Auto-Update: 2024-12-31T13:00:19.045739+00:00

This commit is contained in:
cad-safe-bot 2024-12-31 13:03:42 +00:00
parent 20518ac212
commit afe56860f3
26 changed files with 1538 additions and 32 deletions

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-12105",
"sourceIdentifier": "security@progress.com",
"published": "2024-12-31T11:15:06.140",
"lastModified": "2024-12-31T11:15:06.140",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In WhatsUp Gold versions released before 2024.0.2, an authenticated user can use a\u00a0specially crafted HTTP request that can lead to information disclosure."
},
{
"lang": "es",
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2024.0.2, un usuario autenticado puede utilizar una solicitud HTTP especialmente manipulada que puede conducir a la divulgaci\u00f3n de informaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@progress.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@progress.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://www.progress.com/network-monitoring",
"source": "security@progress.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-12106",
"sourceIdentifier": "security@progress.com",
"published": "2024-12-31T11:15:06.637",
"lastModified": "2024-12-31T11:15:06.637",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In WhatsUp Gold versions released before 2024.0.2, an unauthenticated attacker can configure\u00a0LDAP settings."
},
{
"lang": "es",
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2024.0.2, un atacante no autenticado puede configurar los ajustes LDAP."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@progress.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "security@progress.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [
{
"url": "https://www.progress.com/network-monitoring",
"source": "security@progress.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-12108",
"sourceIdentifier": "security@progress.com",
"published": "2024-12-31T11:15:06.780",
"lastModified": "2024-12-31T11:15:06.780",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In WhatsUp Gold versions released before 2024.0.2, an attacker can gain access to the WhatsUp Gold server via the public API."
},
{
"lang": "es",
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2024.0.2, un atacante puede obtener acceso al servidor de WhatsUp Gold a trav\u00e9s de la API p\u00fablica."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@progress.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "security@progress.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-290"
}
]
}
],
"references": [
{
"url": "https://www.progress.com/network-monitoring",
"source": "security@progress.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-13061",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-12-31T12:15:22.967",
"lastModified": "2024-12-31T12:15:22.967",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Electronic Official Document Management System from 2100 Technology has an Authentication Bypass vulnerability. Although the product enforces an IP whitelist for the API used to query user tokens, unauthenticated remote attackers can still deceive the server to obtain tokens of arbitrary users, which can then be used to log into the system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-290"
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-8340-d8b16-2.html",
"source": "twcert@cert.org.tw"
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-8339-570fa-1.html",
"source": "twcert@cert.org.tw"
}
]
}

View File

@ -0,0 +1,149 @@
{
"id": "CVE-2024-13069",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-31T11:15:06.933",
"lastModified": "2024-12-31T11:15:06.933",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Multi Role Login System 1.0. It has been classified as problematic. Affected is an unknown function of the file /endpoint/add-user.php. The manipulation of the argument name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en SourceCodester Multi Role Login System 1.0. Se ha clasificado como problem\u00e1tica. Se ve afectada una funci\u00f3n desconocida del archivo /endpoint/add-user.php. La manipulaci\u00f3n del nombre del argumento provoca cross site scripting. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/shaturo1337/POCs/blob/main/Stored%20XSS%20Vulnerability%20in%20Multi%20Role%20Login%20System.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.289824",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.289824",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.469520",
"source": "cna@vuldb.com"
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-56209",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-12-31T11:15:07.173",
"lastModified": "2024-12-31T11:15:07.173",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SeventhQueen Kleo allows Reflected XSS.This issue affects Kleo: from n/a before 5.4.4."
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en SeventhQueen Kleo permite XSS reflejado. Este problema afecta a Kleo: desde n/a antes de 5.4.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/theme/kleo/vulnerability/wordpress-kleo-theme-5-4-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-56210",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-12-31T11:15:07.337",
"lastModified": "2024-12-31T11:15:07.337",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in DeluxeThemes Userpro allows Reflected XSS.This issue affects Userpro: from n/a through 5.1.9."
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en DeluxeThemes Userpro permite XSS reflejado. Este problema afecta a Userpro: desde n/a hasta 5.1.9."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/userpro/vulnerability/wordpress-userpro-plugin-5-1-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-56215",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-12-31T11:15:07.480",
"lastModified": "2024-12-31T11:15:07.480",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Stephen Sherrard Member Directory and Contact Form allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Member Directory and Contact Form: from n/a through 1.7.0."
