Skip to content

Commit

Permalink
generated content from 2024-11-24
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Nov 24, 2024
1 parent 5c0a710 commit 7f4d03d
Show file tree
Hide file tree
Showing 46 changed files with 1,035 additions and 0 deletions.
45 changes: 45 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -257671,3 +257671,48 @@ vulnerability,CVE-2023-52333,vulnerability--2406cfff-c53d-44e6-bf33-33d3c85ac45d
vulnerability,CVE-2023-52335,vulnerability--3f1c9f17-12df-4e47-827b-f77613197860
vulnerability,CVE-2023-52332,vulnerability--652c69d8-9ce5-47d0-b6b1-b28ebaa9ad65
vulnerability,CVE-2023-39470,vulnerability--2f0024b5-fd27-4e54-ad5f-f7bf11b6a466
vulnerability,CVE-2024-10874,vulnerability--d2c586c2-af91-41be-b8d9-7fcb94424149
vulnerability,CVE-2024-10880,vulnerability--8bc1c38e-89d9-4a0d-8c68-d64be86ace3d
vulnerability,CVE-2024-10873,vulnerability--e829d29c-1b59-48d0-a8b5-5fe052d20112
vulnerability,CVE-2024-10961,vulnerability--ab9bf4a9-efdd-4464-9681-1046d0e2e0ed
vulnerability,CVE-2024-10869,vulnerability--5e9500a1-8c40-42bf-9f19-b7e79e36411f
vulnerability,CVE-2024-10519,vulnerability--b8c9f36d-389a-4bed-b63e-416ca7a8ff8c
vulnerability,CVE-2024-10803,vulnerability--32513bb5-8e48-44cc-ab4b-63f6ebd82598
vulnerability,CVE-2024-10868,vulnerability--d863044f-1c9d-4f45-b525-55d83a9afee1
vulnerability,CVE-2024-10537,vulnerability--6f85d91e-cc34-485d-a226-6818c825fb58
vulnerability,CVE-2024-10216,vulnerability--ed4e12a0-903c-492a-8c6d-77d9bef6c0d6
vulnerability,CVE-2024-10886,vulnerability--444ad776-d9ad-46a3-99fb-b74886edbed5
vulnerability,CVE-2024-10606,vulnerability--c516f3f0-c373-45b2-8ce5-59aa6dc76b0e
vulnerability,CVE-2024-10116,vulnerability--e0cc1356-e0ca-480e-8e83-2b1a333ee44c
vulnerability,CVE-2024-10813,vulnerability--df9f10e4-da02-4e35-9d09-507945929407
vulnerability,CVE-2024-9660,vulnerability--fdaf3dc3-5ae1-4087-ad0f-eb84ec1123ff
vulnerability,CVE-2024-9941,vulnerability--aeb6a405-c911-435b-a812-88383a71b4e9
vulnerability,CVE-2024-9659,vulnerability--3b5d8341-5727-4cf3-ae55-f1bf2fe49704
vulnerability,CVE-2024-9511,vulnerability--e16b48cf-a49b-4b3c-bb3e-110a2e17ba94
vulnerability,CVE-2024-9635,vulnerability--fefeae7d-8a05-40d2-929d-4cd5b0bb171d
vulnerability,CVE-2024-9223,vulnerability--bf6341f2-7ce4-420e-be1f-da5d2fae248f
vulnerability,CVE-2024-9942,vulnerability--d7279ade-2258-4afa-9bbe-d2b8a7e696d0
vulnerability,CVE-2024-11426,vulnerability--931d7541-7575-4ebb-8540-75d9c6101f73
vulnerability,CVE-2024-11463,vulnerability--a5501ff3-059f-40df-8055-a900db92a084
vulnerability,CVE-2024-11332,vulnerability--a10878f3-9eca-4f81-84e1-9bdd5bcd64b2
vulnerability,CVE-2024-11199,vulnerability--a555dced-1f4b-4da3-a9f6-b3fc10040fe1
vulnerability,CVE-2024-11227,vulnerability--eeac7703-068a-4711-869d-7e8e0da2c66d
vulnerability,CVE-2024-11265,vulnerability--9fe66f17-f17e-4ad9-8d62-1ffef7117f2f
vulnerability,CVE-2024-11188,vulnerability--1d83d09d-d25a-40bd-9bcb-7a3f4b954b57
vulnerability,CVE-2024-11228,vulnerability--6f91dfff-ed03-48ee-a617-52f7ef5e385f
vulnerability,CVE-2024-11361,vulnerability--256ca746-e3f7-41bf-a5ad-4630cfd2bec0
vulnerability,CVE-2024-11231,vulnerability--1d2ceada-ca6a-4eb1-a783-77f97ffde25a
vulnerability,CVE-2024-11229,vulnerability--fe3df894-0f1f-4e82-b035-0ee9d518c8a7
vulnerability,CVE-2024-11631,vulnerability--042859b5-7b1a-4c2b-a9f0-67ea42a6b5ac
vulnerability,CVE-2024-11034,vulnerability--4b15dfe7-a4d6-46aa-9f03-350ac3ba7fa5
vulnerability,CVE-2024-11362,vulnerability--8b2038e6-3eba-4398-b67a-cfa94c8c9b06
vulnerability,CVE-2024-11415,vulnerability--17e350a9-d59e-403c-bb18-bbd7927516be
vulnerability,CVE-2024-11446,vulnerability--c83202ee-6b8d-4d82-8042-64a110e8e4ad
vulnerability,CVE-2024-11408,vulnerability--c19f651e-7e4f-42f7-aa55-e0ec7dc1468b
vulnerability,CVE-2024-11330,vulnerability--4b1d32ae-96a0-4a8c-bb5c-43e30669d820
vulnerability,CVE-2024-11387,vulnerability--cbe82879-639f-486b-9b25-1630fb53b9ee
vulnerability,CVE-2024-11586,vulnerability--e0829493-1636-4b4e-aa5b-8ea0124b2189
vulnerability,CVE-2024-11632,vulnerability--b6488871-884d-45bf-85ad-6bc82c244449
