mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-30 18:21:17 +00:00
Auto-Update: 2024-12-01T23:00:19.450129+00:00
This commit is contained in:
parent
109a096fea
commit
3dab62f97f
25
CVE-2024/CVE-2024-455xx/CVE-2024-45520.json
Normal file
25
CVE-2024/CVE-2024-455xx/CVE-2024-45520.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-45520",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-01T21:15:04.190",
|
||||
"lastModified": "2024-12-01T21:15:04.190",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "WithSecure Atlant (formerly F-Secure Atlant) 1.0.35-1 allows a remote Denial of Service because of memory corruption during scanning of a PE32 file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://withsecure.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.withsecure.com/en/support/security-advisories/cve-2024-45520",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-537xx/CVE-2024-53742.json
Normal file
56
CVE-2024/CVE-2024-537xx/CVE-2024-53742.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-53742",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-12-01T22:15:05.007",
|
||||
"lastModified": "2024-12-01T22:15:05.007",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Prism I.T. Systems Multilevel Referral Affiliate Plugin for WooCommerce allows Reflected XSS.This issue affects Multilevel Referral Affiliate Plugin for WooCommerce: from n/a through 2.27."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/multilevel-referral-plugin-for-woocommerce/vulnerability/wordpress-multilevel-referral-affiliate-plugin-for-woocommerce-plugin-2-27-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-537xx/CVE-2024-53743.json
Normal file
56
CVE-2024/CVE-2024-537xx/CVE-2024-53743.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-53743",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-12-01T22:15:05.247",
|
||||
"lastModified": "2024-12-01T22:15:05.247",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FlickDevs Countdown Timer for Elementor allows Stored XSS.This issue affects Countdown Timer for Elementor: from n/a through 1.3.6."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/countdown-timer-for-elementor/vulnerability/wordpress-countdown-timer-for-elementor-plugin-1-3-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-537xx/CVE-2024-53744.json
Normal file
56
CVE-2024/CVE-2024-537xx/CVE-2024-53744.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-53744",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-12-01T22:15:05.393",
|
||||
"lastModified": "2024-12-01T22:15:05.393",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Skybootstrap Elementor Image Gallery Plugin allows Stored XSS.This issue affects Elementor Image Gallery Plugin: from n/a through 1.0.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/skyboot-portfolio-gallery/vulnerability/wordpress-elementor-image-gallery-plugin-1-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-537xx/CVE-2024-53745.json
Normal file
56
CVE-2024/CVE-2024-537xx/CVE-2024-53745.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-53745",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-12-01T22:15:05.530",
|
||||
"lastModified": "2024-12-01T22:15:05.530",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in \ucf54\uc2a4\ubaa8\uc2a4\ud31c \u2013 Cosmosfarm \uc18c\uc15c \uacf5\uc720 \ubc84\ud2bc By \ucf54\uc2a4\ubaa8\uc2a4\ud31c allows Stored XSS.This issue affects \uc18c\uc15c \uacf5\uc720 \ubc84\ud2bc By \ucf54\uc2a4\ubaa8\uc2a4\ud31c: from n/a through 1.9."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/cosmosfarm-share-buttons/vulnerability/wordpress-social-sharing-buttons-by-cosmos-farm-plugin-1-9-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-537xx/CVE-2024-53746.json
Normal file
56
