diff --git a/cve/2024/CVE-2024-53731.json b/cve/2024/CVE-2024-53731.json new file mode 100644 index 0000000000..a44ca8891a --- /dev/null +++ b/cve/2024/CVE-2024-53731.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-53731", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-28T12:15:17.107", "lastModified": "2024-11-28T12:15:17.107", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Fintelligence Fintelligence Calculator allows Stored XSS.This issue affects Fintelligence Calculator: from n/a through 1.0.3."}, {"lang": "es", "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Fintelligence Fintelligence Calculator permite XSS almacenado. Este problema afecta a Fintelligence Calculator: desde n/a hasta 1.0.3."}], "metrics": {"cvssMetricV31": [{"source": "audit@patchstack.com", "type": "Secondary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW"}, "exploitabilityScore": 2.3, "impactScore": 3.7}]}, "weaknesses": [{"source": "audit@patchstack.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-79"}]}], "references": [{"url": "https://patchstack.com/database/wordpress/plugin/fintelligence-calculator/vulnerability/wordpress-fintelligence-calculator-plugin-1-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve", "source": "audit@patchstack.com"}]}} \ No newline at end of file diff --git a/cve/2024/CVE-2024-7747.json b/cve/2024/CVE-2024-7747.json new file mode 100644 index 0000000000..5f452be923 --- /dev/null +++ b/cve/2024/CVE-2024-7747.json @@ -0,0 +1 @@ +{"cve": {"id": "CVE-2024-7747", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-28T13:15:21.843", "lastModified": "2024-11-28T13:15:21.843", "vulnStatus": "Received", "cveTags": [], "descriptions": [{"lang": "en", "value": "The Wallet for WooCommerce plugin for WordPress is vulnerable to incorrect conversion between numeric types in all versions up to, and including, 1.5.6. This is due to a numerical logic flaw when transferring funds to another user. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create funds during a transfer and distribute these funds to any number of other users or their own account, rendering products free. Attackers could also request to withdraw funds if the Wallet Withdrawal extension is used and the request is approved by an administrator."}], "metrics": {"cvssMetricV31": [{"source": "security@wordfence.com", "type": "Primary", "cvssData": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE"}, "exploitabilityScore": 2.8, "impactScore": 3.6}]}, "weaknesses": [{"source": "security@wordfence.com", "type": "Primary", "description": [{"lang": "en", "value": "CWE-681"}]}], "references": [{"url": "https://plugins.trac.wordpress.org/browser/woo-wallet/trunk/includes/class-woo-wallet-frontend.php#L407", "source": "security@wordfence.com"}, {"url": "https://plugins.trac.wordpress.org/changeset/3145131/", "source": "security@wordfence.com"}, {"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fd8f3eb7-ac60-46c4-b41f-5d89e3133042?source=cve", "source": "security@wordfence.com"}]}} \ No newline at end of file diff --git a/syncdate.json b/syncdate.json index 878ec5976e..1ce64aada2 100644 --- a/syncdate.json +++ b/syncdate.json @@ -1 +1 @@ -{"lastModStartDate": "2024-11-28T10:02:45.251562+00:00", "lastModEndDate": "2024-11-28T12:03:00.799047+00:00"} \ No newline at end of file +{"lastModStartDate": "2024-11-28T12:03:00.799047+00:00", "lastModEndDate": "2024-11-28T14:02:46.768694+00:00"} \ No newline at end of file