Skip to content

Commit

Permalink
Publish Advisories
Browse files Browse the repository at this point in the history
  • Loading branch information
advisory-database[bot] committed Dec 11, 2024
1 parent 6100ae0 commit 0b34ca5
Show file tree
Hide file tree
Showing 9 changed files with 318 additions and 1 deletion.
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"schema_version": "1.4.0",
"id": "GHSA-8g38-jgjc-p9jh",
"modified": "2024-10-14T15:30:45Z",
"modified": "2024-12-11T09:32:03Z",
"published": "2024-10-14T15:30:45Z",
"aliases": [
"CVE-2024-8602"
Expand All @@ -22,6 +22,10 @@
{
"type": "WEB",
"url": "https://esteuer.ewv-ete.ch/fileadmin/esta/2024-10-09-update/24_09_esta_newsletter_de.pdf"
},
{
"type": "WEB",
"url": "https://mkiesel.ch/posts/swiss-tax-adventures-1"
}
],
"database_specific": {
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
{
"schema_version": "1.4.0",
"id": "GHSA-3mq8-695h-7r35",
"modified": "2024-12-11T09:32:04Z",
"published": "2024-12-11T09:32:04Z",
"aliases": [
"CVE-2024-12283"
],
"details": "The WP Pipes plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘x1’ parameter in all versions up to, and including, 1.4.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
}
],
"affected": [],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12283"
},
{
"type": "WEB",
"url": "https://plugins.trac.wordpress.org/changeset/3204551"
},
{
"type": "WEB",
"url": "https://wordpress.org/plugins/wp-pipes/#developers"
},
{
"type": "WEB",
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3aa56fc7-8d48-4149-afa7-8f9885de0674?source=cve"
}
],
"database_specific": {
"cwe_ids": [
"CWE-79"
],
"severity": "MODERATE",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-12-11T09:15:05Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,36 @@
{
"schema_version": "1.4.0",
"id": "GHSA-86jp-9fvq-qr9r",
"modified": "2024-12-11T09:32:03Z",
"published": "2024-12-11T09:32:03Z",
"aliases": [
"CVE-2024-52537"
],
"details": "Dell Client Platform Firmware Update Utility contains an Improper Link Resolution vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"
}
],
"affected": [],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-52537"
},
{
"type": "WEB",
"url": "https://www.dell.com/support/kbdoc/en-us/000227591/dsa-2024-351"
}
],
"database_specific": {
"cwe_ids": [
"CWE-61"
],
"severity": "MODERATE",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-12-11T08:15:05Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,36 @@
{
"schema_version": "1.4.0",
"id": "GHSA-cxvp-2gqq-8958",
"modified": "2024-12-11T09:32:04Z",
"published": "2024-12-11T09:32:04Z",
"aliases": [
"CVE-2024-53292"
],
"details": "Dell VxVerify, versions prior to x.40.405, contain a Plain-text Password Storage Vulnerability in the shell wrapper. A local high privileged attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable component with privileges of the compromised account.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H"
}
],
"affected": [],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-53292"
},
{
"type": "WEB",
"url": "https://www.dell.com/support/kbdoc/en-us/000258964/dsa-2024-492-security-update-dell-vxverify-on-vxrail-plaintext-password-storage-vulnerabilities"
}
],
"database_specific": {
"cwe_ids": [
"CWE-256"
],
"severity": "HIGH",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-12-11T08:15:06Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,48 @@
{
"schema_version": "1.4.0",
"id": "GHSA-ff62-2g5m-w3f8",
"modified": "2024-12-11T09:32:04Z",
"published": "2024-12-11T09:32:04Z",
"aliases": [
"CVE-2024-12004"
],
"details": "The WPC Order Notes for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5.2. This is due to missing or incorrect nonce validation on the ajax_update_order_note() function. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
}
],
"affected": [],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12004"
},
{
"type": "WEB",
"url": "https://plugins.trac.wordpress.org/browser/woo-order-notes/trunk/wpc-order-notes.php#L416"
},
{
"type": "WEB",
"url": "https://plugins.trac.wordpress.org/changeset/3205072"
},
{
"type": "WEB",
"url": "https://wordpress.org/plugins/woo-order-notes/#developers"
},
{
"type": "WEB",
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/05f40082-30ed-45f7-81d5-d5334a51fcea?source=cve"
}
],
"database_specific": {
"cwe_ids": [
"CWE-352"
],
"severity": "MODERATE",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-12-11T09:15:05Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
{
"schema_version": "1.4.0",
"id": "GHSA-h288-5fq8-5pfw",
"modified": "2024-12-11T09:32:03Z",
"published": "2024-12-11T09:32:03Z",
"aliases": [
"CVE-2024-11053"
],
"details": "When asked to both use a `.netrc` file for credentials and to follow HTTP\nredirects, curl could leak the password used for the first host to the\nfollowed-to host under certain circumstances.\n\nThis flaw only manifests itself if the netrc file has an entry that matches\nthe redirect target hostname but the entry either omits just the password or\nomits both login and password.",
"severity": [],
"affected": [],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-11053"
},
{
"type": "WEB",
"url": "https://hackerone.com/reports/2829063"
},
{
"type": "WEB",
"url": "https://curl.se/docs/CVE-2024-11053.html"
},
{
"type": "WEB",
"url": "https://curl.se/docs/CVE-2024-11053.json"
}
],
"database_specific": {
"cwe_ids": [],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-12-11T08:15:05Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,36 @@
{
"schema_version": "1.4.0",
"id": "GHSA-rq4h-wrjf-38w8",
"modified": "2024-12-11T09:32:04Z",
"published": "2024-12-11T09:32:04Z",
"aliases": [
"CVE-2024-53290"
],
"details": "Dell ThinOS version 2408 contains an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Command execution",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"affected": [],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-53290"
},
{
"type": "WEB",
"url": "https://www.dell.com/support/kbdoc/en-us/000248475/dsa-2024-463"
}
],
"database_specific": {
"cwe_ids": [
"CWE-77"
],
"severity": "HIGH",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-12-11T08:15:06Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,36 @@
{
"schema_version": "1.4.0",
"id": "GHSA-wx23-5hwg-8p26",
"modified": "2024-12-11T09:32:03Z",
"published": "2024-12-11T09:32:03Z",
"aliases": [
"CVE-2024-53289"
],
"details": "Dell ThinOS version 2408 contains a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"affected": [],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-53289"
},
{
"type": "WEB",
"url": "https://www.dell.com/support/kbdoc/en-us/000248475/dsa-2024-463"
}
],
"database_specific": {
"cwe_ids": [
"CWE-367"
],
"severity": "HIGH",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-12-11T08:15:06Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,40 @@
{
"schema_version": "1.4.0",
"id": "GHSA-x424-8ch7-2p52",
"modified": "2024-12-11T09:32:04Z",
"published": "2024-12-11T09:32:04Z",
"aliases": [
"CVE-2024-10511"
],
"details": "CWE-287: Improper Authentication vulnerability exists that could cause Denial of access to the web interface\nwhen someone on the local network repeatedly requests the /accessdenied URL.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
}
],
"affected": [],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10511"
},
{
"type": "WEB",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-345-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-345-01.pdf"
}
],
"database_specific": {
"cwe_ids": [
"CWE-287"
],
"severity": "MODERATE",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-12-11T09:15:05Z"
}
}

0 comments on commit 0b34ca5

Please sign in to comment.