},
{
"lang": "es",
"value": "La vulnerabilidad de autorizaci\u00f3n faltante en Stephen Sherrard Member Directory y Contact Form permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta al Directorio de miembros y al Formulario de contacto: desde n/a hasta 1.7.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/pta-member-directory/vulnerability/wordpress-member-directory-and-contact-form-plugin-1-7-0-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-56217",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-12-31T11:15:07.633",
"lastModified": "2024-12-31T11:15:07.633",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in W3 Eden, Inc. Download Manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Download Manager: from n/a through 3.3.03."
},
{
"lang": "es",
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en W3 Eden, Inc. Download Manager permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Download Manager: desde n/a hasta 3.3.03."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/download-manager/vulnerability/wordpress-download-manager-plugin-3-3-03-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-56219",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-12-31T11:15:07.783",
"lastModified": "2024-12-31T11:15:07.783",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in MarketingFire Widget Options allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Widget Options: from n/a through 4.0.6.1."
},
{
"lang": "es",
"value": "La vulnerabilidad de autorizaci\u00f3n faltante en MarketingFire Widget Options permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a las opciones de widget: desde n/a hasta 4.0.6.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/widget-options/vulnerability/wordpress-widget-options-plugin-4-0-6-1-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-56221",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-12-31T11:15:07.937",
"lastModified": "2024-12-31T11:15:07.937",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Elicus WPMozo Addons Lite for Elementor allows Stored XSS.This issue affects WPMozo Addons Lite for Elementor: from n/a through 1.2.0."
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Elicus WPMozo Addons Lite para Elementor permite XSS almacenado. Este problema afecta a WPMozo Addons Lite para Elementor: desde n/a hasta 1.2.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wpmozo-addons-lite-for-elementor/vulnerability/wordpress-wpmozo-addons-lite-for-elementor-plugin-1-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-56223",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-12-31T11:15:08.090",
"lastModified": "2024-12-31T11:15:08.090",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Fahad Mahmood Gulri Slider allows Reflected XSS.This issue affects Gulri Slider: from n/a through 3.5.8."
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Fahad Mahmood Gulri Slider permite XSS reflejado. Este problema afecta a Gulri Slider: desde n/a hasta 3.5.8."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/gulri-slider/vulnerability/wordpress-gulri-slider-plugin-3-5-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-56224",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-12-31T11:15:08.240",
"lastModified": "2024-12-31T11:15:08.240",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ledenbeheer allows Stored XSS.This issue affects Ledenbeheer: from n/a through 2.1.0."
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Ledenbeheer permite XSS almacenado. Este problema afecta a Ledenbeheer: desde n/a hasta 2.1.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/ledenbeheer-external-connection/vulnerability/wordpress-ledenbeheer-plugin-2-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-56225",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-12-31T11:15:08.380",
"lastModified": "2024-12-31T11:15:08.380",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Leap13 Premium Addons for Elementor allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Premium Addons for Elementor: from n/a through 4.10.56."
},
{
"lang": "es",
"value": "La vulnerabilidad de autorizaci\u00f3n faltante en los complementos Leap13 Premium Addons para Elementor permite acceder a funciones que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a los complementos Premium de Elementor: desde n/a hasta 4.10.56."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/premium-addons-for-elementor/vulnerability/wordpress-premium-addons-for-elementor-plugin-4-10-56-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-56226",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-12-31T11:15:08.527",
"lastModified": "2024-12-31T11:15:08.527",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Royal Royal Elementor Addons allows Reflected XSS.This issue affects Royal Elementor Addons: from n/a through 1.7.1001."
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WP Royal Royal Elementor Addons permite XSS reflejado. Este problema afecta a Royal Elementor Addons: desde n/a hasta 1.7.1001."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/royal-elementor-addons/vulnerability/wordpress-royal-elementor-addons-plugin-1-7-1001-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-56227",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-12-31T11:15:08.670",
"lastModified": "2024-12-31T11:15:08.670",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in WP Royal Royal Elementor Addons allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Royal Elementor Addons: from n/a through 1.7.1001."
},
{
"lang": "es",
"value": "La vulnerabilidad de autorizaci\u00f3n faltante en los complementos Royal Elementor de WP Royal permite explotar los niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a los complementos Royal Elementor: desde n/a hasta 1.7.1001."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/royal-elementor-addons/vulnerability/wordpress-royal-elementor-addons-plugin-1-7-1001-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-56228",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-12-31T11:15:08.817",
"lastModified": "2024-12-31T11:15:08.817",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPFactory Wishlist for WooCommerce: Multi Wishlists Per Customer allows Reflected XSS.This issue affects Wishlist for WooCommerce: Multi Wishlists Per Customer: from n/a through 3.1.2."
