Skip to content

Commit

Permalink
3 changes (3 new | 0 updated):
Browse files Browse the repository at this point in the history
      - 3 new CVEs:  CVE-2024-11184, CVE-2024-11357, CVE-2024-12595
      - 0 updated CVEs:
  • Loading branch information
cvelistV5 Github Action committed Jan 2, 2025
1 parent 5ec8a11 commit 7b341ff
Show file tree
Hide file tree
Showing 5 changed files with 293 additions and 106 deletions.
83 changes: 83 additions & 0 deletions cves/2024/11xxx/CVE-2024-11184.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,83 @@
{
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"cveMetadata": {
"cveId": "CVE-2024-11184",
"assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81",
"state": "PUBLISHED",
"assignerShortName": "WPScan",
"dateReserved": "2024-11-13T15:55:57.036Z",
"datePublished": "2025-01-02T06:00:04.587Z",
"dateUpdated": "2025-01-02T06:00:04.587Z"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81",
"shortName": "WPScan",
"dateUpdated": "2025-01-02T06:00:04.587Z"
},
"title": "WP Enabled SVG <= 0.7 - Author+ Stored XSS via SVG",
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-79 Cross-Site Scripting (XSS)",
"lang": "en",
"type": "CWE"
}
]
}
],
"affected": [
{
"vendor": "Unknown",
"product": "wp-enable-svg",
"versions": [
{
"status": "affected",
"versionType": "semver",
"version": "0",
"lessThanOrEqual": "0.7"
}
],
"defaultStatus": "affected"
}
],
"descriptions": [
{
"lang": "en",
"value": "The wp-enable-svg WordPress plugin through 0.7 does not sanitize SVG files when uploaded, allowing for authors and above to upload SVGs containing malicious scripts"
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/fc982bcb-9974-481f-aef4-580ae9edc3c8/",
"tags": [
"exploit",
"vdb-entry",
"technical-description"
]
}
],
"credits": [
{
"lang": "en",
"value": "Pierre Rudloff",
"type": "finder"
},
{
"lang": "en",
"value": "WPScan",
"type": "coordinator"
}
],
"source": {
"discovery": "EXTERNAL"
},
"x_generator": {
"engine": "WPScan CVE Generator"
}
}
}
}
83 changes: 83 additions & 0 deletions cves/2024/11xxx/CVE-2024-11357.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,83 @@
{
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"cveMetadata": {
"cveId": "CVE-2024-11357",
"assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81",
"state": "PUBLISHED",
"assignerShortName": "WPScan",
"dateReserved": "2024-11-18T18:33:52.275Z",
"datePublished": "2025-01-02T06:00:10.840Z",
"dateUpdated": "2025-01-02T06:00:10.840Z"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81",
"shortName": "WPScan",
"dateUpdated": "2025-01-02T06:00:10.840Z"
},
"title": "Goodlayers Core < 2.0.10 - Contributor+ Stored XSS",
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-79 Cross-Site Scripting (XSS)",
"lang": "en",
"type": "CWE"
}
]
}
],
"affected": [
{
"vendor": "Unknown",
"product": "goodlayers-core",
"versions": [
{
"status": "affected",
"versionType": "semver",
"version": "0",
"lessThan": "2.0.10"
}
],
"defaultStatus": "unaffected"
}
],
"descriptions": [
{
"lang": "en",
"value": "The goodlayers-core WordPress plugin before 2.0.10 does not sanitise and escape some of its settings, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks."
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/7e8c6816-9b7a-43e8-9508-789c8051dd9b/",
"tags": [
"exploit",
"vdb-entry",
"technical-description"
]
}
],
"credits": [
{
"lang": "en",
"value": "Bob Matyas",
"type": "finder"
},
{
"lang": "en",
"value": "WPScan",
"type": "coordinator"
}
],
"source": {
"discovery": "EXTERNAL"
},
"x_generator": {
"engine": "WPScan CVE Generator"
}
}
}
}
83 changes: 83 additions & 0 deletions cves/2024/12xxx/CVE-2024-12595.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,83 @@
{
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"cveMetadata": {
"cveId": "CVE-2024-12595",
"assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81",
"state": "PUBLISHED",
"assignerShortName": "WPScan",
"dateReserved": "2024-12-12T22:04:10.012Z",
"datePublished": "2025-01-02T06:00:13.479Z",
"dateUpdated": "2025-01-02T06:00:13.479Z"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81",
"shortName": "WPScan",
"dateUpdated": "2025-01-02T06:00:13.479Z"
},
"title": "AHAthat Plugin <= 1.6 - Reflected XSS via REQUEST_URI",
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-79 Cross-Site Scripting (XSS)",
"lang": "en",
"type": "CWE"
}
]
}
],
"affected": [
{
"vendor": "Unknown",
"product": "AHAthat Plugin",
"versions": [
{
"status": "affected",
"versionType": "semver",
"version": "0",
"lessThanOrEqual": "1.6"
}
],
"defaultStatus": "affected"
}
],
"descriptions": [
{
"lang": "en",
"value": "The AHAthat Plugin WordPress plugin through 1.6 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers"
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/7a506438-3106-477f-816d-b9b116ec8555/",
"tags": [
"exploit",
"vdb-entry",
"technical-description"
]
}
],
"credits": [
{
"lang": "en",
"value": "Bob Matyas",
"type": "finder"
},
{
"lang": "en",
"value": "WPScan",
"type": "coordinator"
}
],
"source": {
"discovery": "EXTERNAL"
},
"x_generator": {
"engine": "WPScan CVE Generator"
}
}
}
}
30 changes: 18 additions & 12 deletions cves/delta.json
Original file line number Diff line number Diff line change
@@ -1,20 +1,26 @@
{
"fetchTime": "2025-01-02T05:06:52.805Z",
"numberOfChanges": 2,
"new": [],
"updated": [
"fetchTime": "2025-01-02T06:00:22.791Z",
"numberOfChanges": 3,
"new": [
{
"cveId": "CVE-2002-20002",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2002-20002",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2002/20xxx/CVE-2002-20002.json",
"dateUpdated": "2025-01-02T05:00:27.855Z"
"cveId": "CVE-2024-11184",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11184",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11184.json",
"dateUpdated": "2025-01-02T06:00:04.587Z"
},
{
"cveId": "CVE-2024-56830",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-56830",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/56xxx/CVE-2024-56830.json",
"dateUpdated": "2025-01-02T05:00:55.766Z"
"cveId": "CVE-2024-11357",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11357",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11357.json",
"dateUpdated": "2025-01-02T06:00:10.840Z"
},
{
"cveId": "CVE-2024-12595",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-12595",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/12xxx/CVE-2024-12595.json",
"dateUpdated": "2025-01-02T06:00:13.479Z"
}
],
"updated": [],
"error": []
}
Loading

0 comments on commit 7b341ff

Please sign in to comment.