From 94506ac10a56229e3d0bc647868d95902a1c7e61 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 7 Feb 2024 09:01:17 +0000 Subject: [PATCH] Auto-Update: 2024-02-07T09:01:13.871050+00:00 --- CVE-2023/CVE-2023-403xx/CVE-2023-40355.json | 20 ++++++++ CVE-2024/CVE-2024-06xx/CVE-2024-0628.json | 47 ++++++++++++++++++ CVE-2024/CVE-2024-09xx/CVE-2024-0977.json | 47 ++++++++++++++++++ CVE-2024/CVE-2024-10xx/CVE-2024-1037.json | 55 +++++++++++++++++++++ CVE-2024/CVE-2024-10xx/CVE-2024-1055.json | 51 +++++++++++++++++++ CVE-2024/CVE-2024-10xx/CVE-2024-1078.json | 47 ++++++++++++++++++ CVE-2024/CVE-2024-10xx/CVE-2024-1079.json | 47 ++++++++++++++++++ README.md | 16 ++++-- 8 files changed, 325 insertions(+), 5 deletions(-) create mode 100644 CVE-2023/CVE-2023-403xx/CVE-2023-40355.json create mode 100644 CVE-2024/CVE-2024-06xx/CVE-2024-0628.json create mode 100644 CVE-2024/CVE-2024-09xx/CVE-2024-0977.json create mode 100644 CVE-2024/CVE-2024-10xx/CVE-2024-1037.json create mode 100644 CVE-2024/CVE-2024-10xx/CVE-2024-1055.json create mode 100644 CVE-2024/CVE-2024-10xx/CVE-2024-1078.json create mode 100644 CVE-2024/CVE-2024-10xx/CVE-2024-1079.json diff --git a/CVE-2023/CVE-2023-403xx/CVE-2023-40355.json b/CVE-2023/CVE-2023-403xx/CVE-2023-40355.json new file mode 100644 index 00000000000..bdbade438a9 --- /dev/null +++ b/CVE-2023/CVE-2023-403xx/CVE-2023-40355.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-40355", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-07T08:15:40.973", + "lastModified": "2024-02-07T08:15:40.973", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting (XSS) vulnerability in Axigen versions 10.3.3.0 before 10.3.3.59, 10.4.0 before 10.4.19, and 10.5.0 before 10.5.5, allows authenticated attackers to execute arbitrary code and obtain sensitive information via the logic for switching between the Standard and Ajax versions." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.axigen.com/knowledgebase/Axigen-WebMail-XSS-Vulnerability-CVE-2023-40355-_396.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0628.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0628.json new file mode 100644 index 00000000000..015971b3104 --- /dev/null +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0628.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2024-0628", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-02-07T07:15:07.577", + "lastModified": "2024-02-07T07:15:07.577", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The WP RSS Aggregator plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 4.23.5 via the RSS feed source in admin settings. This makes it possible for authenticated attackers, with administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.8, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 2.5 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3029525/wp-rss-aggregator", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2154383e-eabb-4964-8991-423dd68d5efb?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0977.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0977.json new file mode 100644 index 00000000000..2cd9f1319fc --- /dev/null +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0977.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2024-0977", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-02-07T08:15:41.957", + "lastModified": "2024-02-07T08:15:41.957", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Timeline Widget For Elementor (Elementor Timeline, Vertical & Horizontal Timeline) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via image URLs in the plugin's timeline widget in all versions up to, and including, 1.5.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page, changes the slideshow type, and then changes it back to an image." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3029865%40timeline-widget-addon-for-elementor&new=3029865%40timeline-widget-addon-for-elementor&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/03073726-58d0-45b3-b7a6-7d12dbede919?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1037.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1037.json new file mode 100644 index 00000000000..24e6299a211 --- /dev/null +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1037.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-1037", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-02-07T07:15:08.877", + "lastModified": "2024-02-07T07:15:08.877", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The All-In-One Security (AIOS) \u2013 Security and Firewall plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'tab' parameter in all versions up to, and including, 5.2.