Skip to content

Commit da9601d

Browse files
committed
Auto-Update: 2026-02-28T07:00:11.497285+00:00
1 parent 7d4c310 commit da9601d

File tree

3 files changed

+48
-44
lines changed

3 files changed

+48
-44
lines changed
Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
{
2+
"id": "CVE-2026-1542",
3+
"sourceIdentifier": "contact@wpscan.com",
4+
"published": "2026-02-28T06:16:02.080",
5+
"lastModified": "2026-02-28T06:16:02.080",
6+
"vulnStatus": "Received",
7+
"cveTags": [],
8+
"descriptions": [
9+
{
10+
"lang": "en",
11+
"value": "The Super Stage WP WordPress plugin through 1.0.1 unserializes user input via REQUEST, which could allow unauthenticated users to perform PHP Object Injection when a suitable gadget is present on the blog."
12+
}
13+
],
14+
"metrics": {},
15+
"references": [
16+
{
17+
"url": "https://wpscan.com/vulnerability/d6e3041f-62e8-49ba-8806-59a1c07ec43d/",
18+
"source": "contact@wpscan.com"
19+
}
20+
]
21+
}

README.md

Lines changed: 7 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
1313
### Last Repository Update
1414

1515
```plain
16-
2026-02-28T05:00:11.841943+00:00
16+
2026-02-28T07:00:11.497285+00:00
1717
```
1818

1919
### Most recent CVE Modification Timestamp synchronized with NVD
2020

2121
```plain
22-
2026-02-28T04:16:19.447000+00:00
22+
2026-02-28T06:16:02.080000+00:00
2323
```
2424

2525
### Last Data Feed Release
@@ -33,38 +33,20 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
3333
### Total Number of included CVEs
3434

3535
```plain
36-
335213
36+
335214
3737
```
3838

3939
### CVEs added in the last Commit
4040

41-
Recently added CVEs: `0`
41+
Recently added CVEs: `1`
4242

43+
- [CVE-2026-1542](CVE-2026/CVE-2026-15xx/CVE-2026-1542.json) (`2026-02-28T06:16:02.080`)
4344

4445

4546
### CVEs modified in the last Commit
4647

47-
Recently modified CVEs: `19`
48-
49-
- [CVE-2024-26480](CVE-2024/CVE-2024-264xx/CVE-2024-26480.json) (`2026-02-28T04:16:16.357`)
50-
- [CVE-2025-65887](CVE-2025/CVE-2025-658xx/CVE-2025-65887.json) (`2026-02-28T04:16:17.103`)
51-
- [CVE-2025-6591](CVE-2025/CVE-2025-65xx/CVE-2025-6591.json) (`2026-02-28T04:16:17.870`)
52-
- [CVE-2025-66374](CVE-2025/CVE-2025-663xx/CVE-2025-66374.json) (`2026-02-28T04:16:17.283`)
53-
- [CVE-2025-69421](CVE-2025/CVE-2025-694xx/CVE-2025-69421.json) (`2026-02-28T04:16:17.457`)
54-
- [CVE-2025-69971](CVE-2025/CVE-2025-699xx/CVE-2025-69971.json) (`2026-02-28T04:16:17.690`)
55-
- [CVE-2026-2762](CVE-2026/CVE-2026-27xx/CVE-2026-2762.json) (`2026-02-28T03:16:03.350`)
56-
- [CVE-2026-2763](CVE-2026/CVE-2026-27xx/CVE-2026-2763.json) (`2026-02-28T03:16:03.627`)
57-
- [CVE-2026-2764](CVE-2026/CVE-2026-27xx/CVE-2026-2764.json) (`2026-02-28T03:16:03.823`)
58-
- [CVE-2026-2765](CVE-2026/CVE-2026-27xx/CVE-2026-2765.json) (`2026-02-28T03:16:04.023`)
59-
- [CVE-2026-2766](CVE-2026/CVE-2026-27xx/CVE-2026-2766.json) (`2026-02-28T03:16:04.233`)
60-
- [CVE-2026-2773](CVE-2026/CVE-2026-27xx/CVE-2026-2773.json) (`2026-02-28T03:16:04.443`)
61-
- [CVE-2026-2775](CVE-2026/CVE-2026-27xx/CVE-2026-2775.json) (`2026-02-28T04:16:18.283`)
62-
- [CVE-2026-2776](CVE-2026/CVE-2026-27xx/CVE-2026-2776.json) (`2026-02-28T04:16:18.490`)
63-
- [CVE-2026-2778](CVE-2026/CVE-2026-27xx/CVE-2026-2778.json) (`2026-02-28T04:16:18.683`)
64-
- [CVE-2026-2779](CVE-2026/CVE-2026-27xx/CVE-2026-2779.json) (`2026-02-28T04:16:18.877`)
65-
- [CVE-2026-2784](CVE-2026/CVE-2026-27xx/CVE-2026-2784.json) (`2026-02-28T04:16:19.063`)
66-
- [CVE-2026-2788](CVE-2026/CVE-2026-27xx/CVE-2026-2788.json) (`2026-02-28T04:16:19.250`)
67-
- [CVE-2026-2791](CVE-2026/CVE-2026-27xx/CVE-2026-2791.json) (`2026-02-28T04:16:19.447`)
48+
Recently modified CVEs: `0`
49+
6850

6951

7052
## Download and Usage

0 commit comments

Comments
 (0)