001bfa156d8fd693cdb1bc031ace9ff9b1069dd15e741072eb2e01c456,2024-06-09T13:15:53.817000
CVE-2024-32825,0,0,004eee12f4f1b22c4e428c7ab0e0229e0137f723f36fa7ab2cf6c1cdf7bdb1bc,2024-04-24T13:39:42.883000
CVE-2024-32826,0,0,0d7c35c38998736930e8124de26137dd3edb154046638c71583ab2454604a929,2024-04-26T12:58:17.720000
CVE-2024-32827,0,0,f12873522aee15d251b15a9df8d80da0710686cec09e7851877e1c0fcf6388cb,2024-05-17T18:35:35.070000
@ -250172,8 +250200,11 @@ CVE-2024-3354,0,0,5aae79cede7291e1765a3e1fa18184af5eeaede0f0b8f7a4b3c7ba1d02dd5f
CVE-2024-33540,0,0,1e814a0ea27748156363c52e26bb77b4bb9ce63c0961730b17ad99865f2d78c6,2024-04-29T12:42:03.667000
CVE-2024-33541,0,0,48df6991afa9cae4f79a5330afbca5880d1b2d6db8fa020b9134287390cf47af,2024-06-04T16:57:41.053000
CVE-2024-33542,0,0,cb2721f36c93deba778615e90e795a43af96c8ef4ed64b27455e7152f7eea493,2024-06-05T17:15:13.303000
CVE-2024-33543,1,1,7abbc3ad9a24ceeb1e5c898283c2901216da6c1b520f3587006064861d3eef52,2024-06-09T12:15:11.560000
CVE-2024-33544,0,0,6e4ff4d9102a5d0f999b74773217097beffc904dc7d907863d8222867af3d336,2024-04-29T12:42:03.667000
CVE-2024-33545,1,1,046d62827d3f301005c65928c079d218529a0ba877c88811eab4edda8b7c5463,2024-06-09T12:15:11.813000
CVE-2024-33546,0,0,b169a469c02b39c7428e1081bafd0bce76a92a565897fda0bd0e3619ddaf047f,2024-04-29T12:42:03.667000
CVE-2024-33547,1,1,117d5e2f2e21ada8a4ff773b692ab837fcdd782268581ef7531c270ca7498aaa,2024-06-09T12:15:12.080000
CVE-2024-33548,0,0,77517ef36052fd5da5d8593285e56cc1fd6d7fc769c21993c4b43685f53c1b16,2024-04-29T12:42:03.667000
CVE-2024-33549,0,0,627091a54640136f39121102da5901117440b23127e2b0fc49ed5e1f481f5d12,2024-05-17T18:36:05.263000
CVE-2024-3355,0,0,261f5e790bb8ed0cc80994fb2b85557e08f93592b2e3e3daaccf1cfebbaecebd,2024-05-17T02:39:52.060000
@ -250182,13 +250213,18 @@ CVE-2024-33551,0,0,e3c8a7805d48a6724ffde81afa219ca071021e06c31bcfbe95e7eb6246451
CVE-2024-33552,0,0,fde617a71e53ba17ca9f10ac03296324c4dbf70e1400c675507bd26b68dc445f,2024-05-17T18:36:05.263000
CVE-2024-33553,0,0,a63cd25e668e51ecdb575a6c39c2fdd900060fbc8acd7ddcf7e42aae11fc033a,2024-04-29T12:42:03.667000
CVE-2024-33554,0,0,2fa44634a105abf41bf64ae29b253ae6fabbadcb928bf62199eae71c375589ab,2024-04-29T12:42:03.667000
CVE-2024-33555,1,1,2cb883e65ea630fd19d4b9c49978c3c16e2919108b902b70a0842f6cb01a5e5b,2024-06-09T12:15:12.330000
CVE-2024-33556,0,0,bf8553efa7bbc1b53671beaaba018dbbf4557a86527dffcc557df95897680dab,2024-05-17T18:36:05.263000
CVE-2024-33557,0,0,3b7e7f015fa77133fafcd1fb72f707b2ff9df58e0d92a7f911470f219c28a2f6,2024-06-04T16:57:41.053000
CVE-2024-33558,0,0,cf1181c3a097a2fb7b0482529266f16182741fa48852985dd7469f08bd1e4d39,2024-04-29T12:42:03.667000
CVE-2024-33559,0,0,7cbd898a0eece080f97fc20fdacdba598f6fa88c2c0ecdd34006e14d646ba964,2024-04-29T12:42:03.667000
CVE-2024-3356,0,0,cd18273ede30de9828727c0da7510b9e37ba44a42d6203a51ac948e77f776d06,2024-05-17T02:39:52.150000
CVE-2024-33560,0,0,8770d330406a0895b13dc27cbe3bdf6bc90eee66a07dddaacf6ab9b862a93deb,2024-06-04T16:57:41.053000
CVE-2024-33561,1,1,8492b376ad906c6daf71ab0e5a41ce761d7e71cc8ce91384700401517c1262a2,2024-06-09T12:15:12.567000
CVE-2024-33562,0,0,27fac541d1d64e11476c3268a849af55b6413283c20341e42235e842aff36652,2024-04-29T12:42:03.667000
CVE-2024-33563,1,1,265c2220a7c5e5030f1e5416f7d99fdc37854d499947684616ec6fe3efb50633,2024-06-09T12:15:12.800000
CVE-2024-33564,1,1,b4a22342133532202aba346337fbc39afaf78ddea547cf74f5dcd15e3d5aeeaf,2024-06-09T12:15:13.030000
CVE-2024-33565,1,1,05780d1cee5e35fbcb301e56ca8b6baa040e060acf2101b0b986358bb1834ddb,2024-06-09T12:15:13.247000
