From 1c8b3d6e53c53f2fe0c9e0ba6ec0002acc2c7a64 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 12 Nov 2024 13:03:22 +0000 Subject: [PATCH] Auto-Update: 2024-11-12T13:00:19.883444+00:00 --- CVE-2024/CVE-2024-102xx/CVE-2024-10245.json | 4 ++++ CVE-2024/CVE-2024-99xx/CVE-2024-9998.json | 16 ++++++++++++++++ README.md | 10 +++++----- _state.csv | 5 +++-- 4 files changed, 28 insertions(+), 7 deletions(-) create mode 100644 CVE-2024/CVE-2024-99xx/CVE-2024-9998.json diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10245.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10245.json index 2b18f79137a..6120c278b5e 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10245.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10245.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Relais 2FA plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.0. This is due to incorrect authentication and capability checking in the 'rl_do_ajax' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email." + }, + { + "lang": "es", + "value": "El complemento Relais 2FA para WordPress es vulnerable a la omisi\u00f3n de la autenticaci\u00f3n en versiones hasta la 1.0 incluida. Esto se debe a una verificaci\u00f3n de autenticaci\u00f3n y capacidad incorrecta en la funci\u00f3n 'rl_do_ajax'. Esto hace posible que atacantes no autenticados inicien sesi\u00f3n como cualquier usuario existente en el sitio, como un administrador, si tienen acceso al correo electr\u00f3nico." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9998.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9998.json new file mode 100644 index 00000000000..96d34edb6fc --- /dev/null +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9998.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2024-9998", + "sourceIdentifier": "info@cert.vde.com", + "published": "2024-11-12T11:15:03.840", + "lastModified": "2024-11-12T11:15:03.840", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: The vulnerability has no impact, so it has been deprecated." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/README.md b/README.md index 3344e77af1e..1c922766773 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-11-12T11:00:25.783277+00:00 +2024-11-12T13:00:19.883444+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-11-12T10:15:04.003000+00:00 +2024-11-12T11:15:03.840000+00:00 ``` ### Last Data Feed Release @@ -33,21 +33,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -269114 +269115 ``` ### CVEs added in the last Commit Recently added CVEs: `1` -- [CVE-2024-10245](CVE-2024/CVE-2024-102xx/CVE-2024-10245.json) (`2024-11-12T10:15:04.003`) +- [CVE-2024-9998](CVE-2024/CVE-2024-99xx/CVE-2024-9998.json) (`2024-11-12T11:15:03.840`) ### CVEs modified in the last Commit Recently modified CVEs: `1` -- [CVE-2024-10323](CVE-2024/CVE-2024-103xx/CVE-2024-10323.json) (`2024-11-12T07:15:03.770`) +- [CVE-2024-10245](CVE-2024/CVE-2024-102xx/CVE-2024-10245.json) (`2024-11-12T10:15:04.003`) ## Download and Usage diff --git a/_state.csv b/_state.csv index aaca944eedf..18fa3c7628e 100644 --- a/_state.csv +++ b/_state.csv @@ -242551,7 +242551,7 @@ CVE-2024-10233,0,0,ae75a6902cbd361dba7f0db59261b7e58fb8ced87e17031187e0bfd405b07 CVE-2024-10234,0,0,29441fe4cd8bfbe6b6cb2ad55d7c2d2c9161b1369f9e713c11aec1dfec3e0850,2024-10-30T18:50:59.883000 CVE-2024-1024,0,0,d47b3d3840cd70db883d335219cea52b6b4fa0e3fdfc3f4d41efc4b833dff6a1,2024-05-17T02:35:11.210000 CVE-2024-10241,0,0,ae512d639185a0ae3de570db96ee11e8b4269e6da724c94a52e42eddaeb0b4fe,2024-10-29T14:34:04.427000 -CVE-2024-10245,1,1,4c79431d0e1937cc9f28c9da4debe2e726d3d86f75e82d494d64e10325f2fe6f,2024-11-12T10:15:04.003000 +CVE-2024-10245,0,1,09c56ac2f5ab65e7438f225b13b7a6448074be978cbd6719e92800a57a5b5335,2024-11-12T10:15:04.003000 CVE-2024-10250,0,0,8accb693817c35c7e4f9fa710076ead819720d8653e5052fbeeec31b3a5b47d2,2024-10-25T16:37:32.777000 CVE-2024-1026,0,0,e127bb5d00442b36eed0e6ff6513a3a42c45706876a3a5f2167365447fb898e7,2024-05-17T02:35:11.320000 CVE-2024-10261,0,0,f7de3caa14777c134bde9728a3a9cd2add83d6035ac273a737fc1b44550f614b,2024-11-09T12:15:16.800000 @@ -242598,7 +242598,7 @@ CVE-2024-10315,0,0,025c4b8541b1053d1918641d8b702b85f2b2c6a7adfb21d7ffa6a8e2e0dfc CVE-2024-10318,0,0,c9c0b32165e110789e705dc55263c8f26a928f9dce25281896f08d394c1b97f7,2024-11-08T19:51:49.380000 CVE-2024-10319,0,0,521a2584bb331a8cf29df932b8069e068af4d281b03c20cc06073eb127cb6582,2024-11-08T15:25:16.317000 CVE-2024-1032,0,0,06925fc416f8ceea7fb895efc2e3f765d4f064c5150968a9409448741aa1fb78,2024-05-17T02:35:11.947000 -CVE-2024-10323,0,1,1dff254603f7984a49693bc430868d53d2b615acc697fecabea3e15abfd09949,2024-11-12T07:15:03.770000 +CVE-2024-10323,0,0,1dff254603f7984a49693bc430868d53d2b615acc697fecabea3e15abfd09949,2024-11-12T07:15:03.770000 CVE-2024-10325,0,0,c6f88079ac22a9091bf71035663ec83de5617fab99af997896d6ec6bdca8a204,2024-11-08T19:01:03.880000 CVE-2024-10327,0,0,5a1546502e73211d148718e818d15cec9bc5841df26bde254740ef77c9d65b28,2024-10-25T12:56:07.750000 CVE-2024-10329,0,0,aa7a42ea4cf0e5f5abf4a60b69d94b5c2177a6fa12ec61ac3de40c80882e4efd,2024-11-08T15:59:16.407000 @@ -269113,3 +269113,4 @@ CVE-2024-9990,0,0,6535e43f058bfb50050d26d851e120f9cfe62488cf6b3933d7c62cfdab49fc CVE-2024-9991,0,0,adb978eaa002da8be608de3b4e550af4ed1a2d2f51d6542eb9fa168b402820e2,2024-10-28T13:58:09.230000 CVE-2024-9996,0,0,d5e7827ad5391d78a31addd2ca4c41dc6e5d45abf975a0bf7cf45c9296bda120,2024-11-01T16:27:30.387000 CVE-2024-9997,0,0,a8e0d075074a0193393843d7836722691de5269a9c302917e51ae6ca5570db59,2024-11-01T16:27:34.960000 +CVE-2024-9998,1,1,0419a3dad23ae850906f2650ca4d40b180999b4a5d360bcc1b838f8893ae2af5,2024-11-12T11:15:03.840000