vulnerability,CVE-2024-41761,vulnerability--622b7f15-930f-48ab-939a-c8c2c9c429ee
vulnerability,CVE-2024-35160,vulnerability--647b2dbf-0720-497d-bfab-097ae6abaffc
vulnerability,CVE-2023-7299,vulnerability--24bd3d51-5c62-450d-84ed-ce298c1f2e84
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5b4777af-ff36-4008-8d1e-dee94a017570",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--042859b5-7b1a-4c2b-a9f0-67ea42a6b5ac",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-24T00:23:40.719766Z",
"modified": "2024-11-24T00:23:40.719766Z",
"name": "CVE-2024-11631",
"description": "A vulnerability was found in itsourcecode Tailoring Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /expedit.php. The manipulation of the argument expcat leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11631"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--8ed0c728-63b9-42be-99d6-9cbc5ef123df",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--17e350a9-d59e-403c-bb18-bbd7927516be",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-24T00:23:40.726508Z",
"modified": "2024-11-24T00:23:40.726508Z",
"name": "CVE-2024-11415",
"description": "The WP-Orphanage Extended plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2. This is due to missing or incorrect nonce validation on the wporphanageex_menu_settings() function. This makes it possible for unauthenticated attackers to escalate the privileges of all orphan accounts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11415"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d87caa85-ee0d-4767-88e0-a75d49ea3cd2",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1d2ceada-ca6a-4eb1-a783-77f97ffde25a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-24T00:23:40.715915Z",
"modified": "2024-11-24T00:23:40.715915Z",
"name": "CVE-2024-11231",
"description": "The 우커머스 네이버페이 plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's mnp_purchase shortcode in all versions up to, and including, 3.3.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11231"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5f9227d8-c5af-4c58-98c1-7f6d82ca6a5a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1d83d09d-d25a-40bd-9bcb-7a3f4b954b57",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-24T00:23:40.710673Z",
"modified": "2024-11-24T00:23:40.710673Z",
"name": "CVE-2024-11188",
"description": "The Formidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calculator Form & Custom Form Builder plugin for WordPress is vulnerable to POST-Based Reflected Cross-Site Scripting via the Custom HTML Form parameters in all versions up to, and including, 6.16.1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11188"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--0fedd441-2bce-4d16-a456-d309bb007664",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--24bd3d51-5c62-450d-84ed-ce298c1f2e84",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-24T00:23:50.273962Z",
"modified": "2024-11-24T00:23:50.273962Z",
"name": "CVE-2023-7299",
"description": "A vulnerability was found in DataGear up to 4.60. It has been declared as critical. This vulnerability affects unknown code of the file /dataSet/resolveSql. The manipulation of the argument sql leads to sql injection. The attack can be initiated remotely. Upgrading to version 4.7.0 is able to address this issue. It is recommended to upgrade the affected component.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-7299"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--1ba01e62-2723-40b0-9389-6d83f6aab697",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--256ca746-e3f7-41bf-a5ad-4630cfd2bec0",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-24T00:23:40.714459Z",
"modified": "2024-11-24T00:23:40.714459Z",
"name": "CVE-2024-11361",
"description": "The PDF Invoices & Packing Slips Generator for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.2.1. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11361"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--c7cdf79d-44b6-44f2-ba87-8aa83f669a00",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--32513bb5-8e48-44cc-ab4b-63f6ebd82598",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-24T00:23:40.232646Z",