CVE-2024/CVE-2024-537xx/CVE-2024-53746.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-53746",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-12-01T22:15:05.663",
|
||||
"lastModified": "2024-12-01T22:15:05.663",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FlickDevs Elementor Button Plus allows Stored XSS.This issue affects Elementor Button Plus: from n/a through 1.3.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/fd-elementor-button-plus/vulnerability/wordpress-elementor-button-plus-plugin-1-3-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-537xx/CVE-2024-53747.json
Normal file
56
CVE-2024/CVE-2024-537xx/CVE-2024-53747.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-53747",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-12-01T22:15:05.793",
|
||||
"lastModified": "2024-12-01T22:15:05.793",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NuttTaro Video Player for WPBakery allows Stored XSS.This issue affects Video Player for WPBakery: from n/a through 1.0.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/video-player-for-wpbakery/vulnerability/wordpress-video-player-for-wpbakery-plugin-1-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-537xx/CVE-2024-53748.json
Normal file
56
CVE-2024/CVE-2024-537xx/CVE-2024-53748.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-53748",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-12-01T22:15:05.933",
|
||||
"lastModified": "2024-12-01T22:15:05.933",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Terry Lin WP Mermaid allows Stored XSS.This issue affects WP Mermaid: from n/a through 1.0.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/wp-mermaid/vulnerability/wordpress-wp-mermaid-plugin-1-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-537xx/CVE-2024-53749.json
Normal file
56
CVE-2024/CVE-2024-537xx/CVE-2024-53749.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-53749",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-12-01T22:15:06.080",
|
||||
"lastModified": "2024-12-01T22:15:06.080",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Plugin Devs Post Carousel Slider for Elementor allows Stored XSS.This issue affects Post Carousel Slider for Elementor: from n/a through 1.4.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/post-carousel-slider-for-elementor/vulnerability/wordpress-post-carousel-slider-for-elementor-plugin-1-4-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-537xx/CVE-2024-53750.json
Normal file
56
CVE-2024/CVE-2024-537xx/CVE-2024-53750.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-53750",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-12-01T22:15:06.217",
|
||||
"lastModified": "2024-12-01T22:15:06.217",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Maeve Lander PayPal Responder allows Stored XSS.This issue affects PayPal Responder: from n/a through 1.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/paypal-responder/vulnerability/wordpress-paypal-responder-plugin-1-2-csrf-to-stored-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-537xx/CVE-2024-53752.json
Normal file
56
CVE-2024/CVE-2024-537xx/CVE-2024-53752.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-53752",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-12-01T22:15:06.360",
|
||||
"lastModified": "2024-12-01T22:15:06.360",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Berg Informatik Stripe Donation allows Stored XSS.This issue affects Stripe Donation: from n/a through 1.2.5."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/bin-stripe-donation/vulnerability/wordpress-stripe-donation-plugin-1-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
25
README.md
25
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-12-01T21:00:19.658648+00:00
|
||||
2024-12-01T23:00:19.450129+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-12-01T19:15:04.890000+00:00
