From 44031abf9661d7ed9a7159b73d914158fe023c8c Mon Sep 17 00:00:00 2001 From: erwanlr Date: Mon, 21 Feb 2022 11:41:05 +0100 Subject: [PATCH] Adds CVEs --- 2021/24xxx/CVE-2021-24867.json | 1423 +++++++++++++++++++++++++++++++- 2021/24xxx/CVE-2021-24921.json | 87 +- 2021/25xxx/CVE-2021-25055.json | 92 ++- 2021/25xxx/CVE-2021-25057.json | 87 +- 2021/25xxx/CVE-2021-25058.json | 87 +- 2021/25xxx/CVE-2021-25060.json | 87 +- 2021/25xxx/CVE-2021-25069.json | 92 ++- 2021/25xxx/CVE-2021-25075.json | 87 +- 2021/25xxx/CVE-2021-25082.json | 92 ++- 2021/25xxx/CVE-2021-25099.json | 92 ++- 2021/25xxx/CVE-2021-25100.json | 92 ++- 2021/25xxx/CVE-2021-25101.json | 87 +- 2021/4xxx/CVE-2021-4208.json | 87 +- 2022/0xxx/CVE-2022-0134.json | 87 +- 2022/0xxx/CVE-2022-0164.json | 92 ++- 2022/0xxx/CVE-2022-0186.json | 91 +- 2022/0xxx/CVE-2022-0199.json | 92 ++- 2022/0xxx/CVE-2022-0211.json | 87 +- 2022/0xxx/CVE-2022-0228.json | 94 ++- 2022/0xxx/CVE-2022-0234.json | 92 ++- 2022/0xxx/CVE-2022-0252.json | 92 ++- 2022/0xxx/CVE-2022-0255.json | 87 +- 2022/0xxx/CVE-2022-0279.json | 87 +- 2022/0xxx/CVE-2022-0288.json | 101 ++- 2022/0xxx/CVE-2022-0313.json | 92 ++- 25 files changed, 3208 insertions(+), 378 deletions(-) diff --git a/2021/24xxx/CVE-2021-24867.json b/2021/24xxx/CVE-2021-24867.json index d6115818538..cfc92f1bbce 100644 --- a/2021/24xxx/CVE-2021-24867.json +++ b/2021/24xxx/CVE-2021-24867.json @@ -1,18 +1,1409 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-24867", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2021-24867", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Backdoored Plugins & Themes from AccessPress Themes" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "AccessPress Themes", + "product": { + "product_data": [ + { + "product_name": "Frontend Post WordPress Plugin – AccessPress Anonymous Post", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "2.8.0", + "version_value": "2.8.0" + }, + { + "version_affected": "<", + "version_name": "2.8.1", + "version_value": "2.8.1" + } + ] + } + }, + { + "product_name": "AccessPress Custom CSS", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "2.0.1", + "version_value": "2.0.1" + }, + { + "version_affected": "<", + "version_name": "2.0.2", + "version_value": "2.0.2" + } + ] + } + }, + { + "product_name": "AccessPress Custom Post Type", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "1.0.8", + "version_value": "1.0.8" + }, + { + "version_affected": "<", + "version_name": "1.0.9", + "version_value": "1.0.9" + } + ] + } + }, + { + "product_name": "Social Auto Poster", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "2.1.3", + "version_value": "2.1.3" + }, + { + "version_affected": "<", + "version_name": "2.1.4", + "version_value": "2.1.4" + } + ] + } + }, + { + "product_name": "AccessPress iFeeds", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "4.0.3", + "version_value": "4.0.3" + }, + { + "version_affected": "<", + "version_name": "4.0.4", + "version_value": "4.0.4" + } + ] + } + }, + { + "product_name": "PI Button", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "3.3.3", + "version_value": "3.3.3" + }, + { + "version_affected": "<", + "version_name": "3.3.4", + "version_value": "3.3.4" + } + ] + } + }, + { + "product_name": "AccessPress Social Counter", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "1.9.1", + "version_value": "1.9.1" + }, + { + "version_affected": "<", + "version_name": "1.9.2", + "version_value": "1.9.2" + } + ] + } + }, + { + "product_name": "AccessPress Social Icons", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "1.8.2", + "version_value": "1.8.2" + }, + { + "version_affected": "<", + "version_name": "1.8.3", + "version_value": "1.8.3" + } + ] + } + }, + { + "product_name": "AccessPress Social Login Lite – Social Login WordPress Plugin", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "3.4.7", + "version_value": "3.4.7" + }, + { + "version_affected": "<", + "version_name": "3.4.8", + "version_value": "3.4.8" + } + ] + } + }, + { + "product_name": "AccessPress Social Share", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "4.5.5", + "version_value": "4.5.5" + }, + { + "version_affected": "<", + "version_name": "4.5.6", + "version_value": "4.5.6" + } + ] + } + }, + { + "product_name": "TAuto Poster", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "1.4.5", + "version_value": "1.4.5" + }, + { + "version_affected": "<", + "version_name": "1.4.6", + "version_value": "1.4.6" + } + ] + } + }, + { + "product_name": "WP TFeed", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "1.6.7", + "version_value": "1.6.7" + }, + { + "version_affected": "<", + "version_name": "1.6.8", + "version_value": "1.6.8" + } + ] + } + }, + { + "product_name": "Effectively Add & Customize Free Icons For WordPress Menus – WP Menu Icons Lite", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1.0.9", + "version_value": "1.0.9" + } + ] + } + }, + { + "product_name": "AP Companion", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1.0.7", + "version_value": "1.0.7" + } + ] + } + }, + { + "product_name": "Easiest Contact Form for WordPress – AP Contact Form", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "1.0.6", + "version_value": "1.0.6" + }, + { + "version_affected": "<", + "version_name": "1.0.7", + "version_value": "1.0.7" + } + ] + } + }, + { + "product_name": "Testimonial WordPress Plugin – AP Custom Testimonial", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "1.4.6", + "version_value": "1.4.6" + }, + { + "version_affected": "<", + "version_name": "1.4.7", + "version_value": "1.4.7" + } + ] + } + }, + { + "product_name": "Mega Menu Plugin for WordPress – AP Mega Menu", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "3.0.5", + "version_value": "3.0.5" + }, + { + "version_affected": "<", + "version_name": "3.0.6", + "version_value": "3.0.6" + } + ] + } + }, + { + "product_name": "Pricing Table Builder – AP Pricing Tables Lite", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "1.1.3", + "version_value": "1.1.3" + }, + { + "version_affected": "<", + "version_name": "1.1.3", + "version_value": "1.1.3" + } + ] + } + }, + { + "product_name": "Responsive Notification Bar Plugin for WordPress – Apex Notification Bar Lite", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "2.0.4", + "version_value": "2.0.4" + }, + { + "version_affected": "<", + "version_name": "2.0.5", + "version_value": "2.0.5" + } + ] + } + }, + { + "product_name": "Form Store to DB", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "1.0.9", + "version_value": "1.0.9" + }, + { + "version_affected": "<", + "version_name": "1.1.0", + "version_value": "1.1.0" + } + ] + } + }, + { + "product_name": "Comments Disable – AccessPress", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "1.0.7", + "version_value": "1.0.7" + }, + { + "version_affected": "<", + "version_name": "1.0.8", + "version_value": "1.0.8" + } + ] + } + }, + { + "product_name": "CTA