Skip to content

Commit cdd0e58

Browse files
author
cvelistV5 Github Action
committed
1 changes (0 new | 1 updated):
- 0 new CVEs: - 1 updated CVEs: CVE-2024-11010
1 parent 66fa08f commit cdd0e58

File tree

3 files changed

+24
-10
lines changed

3 files changed

+24
-10
lines changed

cves/2024/11xxx/CVE-2024-11010.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,14 +8,14 @@
88
"assignerShortName": "Wordfence",
99
"dateReserved": "2024-11-08T00:40:26.083Z",
1010
"datePublished": "2024-12-07T09:27:05.743Z",
11-
"dateUpdated": "2024-12-09T16:11:38.186Z"
11+
"dateUpdated": "2024-12-09T23:58:28.301Z"
1212
},
1313
"containers": {
1414
"cna": {
1515
"providerMetadata": {
1616
"orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
1717
"shortName": "Wordfence",
18-
"dateUpdated": "2024-12-07T09:27:05.743Z"
18+
"dateUpdated": "2024-12-09T23:58:28.301Z"
1919
},
2020
"affected": [
2121
{
@@ -35,7 +35,7 @@
3535
"descriptions": [
3636
{
3737
"lang": "en",
38-
"value": "The FileOrganizer – Manage WordPress and Website Files plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.1.4 via the 'default_lang' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included."
38+
"value": "The FileOrganizer – Manage WordPress and Website Files plugin for WordPress is vulnerable to Local JavaScript File Inclusion in all versions up to, and including, 1.1.4 via the 'default_lang' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to include and execute arbitrary JavaScript files on the server, allowing the execution of any JavaScript code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included."
3939
}
4040
],
4141
"title": "FileOrganizer <= 1.1.4 - Authenticated (Administrator+) Local JavaScript File Inclusion",

cves/delta.json

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
{
2-
"fetchTime": "2024-12-09T23:54:10.894Z",
2+
"fetchTime": "2024-12-10T00:00:18.982Z",
33
"numberOfChanges": 1,
4-
"new": [
4+
"new": [],
5+
"updated": [
56
{
6-
"cveId": "CVE-2024-9672",
7-
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-9672",
8-
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/9xxx/CVE-2024-9672.json",
9-
"dateUpdated": "2024-12-09T23:49:55.535Z"
7+
"cveId": "CVE-2024-11010",
8+
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11010",
9+
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11010.json",
10+
"dateUpdated": "2024-12-09T23:58:28.301Z"
1011
}
1112
],
12-
"updated": [],
1313
"error": []
1414
}

cves/deltaLog.json

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,18 @@
11
[
2+
{
3+
"fetchTime": "2024-12-10T00:00:18.982Z",
4+
"numberOfChanges": 1,
5+
"new": [],
6+
"updated": [
7+
{
8+
"cveId": "CVE-2024-11010",
9+
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11010",
10+
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11010.json",
11+
"dateUpdated": "2024-12-09T23:58:28.301Z"
12+
}
13+
],
14+
"error": []
15+
},
216
{
317
"fetchTime": "2024-12-09T23:54:10.894Z",
418
"numberOfChanges": 1,

0 commit comments

Comments
 (0)