|
||||
2024-12-01T22:15:06.360000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,23 +33,30 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
271738
|
||||
271749
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `0`
|
||||
Recently added CVEs: `11`
|
||||
|
||||
- [CVE-2024-45520](CVE-2024/CVE-2024-455xx/CVE-2024-45520.json) (`2024-12-01T21:15:04.190`)
|
||||
- [CVE-2024-53742](CVE-2024/CVE-2024-537xx/CVE-2024-53742.json) (`2024-12-01T22:15:05.007`)
|
||||
- [CVE-2024-53743](CVE-2024/CVE-2024-537xx/CVE-2024-53743.json) (`2024-12-01T22:15:05.247`)
|
||||
- [CVE-2024-53744](CVE-2024/CVE-2024-537xx/CVE-2024-53744.json) (`2024-12-01T22:15:05.393`)
|
||||
- [CVE-2024-53745](CVE-2024/CVE-2024-537xx/CVE-2024-53745.json) (`2024-12-01T22:15:05.530`)
|
||||
- [CVE-2024-53746](CVE-2024/CVE-2024-537xx/CVE-2024-53746.json) (`2024-12-01T22:15:05.663`)
|
||||
- [CVE-2024-53747](CVE-2024/CVE-2024-537xx/CVE-2024-53747.json) (`2024-12-01T22:15:05.793`)
|
||||
- [CVE-2024-53748](CVE-2024/CVE-2024-537xx/CVE-2024-53748.json) (`2024-12-01T22:15:05.933`)
|
||||
- [CVE-2024-53749](CVE-2024/CVE-2024-537xx/CVE-2024-53749.json) (`2024-12-01T22:15:06.080`)
|
||||
- [CVE-2024-53750](CVE-2024/CVE-2024-537xx/CVE-2024-53750.json) (`2024-12-01T22:15:06.217`)
|
||||
- [CVE-2024-53752](CVE-2024/CVE-2024-537xx/CVE-2024-53752.json) (`2024-12-01T22:15:06.360`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `4`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2024-38656](CVE-2024/CVE-2024-386xx/CVE-2024-38656.json) (`2024-12-01T19:15:04.440`)
|
||||
- [CVE-2024-39710](CVE-2024/CVE-2024-397xx/CVE-2024-39710.json) (`2024-12-01T19:15:04.667`)
|
||||
- [CVE-2024-39711](CVE-2024/CVE-2024-397xx/CVE-2024-39711.json) (`2024-12-01T19:15:04.783`)
|
||||
- [CVE-2024-39712](CVE-2024/CVE-2024-397xx/CVE-2024-39712.json) (`2024-12-01T19:15:04.890`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
19
_state.csv
19
_state.csv
@ -258757,7 +258757,7 @@ CVE-2024-38652,0,0,c09b7df399ce36bfa6f99e496912789d409fa436d96980e8d3bf3eedfe5b5
|
||||
CVE-2024-38653,0,0,c8ed77058a52701b560001b5f44bd7270c8687b6c4890948d6b9eaf03edfd74d,2024-08-15T17:32:57.587000
|
||||
CVE-2024-38654,0,0,f45589254774140aa774de676d23baded7790116b3c26a33eefbf7b8b5299f5e,2024-11-13T17:35:06.447000
|
||||
CVE-2024-38655,0,0,26921028d57aeb27da418884c4f65831287be30bc954e6fd9c39e161e53e5c78,2024-11-23T21:15:14.393000
|
||||
CVE-2024-38656,0,1,7a761f228145d4c9c0ed8d92c300e9df17f7d325bea623f24e15c901a006d981,2024-12-01T19:15:04.440000
|
||||
CVE-2024-38656,0,0,7a761f228145d4c9c0ed8d92c300e9df17f7d325bea623f24e15c901a006d981,2024-12-01T19:15:04.440000
|
||||
CVE-2024-38658,0,0,e6ea9cd2600e863335625bfa75713e2218e611a3fa971502d028f479b505f7e3,2024-11-29T21:15:05.633000
|
||||
CVE-2024-38659,0,0,7f018343721f0a1816fbc1d0de6ee38bcc05d21743970bb8a1218031b26bafff,2024-07-15T07:15:14.163000
|
||||
CVE-2024-3866,0,0,7a39485bd1345ca492dd2d645f7c31281d1cbae5daa389ff1a3811c5ea0b474f,2024-10-02T18:26:59.520000
|
||||
@ -259514,9 +259514,9 @@ CVE-2024-39707,0,0,b27b038ddc6cdbabee843db40a21ee56e96ad76d049f977d89dc316ee0e97
|
||||
CVE-2024-39708,0,0,5ba6724a88a25c721702dbcbb09c32f9771f7eb0a866958cc03dc7237b54b807,2024-10-31T14:35:16.610000
|
||||
CVE-2024-39709,0,0,7412cab9f5821072dc4804eb5785dcfaaaebeae4cb15f2e4d1fcbff88c86a4c1,2024-11-23T21:15:14.647000
|
||||
CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000
|
||||
CVE-2024-39710,0,1,b05f6a7f221815bdb8123d94e6657e3058105532575cec2e42aabfb1fe08842c,2024-12-01T19:15:04.667000
|
||||
CVE-2024-39711,0,1,d158474968d0c4ba532d2750ae9d36072390ffe90cbbac215e6c1727540498b3,2024-12-01T19:15:04.783000
|
||||
CVE-2024-39712,0,1,0517cfe1076f54518ce66d0c7d14841afcb984b728ffe4653ac0d4a75fcbd022,2024-12-01T19:15:04.890000
|
||||
