Skip to content

Commit ddca8bc

Browse files
committed
Auto-Update: 2026-02-26T07:00:12.873020+00:00
1 parent 883aefc commit ddca8bc

File tree

5 files changed

+304
-46
lines changed

5 files changed

+304
-46
lines changed
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
{
2+
"id": "CVE-2026-1311",
3+
"sourceIdentifier": "security@wordfence.com",
4+
"published": "2026-02-26T05:17:41.933",
5+
"lastModified": "2026-02-26T05:17:41.933",
6+
"vulnStatus": "Received",
7+
"cveTags": [],
8+
"descriptions": [
9+
{
10+
"lang": "en",
11+
"value": "The Worry Proof Backup plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 0.2.4 via the backup upload functionality. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload a malicious ZIP archive with path traversal sequences to write arbitrary files anywhere on the server, including executable PHP files. This can lead to remote code execution."
12+
}
13+
],
14+
"metrics": {
15+
"cvssMetricV31": [
16+
{
17+
"source": "security@wordfence.com",
18+
"type": "Primary",
19+
"cvssData": {
20+
"version": "3.1",
21+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
22+
"baseScore": 8.8,
23+
"baseSeverity": "HIGH",
24+
"attackVector": "NETWORK",
25+
"attackComplexity": "LOW",
26+
"privilegesRequired": "LOW",
27+
"userInteraction": "NONE",
28+
"scope": "UNCHANGED",
29+
"confidentialityImpact": "HIGH",
30+
"integrityImpact": "HIGH",
31+
"availabilityImpact": "HIGH"
32+
},
33+
"exploitabilityScore": 2.8,
34+
"impactScore": 5.9
35+
}
36+
]
37+
},
38+
"weaknesses": [
39+
{
40+
"source": "security@wordfence.com",
41+
"type": "Primary",
42+
"description": [
43+
{
44+
"lang": "en",
45+
"value": "CWE-22"
46+
}
47+
]
48+
}
49+
],
50+
"references": [
51+
{
52+
"url": "https://plugins.trac.wordpress.org/browser/worry-proof-backup/tags/0.2.4/inc/libs/upload-backup.php#L97",
53+
"source": "security@wordfence.com"
54+
},
55+
{
56+
"url": "https://plugins.trac.wordpress.org/browser/worry-proof-backup/trunk/inc/libs/upload-backup.php#L97",
57+
"source": "security@wordfence.com"
58+
},
59+
{
60+
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3ffd6ce0-2536-43a5-9925-438bc653d0e5?source=cve",
61+
"source": "security@wordfence.com"
62+
}
63+
]
64+
}
Lines changed: 104 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,104 @@
1+
{
2+
"id": "CVE-2026-23703",
3+
"sourceIdentifier": "vultures@jpcert.or.jp",
4+
"published": "2026-02-26T06:17:15.893",
5+
"lastModified": "2026-02-26T06:17:15.893",
6+
"vulnStatus": "Received",
7+
"cveTags": [],
8+
"descriptions": [
9+
{
10+
"lang": "en",
11+
"value": "The installer of FinalCode Client provided by Digital Arts Inc. contains an incorrect default permissions vulnerability. A non-administrative user may execute arbitrary code with SYSTEM privilege."
12+
}
13+
],
14+
"metrics": {
15+
"cvssMetricV40": [
16+
{
17+
"source": "vultures@jpcert.or.jp",
18+
"type": "Secondary",
19+
"cvssData": {
20+
"version": "4.0",
21+