plugin for WordPress – Easy Side Tab", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "1.0.7", + "version_value": "1.0.7" + }, + { + "version_affected": "<", + "version_name": "1.0.8", + "version_value": "1.0.8" + } + ] + } + }, + { + "product_name": "WordPress Backend Customizer – Everest Admin Theme Lite", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "1.0.7", + "version_value": "1.0.7" + }, + { + "version_affected": "<", + "version_name": "1.0.8", + "version_value": "1.0.8" + } + ] + } + }, + { + "product_name": "Ultimate Coming Soon, Maintenance Mode Plugin for WordPress – Everest Coming Soon Lite", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "1.1.0", + "version_value": "1.1.0" + }, + { + "version_affected": "<", + "version_name": "1.1.1", + "version_value": "1.1.1" + } + ] + } + }, + { + "product_name": "Free WordPress Plugin To Display Like/Dislike Comment Rating – Everest Comment Rating Lite", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "2.0.4", + "version_value": "2.0.4" + }, + { + "version_affected": "<", + "version_name": "2.0.5", + "version_value": "2.0.5" + } + ] + } + }, + { + "product_name": "Beautiful Stat Counter Plugin for WordPress – Everest Counter Lite", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "2.0.7", + "version_value": "2.0.7" + }, + { + "version_affected": "<", + "version_name": "2.0.8", + "version_value": "2.0.8" + } + ] + } + }, + { + "product_name": "Beautiful FAQ Plugin for WordPress – Everest FAQ Manager Lite", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "1.0.8", + "version_value": "1.0.8" + }, + { + "version_affected": "<", + "version_name": "1.0.9", + "version_value": "1.0.9" + } + ] + } + }, + { + "product_name": "Responsive Media Gallery Plugin for WordPress – Everest Gallery Lite", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "1.0.8", + "version_value": "1.0.8" + }, + { + "version_affected": "<", + "version_name": "1.0.9", + "version_value": "1.0.9" + } + ] + } + }, + { + "product_name": "Everest GPlaces Business Reviews", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "1.0.9", + "version_value": "1.0.9" + }, + { + "version_affected": "<", + "version_name": "2.0.0", + "version_value": "2.0.0" + } + ] + } + }, + { + "product_name": "Everest Review Lite – User/Admin review plugin for WordPress", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.0.7", + "version_value": "1.0.7" + } + ] + } + }, + { + "product_name": "Free Responsive Tab Plugin For WordPress – Everest Tab Lite", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "2.0.3", + "version_value": "2.0.3" + }, + { + "version_affected": "<", + "version_name": "2.0.4", + "version_value": "2.0.4" + } + ] + } + }, + { + "product_name": "Responsive WordPress Timeline Plugin – Everest Timeline Lite", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "1.1.1", + "version_value": "1.1.1" + }, + { + "version_affected": "<", + "version_name": "1.1.2", + "version_value": "1.1.2" + } + ] + } + }, + { + "product_name": "Inline Call To Action Builder Lite – Free Call To Action Layer Plugin for WordPress", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "1.1.0", + "version_value": "1.1.0" + }, + { + "version_affected": "<", + "version_name": "1.1.1", + "version_value": "1.1.1" + } + ] + } + }, + { + "product_name": "Product Slider For WooCommerce Lite", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "1.1.5", + "version_value": "1.1.5" + }, + { + "version_affected": "<", + "version_name": "1.1.6", + "version_value": "1.1.6" + } + ] + } + }, + { + "product_name": "Responsive Clients Logo Gallery Plugin for WordPress – Smart Logo Showcase Lite", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "1.1.7", + "version_value": "1.1.7" + }, + { + "version_affected": "<", + "version_name": "1.1.8", + "version_value": "1.1.8" + } + ] + } + }, + { + "product_name": "Smart Scroll Posts for WordPress", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "2.0.8", + "version_value": "2.0.8" + }, + { + "version_affected": "<", + "version_name": "2.0.9", + "version_value": "2.0.9" + } + ] + } + }, + { + "product_name": "Faster and Easier scroll to Top Plugin for WordPress – Smart Scroll to Top Lite", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "1.0.3", + "version_value": "1.0.3" + }, + { + "version_affected": "<", + "version_name": "1.0.4", + "version_value": "1.0.4" + } + ] + } + }, + { + "product_name": "Total GDPR Compliance Lite – WordPress Plugin for GDPR Compatibility", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.0.4", + "version_value": "1.0.4" + } + ] + } + }, + { + "product_name": "Total Team Lite – Responsive Team Manager / Showcase Plugin for WordPress", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "1.1.1", + "version_value": "1.1.1" + }, + { + "version_affected": "<", + "version_name": "1.1.2", + "version_value": "1.1.2" + } + ] + } + }, + { + "product_name": "Free Responsive Post/Article Author Section Plugin for WordPress – Ultimate Author Box Lite", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "1.1.2", + "version_value": "1.1.2" + }, + { + "version_affected": "<", + "version_name": "1.1.3", + "version_value": "1.1.3" + } + ] + } + }, + { + "product_name": "Contact Form for WordPress – Ultimate Form Builder Lite", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "1.5.0", + "version_value": "1.5.0" + }, + { + "version_affected": "<", + "version_name": "1.5.1", + "version_value": "1.5.1" + } + ] + } + }, + { + "product_name": "Badge Designer Lite For WooCommerce", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "1.1.0", + "version_value": "1.1.0" + }, + { + "version_affected": "<", + "version_name": "1.1.1", + "version_value": "1.1.1" + } + ] + } + }, + { + "product_name": "WordPress Slider Plugin – WP 1 Slider", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "1.2.9", + "version_value": "1.2.9" + }, + { + "version_affected": "<", + "version_name": "1.3.0", + "version_value": "1.3.0" + } + ] + } + }, + { + "product_name": "Plugin to Manage / Design WordPress Blog – WP Blog Manager Lite", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "1.1.1", + "version_value": "1.1.1" + }, + { + "version_affected": "<", + "version_name": "1.1.2", + "version_value": "1.1.2" + } + ] + } + }, + { + "product_name": "Smartest Way To Design & Customize WordPress Comments & Comment Form – WP Comment Designer Lite", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "2.0.3", + "version_value": "2.0.3" + }, + { + "version_affected": "<", + "version_name": "2.0.4", + "version_value": "2.0.4" + } + ] + } + }, + { + "product_name": "Cookie Notification Plugin for WordPress – WP Cookie User Info", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "1.0.7", + "version_value": "1.0.7" + }, + { + "version_affected": "<", + "version_name": "1.0.8", + "version_value": "1.0.8" + } + ] + } + }, + { + "product_name": "Social