-
Notifications
You must be signed in to change notification settings - Fork 18
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Auto-Update: 2024-08-18T22:00:16.698210+00:00
- Loading branch information
1 parent
22f7f4a
commit 908c63e
Showing
5 changed files
with
261 additions
and
9 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,56 @@ | ||
{ | ||
"id": "CVE-2024-43303", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2024-08-18T21:15:03.647", | ||
"lastModified": "2024-08-18T21:15:03.647", | ||
"vulnStatus": "Received", | ||
"cveTags": [], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in videousermanuals.Com White Label CMS allows Reflected XSS.This issue affects White Label CMS: from n/a through 2.7.4." | ||
} | ||
], | ||
"metrics": { | ||
"cvssMetricV31": [ | ||
{ | ||
"source": "[email protected]", | ||
"type": "Secondary", | ||
"cvssData": { | ||
"version": "3.1", | ||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", | ||
"attackVector": "NETWORK", | ||
"attackComplexity": "LOW", | ||
"privilegesRequired": "NONE", | ||
"userInteraction": "REQUIRED", | ||
"scope": "CHANGED", | ||
"confidentialityImpact": "LOW", | ||
"integrityImpact": "LOW", | ||
"availabilityImpact": "LOW", | ||
"baseScore": 7.1, | ||
"baseSeverity": "HIGH" | ||
}, | ||
"exploitabilityScore": 2.8, | ||
"impactScore": 3.7 | ||
} | ||
] | ||
}, | ||
"weaknesses": [ | ||
{ | ||
"source": "[email protected]", | ||
"type": "Primary", | ||
"description": [ | ||
{ | ||
"lang": "en", | ||
"value": "CWE-79" | ||
} | ||
] | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"url": "https://patchstack.com/database/vulnerability/white-label-cms/wordpress-white-label-cms-plugin-2-7-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", | ||
"source": "[email protected]" | ||
} | ||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,56 @@ | ||
{ | ||
"id": "CVE-2024-43304", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2024-08-18T21:15:03.860", | ||
"lastModified": "2024-08-18T21:15:03.860", | ||
"vulnStatus": "Received", | ||
"cveTags": [], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Cool Plugins Cryptocurrency Widgets \u2013 Price Ticker & Coins List allows Reflected XSS.This issue affects Cryptocurrency Widgets \u2013 Price Ticker & Coins List: from n/a through 2.8.0." | ||
} | ||
], | ||
"metrics": { | ||
"cvssMetricV31": [ | ||
{ | ||
"source": "[email protected]", | ||
"type": "Secondary", | ||
"cvssData": { | ||
"version": "3.1", | ||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", | ||
"attackVector": "NETWORK", | ||
"attackComplexity": "LOW", | ||
"privilegesRequired": "NONE", | ||
"userInteraction": "REQUIRED", | ||
"scope": "CHANGED", | ||
"confidentialityImpact": "LOW", | ||
"integrityImpact": "LOW", | ||
"availabilityImpact": "LOW", | ||
"baseScore": 7.1, | ||
"baseSeverity": "HIGH" | ||
}, | ||
"exploitabilityScore": 2.8, | ||
"impactScore": 3.7 | ||
} | ||
] | ||
}, | ||
"weaknesses": [ | ||
{ | ||
"source": "[email protected]", | ||
"type": "Primary", | ||
"description": [ | ||
{ | ||
"lang": "en", | ||
"value": "CWE-79" | ||
} | ||
] | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"url": "https://patchstack.com/database/vulnerability/cryptocurrency-price-ticker-widget/wordpress-cryptocurrency-widgets-plugin-2-8-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", | ||
"source": "[email protected]" | ||
} | ||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,137 @@ | ||
{ | ||
"id": "CVE-2024-7911", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2024-08-18T20:15:04.260", | ||
"lastModified": "2024-08-18T20:15:04.260", | ||
"vulnStatus": "Received", | ||
"cveTags": [], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "A vulnerability was found in SourceCodester Simple Online Bidding System 1.0. It has been classified as critical. This affects an unknown part of the file /simple-online-bidding-system/bidding/index.php. The manipulation of the argument page leads to file inclusion. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." | ||