},
{
"lang": "es",
"value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WPFactory Wishlist para WooCommerce: Multi Wishlists Per Customer permite XSS reflejado. Este problema afecta a Wishlist for WooCommerce: Multi Wishlists Per Customer: desde n/a hasta 3.1.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wish-list-for-woocommerce/vulnerability/wordpress-wishlist-for-woocommerce-multi-wishlists-per-customer-plugin-3-1-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-56231",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-12-31T11:15:08.953",
"lastModified": "2024-12-31T11:15:08.953",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Debuggers Studio SaasPricing allows DOM-Based XSS.This issue affects SaasPricing: from n/a through 1.1.4."
},
{
"lang": "es",
"value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Debuggers Studio SaasPricing permite XSS basado en DOM. Este problema afecta a SaasPricing: desde n/a hasta 1.1.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/saaspricing/vulnerability/wordpress-saaspricing-plugin-1-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Alexander Volkov WP Nice Loader allows Stored XSS.This issue affects WP Nice Loader: from n/a through 0.1.0.4."
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en WP Nice Loader de Alexander Volkov permite XSS almacenado. Este problema afecta a WP Nice Loader: desde n/a hasta 0.1.0.4."
}
],
"metrics": {

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-56233",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-12-31T11:15:09.090",
"lastModified": "2024-12-31T11:15:09.090",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kinhelios Kintpv Wooconnect allows Stored XSS.This issue affects Kintpv Wooconnect: from n/a through 8.129."
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Kinhelios Kintpv Wooconnect permite XSS almacenado. Este problema afecta a Kintpv Wooconnect: desde n/a hasta 8.129."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/kintpv-connect/vulnerability/wordpress-kintpv-wooconnect-plugin-8-129-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-56234",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-12-31T11:15:09.237",
"lastModified": "2024-12-31T11:15:09.237",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in VW THEMES VW Automobile Lite allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects VW Automobile Lite: from n/a through 2.1."
},
{
"lang": "es",
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en VW THEMES VW Automobile Lite permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a VW Automobile Lite: desde n/a hasta 2.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/theme/vw-automobile-lite/vulnerability/wordpress-vw-automobile-lite-theme-2-1-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-56235",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-12-31T11:15:09.390",
"lastModified": "2024-12-31T11:15:09.390",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Coupon Plugin Coupon allows DOM-Based XSS.This issue affects Coupon: from n/a through 1.2.1."
},
{
"lang": "es",
"value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en el complemento Coupon. Coupon permite XSS basado en DOM. Este problema afecta a Coupon: desde n/a hasta 1.2.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/coupon-lite/vulnerability/wordpress-coupon-plugin-1-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-56256",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-12-31T11:15:09.543",
"lastModified": "2024-12-31T11:15:09.543",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Andy Fragen Embed PDF Viewer allows Stored XSS.This issue affects Embed PDF Viewer: from n/a through 2.3.1."
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Andy Fragen Embed PDF Viewer permite XSS almacenado. Este problema afecta a Embed PDF Viewer: desde n/a hasta 2.3.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/embed-pdf-viewer/vulnerability/wordpress-embed-pdf-viewer-plugin-2-3-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-56265",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-12-31T11:15:09.707",
"lastModified": "2024-12-31T11:15:09.707",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPWeb WooCommerce PDF Vouchers allows Reflected XSS.This issue affects WooCommerce PDF Vouchers: from n/a before 4.9.9."