Review", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1.0.9", + "version_value": "1.0.9" + } + ] + } + }, + { + "product_name": "MContact Button", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "2.0.7", + "version_value": "2.0.7" + } + ] + } + }, + { + "product_name": "WP Floating Menu – One page navigator, sticky menu for WordPress", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "1.4.4", + "version_value": "1.4.4" + }, + { + "version_affected": "<", + "version_name": "1.4.5", + "version_value": "1.4.5" + } + ] + } + }, + { + "product_name": "The Easiest WordPress Media Manager Plugin – WP Media Manager Lite", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "1.1.2", + "version_value": "1.1.2" + }, + { + "version_affected": "<", + "version_name": "1.1.3", + "version_value": "1.1.3" + } + ] + } + }, + { + "product_name": "WP Popup Banners", + "version": { + "version_data": [ + { + "version_affected": ">=", + "version_name": "1.2.3", + "version_value": "1.2.3" + }, + { + "version_affected": "<", + "version_name": "1.2.4", + "version_value": "1.2.4" + } + ] + } + }, + { + "product_name": "WP Popup Lite – Responsive popup plugin for WordPress", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.0.8", + "version_value": "1.0.8" + } + ] + } + }, + { + "product_name": "Responsive Products Showcase Listing for WordPress – WP Product Gallery Lite", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.1.1", + "version_value": "1.1.1" + } + ] + } + }, + { + "product_name": "accessbuddy", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.0.0", + "version_value": "1.0.0" + } + ] + } + }, + { + "product_name": "Accesspress Basic", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "3.2.1", + "version_value": "3.2.1" + } + ] + } + }, + { + "product_name": "Accesspress Lite", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "2.92", + "version_value": "2.92" + } + ] + } + }, + { + "product_name": "Accesspress Mag", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "2.6.5", + "version_value": "2.6.5" + } + ] + } + }, + { + "product_name": "AccessPress Parallax", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "4.5", + "version_value": "4.5" + } + ] + } + }, + { + "product_name": "accesspress-ray", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.19.5", + "version_value": "1.19.5" + } + ] + } + }, + { + "product_name": "AccessPress Root", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "2.5", + "version_value": "2.5" + } + ] + } + }, + { + "product_name": "AccessPress Staple", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.9.1", + "version_value": "1.9.1" + } + ] + } + }, + { + "product_name": "AccessPress Store", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "2.4.9", + "version_value": "2.4.9" + } + ] + } + }, + { + "product_name": "Agency Lite", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.1.6", + "version_value": "1.1.6" + } + ] + } + }, + { + "product_name": "Aplite", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.0.6", + "version_value": "1.0.6" + } + ] + } + }, + { + "product_name": "Bingle", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.0.4", + "version_value": "1.0.4" + } + ] + } + }, + { + "product_name": "Bloger", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.2.6", + "version_value": "1.2.6" + } + ] + } + }, + { + "product_name": "Construction Lite", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.2.5", + "version_value": "1.2.5" + } + ] + } + }, + { + "product_name": "Doko", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.0.27", + "version_value": "1.0.27" + } + ] + } + }, + { + "product_name": "Enlighten", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.3.5", + "version_value": "1.3.5" + } + ] + } + }, + { + "product_name": "FashStore", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.2.1", + "version_value": "1.2.1" + } + ] + } + }, + { + "product_name": "FotoGraphy", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "2.4.0", + "version_value": "2.4.0" + } + ] + } + }, + { + "product_name": "Gaga Corp", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.0.8", + "version_value": "1.0.8" + } + ] + } + }, + { + "product_name": "Gaga Lite", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.4.2", + "version_value": "1.0.8" + } + ] + } + }, + { + "product_name": "One Paze", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "2.2.8", + "version_value": "2.2.8" + } + ] + } + }, + { + "product_name": "parallax-blog", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "3.1.1574941215", + "version_value": "3.1.1574941215" + } + ] + } + }, + { + "product_name": "ParallaxSome", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.3.6", + "version_value": "1.3.6" + } + ] + } + }, + { + "product_name": "Punte", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.1.2", + "version_value": "1.1.2" + } + ] + } + }, + { + "product_name": "Revolve", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.3.1", + "version_value": "1.3.1" + } + ] + } + }, + { + "product_name": "Ripple", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.2.0", + "version_value": "1.2.0" + } + ] + } + }, + { + "product_name": "ScrollMe", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "2.1.0", + "version_value": "2.1.0" + } + ] + } + }, + { + "product_name": "SportsMag", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.2.1", + "version_value": "1.2.1" + } + ] + } + }, + { + "product_name": "StoreVilla", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.4.1", + "version_value": "1.4.1" + } + ] + } + }, + { + "product_name": "Swing Lite", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.1.9", + "version_value": "1.1.9" + } + ] + } + }, + { + "product_name": "The Launcher", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.3.2", + "version_value": "1.3.2" + } + ] + } + }, + { + "product_name": "The Monday", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.4.1", + "version_value": "1.4.1" + } + ] + } + }, + { + "product_name": "Uncode Lite", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.3.1", + "version_value": "1.3.1" + } + ] + } + }, + { + "product_name": "Unicon Lite", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.2.6", + "version_value": "1.2.6" + } + ] + } + }, + { + "product_name": "VMag", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.2.7", + "version_value": "1.2.7" + } + ] + } + }, + { + "product_name": "VMagazine Lite", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.3.5", + "version_value": "1.3.5" + } + ] + } + }, + { + "product_name": "Vmagazine News", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.0.5", + "version_value": "1.0.5" + } + ] + } + }, + { + "product_name": "Zigcy