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
22+
"baseScore": 8.5,
23+
"baseSeverity": "HIGH",
24+
"attackVector": "LOCAL",
25+
"attackComplexity": "LOW",
26+
"attackRequirements": "NONE",
27+
"privilegesRequired": "LOW",
28+
"userInteraction": "NONE",
29+
"vulnConfidentialityImpact": "HIGH",
30+
"vulnIntegrityImpact": "HIGH",
31+
"vulnAvailabilityImpact": "HIGH",
32+
"subConfidentialityImpact": "NONE",
33+
"subIntegrityImpact": "NONE",
34+
"subAvailabilityImpact": "NONE",
35+
"exploitMaturity": "NOT_DEFINED",
36+
"confidentialityRequirement": "NOT_DEFINED",
37+
"integrityRequirement": "NOT_DEFINED",
38+
"availabilityRequirement": "NOT_DEFINED",
39+
"modifiedAttackVector": "NOT_DEFINED",
40+
"modifiedAttackComplexity": "NOT_DEFINED",
41+
"modifiedAttackRequirements": "NOT_DEFINED",
42+
"modifiedPrivilegesRequired": "NOT_DEFINED",
43+
"modifiedUserInteraction": "NOT_DEFINED",
44+
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
45+
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
46+
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
47+
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
48+
"modifiedSubIntegrityImpact": "NOT_DEFINED",
49+
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
50+
"Safety": "NOT_DEFINED",
51+
"Automatable": "NOT_DEFINED",
52+
"Recovery": "NOT_DEFINED",
53+
"valueDensity": "NOT_DEFINED",
54+
"vulnerabilityResponseEffort": "NOT_DEFINED",
55+
"providerUrgency": "NOT_DEFINED"
56+
}
57+
}
58+
],
59+
"cvssMetricV30": [
60+
{
61+
"source": "vultures@jpcert.or.jp",
62+
"type": "Secondary",
63+
"cvssData": {
64+
"version": "3.0",
65+
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
66+
"baseScore": 7.8,
67+
"baseSeverity": "HIGH",
68+
"attackVector": "LOCAL",
69+
"attackComplexity": "LOW",
70+
"privilegesRequired": "LOW",
71+
"userInteraction": "NONE",
72+
"scope": "UNCHANGED",
73+
"confidentialityImpact": "HIGH",
74+
"integrityImpact": "HIGH",
75+
"availabilityImpact": "HIGH"
76+
},
77+
"exploitabilityScore": 1.8,
78+
"impactScore": 5.9
79+
}
80+
]
81+
},
82+
"weaknesses": [
83+
{
84+
"source": "vultures@jpcert.or.jp",
85+
"type": "Primary",
86+
"description": [
87+
{
88+
"lang": "en",
89+
"value": "CWE-276"
90+
}
91+
]
92+
}
93+
],
94+
"references": [
95+
{
96+
"url": "https://jvn.jp/en/jp/JVN48498976/",
97+
"source": "vultures@jpcert.or.jp"
98+
},
99+
{
100+
"url": "https://www.daj.jp/shared/php/downloadset/c/parts.php?page=dl&filename=information_20260226_01.pdf",
101+
"source": "vultures@jpcert.or.jp"
102+
}
103+
]
104+
}
Lines changed: 104 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,104 @@
1+
{
2+
"id": "CVE-2026-25191",
3+
"sourceIdentifier": "vultures@jpcert.or.jp",
4+
"published": "2026-02-26T06:17:16.200",
5+
"lastModified": "2026-02-26T06:17:16.200",
6+
"vulnStatus": "Received",
7+
"cveTags": [],
8+
"descriptions": [
9+
{
10+
"lang": "en",
11+