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WPWeb WooCommerce PDF Vouchers permite XSS reflejado. Este problema afecta a WooCommerce PDF Vouchers: desde n/a hasta 4.9.9."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/woocommerce-pdf-vouchers/vulnerability/wordpress-woocommerce-pdf-vouchers-plugin-4-9-9-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-12-31T11:00:19.367074+00:00
2024-12-31T13:00:19.045739+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-12-31T10:15:11.140000+00:00
2024-12-31T12:15:22.967000+00:00
```
### Last Data Feed Release
@ -33,33 +33,43 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
275220
275243
```
### CVEs added in the last Commit
Recently added CVEs: `13`
Recently added CVEs: `23`
- [CVE-2024-13067](CVE-2024/CVE-2024-130xx/CVE-2024-13067.json) (`2024-12-31T09:15:05.307`)
- [CVE-2024-49422](CVE-2024/CVE-2024-494xx/CVE-2024-49422.json) (`2024-12-31T09:15:05.740`)
- [CVE-2024-56211](CVE-2024/CVE-2024-562xx/CVE-2024-56211.json) (`2024-12-31T10:15:09.390`)
- [CVE-2024-56212](CVE-2024/CVE-2024-562xx/CVE-2024-56212.json) (`2024-12-31T10:15:09.573`)
- [CVE-2024-56213](CVE-2024/CVE-2024-562xx/CVE-2024-56213.json) (`2024-12-31T10:15:09.727`)
- [CVE-2024-56214](CVE-2024/CVE-2024-562xx/CVE-2024-56214.json) (`2024-12-31T10:15:09.890`)
- [CVE-2024-56216](CVE-2024/CVE-2024-562xx/CVE-2024-56216.json) (`2024-12-31T10:15:10.060`)
- [CVE-2024-56218](CVE-2024/CVE-2024-562xx/CVE-2024-56218.json) (`2024-12-31T10:15:10.233`)
- [CVE-2024-56220](CVE-2024/CVE-2024-562xx/CVE-2024-56220.json) (`2024-12-31T10:15:10.403`)
- [CVE-2024-56222](CVE-2024/CVE-2024-562xx/CVE-2024-56222.json) (`2024-12-31T10:15:10.583`)
- [CVE-2024-56229](CVE-2024/CVE-2024-562xx/CVE-2024-56229.json) (`2024-12-31T10:15:10.760`)
- [CVE-2024-56230](CVE-2024/CVE-2024-562xx/CVE-2024-56230.json) (`2024-12-31T10:15:10.930`)
- [CVE-2024-56232](CVE-2024/CVE-2024-562xx/CVE-2024-56232.json) (`2024-12-31T10:15:11.140`)
- [CVE-2024-12105](CVE-2024/CVE-2024-121xx/CVE-2024-12105.json) (`2024-12-31T11:15:06.140`)
- [CVE-2024-12106](CVE-2024/CVE-2024-121xx/CVE-2024-12106.json) (`2024-12-31T11:15:06.637`)
- [CVE-2024-12108](CVE-2024/CVE-2024-121xx/CVE-2024-12108.json) (`2024-12-31T11:15:06.780`)
- [CVE-2024-13061](CVE-2024/CVE-2024-130xx/CVE-2024-13061.json) (`2024-12-31T12:15:22.967`)
- [CVE-2024-13069](CVE-2024/CVE-2024-130xx/CVE-2024-13069.json) (`2024-12-31T11:15:06.933`)
- [CVE-2024-56209](CVE-2024/CVE-2024-562xx/CVE-2024-56209.json) (`2024-12-31T11:15:07.173`)
- [CVE-2024-56210](CVE-2024/CVE-2024-562xx/CVE-2024-56210.json) (`2024-12-31T11:15:07.337`)
- [CVE-2024-56215](CVE-2024/CVE-2024-562xx/CVE-2024-56215.json) (`2024-12-31T11:15:07.480`)
- [CVE-2024-56217](CVE-2024/CVE-2024-562xx/CVE-2024-56217.json) (`2024-12-31T11:15:07.633`)
- [CVE-2024-56219](CVE-2024/CVE-2024-562xx/CVE-2024-56219.json) (`2024-12-31T11:15:07.783`)
- [CVE-2024-56221](CVE-2024/CVE-2024-562xx/CVE-2024-56221.json) (`2024-12-31T11:15:07.937`)
- [CVE-2024-56223](CVE-2024/CVE-2024-562xx/CVE-2024-56223.json) (`2024-12-31T11:15:08.090`)
- [CVE-2024-56224](CVE-2024/CVE-2024-562xx/CVE-2024-56224.json) (`2024-12-31T11:15:08.240`)
- [CVE-2024-56225](CVE-2024/CVE-2024-562xx/CVE-2024-56225.json) (`2024-12-31T11:15:08.380`)
- [CVE-2024-56226](CVE-2024/CVE-2024-562xx/CVE-2024-56226.json) (`2024-12-31T11:15:08.527`)
- [CVE-2024-56227](CVE-2024/CVE-2024-562xx/CVE-2024-56227.json) (`2024-12-31T11:15:08.670`)
- [CVE-2024-56228](CVE-2024/CVE-2024-562xx/CVE-2024-56228.json) (`2024-12-31T11:15:08.817`)
- [CVE-2024-56231](CVE-2024/CVE-2024-562xx/CVE-2024-56231.json) (`2024-12-31T11:15:08.953`)
- [CVE-2024-56233](CVE-2024/CVE-2024-562xx/CVE-2024-56233.json) (`2024-12-31T11:15:09.090`)
- [CVE-2024-56234](CVE-2024/CVE-2024-562xx/CVE-2024-56234.json) (`2024-12-31T11:15:09.237`)
- [CVE-2024-56235](CVE-2024/CVE-2024-562xx/CVE-2024-56235.json) (`2024-12-31T11:15:09.390`)
- [CVE-2024-56256](CVE-2024/CVE-2024-562xx/CVE-2024-56256.json) (`2024-12-31T11:15:09.543`)
- [CVE-2024-56265](CVE-2024/CVE-2024-562xx/CVE-2024-56265.json) (`2024-12-31T11:15:09.707`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
- [CVE-2024-21520](CVE-2024/CVE-2024-215xx/CVE-2024-21520.json) (`2024-12-31T10:15:06.317`)
- [CVE-2024-56232](CVE-2024/CVE-2024-562xx/CVE-2024-56232.json) (`2024-12-31T10:15:11.140`)
## Download and Usage

View File

@ -244775,7 +244775,10 @@ CVE-2024-1210,0,0,f5a9389cac94cbfcfa3f0d961d1ea27115bf7afa331ce2988db15dbaf2efdf
CVE-2024-12100,0,0,5d9bee140d619efc5bcb5724e98abb1747cc29824dfdae10a66de74940256d24,2024-12-24T06:15:32.830000
CVE-2024-12101,0,0,cf6330eb409e982923b4b0b78cc8d64ad396889b9513f5530cedf911c9fe2802,2024-12-03T16:15:20.910000
CVE-2024-12103,0,0,2ab2e8f87386f7081d0b465f2935a38be96d397e85c0b3ea2192a2941673c10d,2024-12-24T10:15:05.820000
CVE-2024-12105,1,1,e29c8e0961836d9b30f212194f9d06abd979b0be7feb58d41b651ec37ddf37be,2024-12-31T11:15:06.140000
CVE-2024-12106,1,1,ca9fcf91c9868df2b6874232721b9a8a22de7741272bfc3773ac02c110667ccb,2024-12-31T11:15:06.637000
CVE-2024-12107,0,0,7da8659dc821ee4f071df4b42d3ae5a3881cc2b8cc55779739dc797df4a302eb,2024-12-04T11:15:05
CVE-2024-12108,1,1,1ec7eda10b7b66f6b453997e65bb7c941490ce78524a97d169432e108394ce1e,2024-12-31T11:15:06.780000
CVE-2024-12110,0,0,f266935beaa447960f1dea8d3421db64eefadfd0613c53fd8d2543de02327a47,2024-12-06T09:15:08.270000
CVE-2024-12111,0,0,94cbde89c1eb7b342ad5b2e1b90e676e3d9dc7b09262fa3ba8de5cb41e47a11b,2024-12-19T20:15:06.950000
CVE-2024-12115,0,0,e6944683813361fa4999b92dbfb5849d2d0c20bc3f6186b671317bdf2839435d,2024-12-07T02:15:18.653000
@ -245299,7 +245302,9 @@ CVE-2024-13050,0,0,84109de165147e4a5232ee1fdc9c6d22162f7758c34e8757df3c209c53af5
CVE-2024-13051,0,0,1be1ae94a61dba469e5e49f0e3a210eb507d631c9c82589acffd3c63211509af,2024-12-30T21:15:07.717000
CVE-2024-13058,0,0,91396049ed5baf4a6f156f57d5990485463c9e52e997b4c7fdc31249002c7bf7,2024-12-30T22:15:05.957000