CVE-2024-39710,0,0,b05f6a7f221815bdb8123d94e6657e3058105532575cec2e42aabfb1fe08842c,2024-12-01T19:15:04.667000
|
||||
CVE-2024-39711,0,0,d158474968d0c4ba532d2750ae9d36072390ffe90cbbac215e6c1727540498b3,2024-12-01T19:15:04.783000
|
||||
CVE-2024-39712,0,0,0517cfe1076f54518ce66d0c7d14841afcb984b728ffe4653ac0d4a75fcbd022,2024-12-01T19:15:04.890000
|
||||
CVE-2024-39713,0,0,8b5ceb8324ff1f59d883393f3c2fa903aaaabc7a64330bd1fe2b73aa3534e83b,2024-09-06T17:35:12.380000
|
||||
CVE-2024-39714,0,0,4056f55d0df430f8323fee2d9091569bd1a5c6627633d4c031ced4b04745987c,2024-09-09T17:35:03.387000
|
||||
CVE-2024-39715,0,0,15f33b0904bec8d29ab0aa789fb7bca5f17b446aa8a06884e3c4dec4fda56438,2024-09-09T16:35:04.780000
|
||||
@ -263363,6 +263363,7 @@ CVE-2024-45511,0,0,a33b00ed5286e02a99a5d7d32b95a722e842936b42cb3272cb3598da23178
|
||||
CVE-2024-45518,0,0,9735413fa02ac827dc734eb603d392ab15d93caac171e362b785c2b23afa3a6f,2024-10-30T21:23:59.893000
|
||||
CVE-2024-45519,0,0,ba02770fed1525b5b4f0df98b6cf30b24de2e09da9e676dc121caef23db2992b,2024-10-23T15:39:23.220000
|
||||
CVE-2024-4552,0,0,a910e848f992d4848b5a9057809234cfe8833a167abb01396097dc34db4ca3d3,2024-06-04T16:57:41.053000
|
||||
CVE-2024-45520,1,1,17c8a5ee333942b254f1fb713e55b8c00193a6e6a8baa3e94cf38a9a53a48bbc,2024-12-01T21:15:04.190000
|
||||
CVE-2024-45522,0,0,cfbe5f5b4866198ecf4773ddc4ec07a576ac517554c3c987f558bc88648f0e9a,2024-09-05T14:29:32.737000
|
||||
CVE-2024-45523,0,0,e7d93fa702fd02b5bced215282921c641c45ca521a1d9282d8eeca5a4c9e6cac,2024-09-20T14:35:11.523000
|
||||
CVE-2024-45526,0,0,f14e1fcc5198e28bcb9f7b3a43daa36e99814812ca109c1c007380ac29ec0aa1,2024-10-23T19:35:10.713000
|
||||
@ -267848,7 +267849,17 @@ CVE-2024-53737,0,0,f3a335bb195dd0244d4039f558efb2c4498714f2b0074383fd7bed5cc5fa8
|
||||
CVE-2024-53738,0,0,ab5f509d61384a8d5bb28b6ed9517e0641b5e54dd9466510814bf9b361067912,2024-11-30T21:15:15.350000
|
||||
CVE-2024-53739,0,0,0576cfe7f72b11873c2d85ed4107584c336a3c0ba57c0c01247976652b6807f8,2024-11-30T21:15:15.653000
|
||||
CVE-2024-5374,0,0,9590dde507302753225c45768250d14c5989d70c121d20e0bb9a4a301eeaee55,2024-05-28T12:39:28.377000
|
||||
CVE-2024-53742,1,1,97a10dbf8528ba8ea615d10490be23e98c0e662868a40aa466de286b0b7e3433,2024-12-01T22:15:05.007000
|
||||
CVE-2024-53743,1,1,feb004f324a1261364f2a4d452e2172f54b890a3ffd00baa1714195ee5d48f0c,2024-12-01T22:15:05.247000
|
||||
CVE-2024-53744,1,1,e60b9ac53c5025b801bf3932b561a8621c4ce8ca9fefa21ab185fd27f8e00b7b,2024-12-01T22:15:05.393000
|
||||
CVE-2024-53745,1,1,bf63f927a4c134602353377f273e5831f1c962987f36009498c9ee49332ede29,2024-12-01T22:15:05.530000
|
||||
CVE-2024-53746,1,1,907df9cf2d2f2e1420e7f455f643352fb1b0df53b6611d69d4d7fa86afbba7e8,2024-12-01T22:15:05.663000
|
||||
CVE-2024-53747,1,1,da4c6e77e33108fd8e01bec7503507d6ac1fb2c30677ee8b2563f310ec2227be,2024-12-01T22:15:05.793000
|
||||
CVE-2024-53748,1,1,b88a9b1ce9c55ac9da22becdcc2d8a4d80472347150e9b04a63606bcb9d3a26f,2024-12-01T22:15:05.933000
|
||||
CVE-2024-53749,1,1,9053e051fa5385b6ef36255ca5a18e2c1299eaa441080631f0693dfba2467042,2024-12-01T22:15:06.080000
|
||||
CVE-2024-5375,0,0,ee384884521ae20b595e19cb0f157171143b462efc516d82edefadc2db8af61c,2024-06-04T19:21:07.297000
|
||||
CVE-2024-53750,1,1,4850438ad2df488d504e24a4b23943996fec6575e28da6125c54fcb9dc7f153b,2024-12-01T22:15:06.217000
|
||||
CVE-2024-53752,1,1,ee9ea6d0a0bfb4fdc244e64871d614994ca2a53ef8c67604ea7a0a1c631195c5,2024-12-01T22:15:06.360000
|
||||
CVE-2024-53756,0,0,1534bc9cafd8b9e85e4aa0cb8ed3455c9e21cd00440e21d978b660417fca453e,2024-11-30T22:15:17.433000
|
||||
CVE-2024-53757,0,0,3ab806c7443ca7454908ccef564c0146328a2f5fb0d433be52be21d67cb958d4,2024-11-30T22:15:17.740000
|
||||
CVE-2024-53758,0,0,bde4fa2013676ceaff0c568b31de62731a43cdadd754347c99deeb769a812bc3,2024-11-30T22:15:17.883000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user