"modified": "2024-11-24T00:23:40.232646Z",
"name": "CVE-2024-10803",
"description": "The MP3 Sticky Player plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 8.0 via the content/downloader.php file. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information. Please note the vendor released the patched version as the same version as the affected version.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10803"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--62695eea-4a6f-49dc-a099-92005618310b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--3b5d8341-5727-4cf3-ae55-f1bf2fe49704",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-24T00:23:40.288717Z",
"modified": "2024-11-24T00:23:40.288717Z",
"name": "CVE-2024-9659",
"description": "The School Management System for Wordpress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the mj_smgt_user_avatar_image_upload() function in all versions up to, and including, 91.5.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9659"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--0739bf8a-1957-49d9-9ad6-7b482ffd88e7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--444ad776-d9ad-46a3-99fb-b74886edbed5",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-24T00:23:40.261666Z",
"modified": "2024-11-24T00:23:40.261666Z",
"name": "CVE-2024-10886",
"description": "The Tribute Testimonials – WordPress Testimonial Grid/Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'tribute_testimonials_slider' shortcode in all versions up to, and including, 1.0.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10886"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--f3d99677-3c21-4823-ab6c-f00a0eeabb83",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--4b15dfe7-a4d6-46aa-9f03-350ac3ba7fa5",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-24T00:23:40.721208Z",
"modified": "2024-11-24T00:23:40.721208Z",
"name": "CVE-2024-11034",
"description": "The The Request a Quote for WooCommerce and Elementor – Get a Quote Button – Product Enquiry Form Popup – Product Quotation plugin for WordPress is vulnerable to arbitrary shortcode execution via fire_contact_form AJAX action in all versions up to, and including, 1.4. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11034"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6032125b-bf13-4944-b2b5-5f23d70c9f4a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--4b1d32ae-96a0-4a8c-bb5c-43e30669d820",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-24T00:23:40.735086Z",
"modified": "2024-11-24T00:23:40.735086Z",
"name": "CVE-2024-11330",
"description": "The Custom CSS, JS & PHP plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.3.0. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11330"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--78deccd9-be43-4c40-9b33-0ec1d1fef3c4",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--5e9500a1-8c40-42bf-9f19-b7e79e36411f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-24T00:23:40.22813Z",
"modified": "2024-11-24T00:23:40.22813Z",
"name": "CVE-2024-10869",
"description": "The WordPress Brute Force Protection – Stop Brute Force Attacks plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.2.6. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10869"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--fd11faea-0ba4-4373-9adc-d8d400e8951d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--622b7f15-930f-48ab-939a-c8c2c9c429ee",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-24T00:23:41.336693Z",
"modified": "2024-11-24T00:23:41.336693Z",
"name": "CVE-2024-41761",
"description": "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to a denial of service as the server may crash under certain conditions with a specially crafted query.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-41761"
}
]
}
]
}
Loading

0 comments on commit 7f4d03d

Please sign in to comment.