CVE-2024-1306,0,0,0542247252f536db3d3f5f372f6b06cf8f9322e7de2b3d2f5040c13d3f80547b,2024-11-21T08:50:17.053000
CVE-2024-13067,1,1,dac89381ddeb2bd239b81d96b3005b135a2a8c3e5a25d9e952411ecf22b373e9,2024-12-31T09:15:05.307000
CVE-2024-13061,1,1,b03feaa2f4fc804226d0585c376accf3d822de2d58d31f55dfdc314d7922b688,2024-12-31T12:15:22.967000
CVE-2024-13067,0,0,dac89381ddeb2bd239b81d96b3005b135a2a8c3e5a25d9e952411ecf22b373e9,2024-12-31T09:15:05.307000
CVE-2024-13069,1,1,b4e1c0fcfc5a6354256ed66051b3e6362f182a10b32b325ebc3e8293696eb528,2024-12-31T11:15:06.933000
CVE-2024-1307,0,0,791d403fd6ce043b636953425f5891ef42986249387c4cd3003ec2c058fbc715,2024-11-21T08:50:17.233000
CVE-2024-1308,0,0,b2bb733c7402260f9ace902e9d676967e691f690d52b513a8afbdef713b7d4c5,2024-11-21T08:50:17.413000
CVE-2024-1309,0,0,46059633232401d149997e4f4dfdb966bb51f1c7d1649dc6d177fd25783e7c4a,2024-11-22T20:03:02.910000
@ -247316,7 +247321,7 @@ CVE-2024-21517,0,0,71e12b43226e2a3b487e6ff6fb65bd8c154254848a0a34c039dd34c5fa8f3
CVE-2024-21518,0,0,d147bbbdb00d33e9919b4e00455fd4d118ef1b58e469f947369c25e12ebd2500,2024-11-21T08:54:36.223000
CVE-2024-21519,0,0,847e1cd4eb3a390981cb70fcaa8a9f794d31a430107ae76bd7b814306d528c12,2024-11-21T08:54:36.377000
CVE-2024-2152,0,0,c1376433b3da8765c2809fe086daca92323bdf8c0d0c7833abccd0e9fbc0df64,2024-12-20T19:37:50.807000
CVE-2024-21520,0,1,5e547b18267dcaae317db1ad1de87bfb370e8f29e785a6fe54608475471cda4e,2024-12-31T10:15:06.317000
CVE-2024-21520,0,0,5e547b18267dcaae317db1ad1de87bfb370e8f29e785a6fe54608475471cda4e,2024-12-31T10:15:06.317000
CVE-2024-21521,0,0,dd4dbc6b6caa697a204d1f25a03cccd69d475e8249033ed79cb42c5ca4571633,2024-11-21T08:54:36.637000
CVE-2024-21522,0,0,ab99178ca7bf4d5693b2b017e36fa9c863c7d75c2a02fd0b4b775f31c0f098fa,2024-11-21T08:54:36.760000
CVE-2024-21523,0,0,899e1723b3d4ef8dc9531de2159de1a5a2bf71bfd9781b579d36649995048d02,2024-11-21T08:54:36.877000
@ -267429,7 +267434,7 @@ CVE-2024-49419,0,0,a5a819bfe5a9799735b4e639f835a9c23b57c3f1fc4456607d48faf2f5774
CVE-2024-4942,0,0,fa20ab38a1078a726b9a100f42578147d69df08621b5e1a638f41b48603f8405,2024-11-21T09:43:55.063000
CVE-2024-49420,0,0,97029bba266be94c493b393755bc15c85ed7da79c235f00baf1a98d893a5bd80,2024-12-03T06:15:10.253000
CVE-2024-49421,0,0,16e0a57305b9d5bb74efae9fe2470ed3315349d30a3f738565603fde91a637ce,2024-12-03T06:15:10.393000
CVE-2024-49422,1,1,34932e0ca9c7a34733fa3277557fa3dbbd58948cdf152bed38a1c8911c39654b,2024-12-31T09:15:05.740000
CVE-2024-49422,0,0,34932e0ca9c7a34733fa3277557fa3dbbd58948cdf152bed38a1c8911c39654b,2024-12-31T09:15:05.740000
CVE-2024-4943,0,0,90b9ef9fb616c7eac2dd8fd3f589a71055cfcb2bdae44cccbc0c6aa4988e9e62,2024-11-21T09:43:55.193000
CVE-2024-4944,0,0,09398dee46be5f9be62ece5ee06ab5c9bc55e44daea49d24602cf09b051c68ba,2024-11-21T09:43:55.310000
CVE-2024-4945,0,0,0c472cf3594efbe18607e870522e0a7b06d6a229b03f8639830c411ab0f637e0,2024-11-21T09:43:55.460000