"value": "The installer of FinalCode Client provided by Digital Arts Inc. contains an issue with the DLL search path. If a user is directed to place a malicious DLL file and the installer to the same directory and execute the installer, arbitrary code may be executed with the installer's execution privilege."
12+
}
13+
],
14+
"metrics": {
15+
"cvssMetricV40": [
16+
{
17+
"source": "vultures@jpcert.or.jp",
18+
"type": "Secondary",
19+
"cvssData": {
20+
"version": "4.0",
21+
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
22+
"baseScore": 8.4,
23+
"baseSeverity": "HIGH",
24+
"attackVector": "LOCAL",
25+
"attackComplexity": "LOW",
26+
"attackRequirements": "NONE",
27+
"privilegesRequired": "NONE",
28+
"userInteraction": "ACTIVE",
29+
"vulnConfidentialityImpact": "HIGH",
30+
"vulnIntegrityImpact": "HIGH",
31+
"vulnAvailabilityImpact": "HIGH",
32+
"subConfidentialityImpact": "NONE",
33+
"subIntegrityImpact": "NONE",
34+
"subAvailabilityImpact": "NONE",
35+
"exploitMaturity": "NOT_DEFINED",
36+
"confidentialityRequirement": "NOT_DEFINED",
37+
"integrityRequirement": "NOT_DEFINED",
38+
"availabilityRequirement": "NOT_DEFINED",
39+
"modifiedAttackVector": "NOT_DEFINED",
40+
"modifiedAttackComplexity": "NOT_DEFINED",
41+
"modifiedAttackRequirements": "NOT_DEFINED",
42+
"modifiedPrivilegesRequired": "NOT_DEFINED",
43+
"modifiedUserInteraction": "NOT_DEFINED",
44+
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
45+
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
46+
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
47+
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
48+
"modifiedSubIntegrityImpact": "NOT_DEFINED",
49+
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
50+
"Safety": "NOT_DEFINED",
51+
"Automatable": "NOT_DEFINED",
52+
"Recovery": "NOT_DEFINED",
53+
"valueDensity": "NOT_DEFINED",
54+
"vulnerabilityResponseEffort": "NOT_DEFINED",
55+
"providerUrgency": "NOT_DEFINED"
56+
}
57+
}
58+
],
59+
"cvssMetricV30": [
60+
{
61+
"source": "vultures@jpcert.or.jp",
62+
"type": "Secondary",
63+
"cvssData": {
64+
"version": "3.0",
65+
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
66+
"baseScore": 7.8,
67+
"baseSeverity": "HIGH",
68+
"attackVector": "LOCAL",
69+
"attackComplexity": "LOW",
70+
"privilegesRequired": "NONE",
71+
"userInteraction": "REQUIRED",
72+
"scope": "UNCHANGED",
73+
"confidentialityImpact": "HIGH",
74+
"integrityImpact": "HIGH",
75+
"availabilityImpact": "HIGH"
76+
},
77+
"exploitabilityScore": 1.8,
78+
"impactScore": 5.9
79+
}
80+
]
81+
},
82+
"weaknesses": [
83+
{
84+
"source": "vultures@jpcert.or.jp",
85+
"type": "Primary",
86+
"description": [
87+
{
88+
"lang": "en",
89+
"value": "CWE-427"
90+
}
91+
]
92+
}
93+
],
94+
"references": [
95+
{
96+
"url": "https://jvn.jp/en/jp/JVN48498976/",
97+
"source": "vultures@jpcert.or.jp"
98+
},
99+
{
100+
"url": "https://www.daj.jp/shared/php/downloadset/c/parts.php?page=dl&filename=information_20260226_01.pdf",
101+
"source": "vultures@jpcert.or.jp"
102+
}
103+
]
104+
}

