mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-07 05:28:59 +00:00
29 lines
1.3 KiB
JSON
29 lines
1.3 KiB
JSON
{
|
|
"id": "CVE-2024-38344",
|
|
"sourceIdentifier": "vultures@jpcert.or.jp",
|
|
"published": "2024-07-04T01:15:02.260",
|
|
"lastModified": "2024-07-05T12:55:51.367",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A cross-site request forgery vulnerability exists in WP Tweet Walls versions prior to 1.0.4. If this vulnerability is exploited, an attacker allows a user who logs in to the WordPress site where the affected plugin is enabled to access a malicious page. As a result, the user may perform unintended operations on the WordPress site."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Existe una vulnerabilidad de Cross-Site Request Forgery en las versiones de WP Tweet Walls anteriores a la 1.0.4. Si se explota esta vulnerabilidad, un atacante permite que un usuario que inicia sesi\u00f3n en el sitio de WordPress donde est\u00e1 habilitado el complemento afectado acceda a una p\u00e1gina maliciosa. Como resultado, el usuario puede realizar operaciones no deseadas en el sitio de WordPress."
|
|
}
|
|
],
|
|
"metrics": {},
|
|
"references": [
|
|
{
|
|
"url": "https://jvn.jp/en/jp/JVN34977158/",
|
|
"source": "vultures@jpcert.or.jp"
|
|
},
|
|
{
|
|
"url": "https://wordpress.org/plugins/wp-tweet-walls/",
|
|
"source": "vultures@jpcert.or.jp"
|
|
}
|
|
]
|
|
} |