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/all-in-one-wp-security-and-firewall/trunk/admin/wp-security-list-404.php#L32", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/all-in-one-wp-security-and-firewall/trunk/admin/wp-security-list-404.php#L50", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3032127/all-in-one-wp-security-and-firewall/tags/5.2.6/admin/wp-security-list-404.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b50772e5-5142-4f50-b5c0-6116a8821cba?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1055.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1055.json new file mode 100644 index 00000000000..a7a20c79d00 --- /dev/null +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1055.json @@ -0,0 +1,51 @@ +{ + "id": "CVE-2024-1055", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-02-07T07:15:09.497", + "lastModified": "2024-02-07T07:15:09.497", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's buttons in all versions up to, and including, 2.7.14 due to insufficient input sanitization and output escaping on user supplied URL values. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/powerpack-lite-for-elementor/trunk/modules/buttons/widgets/buttons.php#L1544", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3030473%40powerpack-lite-for-elementor&new=3030473%40powerpack-lite-for-elementor&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/036cf299-80c2-48a8-befc-02899ab96e3c?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1078.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1078.json new file mode 100644 index 00000000000..6a12c019504 --- /dev/null +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1078.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2024-1078", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-02-07T08:15:42.863", + "lastModified": "2024-02-07T08:15:42.863", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Quiz Maker plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ays_quick_start() and add_question_rows() functions in all versions up to, and including, 6.5.2.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to create arbitrary quizzes." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3032035/quiz-maker/tags/6.5.2.5/admin/class-quiz-maker-admin.php?old=3030468&old_path=quiz-maker%2Ftags%2F6.5.2.4%2Fadmin%2Fclass-quiz-maker-admin.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7ba2b270-5f02-4cd8-8a22-1723c3873d67?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1079.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1079.json new file mode 100644 index 00000000000..59cd80dc9c5 --- /dev/null +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1079.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2024-1079", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-02-07T08:15:43.500", + "lastModified": "2024-02-07T08:15:43.500", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Quiz Maker plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the ays_show_results() function in all versions up to, and including, 6.5.2.4. This makes it possible for unauthenticated attackers to fetch arbitrary quiz results which can contain PII." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3032035/quiz-maker/tags/6.5.2.5/admin/class-quiz-maker-admin.php?old=3030468&old_path=quiz-maker%2Ftags%2F6.5.2.4%2Fadmin%2Fclass-quiz-maker-admin.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/602df370-cd5b-46dc-a653-6522aef0c62f?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 8baf31271cd..6e6839dbfb2 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-02-07T07:00:24.455458+00:00 +2024-02-07T09:01:13.871050+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-02-07T05:15:08.037000+00:00 +2024-02-07T08:15:43.500000+00:00 ``` ### Last Data Feed Release @@ -29,14 +29,20 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -237851 +237858 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `7` -* [CVE-2024-0256](CVE-2024/CVE-2024-02xx/CVE-2024-0256.json) (`2024-02-07T05:15:08.037`) +* [CVE-2023-40355](CVE-2023/CVE-2023-403xx/CVE-2023-40355.json) (`2024-02-07T08:15:40.973`) +* [CVE-2024-0628](CVE-2024/CVE-2024-06xx/CVE-2024-0628.json) (`2024-02-07T07:15:07.577`) +* [CVE-2024-1037](CVE-2024/CVE-2024-10xx/CVE-2024-1037.json) (`2024-02-07T07:15:08.877`) +* [CVE-2024-1055](CVE-2024/CVE-2024-10xx/CVE-2024-1055.json) (`2024-02-07T07:15:09.497`) +* [CVE-2024-0977](CVE-2024/CVE-2024-09xx/CVE-2024-0977.json) (`2024-02-07T08:15:41.957`) +* [CVE-2024-1078](CVE-2024/CVE-2024-10xx/CVE-2024-1078.json) (`2024-02-07T08:15:42.863`) +* [CVE-2024-1079](CVE-2024/CVE-2024-10xx/CVE-2024-1079.json) (`2024-02-07T08:15:43.500`) ### CVEs modified in the last Commit