README.md

Lines changed: 9 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
1313
### Last Repository Update
1414

1515
```plain
16-
2026-02-26T05:00:12.424657+00:00
16+
2026-02-26T07:00:12.873020+00:00
1717
```
1818

1919
### Most recent CVE Modification Timestamp synchronized with NVD
2020

2121
```plain
22-
2026-02-26T03:16:05.293000+00:00
22+
2026-02-26T06:17:16.200000+00:00
2323
```
2424

2525
### Last Data Feed Release
@@ -33,39 +33,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
3333
### Total Number of included CVEs
3434

3535
```plain
36-
334896
36+
334899
3737
```
3838

3939
### CVEs added in the last Commit
4040

41-
Recently added CVEs: `9`
41+
Recently added CVEs: `3`
4242

43-
- [CVE-2026-1779](CVE-2026/CVE-2026-17xx/CVE-2026-1779.json) (`2026-02-26T03:16:03.827`)
44-
- [CVE-2026-2356](CVE-2026/CVE-2026-23xx/CVE-2026-2356.json) (`2026-02-26T03:16:05.293`)
45-
- [CVE-2026-23999](CVE-2026/CVE-2026-239xx/CVE-2026-23999.json) (`2026-02-26T03:16:04.010`)
46-
- [CVE-2026-24004](CVE-2026/CVE-2026-240xx/CVE-2026-24004.json) (`2026-02-26T03:16:04.183`)
47-
- [CVE-2026-25963](CVE-2026/CVE-2026-259xx/CVE-2026-25963.json) (`2026-02-26T03:16:04.350`)
48-
- [CVE-2026-27465](CVE-2026/CVE-2026-274xx/CVE-2026-27465.json) (`2026-02-26T03:16:04.520`)
49-
- [CVE-2026-27963](CVE-2026/CVE-2026-279xx/CVE-2026-27963.json) (`2026-02-26T03:16:04.687`)
50-
- [CVE-2026-27974](CVE-2026/CVE-2026-279xx/CVE-2026-27974.json) (`2026-02-26T03:16:04.970`)
51-
- [CVE-2026-27975](CVE-2026/CVE-2026-279xx/CVE-2026-27975.json) (`2026-02-26T03:16:05.130`)
43+
- [CVE-2026-1311](CVE-2026/CVE-2026-13xx/CVE-2026-1311.json) (`2026-02-26T05:17:41.933`)
44+
- [CVE-2026-23703](CVE-2026/CVE-2026-237xx/CVE-2026-23703.json) (`2026-02-26T06:17:15.893`)
45+
- [CVE-2026-25191](CVE-2026/CVE-2026-251xx/CVE-2026-25191.json) (`2026-02-26T06:17:16.200`)
5246

5347

5448
### CVEs modified in the last Commit
5549

56-
Recently modified CVEs: `11`
57-
58-
- [CVE-2025-15563](CVE-2025/CVE-2025-155xx/CVE-2025-15563.json) (`2026-02-26T03:01:05.477`)
59-
- [CVE-2025-15582](CVE-2025/CVE-2025-155xx/CVE-2025-15582.json) (`2026-02-26T03:09:26.733`)
60-
- [CVE-2025-15583](CVE-2025/CVE-2025-155xx/CVE-2025-15583.json) (`2026-02-26T03:09:55.007`)
61-
- [CVE-2025-70327](CVE-2025/CVE-2025-703xx/CVE-2025-70327.json) (`2026-02-26T03:06:04.013`)
62-
- [CVE-2025-70328](CVE-2025/CVE-2025-703xx/CVE-2025-70328.json) (`2026-02-26T03:06:13.490`)
63-
- [CVE-2026-24443](CVE-2026/CVE-2026-244xx/CVE-2026-24443.json) (`2026-02-26T03:00:27.553`)
64-
- [CVE-2026-27741](CVE-2026/CVE-2026-277xx/CVE-2026-27741.json) (`2026-02-26T03:03:26.457`)
65-
- [CVE-2026-27742](CVE-2026/CVE-2026-277xx/CVE-2026-27742.json) (`2026-02-26T03:04:02.447`)
66-
- [CVE-2026-27973](CVE-2026/CVE-2026-279xx/CVE-2026-27973.json) (`2026-02-26T03:16:04.850`)
67-
- [CVE-2026-2861](CVE-2026/CVE-2026-28xx/CVE-2026-2861.json) (`2026-02-26T03:07:08.633`)
68-
- [CVE-2026-3028](CVE-2026/CVE-2026-30xx/CVE-2026-3028.json) (`2026-02-26T03:05:29.523`)
50+
Recently modified CVEs: `0`
51+
6952

7053

7154
## Download and Usage

0 commit comments

Comments
 (0)