GHSA-5wrg-9r62-c97f
GHSA-j39v-xvqw-5q63
GHSA-j9gf-9w7p-ww7f
GHSA-rm86-h44c-2r2m
GHSA-x7jc-6q36-2744
This commit is contained in:
advisory-database[bot] 2024-07-24 06:32:39 +00:00
Родитель 28ad86300a
Коммит d9eeaf9cfc
5 изменённых файлов: 216 добавлений и 0 удалений

Просмотреть файл

@ -0,0 +1,35 @@
{
"schema_version": "1.4.0",
"id": "GHSA-5wrg-9r62-c97f",
"modified": "2024-07-24T06:31:10Z",
"published": "2024-07-24T06:31:10Z",
"aliases": [
"CVE-2024-6094"
],
"details": "The WP ULike WordPress plugin before 4.7.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).",
"severity": [
],
"affected": [
],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6094"
},
{
"type": "WEB",
"url": "https://wpscan.com/vulnerability/019b3f34-7b85-4728-8dd7-ca472d6b2d06"
}
],
"database_specific": {
"cwe_ids": [
],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-07-24T06:15:01Z"
}
}

Просмотреть файл

@ -0,0 +1,50 @@
{
"schema_version": "1.4.0",
"id": "GHSA-j39v-xvqw-5q63",
"modified": "2024-07-24T06:31:10Z",
"published": "2024-07-24T06:31:10Z",
"aliases": [
"CVE-2024-5861"
],
"details": "The WP EasyPay – Square for WordPress plugin for WordPress is vulnerable to unauthorized modification of datadue to a missing capability check on the wpep_square_disconnect() function in all versions up to, and including, 4.2.3. This makes it possible for unauthenticated attackers to disconnect square.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
}
],
"affected": [
],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-5861"
},
{
"type": "WEB",
"url": "https://plugins.trac.wordpress.org/browser/wp-easy-pay/trunk/modules/payments/square-authorization.php#L199"
},
{
"type": "WEB",
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3106655%40wp-easy-pay&new=3106655%40wp-easy-pay&sfp_email=&sfph_mail=#file1"
},
{
"type": "WEB",
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3122946%40wp-easy-pay&new=3122946%40wp-easy-pay&sfp_email=&sfph_mail="
},
{
"type": "WEB",
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/446d458e-8b42-434e-a190-0af37a7d3afb?source=cve"
}
],
"database_specific": {
"cwe_ids": [
"CWE-862"
],
"severity": "MODERATE",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-07-24T04:15:04Z"
}
}

Просмотреть файл

@ -0,0 +1,46 @@
{
"schema_version": "1.4.0",
"id": "GHSA-j9gf-9w7p-ww7f",
"modified": "2024-07-24T06:31:10Z",
"published": "2024-07-24T06:31:10Z",
"aliases": [
"CVE-2024-6836"
],
"details": "The Funnel Builder for WordPress by FunnelKit – Customize WooCommerce Checkout Pages, Create Sales Funnels, Order Bumps & One Click Upsells plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on multiple functions in all versions up to, and including, 3.4.6. This makes it possible for authenticated attackers, with Contributor-level access and above, to update multiple settings, including templates, designs, checkouts, and other plugin settings.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
}
],
"affected": [
],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6836"
},
{
"type": "WEB",
"url": "https://plugins.trac.wordpress.org/browser/funnel-builder/trunk/modules/checkouts/includes/class-wfacp-ajax-controller.php"
},
{
"type": "WEB",
"url": "https://plugins.trac.wordpress.org/changeset/3123202"
},
{
"type": "WEB",
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d9022afe-0c79-413b-ac0a-a1d32ec09619?source=cve"
}
],
"database_specific": {
"cwe_ids": [
"CWE-862"
],
"severity": "MODERATE",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-07-24T06:15:02Z"
}
}

Просмотреть файл

@ -0,0 +1,43 @@
{
"schema_version": "1.4.0",
"id": "GHSA-rm86-h44c-2r2m",
"modified": "2024-07-24T06:31:10Z",
"published": "2024-07-24T06:31:10Z",
"aliases": [
"CVE-2024-40767"
],
"details": "In OpenStack Nova before 27.4.1, 28 before 28.2.1, and 29 before 29.1.1, by supplying a raw format image that is actually a crafted QCOW2 image with a backing file path or VMDK flat image with a descriptor file path, an authenticated user may convince systems to return a copy of the referenced file's contents from the server, resulting in unauthorized access to potentially sensitive data. All Nova deployments are affected. NOTE: this issue exists because of an incomplete fix for CVE-2022-47951 and CVE-2024-32498.",
"severity": [
],
"affected": [
],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40767"
},
{
"type": "WEB",
"url": "https://launchpad.net/bugs/2071734"
},
{
"type": "WEB",
"url": "https://security.openstack.org"
},
{
"type": "WEB",
"url": "https://www.openwall.com/lists/oss-security/2024/07/23/2"
}
],
"database_specific": {
"cwe_ids": [
],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-07-24T05:15:12Z"
}
}

Просмотреть файл

@ -0,0 +1,42 @@
{
"schema_version": "1.4.0",
"id": "GHSA-x7jc-6q36-2744",
"modified": "2024-07-24T06:31:10Z",
"published": "2024-07-24T06:31:10Z",
"aliases": [
"CVE-2024-3246"
],
"details": "The LiteSpeed Cache plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 6.2.0.1. This is due to missing or incorrect nonce validation. This makes it possible for unauthenticated attackers to update the token setting and inject malicious JavaScript via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
}
],
"affected": [
],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3246"
},
{
"type": "WEB",
"url": "https://plugins.trac.wordpress.org/changeset/3123399/litespeed-cache/trunk/src/cloud.cls.php"
},
{
"type": "WEB",
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8036bd83-9af5-4b71-8974-9b0690ea6769?source=cve"
}
],
"database_specific": {
"cwe_ids": [
"CWE-352"
],
"severity": "MODERATE",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-07-24T04:15:04Z"
}
}