diff --git a/2024/46xxx/CVE-2024-46712.json b/2024/46xxx/CVE-2024-46712.json index addc1542f88..a9ef2e6d2ee 100644 --- a/2024/46xxx/CVE-2024-46712.json +++ b/2024/46xxx/CVE-2024-46712.json @@ -77,6 +77,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/46xxx/CVE-2024-46713.json b/2024/46xxx/CVE-2024-46713.json index dd3bab55e91..f74f3db3c09 100644 --- a/2024/46xxx/CVE-2024-46713.json +++ b/2024/46xxx/CVE-2024-46713.json @@ -55,37 +55,37 @@ "version": "0", "lessThan": "4.1", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.226", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.167", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.110", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.51", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10.10", "lessThanOrEqual": "6.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.11", @@ -141,6 +141,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/46xxx/CVE-2024-46714.json b/2024/46xxx/CVE-2024-46714.json index 66e08bf1929..19558d32785 100644 --- a/2024/46xxx/CVE-2024-46714.json +++ b/2024/46xxx/CVE-2024-46714.json @@ -51,37 +51,37 @@ "version": "5.4.284", "lessThanOrEqual": "5.4.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.226", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.167", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.109", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.50", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10.9", "lessThanOrEqual": "6.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.11", @@ -142,6 +142,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/46xxx/CVE-2024-46715.json b/2024/46xxx/CVE-2024-46715.json index a227baf2839..a49c739dcb2 100644 --- a/2024/46xxx/CVE-2024-46715.json +++ b/2024/46xxx/CVE-2024-46715.json @@ -51,19 +51,19 @@ "version": "6.1.109", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.50", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10.9", "lessThanOrEqual": "6.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.11", @@ -109,6 +109,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/46xxx/CVE-2024-46716.json b/2024/46xxx/CVE-2024-46716.json index 55e2faa5c32..e90eec96117 100644 --- a/2024/46xxx/CVE-2024-46716.json +++ b/2024/46xxx/CVE-2024-46716.json @@ -51,19 +51,19 @@ "version": "6.1.109", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.50", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10.9", "lessThanOrEqual": "6.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.11", @@ -109,6 +109,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51528.json b/2024/51xxx/CVE-2024-51528.json index 15fbd27b693..a39e08f1924 100644 --- a/2024/51xxx/CVE-2024-51528.json +++ b/2024/51xxx/CVE-2024-51528.json @@ -1,17 +1,114 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-51528", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@huawei.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Vulnerability of improper log printing in the Super Home Screen module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-532 Insertion of Sensitive Information into Log File", + "cweId": "CWE-532" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Huawei", + "product": { + "product_data": [ + { + "product_name": "HarmonyOS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.2.0" + }, + { + "version_affected": "=", + "version_value": "4.0.0" + }, + { + "version_affected": "=", + "version_value": "3.1.0" + }, + { + "version_affected": "=", + "version_value": "3.0.0" + } + ] + } + }, + { + "product_name": "EMUI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "14.0.0" + }, + { + "version_affected": "=", + "version_value": "13.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/", + "refsource": "MISC", + "name": "https://consumer.huawei.com/en/support/bulletin/2024/11/" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "version": "3.1" } ] } diff --git a/2024/7xxx/CVE-2024-7429.json b/2024/7xxx/CVE-2024-7429.json index 070a8cc968b..d4b226d3bc4 100644 --- a/2024/7xxx/CVE-2024-7429.json +++ b/2024/7xxx/CVE-2024-7429.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-7429", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Zotpress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the Zotpress_process_accounts_AJAX function in all versions up to, and including, 7.3.12. This makes it possible for authenticated attackers, with Contributor-level access and above, to reset the plugin's settings." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-284 Improper Access Control", + "cweId": "CWE-284" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "kseaborn", + "product": { + "product_data": [ + { + "product_name": "Zotpress", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "7.3.12" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1f38676b-270f-4b0f-bc98-a14a26b86a50?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1f38676b-270f-4b0f-bc98-a14a26b86a50?source=cve" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/zotpress/trunk/lib/admin/admin.php#L40", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/zotpress/trunk/lib/admin/admin.php#L40" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3153348/zotpress/trunk/lib/admin/admin.php", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset/3153348/zotpress/trunk/lib/admin/admin.php" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Rafshanzani Suhada" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" } ] } diff --git a/2024/9xxx/CVE-2024-9878.json b/2024/9xxx/CVE-2024-9878.json index 0f80730e532..46fa018fced 100644 --- a/2024/9xxx/CVE-2024-9878.json +++ b/2024/9xxx/CVE-2024-9878.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-9878", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Photo Gallery by 10Web \u2013 Mobile-Friendly Image Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.8.30 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "10web", + "product": { + "product_data": [ + { + "product_name": "Photo Gallery by 10Web \u2013 Mobile-Friendly Image Gallery", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "1.8.30" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bfa1192b-34f5-4b71-8fff-14f2d4ac4aca?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bfa1192b-34f5-4b71-8fff-14f2d4ac4aca?source=cve" + }, + { + "url": "https://packetstormsecurity.com/files/179357/WordPress-Photo-Gallery-1.8.26-Cross-Site-Scripting.html", + "refsource": "MISC", + "name": "https://packetstormsecurity.com/files/179357/WordPress-Photo-Gallery-1.8.26-Cross-Site-Scripting.html" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3180567%40photo-gallery%2Ftrunk&old=3171538%40photo-gallery%2Ftrunk&sfp_email=&sfph_mail=#file12", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3180567%40photo-gallery%2Ftrunk&old=3171538%40photo-gallery%2Ftrunk&sfp_email=&sfph_mail=#file12" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "tmrswrr" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" } ] }