@ -271216,22 +271221,40 @@ CVE-2024-5619,0,0,847b29035ced8b12638c0c9edc7633e1fcbe758edecd5717d697d3abb49553
CVE-2024-5620,0,0,240638ef58a29a459ed1037710fcf1b7e875e31a78e263978233bb4c4a8442da,2024-11-21T09:48:01.930000
CVE-2024-56200,0,0,3879bcf029467f661c4f86f22f421720527f4e18cebe03faa8ac0ac24cb0d998,2024-12-19T19:15:08.280000
CVE-2024-56201,0,0,8a150a16c59122912c829dcd4ae74581ec42a93463074adfa3bf7e42e1708846,2024-12-24T02:15:06.580000
CVE-2024-56211,1,1,2561ac63bcd02a4c3d6e2563fe50f290b21325c58f8548dae7eb232bdf996af3,2024-12-31T10:15:09.390000
CVE-2024-56212,1,1,faae60261349dc3edb80fb398c429b73a210473a2c9693a314eada91472fb263,2024-12-31T10:15:09.573000
CVE-2024-56213,1,1,7972b71001bbc96c25bc75a0b90aab41342cf8b8507f9782df8baed82fd4b7a8,2024-12-31T10:15:09.727000
CVE-2024-56214,1,1,537314a9b1e6270ee651f360e23d6f9f7f5ecd99a83c3b546c1ec39938adf6a5,2024-12-31T10:15:09.890000
CVE-2024-56216,1,1,6d10a1f2eedc777cff745866582314493bedb336702653baf4173bdc458fc7b1,2024-12-31T10:15:10.060000
CVE-2024-56218,1,1,04936fc1a90e38a6ad3a7c732c0117a555fb64a22f7d6cc3b697674fc52c766c,2024-12-31T10:15:10.233000
CVE-2024-56209,1,1,af796ddb1e278686af452acab93e48795e8ac6892478f6485dfcd1bf2a1f79d9,2024-12-31T11:15:07.173000
CVE-2024-56210,1,1,85c79aee6f65dc95344949ff91273158b7de13483e8e1dff247bdafd0f574e29,2024-12-31T11:15:07.337000
CVE-2024-56211,0,0,2561ac63bcd02a4c3d6e2563fe50f290b21325c58f8548dae7eb232bdf996af3,2024-12-31T10:15:09.390000
CVE-2024-56212,0,0,faae60261349dc3edb80fb398c429b73a210473a2c9693a314eada91472fb263,2024-12-31T10:15:09.573000
CVE-2024-56213,0,0,7972b71001bbc96c25bc75a0b90aab41342cf8b8507f9782df8baed82fd4b7a8,2024-12-31T10:15:09.727000
CVE-2024-56214,0,0,537314a9b1e6270ee651f360e23d6f9f7f5ecd99a83c3b546c1ec39938adf6a5,2024-12-31T10:15:09.890000
CVE-2024-56215,1,1,826c0df9065625ff5bb38e043e5dac67c3934cff9580b6d0e719568db39bb040,2024-12-31T11:15:07.480000
CVE-2024-56216,0,0,6d10a1f2eedc777cff745866582314493bedb336702653baf4173bdc458fc7b1,2024-12-31T10:15:10.060000
CVE-2024-56217,1,1,64346367c1c13c2b08c754e0e2f182110adbeafd6d6715a982a32c5605e73e44,2024-12-31T11:15:07.633000
CVE-2024-56218,0,0,04936fc1a90e38a6ad3a7c732c0117a555fb64a22f7d6cc3b697674fc52c766c,2024-12-31T10:15:10.233000
CVE-2024-56219,1,1,f1bd27238dc7a5910b3a2ea7e9abc9ad4f12d5acf5bf53dd2da15526c715eafc,2024-12-31T11:15:07.783000
CVE-2024-5622,0,0,48dd50139cd0fb0b9e32ff1d34b4004b39a7c87dde414648422613d43b5d51e5,2024-09-13T20:21:38.610000
CVE-2024-56220,1,1,fa8c17176c6a7385721ca51b743f1e1e3db77dc75e585bef828b7711bc20a817,2024-12-31T10:15:10.403000
CVE-2024-56222,1,1,caabc5f3fbffe8317d5c373a8d57fc45e1f9c1e294c2218748a9283876145b1f,2024-12-31T10:15:10.583000
CVE-2024-56229,1,1,780291cf9257aeb905df3026fd98d748aa407f4154387d50cbe21d7f39417330,2024-12-31T10:15:10.760000
CVE-2024-56220,0,0,fa8c17176c6a7385721ca51b743f1e1e3db77dc75e585bef828b7711bc20a817,2024-12-31T10:15:10.403000