Baby", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.0.6", + "version_value": "1.0.6" + } + ] + } + }, + { + "product_name": "Zigcy Cosmetics", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "1.0.5", + "version_value": "1.0.5" + } + ] + } + }, + { + "product_name": "Zigcy Lite", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_name": "2.0.9", + "version_value": "2.0.9" + } + ] + } + } + ] + } + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Numerous Plugins and Themes from the AccessPress Themes (aka Access Keys) vendor are backdoored due to their website being compromised. Only plugins and themes downloaded via the vendor website are affected, and those hosted on wordpress.org are not. However, all of them were updated or removed to avoid any confusion" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/9c76bada-fa32-4c2f-9855-d0efd1e63eff", + "name": "https://wpscan.com/vulnerability/9c76bada-fa32-4c2f-9855-d0efd1e63eff" + }, + { + "refsource": "MISC", + "url": "https://jetpack.com/2022/01/18/backdoor-found-in-themes-and-plugins-from-accesspress-themes/", + "name": "https://jetpack.com/2022/01/18/backdoor-found-in-themes-and-plugins-from-accesspress-themes/" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-912 Hidden Functionality", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "Harald Eilertsen (Jetpack Scan)" + } + ], + "source": { + "discovery": "EXTERNAL" + } +} diff --git a/2021/24xxx/CVE-2021-24921.json b/2021/24xxx/CVE-2021-24921.json index 9ed644fcb86..42da832903b 100644 --- a/2021/24xxx/CVE-2021-24921.json +++ b/2021/24xxx/CVE-2021-24921.json @@ -1,18 +1,75 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-24921", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2021-24921", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Advanced Database Cleaner < 3.0.4 - Reflected Cross-Site Scripting" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Advanced Database Cleaner", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "3.0.4", + "version_value": "3.0.4" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Advanced Database Cleaner WordPress plugin before 3.0.4 does not sanitise and escape $_GET keys and values before outputting them back in attributes, leading to Reflected Cross-Site Scripting issues" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/43ab0997-4d15-4ff7-af41-7b528b0ba3c7", + "name": "https://wpscan.com/vulnerability/43ab0997-4d15-4ff7-af41-7b528b0ba3c7" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-79 Cross-site Scripting (XSS)", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "JrXnm" + } + ], + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25055.json b/2021/25xxx/CVE-2021-25055.json index 6dfcba2526e..81e523c23fd 100644 --- a/2021/25xxx/CVE-2021-25055.json +++ b/2021/25xxx/CVE-2021-25055.json @@ -1,18 +1,80 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-25055", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2021-25055", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "FeedWordPress < 2022.0123 - Reflected Cross-Site Scripting (XSS)" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "FeedWordPress", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "2022.0123", + "version_value": "2022.0123" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The FeedWordPress plugin before 2022.0123 is affected by a Reflected Cross-Site Scripting (XSS) within the \"visibility\" parameter." + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/7ed050a4-27eb-4ecb-9182-1d8fa1e71571", + "name": "https://wpscan.com/vulnerability/7ed050a4-27eb-4ecb-9182-1d8fa1e71571" + }, + { + "refsource": "CONFIRM", + "url": "https://plugins.trac.wordpress.org/changeset/2662665", + "name": "https://plugins.trac.wordpress.org/changeset/2662665" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-79 Cross-site Scripting (XSS)", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "Hung Chien" + } + ], + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25057.json b/2021/25xxx/CVE-2021-25057.json index e8a929b09c5..2ce238c6566 100644 --- a/2021/25xxx/CVE-2021-25057.json +++ b/2021/25xxx/CVE-2021-25057.json @@ -1,18 +1,75 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-25057", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2021-25057", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Translation Exchange <= 1.0.14 - Authenticated Stored Cross-Site Scripting (XSS)" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Translation Exchange – Translate Your WordPress Site In Minutes!", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "1.0.14", + "version_value": "1.0.14" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Translation Exchange WordPress plugin through 1.0.14 was vulnerable to Authenticated Stored Cross-Site Scripting (XSS) within the Project Key text field found in the plugin's settings." + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/c0dd3ef1-579d-43a4-801a-660c41495d58", + "name": "https://wpscan.com/vulnerability/c0dd3ef1-579d-43a4-801a-660c41495d58" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-79 Cross-site Scripting (XSS)", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "Rutuja D Shirke" + } + ], + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25058.json b/2021/25xxx/CVE-2021-25058.json index 014a5343ff7..50b1ed62400 100644 --- a/2021/25xxx/CVE-2021-25058.json +++ b/2021/25xxx/CVE-2021-25058.json @@ -1,18 +1,75 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-25058", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2021-25058", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "The Buffer Button <= 1.0 - Authenticated Stored Cross Site Scripting (XSS)" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "The Buffer Button", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "1.0", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Buffer Button WordPress plugin through 1.0 was vulnerable to Authenticated Stored Cross Site Scripting (XSS) within the Twitter username to mention text field." + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/fd5271ef-1da5-4d09-888e-f1fd71820cde", + "name": "https://wpscan.com/vulnerability/fd5271ef-1da5-4d09-888e-f1fd71820cde" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-79 Cross-site Scripting (XSS)", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "Rutuja D Shirke" + } + ], + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25060.json b/2021/25xxx/CVE-2021-25060.json index 1ade5453a29..e0948e4d5da 100644 --- a/2021/25xxx/CVE-2021-25060.json +++ b/2021/25xxx/CVE-2021-25060.json @@ -1,18 +1,75 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-25060", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2021-25060", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Five Star Business Profile and Schema < 2.1.7 - Subscriber+ Page Creation & Settings Update to Stored XSS" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Five Star Business Profile and Schema", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "2.1.7", + "version_value": "2.1.7" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Five Star Business Profile and Schema WordPress plugin before 2.1.7 does not have any authorisation and CSRF in its bpfwp_welcome_add_contact_page and bpfwp_welcome_set_contact_information AJAX action, allowing any authenticated users, such as subscribers, to call them. Furthermore, due to the lack of sanitisation, it also lead to Stored Cross-Site Scripting issues" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/9e1ac711-1f65-49fa-b007-66170a77b265", + "name": "https://wpscan.com/vulnerability/9e1ac711-1f65-49fa-b007-66170a77b265" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-79 Cross-site Scripting (XSS)", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "Krzysztof Zając" + } + ], + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25069.json b/2021/25xxx/CVE-2021-25069.json index 86e7881ab0f..747ee4c8e03 100644 --- a/2021/25xxx/CVE-2021-25069.json +++ b/2021/25xxx/CVE-2021-25069.json @@ -1,18 +1,80 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-25069", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2021-25069", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "WordPress Download Manager < 3.2.34 - Authenticated SQL Injection to Reflected XSS" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Download Manager", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "3.2.34", + "version_value": "3.2.34" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Download Manager WordPress plugin before 3.2.34 does not sanitise and escape the package_ids parameter before using it in a SQL statement, leading to a SQL injection, which can also be exploited to cause a Reflected Cross-Site Scripting issue" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/4ff5e638-1b89-41df-b65a-f821de8934e8", + "name": "https://wpscan.com/vulnerability/4ff5e638-1b89-41df-b65a-f821de8934e8" + }, + { + "refsource": "CONFIRM", + "url": "https://plugins.trac.wordpress.org/changeset/2656086", + "name": "https://plugins.trac.wordpress.org/changeset/2656086" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-89 SQL Injection", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "Krzysztof Zając" + } + ], + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25075.json b/2021/25xxx/CVE-2021-25075.json index 498fecd8169..9edb419095b 100644 --- a/2021/25xxx/CVE-2021-25075.json +++ b/2021/25xxx/CVE-2021-25075.json @@ -1,18 +1,75 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-25075", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2021-25075", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Duplicate Page or Post < 1.5.1 - Arbitrary Settings Update to Stored XSS" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Duplicate Page or Post", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1.5.1", + "version_value": "1.5.1" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Duplicate Page or Post WordPress plugin before 1.5.1 does not have any authorisation and has a flawed CSRF check in the wpdevart_duplicate_post_parametrs_save_in_db AJAX action, allowing any authenticated users, such as subscriber to call it and change the plugin's settings, or perform such attack via CSRF. Furthermore, due to the lack of escaping, this could lead to Stored Cross-Site Scripting issues" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/db5a0431-af4d-45b7-be4e-36b6c90a601b", + "name": "https://wpscan.com/vulnerability/db5a0431-af4d-45b7-be4e-36b6c90a601b" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-862 Missing Authorization", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "Krzysztof Zając" + } + ], + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25082.json b/2021/25xxx/CVE-2021-25082.json index 918c2ffdea8..d92e49f0807 100644 --- a/2021/25xxx/CVE-2021-25082.json +++ b/2021/25xxx/CVE-2021-25082.json @@ -1,18 +1,80 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-25082", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2021-25082", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Popup Builder < 4.0.7 - LFI to RCE" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Popup Builder – Create highly converting, mobile friendly marketing popups.", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "4.0.7", + "version_value": "4.0.7" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Popup Builder WordPress plugin before 4.0.7 does not validate and sanitise the sgpb_type parameter before using it in a require statement, leading to a Local File Inclusion issue. Furthermore, since the beginning of the string can be controlled, the issue can lead to RCE vulnerability via wrappers such as PHAR" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/0f90f10c-4b0a-46da-ac1f-aa6a03312132", + "name": "https://wpscan.com/vulnerability/0f90f10c-4b0a-46da-ac1f-aa6a03312132" + }, + { + "refsource": "CONFIRM", + "url": "https://plugins.trac.wordpress.org/changeset/2659117", + "name": "https://plugins.trac.wordpress.org/changeset/2659117" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "JrXnm" + } + ], + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25099.json b/2021/25xxx/CVE-2021-25099.json index efd8e551292..16cfbc8103c 100644 --- a/2021/25xxx/CVE-2021-25099.json +++ b/2021/25xxx/CVE-2021-25099.json @@ -1,18 +1,80 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-25099", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2021-25099", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Give < 2.17.3 - Unauthenticated Reflected Cross-Site Scripting" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "GiveWP – Donation Plugin and Fundraising Platform", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "2.17.3", + "version_value": "2.17.3" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The GiveWP WordPress plugin before 2.17.3 does not sanitise and escape the form_id parameter before outputting it back in the response of an unauthenticated request via the give_checkout_login AJAX action, leading to a Reflected Cross-Site Scripting" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/87a64b27-23a3-40f5-a3d8-0650975fee6f", + "name": "https://wpscan.com/vulnerability/87a64b27-23a3-40f5-a3d8-0650975fee6f" + }, + { + "refsource": "CONFIRM", + "url": "https://plugins.trac.wordpress.org/changeset/2659032", + "name": "https://plugins.trac.wordpress.org/changeset/2659032" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-79 Cross-site Scripting (XSS)", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "JrXnm" + } + ], + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25100.json b/2021/25xxx/CVE-2021-25100.json index b11f4803531..36f7cf3f732 100644 --- a/2021/25xxx/CVE-2021-25100.json +++ b/2021/25xxx/CVE-2021-25100.json @@ -1,18 +1,80 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-25100", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2021-25100", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Give < 2.17.3 - Reflected Cross-Site Scripting via Donation Forms Dashboard" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "GiveWP – Donation Plugin and Fundraising Platform", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "2.17.3", + "version_value": "2.17.3" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The GiveWP WordPress plugin before 2.17.3 does not escape the s parameter before outputting it back in an attribute in the Donation Forms dashboard, leading to a Reflected Cross-Site Scripting" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/fe2c02bf-207c-43da-98bd-4c85d235de8b", + "name": "https://wpscan.com/vulnerability/fe2c02bf-207c-43da-98bd-4c85d235de8b" + }, + { + "refsource": "CONFIRM", + "url": "https://plugins.trac.wordpress.org/changeset/2659032", + "name": "https://plugins.trac.wordpress.org/changeset/2659032" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-79 Cross-site Scripting (XSS)", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "JrXnm" + } + ], + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2021/25xxx/CVE-2021-25101.json b/2021/25xxx/CVE-2021-25101.json index 0a981ed13f3..ed34cf05f02 100644 --- a/2021/25xxx/CVE-2021-25101.json +++ b/2021/25xxx/CVE-2021-25101.json @@ -1,18 +1,75 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-25101", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2021-25101", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Anti-Malware Security and Brute-Force Firewall < 4.20.94 - Admin+ Reflected Cross-Site Scripting" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Anti-Malware Security and Brute-Force Firewall", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "4.20.94", + "version_value": "4.20.94" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Anti-Malware Security and Brute-Force Firewall WordPress plugin before 4.20.94 does not sanitise and escape the POST data before outputting it back in attributes of an admin page, leading to a Reflected Cross-Site scripting. Due to the presence of specific parameter value, available to admin users, this can only be exploited by an admin against another admin user." + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/5fd0380c-0d1d-4380-96f0-a07be5a61eba", + "name": "https://wpscan.com/vulnerability/5fd0380c-0d1d-4380-96f0-a07be5a61eba" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-79 Cross-site Scripting (XSS)", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "JrXnm" + } + ], + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2021/4xxx/CVE-2021-4208.json b/2021/4xxx/CVE-2021-4208.json index 75c2e785ab4..5d18bed74f6 100644 --- a/2021/4xxx/CVE-2021-4208.json +++ b/2021/4xxx/CVE-2021-4208.json @@ -1,18 +1,75 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-4208", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2021-4208", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "ExportFeed <= 2.0.1.0 - Admin+ SQL Injection" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "ExportFeed: List WooCommerce Products on eBay Store", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "2.0.1.0", + "version_value": "2.0.1.0" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The ExportFeed WordPress plugin through 2.0.1.0 does not sanitise and escape the product_id POST parameter before using it in a SQL statement, leading to a SQL injection vulnerability exploitable by high privilege users" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/0cf63b44-f709-4ba4-be14-1eea934c2007", + "name": "https://wpscan.com/vulnerability/0cf63b44-f709-4ba4-be14-1eea934c2007" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-89 SQL Injection", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "0xdecafbad" + } + ], + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0134.json b/2022/0xxx/CVE-2022-0134.json index 71df60576b4..c498a9ebb7e 100644 --- a/2022/0xxx/CVE-2022-0134.json +++ b/2022/0xxx/CVE-2022-0134.json @@ -1,18 +1,75 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2022-0134", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2022-0134", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "AnyComment < 0.2.18 - Arbitrary HyperComments Import/Revert via CSRF" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "AnyComment", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0.2.18", + "version_value": "0.2.18" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The AnyComment WordPress plugin before 0.2.18 does not have CSRF checks in the Import and Revert HyperComments features, allowing attackers to make logged in admin perform such actions via a CSRF attack" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/fa09ea9b-d5a0-4773-a692-9ff0200bcd85", + "name": "https://wpscan.com/vulnerability/fa09ea9b-d5a0-4773-a692-9ff0200bcd85" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-352 Cross-Site Request Forgery (CSRF)", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "Brandon Roldan" + } + ], + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0164.json b/2022/0xxx/CVE-2022-0164.json index 4c691d7d0c1..44cbaa274d2 100644 --- a/2022/0xxx/CVE-2022-0164.json +++ b/2022/0xxx/CVE-2022-0164.json @@ -1,18 +1,80 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2022-0164", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2022-0164", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Coming soon and Maintenance mode < 3.6.7 - Subscriber+ Arbitrary Email Sending to Subscribed Users" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Coming soon and Maintenance mode", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "3.6.8", + "version_value": "3.6.8" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Coming soon and Maintenance mode WordPress plugin before 3.6.8 does not have authorisation and CSRF checks in its coming_soon_send_mail AJAX action, allowing any authenticated users, with a role as low as subscriber to send arbitrary emails to all subscribed users" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/942535f9-73bf-4467-872a-20075f03bc51", + "name": "https://wpscan.com/vulnerability/942535f9-73bf-4467-872a-20075f03bc51" + }, + { + "refsource": "CONFIRM", + "url": "https://plugins.trac.wordpress.org/changeset/2655973", + "name": "https://plugins.trac.wordpress.org/changeset/2655973" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-863 Incorrect Authorization", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "Krzysztof Zając" + } + ], + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0186.json b/2022/0xxx/CVE-2022-0186.json index cb7fdb24ffb..a006602ec4b 100644 --- a/2022/0xxx/CVE-2022-0186.json +++ b/2022/0xxx/CVE-2022-0186.json @@ -1,18 +1,79 