} | ||
], | ||
"metrics": { | ||
"cvssMetricV40": [ | ||
{ | ||
"source": "[email protected]", | ||
"type": "Secondary", | ||
"cvssData": { | ||
"version": "4.0", | ||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", | ||
"attackVector": "NETWORK", | ||
"attackComplexity": "LOW", | ||
"attackRequirements": "NONE", | ||
"privilegesRequired": "LOW", | ||
"userInteraction": "NONE", | ||
"vulnerableSystemConfidentiality": "LOW", | ||
"vulnerableSystemIntegrity": "LOW", | ||
"vulnerableSystemAvailability": "LOW", | ||
"subsequentSystemConfidentiality": "NONE", | ||
"subsequentSystemIntegrity": "NONE", | ||
"subsequentSystemAvailability": "NONE", | ||
"exploitMaturity": "NOT_DEFINED", | ||
"confidentialityRequirements": "NOT_DEFINED", | ||
"integrityRequirements": "NOT_DEFINED", | ||
"availabilityRequirements": "NOT_DEFINED", | ||
"modifiedAttackVector": "NOT_DEFINED", | ||
"modifiedAttackComplexity": "NOT_DEFINED", | ||
"modifiedAttackRequirements": "NOT_DEFINED", | ||
"modifiedPrivilegesRequired": "NOT_DEFINED", | ||
"modifiedUserInteraction": "NOT_DEFINED", | ||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", | ||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED", | ||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED", | ||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", | ||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED", | ||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED", | ||
"safety": "NOT_DEFINED", | ||
"automatable": "NOT_DEFINED", | ||
"recovery": "NOT_DEFINED", | ||
"valueDensity": "NOT_DEFINED", | ||
"vulnerabilityResponseEffort": "NOT_DEFINED", | ||
"providerUrgency": "NOT_DEFINED", | ||
"baseScore": 5.3, | ||
"baseSeverity": "MEDIUM" | ||
} | ||
} | ||
], | ||
"cvssMetricV31": [ | ||
{ | ||
"source": "[email protected]", | ||
"type": "Secondary", | ||
"cvssData": { | ||
"version": "3.1", | ||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", | ||
"attackVector": "NETWORK", | ||
"attackComplexity": "LOW", | ||
"privilegesRequired": "LOW", | ||
"userInteraction": "NONE", | ||
"scope": "UNCHANGED", | ||
"confidentialityImpact": "LOW", | ||
"integrityImpact": "LOW", | ||
"availabilityImpact": "LOW", | ||
"baseScore": 6.3, | ||
"baseSeverity": "MEDIUM" | ||
}, | ||
"exploitabilityScore": 2.8, | ||
"impactScore": 3.4 | ||
} | ||
], | ||
"cvssMetricV2": [ | ||
{ | ||
"source": "[email protected]", | ||
"type": "Secondary", | ||
"cvssData": { | ||
"version": "2.0", | ||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", | ||
"accessVector": "NETWORK", | ||
"accessComplexity": "LOW", | ||
"authentication": "SINGLE", | ||
"confidentialityImpact": "PARTIAL", | ||
"integrityImpact": "PARTIAL", | ||
"availabilityImpact": "PARTIAL", | ||
"baseScore": 6.5 | ||
}, | ||
"baseSeverity": "MEDIUM", | ||
"exploitabilityScore": 8.0, | ||
"impactScore": 6.4, | ||
"acInsufInfo": false, | ||
"obtainAllPrivilege": false, | ||
"obtainUserPrivilege": false, | ||
"obtainOtherPrivilege": false, | ||
"userInteractionRequired": false | ||
} | ||
] | ||
}, | ||
"weaknesses": [ | ||
{ | ||
"source": "[email protected]", | ||
"type": "Primary", | ||
"description": [ | ||
{ | ||
"lang": "en", | ||
"value": "CWE-73" | ||
} | ||
] | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"url": "https://github.com/Wsstiger/cve/blob/main/simple_include.md", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "https://vuldb.com/?ctiid.275037", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "https://vuldb.com/?id.275037", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "https://vuldb.com/?submit.391657", | ||
"source": "[email protected]" | ||
} | ||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters