diff --git a/2024/10xxx/CVE-2024-10050.json b/2024/10xxx/CVE-2024-10050.json index 0a45278fde5..8d937562aa7 100644 --- a/2024/10xxx/CVE-2024-10050.json +++ b/2024/10xxx/CVE-2024-10050.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-10050", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Elementor Header & Footer Builder plugin for WordPress is vulnerable to Information Disclosure in all versions up to, and including, 1.6.43 via the hfe_template shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to view the contents of Draft, Private and Password-protected posts they do not own." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", + "cweId": "CWE-200" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "brainstormforce", + "product": { + "product_data": [ + { + "product_name": "Elementor Header & Footer Builder", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "1.6.43" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/662f6ae2-2047-4bbf-b4a6-2d536051e389?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/662f6ae2-2047-4bbf-b4a6-2d536051e389?source=cve" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/header-footer-elementor/tags/1.6.43/inc/class-header-footer-elementor.php#L634", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/header-footer-elementor/tags/1.6.43/inc/class-header-footer-elementor.php#L634" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3173344/header-footer-elementor/trunk/inc/class-header-footer-elementor.php?contextall=1", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset/3173344/header-footer-elementor/trunk/inc/class-header-footer-elementor.php?contextall=1" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Francesco Carlucci" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" } ] } diff --git a/2024/10xxx/CVE-2024-10333.json b/2024/10xxx/CVE-2024-10333.json new file mode 100644 index 00000000000..a233fc0f7dd --- /dev/null +++ b/2024/10xxx/CVE-2024-10333.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10333", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/10xxx/CVE-2024-10334.json b/2024/10xxx/CVE-2024-10334.json new file mode 100644 index 00000000000..4501539c6d6 --- /dev/null +++ b/2024/10xxx/CVE-2024-10334.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10334", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/50xxx/CVE-2024-50311.json b/2024/50xxx/CVE-2024-50311.json index 6d6bc6ef270..d5dcc44c444 100644 --- a/2024/50xxx/CVE-2024-50311.json +++ b/2024/50xxx/CVE-2024-50311.json @@ -71,7 +71,7 @@ "credits": [ { "lang": "en", - "value": "Red Hat would like to thank Awomir Zakrzewski (AFINE), Maksymilian Kubiak (AFINE), and Pawe Zdunek (AFINE) for reporting this issue." + "value": "Red Hat would like to thank Maksymilian Kubiak (AFINE), Pawe\u0142 Zdunek (AFINE), and S\u0142awomir Zakrzewski (AFINE) for reporting this issue." } ], "impact": { diff --git a/2024/50xxx/CVE-2024-50312.json b/2024/50xxx/CVE-2024-50312.json index 13fa2cde553..b8282e64c7a 100644 --- a/2024/50xxx/CVE-2024-50312.json +++ b/2024/50xxx/CVE-2024-50312.json @@ -82,7 +82,7 @@ "credits": [ { "lang": "en", - "value": "Red Hat would like to thank Awomir Zakrzewski (AFINE), Maksymilian Kubiak (AFINE), and Pawe Zdunek (AFINE) for reporting this issue." + "value": "Red Hat would like to thank Maksymilian Kubiak (AFINE), Pawe\u0142 Zdunek (AFINE), and S\u0142awomir Zakrzewski (AFINE) for reporting this issue." } ], "impact": { diff --git a/2024/8xxx/CVE-2024-8717.json b/2024/8xxx/CVE-2024-8717.json index d8682cc435c..f5b5f5dc7ff 100644 --- a/2024/8xxx/CVE-2024-8717.json +++ b/2024/8xxx/CVE-2024-8717.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-8717", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The PDF Flipbook, 3D Flipbook, PDF embed, PDF viewer \u2013 DearFlip plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'pdf_source' parameter in all versions up to, and including, 2.3.32 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "dearhive", + "product": { + "product_data": [ + { + "product_name": "Dear Flipbook \u2013 PDF Flipbook, 3D Flipbook, PDF embed, PDF viewer", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "2.3.32" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6d4c2944-28e8-4866-b4da-91cf12d9d115?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6d4c2944-28e8-4866-b4da-91cf12d9d115?source=cve" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/3d-flipbook-dflip-lite/trunk/assets/js/dflip.min.js", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/3d-flipbook-dflip-lite/trunk/assets/js/dflip.min.js" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3172275/", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset/3172275/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Noah Stead" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" } ] }