Auto-Update: 2024-07-16T08:00:19.108763+00:00

This commit is contained in:
cad-safe-bot 2024-07-16 08:03:15 +00:00
parent 9c0821bb35
commit f0ae57c543
4 changed files with 113 additions and 6 deletions

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-4780",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-16T07:15:01.943",
"lastModified": "2024-07-16T07:15:01.943",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Image Hover Effects \u2013 Elementor Addon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018eihe_link\u2019 parameter in all versions up to, and including, 1.4.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/image-hover-effects-addon-for-elementor/tags/1.4.3/includes/widgets.php#L529",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3117113/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/image-hover-effects-addon-for-elementor/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/637972a3-1936-4add-88a2-3fbafba4b5c8?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-6559",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-16T07:15:02.373",
"lastModified": "2024-07-16T07:15:02.373",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Backup, Restore and Migrate WordPress Sites With the XCloner Plugin plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 4.7.3. This is due the plugin utilizing sabre without preventing direct access to the files. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3118643/xcloner-backup-and-restore/trunk/vendor/sabre/vobject/bin/fetch_windows_zones.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0500c57a-3983-46e4-92fa-85f7fd47eba8?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-07-16T06:00:18.488324+00:00
2024-07-16T08:00:19.108763+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-07-16T05:15:15.073000+00:00
2024-07-16T07:15:02.373000+00:00
```
### Last Data Feed Release
@ -33,14 +33,15 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
257077
257079
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `2`
- [CVE-2024-6557](CVE-2024/CVE-2024-65xx/CVE-2024-6557.json) (`2024-07-16T05:15:15.073`)
- [CVE-2024-4780](CVE-2024/CVE-2024-47xx/CVE-2024-4780.json) (`2024-07-16T07:15:01.943`)
- [CVE-2024-6559](CVE-2024/CVE-2024-65xx/CVE-2024-6559.json) (`2024-07-16T07:15:02.373`)
### CVEs modified in the last Commit

View File

@ -255786,6 +255786,7 @@ CVE-2024-4776,0,0,8d62a3fb449cd595ed01f29a43c4395459263028a3240838c3f471dfed40e0
CVE-2024-4777,0,0,96d0d896ebb105a32ed437e794c8fc4ba926ad921436ba17bdb49a1a49737be4,2024-06-10T17:16:34.070000
CVE-2024-4778,0,0,e3020a287fa6ceae8ff9c78434f10af4d17cf4058dd5bf80208c921b6bc68bef,2024-07-03T02:08:09.053000
CVE-2024-4779,0,0,7a9d6158e8d260b03b3581dd37b23bd10d59ba6243714ad236ba79968e8d9b16,2024-05-24T01:15:30.977000
CVE-2024-4780,1,1,b1764570f6b0ccd952a7fac5bbe6e858a4ee3d34b81d58b890943a2a9ef0f0f9,2024-07-16T07:15:01.943000
CVE-2024-4783,0,0,413c0436e6758a988a0c847533b21e34b17a9d936626eba8cda1a5d1f87e0181,2024-05-24T01:15:30.977000
CVE-2024-4787,0,0,6e9b8652de9328ef9248746b2fe52f715cb97566c59048ae6277a1aaed304f45,2024-06-20T12:44:01.637000
CVE-2024-4788,0,0,c5cda7420b511fe90756cd5eaf9fe3f931a75f851e6dfa110c10f9969d86e1f7,2024-06-06T14:17:35.017000
@ -257009,7 +257010,8 @@ CVE-2024-6550,0,0,6c4bb046e65a00df1f67c81af4edc0fc3847fdca60c1beea606bf943b58513
CVE-2024-6554,0,0,c39b715167392909a130cc6479af2acca1cb23375ca0bdab5b0fb951f0bce662,2024-07-12T17:01:48.353000
CVE-2024-6555,0,0,bf68ef8f1bd3876021fc33b504457daba53832080530806ef27f797ea5536a0b,2024-07-12T12:49:07.030000
CVE-2024-6556,0,0,246920c1b32eb0a0369982110178f9a30464427865e75d42710950bf8d6bff6c,2024-07-11T13:05:54.930000
CVE-2024-6557,1,1,e9ee209561e99679c20203ca6d94da1a0bb55042ea3baa698cb80a889557bbdd,2024-07-16T05:15:15.073000
CVE-2024-6557,0,0,e9ee209561e99679c20203ca6d94da1a0bb55042ea3baa698cb80a889557bbdd,2024-07-16T05:15:15.073000
CVE-2024-6559,1,1,a25839392cca32e2008cd3fda59c3389e3884032a8d4f1ee12d8e039b4cbaf6f,2024-07-16T07:15:02.373000
CVE-2024-6563,0,0,1b4d88909a8afd884220e1df693026407578c717bcca7ba5cdd4e0bbbf29fb3c,2024-07-09T14:19:19.300000
CVE-2024-6564,0,0,b381c943e4dc87d72df0560a8008d835d4542fba3e8b6a3b21a1beca0e3a3fa5,2024-07-09T14:19:14.760000
CVE-2024-6574,0,0,63009fc3946aa6aa37035c823fc25710c373929512d42b52b922f4cc721537b8,2024-07-15T13:00:34.853000

Can't render this file because it is too large.