Skip to content

Commit

Permalink
🤖 NVD update at 2025-01-02T06:47:21+0000
Browse files Browse the repository at this point in the history
  • Loading branch information
eslerm committed Jan 2, 2025
1 parent 6676722 commit a1a83e1
Show file tree
Hide file tree
Showing 5 changed files with 187 additions and 0 deletions.
64 changes: 64 additions & 0 deletions 2002/CVE-2002-20002.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,64 @@
{
"id": "CVE-2002-20002",
"sourceIdentifier": "[email protected]",
"published": "2025-01-02T05:15:06.430",
"lastModified": "2025-01-02T05:15:06.430",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Net::EasyTCP package before 0.15 for Perl always uses Perl's builtin rand(), which is not a strong random number generator, for cryptographic keys."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "[email protected]",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "[email protected]",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-338"
}
]
}
],
"references": [
{
"url": "https://github.com/briandfoy/cpan-security-advisory/issues/184",
"source": "[email protected]"
},
{
"url": "https://metacpan.org/release/MNAGUIB/EasyTCP-0.15/view/EasyTCP.pm",
"source": "[email protected]"
},
{
"url": "https://metacpan.org/release/MNAGUIB/EasyTCP-0.26/changes",
"source": "[email protected]"
}
]
}
21 changes: 21 additions & 0 deletions 2024/CVE-2024-11184.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
{
"id": "CVE-2024-11184",
"sourceIdentifier": "[email protected]",
"published": "2025-01-02T06:15:06.697",
"lastModified": "2025-01-02T06:15:06.697",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The wp-enable-svg WordPress plugin through 0.7 does not sanitize SVG files when uploaded, allowing for authors and above to upload SVGs containing malicious scripts"
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/fc982bcb-9974-481f-aef4-580ae9edc3c8/",
"source": "[email protected]"
}
]
}
21 changes: 21 additions & 0 deletions 2024/CVE-2024-11357.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
{
"id": "CVE-2024-11357",
"sourceIdentifier": "[email protected]",
"published": "2025-01-02T06:15:07.887",
"lastModified": "2025-01-02T06:15:07.887",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The goodlayers-core WordPress plugin before 2.0.10 does not sanitise and escape some of its settings, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks."
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/7e8c6816-9b7a-43e8-9508-789c8051dd9b/",
"source": "[email protected]"
}
]
}
21 changes: 21 additions & 0 deletions 2024/CVE-2024-12595.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
{
"id": "CVE-2024-12595",
"sourceIdentifier": "[email protected]",
"published": "2025-01-02T06:15:07.983",
"lastModified": "2025-01-02T06:15:07.983",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The AHAthat Plugin WordPress plugin through 1.6 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers"
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/7a506438-3106-477f-816d-b9b116ec8555/",
"source": "[email protected]"
}
]
}
60 changes: 60 additions & 0 deletions 2024/CVE-2024-56830.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,60 @@
{
"id": "CVE-2024-56830",
"sourceIdentifier": "[email protected]",
"published": "2025-01-02T05:15:07.967",
"lastModified": "2025-01-02T05:15:07.967",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Net::EasyTCP package 0.15 through 0.26 for Perl uses Perl's builtin rand() if no strong randomization module is present."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "[email protected]",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "[email protected]",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-338"
}
]
}
],
"references": [
{
"url": "https://github.com/briandfoy/cpan-security-advisory/issues/184",
"source": "[email protected]"
},
{
"url": "https://metacpan.org/release/MNAGUIB/EasyTCP-0.26/changes",
"source": "[email protected]"
}
]
}

0 comments on commit a1a83e1

Please sign in to comment.