diff --git a/cves/2024/55xxx/CVE-2024-55897.json b/cves/2024/55xxx/CVE-2024-55897.json index 7a5d8513049a..21335e91abf6 100644 --- a/cves/2024/55xxx/CVE-2024-55897.json +++ b/cves/2024/55xxx/CVE-2024-55897.json @@ -8,7 +8,7 @@ "assignerShortName": "ibm", "dateReserved": "2024-12-12T18:07:11.452Z", "datePublished": "2025-01-03T22:28:38.502Z", - "dateUpdated": "2025-01-03T22:28:38.502Z" + "dateUpdated": "2025-01-04T01:20:17.071Z" }, "containers": { "cna": { @@ -76,7 +76,7 @@ "providerMetadata": { "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm", - "dateUpdated": "2025-01-03T22:28:38.502Z" + "dateUpdated": "2025-01-04T01:20:17.071Z" }, "references": [ { diff --git a/cves/2024/8xxx/CVE-2024-8066.json b/cves/2024/8xxx/CVE-2024-8066.json index a954b17f5d35..1340ba452cb9 100644 --- a/cves/2024/8xxx/CVE-2024-8066.json +++ b/cves/2024/8xxx/CVE-2024-8066.json @@ -8,14 +8,14 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-08-21T22:44:39.513Z", "datePublished": "2024-11-28T08:47:31.273Z", - "dateUpdated": "2024-11-29T15:29:55.300Z" + "dateUpdated": "2025-01-04T01:01:54.035Z" }, "containers": { "cna": { "providerMetadata": { "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence", - "dateUpdated": "2024-11-28T08:47:31.273Z" + "dateUpdated": "2025-01-04T01:01:54.035Z" }, "affected": [ { @@ -25,7 +25,7 @@ { "version": "*", "status": "affected", - "lessThanOrEqual": "1.8.4", + "lessThanOrEqual": "1.8.6", "versionType": "semver" } ], @@ -35,10 +35,10 @@ "descriptions": [ { "lang": "en", - "value": "The File Manager Pro – Filester plugin for WordPress is vulnerable to arbitrary file uploads due to missing validation in the 'fsConnector' function in all versions up to, and including, 1.8.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, and granted permissions by an Administrator, to upload a new .htaccess file allowing them to subsequently upload arbitrary files on the affected site's server which may make remote code execution possible." + "value": "The File Manager Pro – Filester plugin for WordPress is vulnerable to arbitrary file uploads due to missing validation in the 'fsConnector' function in all versions up to, and including, 1.8.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, and granted permissions by an Administrator, to upload a new .htaccess file allowing them to subsequently upload arbitrary files on the affected site's server which may make remote code execution possible." } ], - "title": "File Manager Pro – Filester <= 1.8.4 - Authenticated (Subscriber+) Arbitrary File Upload", + "title": "File Manager Pro – Filester <= 1.8.6- Authenticated (Subscriber+) Arbitrary File Upload", "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/27288836-e5d3-49fc-b1f6-319ea3b70839?source=cve" diff --git a/cves/delta.json b/cves/delta.json index c3d67f90ae98..c529b4309d9d 100644 --- a/cves/delta.json +++ b/cves/delta.json @@ -1,19 +1,19 @@ { - "fetchTime": "2025-01-03T23:51:20.923Z", + "fetchTime": "2025-01-04T01:31:43.100Z", "numberOfChanges": 2, "new": [], "updated": [ { - "cveId": "CVE-2022-38156", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-38156", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/38xxx/CVE-2022-38156.json", - "dateUpdated": "2025-01-03T23:48:51.671Z" + "cveId": "CVE-2024-55897", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-55897", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/55xxx/CVE-2024-55897.json", + "dateUpdated": "2025-01-04T01:20:17.071Z" }, { - "cveId": "CVE-2023-32221", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-32221", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/32xxx/CVE-2023-32221.json", - "dateUpdated": "2025-01-03T23:46:12.395Z" + "cveId": "CVE-2024-8066", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-8066", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/8xxx/CVE-2024-8066.json", + "dateUpdated": "2025-01-04T01:01:54.035Z" } ], "error": [] diff --git a/cves/deltaLog.json b/cves/deltaLog.json index cef522ede521..df0fbfe18c5f 100644 --- a/cves/deltaLog.json +++ b/cves/deltaLog.json @@ -1,4 +1,24 @@ [ + { + "fetchTime": "2025-01-04T01:31:43.100Z", + "numberOfChanges": 2, + "new": [], + "updated": [ + { + "cveId": "CVE-2024-55897", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-55897", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/55xxx/CVE-2024-55897.json", + "dateUpdated": "2025-01-04T01:20:17.071Z" + }, + { + "cveId": "CVE-2024-8066", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-8066", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/8xxx/CVE-2024-8066.json", + "dateUpdated": "2025-01-04T01:01:54.035Z" + } + ], + "error": [] + }, { "fetchTime": "2025-01-03T23:51:20.923Z", "numberOfChanges": 2, @@ -121883,25 +121903,5 @@ ], "updated": [], "error": [] - }, - { - "fetchTime": "2024-12-05T00:27:29.741Z", - "numberOfChanges": 2, - "new": [ - { - "cveId": "CVE-2024-12187", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-12187", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/12xxx/CVE-2024-12187.json", - "dateUpdated": "2024-12-05T00:00:16.351Z" - }, - { - "cveId": "CVE-2024-12188", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-12188", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/12xxx/CVE-2024-12188.json", - "dateUpdated": "2024-12-05T00:00:18.278Z" - } - ], - "updated": [], - "error": [] } ] \ No newline at end of file