CVE-2024-56221,1,1,1bd1a9430835cba26f66d7903d27ae4188f15c4e232d8c706531fdc6193815c6,2024-12-31T11:15:07.937000
CVE-2024-56222,0,0,caabc5f3fbffe8317d5c373a8d57fc45e1f9c1e294c2218748a9283876145b1f,2024-12-31T10:15:10.583000
CVE-2024-56223,1,1,b18aae69b14a7924951c8832bbb7deff52975d816cc904b2c6b62efaa92912c0,2024-12-31T11:15:08.090000
CVE-2024-56224,1,1,ed6303aa841342213a9a5b68e7bbdd25794ba77ea5037fe46918effd91cf9974,2024-12-31T11:15:08.240000
CVE-2024-56225,1,1,dd1b678859fe49c5dbbf6f1d5dfdbc65c85124878cf0d9d9ecd673419f5d0285,2024-12-31T11:15:08.380000
CVE-2024-56226,1,1,42315c617463a050532b3b2f8e2f6e37aa9a071417ce8df0b8a5c99de49d8586,2024-12-31T11:15:08.527000
CVE-2024-56227,1,1,914bd081a197ac7f90993db1ba15712b88fae8c68aa5d7c9e423563327a1b2d4,2024-12-31T11:15:08.670000
CVE-2024-56228,1,1,bd71efa63bcba4da03859029febae13827c6960effc8d9a29a37d0db8aaeabb3,2024-12-31T11:15:08.817000
CVE-2024-56229,0,0,780291cf9257aeb905df3026fd98d748aa407f4154387d50cbe21d7f39417330,2024-12-31T10:15:10.760000
CVE-2024-5623,0,0,7a27a8a8bb2e29efe02be8c957247e288b25a39c8598c86d8533218d73dc7a15,2024-09-13T20:19:53.477000
CVE-2024-56230,1,1,78c6f283efec144cf5d356e25ccaff84a0966acc7cda3708fbe4f6dca25e40c8,2024-12-31T10:15:10.930000
CVE-2024-56232,1,1,3d1c538ec528db125916594384d3faf9ca5d73c65a614223f5b640922dbb5427,2024-12-31T10:15:11.140000
CVE-2024-56230,0,0,78c6f283efec144cf5d356e25ccaff84a0966acc7cda3708fbe4f6dca25e40c8,2024-12-31T10:15:10.930000
CVE-2024-56231,1,1,c26b5456ba26926f2364dd6a021dbade3c52cd25103ec91ca2099f276038da8f,2024-12-31T11:15:08.953000
CVE-2024-56232,0,1,4348511b91bfb8c85a5dddc2c464ac42db20935e408a659d8e4959fa777a6efb,2024-12-31T10:15:11.140000
CVE-2024-56233,1,1,039dd907be96a71ba29e521ef56e08f0c4c68972de8e6f5808b697533895e699,2024-12-31T11:15:09.090000
CVE-2024-56234,1,1,b07c2ba8a34810e1dd5b90c17eea0c9bce20b99700c195869b0094b59d5024e9,2024-12-31T11:15:09.237000
CVE-2024-56235,1,1,660224e2b08dc2bf0dbf160a418fa525479dca1cb61789ac5cffe9b51cc958ca,2024-12-31T11:15:09.390000
CVE-2024-5624,0,0,7f93c754c9c6e0a4611cd66d82be3519ca19fdbb2803818bcf7cbddb963f07b6,2024-09-13T20:23:28.787000
CVE-2024-5625,0,0,d3de3914e71e24c0640febb528961abd09321cf732dc235d08627199bf00a95c,2024-11-21T09:48:02.390000
CVE-2024-56256,1,1,0539e9ac8f9d8a01c76e1f3d918e1acfed86cca46add33562786e27e02d1fc57,2024-12-31T11:15:09.543000
CVE-2024-5626,0,0,93ceb7b86ba8ddeb56f02be4839062ac9cafc2abafa79ca42f7d116eca5e4c5a,2024-11-21T09:48:02.503000
CVE-2024-56265,1,1,5bb6cbd19bd3cb72df53ec543462cc492be8008573f66d8a4a533f195e4791cd,2024-12-31T11:15:09.707000
CVE-2024-5627,0,0,4f3ee87aef2fc9763c8caa5864c6f83c1e8820b485bf86b137197706dbea80f8,2024-11-21T09:48:02.683000
CVE-2024-5628,0,0,755412ba03c7f502c54c635c9705b96a4154da09bb9bfca64f93d1d41d08cf6a,2024-09-26T15:14:26.547000
CVE-2024-5629,0,0,f9daa1fe2950a7ccef0838fb6e6cae4a7319a3ab1da6174da12e5faf2c955f5a,2024-11-21T09:48:02.860000

Can't render this file because it is too large.