CVE-2024-33566,0,0,46d17e7fcf76ea9cc29b76ef68ee9038fd04b7d980a772b2f399515ebb8e8216,2024-04-29T12:42:03.667000
CVE-2024-33567,0,0,dbf0f06551a8f63fcd89d5d4c2980276f319d41b21ef5e34182332a6cf0b6381,2024-05-17T18:36:05.263000
CVE-2024-33568,0,0,facccff5a47e48f5a83df099be56f1c7b59f98e040afe8cc39c68786737649d9,2024-06-04T16:57:41.053000
@ -250196,6 +250232,7 @@ CVE-2024-33569,0,0,2335700bcdc0172c051939f710b9c93a78b75987bd576fb7fe4abe74717ff
CVE-2024-3357,0,0,8e1ce75ce4550715379c40489d32bb9922798f2d408cbe81aaffbd73849bdb5b,2024-05-17T02:39:52.243000
CVE-2024-33570,0,0,0537b9c72bfbf1655961ce253b4489c4b95e74d24416659de6615e2bf1c6b703,2024-05-07T13:39:32.710000
CVE-2024-33571,0,0,7491ee4b5721aac2bfd880f448bc941e8fa61c24acdbbd5222ab9b2cea79a689,2024-04-29T12:42:03.667000
CVE-2024-33572,1,1,4c765b95961afb4fd05c688360743f915615802425d1c598ac4853af040982a2,2024-06-09T12:15:13.470000
CVE-2024-33573,0,0,aab51bece9cf19b37152277064bd1e6223046e3a9fc591e9f4e8868ebab77e89,2024-05-08T17:05:24.083000
CVE-2024-33574,0,0,77f57023f6c73d88f04d79743221b240911ca3543cfd6fef908b29ee9a1cb4a4,2024-05-08T17:05:24.083000
CVE-2024-33575,0,0,ba650f18eda31a51989bac6516ae56cab367e4b24de4dc251d448b46a52e51ca,2024-04-29T12:42:03.667000
@ -250684,6 +250721,7 @@ CVE-2024-34431,0,0,e39c72a667405883510c9722517a19390857991f13b016bd41ee2154c000f
CVE-2024-34432,0,0,ce3aedb4801ccc9993286e302eb9dde61f27873681b0be3c45eb3ff0974626a7,2024-05-14T16:12:23.490000
CVE-2024-34433,0,0,4fe631c552d0e1b6c185a9d9092467fad59851acb94c1358a12fa8527f1d6b4f,2024-05-14T16:12:23.490000
CVE-2024-34434,0,0,e5aa29ebe09e642688abd82ab70f52b4366fcec5ee5dd78e209c232e5c29ee4e,2024-05-17T18:35:35.070000
CVE-2024-34435,1,1,8ddda279892737c2565a02d5c423e3147b9bc796371fb5479dac0dca514a862c,2024-06-09T12:15:13.703000
CVE-2024-34436,0,0,8b51852c11ed1ba7b7c422b12549d14b32ce869e2c1b0fe9b55af14722578fc6,2024-05-14T16:12:23.490000
CVE-2024-34437,0,0,f954bf10970a9ca62e79d1c7c0483b9cbca9bcbebab9fbfd95b90f34b782af0f,2024-05-14T16:12:23.490000
CVE-2024-34439,0,0,067793c2d3fa6bd001f4f073ac72cf3c1db18509629ca30b4b6ad7370a6d6261,2024-05-14T16:12:23.490000
@ -251175,9 +251213,11 @@ CVE-2024-35655,0,0,601e442a18c4da5a8735e92d8f9fc475270b1e233cb1966c02ba478a71ba1
CVE-2024-35657,0,0,b495f6eb6f600a15a4f0633d9ef74d133f633540bac91d9a975a3fc73c99d577,2024-06-08T16:15:08.850000
CVE-2024-35659,0,0,08837d467eb2c4f6f42cf294692520fdde74cc9e93dd0f8f269796baf7c9422c,2024-06-08T16:15:09.103000
CVE-2024-3566,0,0,e417ef1ceca67d3a9a8ba800520d4a9974bcf4eba2e3e6325dafdfbfe6af8d6b,2024-04-10T19:49:51.183000
CVE-2024-35660,1,1,b4444f7c4ec69c7e1b1b06684ca2907205afa90c86f4142e7e61f131a19f66b1,2024-06-09T12:15:13.953000
CVE-2024-35664,0,0,d0ccb41b020f67bf412b857dae6270e1516e989b566d9599ae1771894ea37eb6,2024-06-05T20:24:24.730000
CVE-2024-35666,0,0,5e133046a1ca74936bb3d36f8c7ff239458fb6b767b78411013c1064b6040b1e,2024-06-05T19:56:00.610000
CVE-2024-35668,0,0,e28d20c2d98d1a373b031e13d9cabba896a6e448df914921afbea8281107f77c,2024-06-05T19:55:05.997000
CVE-2024-35669,1,1,c851c069ff2a972f989cffd5ea6970023f311a01c726769830bedb92f9a26ec9,2024-06-09T12:15:14.197000
CVE-2024-3567,0,0,20839fe5058050b88e3eab46e96c3f4983a4ed5d3b8a31d734ec6d77ca524853,2024-04-10T19:49:51.183000
CVE-2024-35670,0,0,51461788a12064c65ee662bf7b64b9308067815ef5da2ef340b4d91a6fde09fa,2024-06-05T12:53:50.240000
CVE-2024-35672,0,0,fd078dc31a343bfdd739427843c7709952a3a18d571ff08ac22b2e2e1d95fe0e,2024-06-05T12:53:50.240000

Can't render this file because it is too large.