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2022-0186", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2022-0186", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Image Photo Gallery Final Tiles Grid < 3.5.3 - Contributor+ Stored Cross-Site Scripting" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Image Photo Gallery Final Tiles Grid", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "3.5.3", + "version_value": "3.5.3" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Image Photo Gallery Final Tiles Grid WordPress plugin before 3.5.3 does not sanitise and escape the Description field when editing a gallery, allowing users with a role as low as contributor to perform Cross-Site Scripting attacks against other users having access to the gallery dashboard" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/3a9c44c0-866e-4fdf-b53d-666db2e11720", + "name": "https://wpscan.com/vulnerability/3a9c44c0-866e-4fdf-b53d-666db2e11720" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-79 Cross-site Scripting (XSS)", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "Harshit (aka fumenoid)" + }, + { + "lang": "eng", + "value": "Siddhant Chouhan (aka sidchn)" + } + ], + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0199.json b/2022/0xxx/CVE-2022-0199.json index 48df64cabed..9e2dc45537b 100644 --- a/2022/0xxx/CVE-2022-0199.json +++ b/2022/0xxx/CVE-2022-0199.json @@ -1,18 +1,80 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2022-0199", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2022-0199", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Coming soon and Maintenance mode < 3.6.8 - Arbitrary Email Sending to Subscribed Users via CSRF" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Coming soon and Maintenance mode", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "3.6.8", + "version_value": "3.6.8" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Coming soon and Maintenance mode WordPress plugin before 3.6.8 does not have CSRF check in its coming_soon_send_mail AJAX action, allowing attackers to make logged in admin to send arbitrary emails to all subscribed users via a CSRF attack" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/1ab1748f-c939-4953-83fc-9df878da7714", + "name": "https://wpscan.com/vulnerability/1ab1748f-c939-4953-83fc-9df878da7714" + }, + { + "refsource": "CONFIRM", + "url": "https://plugins.trac.wordpress.org/changeset/2659455", + "name": "https://plugins.trac.wordpress.org/changeset/2659455" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-352 Cross-Site Request Forgery (CSRF)", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "Krzysztof Zając" + } + ], + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0211.json b/2022/0xxx/CVE-2022-0211.json index c9208787569..1f0d3522ec4 100644 --- a/2022/0xxx/CVE-2022-0211.json +++ b/2022/0xxx/CVE-2022-0211.json @@ -1,18 +1,75 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2022-0211", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2022-0211", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Shield Security < 13.0.6 - Admin+ Stored Cross-Site Scripting" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Shield Security – Scanners, Security Hardening, Brute Force Protection & Firewall", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "13.0.6", + "version_value": "13.0.6" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Shield Security WordPress plugin before 13.0.6 does not sanitise and escape admin notes, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed." + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/0d276cca-d6eb-4f4c-83dd-fbc03254c679", + "name": "https://wpscan.com/vulnerability/0d276cca-d6eb-4f4c-83dd-fbc03254c679" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-79 Cross-site Scripting (XSS)", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "Yoru Oni" + } + ], + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0228.json b/2022/0xxx/CVE-2022-0228.json index 42bd86ea077..f0f63c5c7eb 100644 --- a/2022/0xxx/CVE-2022-0228.json +++ b/2022/0xxx/CVE-2022-0228.json @@ -1,18 +1,80 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2022-0228", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2022-0228", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Popup Builder < 4.0.7 - Admin+ SQL Injection" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Popup Builder – Create highly converting, mobile friendly marketing popups.", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "4.0.7", + "version_value": "4.0.7" + } + ] + } + } + ] + } + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Popup Builder WordPress plugin before 4.0.7 does not validate and properly escape the orderby and order parameters before using them in a SQL statement in the admin dashboard, which could allow high privilege users to perform SQL injection" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/22facac2-52f4-4e5f-be59-1d2934b260d9", + "name": "https://wpscan.com/vulnerability/22facac2-52f4-4e5f-be59-1d2934b260d9" + }, + { + "refsource": "CONFIRM", + "url": "https://plugins.trac.wordpress.org/changeset/2659117", + "name": "https://plugins.trac.wordpress.org/changeset/2659117" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-89 SQL Injection", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "Tony Wu" + } + ], + "source": { + "discovery": "EXTERNAL" + } +} diff --git a/2022/0xxx/CVE-2022-0234.json b/2022/0xxx/CVE-2022-0234.json index a533d843294..89dd005d12a 100644 --- a/2022/0xxx/CVE-2022-0234.json +++ b/2022/0xxx/CVE-2022-0234.json @@ -1,18 +1,80 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2022-0234", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2022-0234", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "WOOCS < 1.3.7.5 - Reflected Cross-Site Scripting" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "WOOCS – Currency Switcher for WooCommerce. Professional and Free multi currency plugin – Pay in selected currency", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1.3.7.5", + "version_value": "1.3.7.5" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The WOOCS WordPress plugin before 1.3.7.5 does not sanitise and escape the woocs_in_order_currency parameter of the woocs_get_products_price_html AJAX action (available to both unauthenticated and authenticated users) before outputting it back in the response, leading to a Reflected Cross-Site Scripting" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/fd568a1f-bd51-41bb-960d-f8573b84527b", + "name": "https://wpscan.com/vulnerability/fd568a1f-bd51-41bb-960d-f8573b84527b" + }, + { + "refsource": "CONFIRM", + "url": "https://plugins.trac.wordpress.org/changeset/2659191", + "name": "https://plugins.trac.wordpress.org/changeset/2659191" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-79 Cross-site Scripting (XSS)", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "Krzysztof Zając" + } + ], + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0252.json b/2022/0xxx/CVE-2022-0252.json index 143d44f00a5..ad732a18c2c 100644 --- a/2022/0xxx/CVE-2022-0252.json +++ b/2022/0xxx/CVE-2022-0252.json @@ -1,18 +1,80 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2022-0252", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2022-0252", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Give < 2.17.3 - Reflected Cross-Site Scripting via Import Tool" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "GiveWP – Donation Plugin and Fundraising Platform", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "2.17.3", + "version_value": "2.17.3" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The GiveWP WordPress plugin before 2.17.3 does not escape the json parameter before outputting it back in an attribute in the Import admin dashboard, leading to a Reflected Cross-Site Scripting" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/b0e551af-087b-43e7-bdb7-11d7f639028a", + "name": "https://wpscan.com/vulnerability/b0e551af-087b-43e7-bdb7-11d7f639028a" + }, + { + "refsource": "CONFIRM", + "url": "https://plugins.trac.wordpress.org/changeset/2659032", + "name": "https://plugins.trac.wordpress.org/changeset/2659032" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-79 Cross-site Scripting (XSS)", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "JrXnm" + } + ], + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0255.json b/2022/0xxx/CVE-2022-0255.json index 480a774bd39..f06b5ee2e42 100644 --- a/2022/0xxx/CVE-2022-0255.json +++ b/2022/0xxx/CVE-2022-0255.json @@ -1,18 +1,75 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2022-0255", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2022-0255", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Database Backup for WordPress < 2.5.1 - Admin+ SQL Injection" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Database Backup for WordPress", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "2.5.1", + "version_value": "2.5.1" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Database Backup for WordPress plugin before 2.5.1 does not properly sanitise and escape the fragment parameter before using it in a SQL statement in the admin dashboard, leading to a SQL injection issue" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/684bb06d-864f-4cba-ab0d-f83974d026fa", + "name": "https://wpscan.com/vulnerability/684bb06d-864f-4cba-ab0d-f83974d026fa" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-89 SQL Injection", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "JrXnm" + } + ], + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0279.json b/2022/0xxx/CVE-2022-0279.json index 3ddbb000c39..91382f2ce70 100644 --- a/2022/0xxx/CVE-2022-0279.json +++ b/2022/0xxx/CVE-2022-0279.json @@ -1,18 +1,75 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2022-0279", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2022-0279", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "AnyComment < 0.2.18 - Comment Rating Increase/Decrease via Race Condition" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "AnyComment", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0.2.18", + "version_value": "0.2.18" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The AnyComment WordPress plugin before 0.2.18 is affected by a race condition when liking/disliking a comment/reply, which could allow any authenticated user to quickly raise their rating or lower the rating of other users" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/43a4b2d3-1bd5-490c-982c-bb7120595865", + "name": "https://wpscan.com/vulnerability/43a4b2d3-1bd5-490c-982c-bb7120595865" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-362 Race Condition (Concurrent Execution using Shared Resource with Improper Synchronization)", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "Brandon Roldan" + } + ], + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0288.json b/2022/0xxx/CVE-2022-0288.json index dc431753c54..3ad7ffab939 100644 --- a/2022/0xxx/CVE-2022-0288.json +++ b/2022/0xxx/CVE-2022-0288.json @@ -1,18 +1,87 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2022-0288", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2022-0288", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Ad Inserter < 2.7.10 - Reflected Cross-Site Scripting" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Ad Inserter – Ad Manager & AdSense Ads", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "2.7.10", + "version_value": "2.7.10" + } + ] + } + }, + { + "product_name": "Ad Inserter Pro", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "2.7.10", + "version_value": "2.7.10" + } + ] + } + } + ] + } + } + ] } -} \ No newline at end of file + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Ad Inserter WordPress plugin before 2.7.10, Ad Inserter Pro WordPress plugin before 2.7.10 do not sanitise and escape the html_element_selection parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/27b64412-33a4-462c-bc45-f81697e4fe42", + "name": "https://wpscan.com/vulnerability/27b64412-33a4-462c-bc45-f81697e4fe42" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-79 Cross-site Scripting (XSS)", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "Krzysztof Zając" + } + ], + "source": { + "discovery": "EXTERNAL" + } +} diff --git a/2022/0xxx/CVE-2022-0313.json b/2022/0xxx/CVE-2022-0313.json index 6586c3006d5..2b581829b0d 100644 --- a/2022/0xxx/CVE-2022-0313.json +++ b/2022/0xxx/CVE-2022-0313.json @@ -1,18 +1,80 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2022-0313", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2022-0313", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Float Menu < 4.3.1 - Arbitrary Menu Deletion via CSRF" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Float menu – awesome floating side menu", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "4.3.1", + "version_value": "4.3.1" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Float menu WordPress plugin before 4.3.1 does not have CSRF check in place when deleting menu, which could allow attackers to make a logged in admin delete them via a CSRF attack" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://wpscan.com/vulnerability/1ce6c8f4-6f4b-4d56-8d11-43355ef32e8c", + "name": "https://wpscan.com/vulnerability/1ce6c8f4-6f4b-4d56-8d11-43355ef32e8c" + }, + { + "refsource": "CONFIRM", + "url": "https://plugins.trac.wordpress.org/changeset/2661431", + "name": "https://plugins.trac.wordpress.org/changeset/2661431" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-352 Cross-Site Request Forgery (CSRF)", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "Krzysztof Zając" + } + ], + "source": { + "discovery": "EXTERNAL" + } } \ No newline at end of file