Skip to content

Commit

Permalink
generated content from 2024-11-17
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Nov 17, 2024
1 parent 54b4e32 commit 91bab8f
Show file tree
Hide file tree
Showing 51 changed files with 1,150 additions and 0 deletions.
50 changes: 50 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -256430,3 +256430,53 @@ vulnerability,CVE-2023-2332,vulnerability--f0069ffc-7767-47b8-b38e-fb146715b7de
vulnerability,CVE-2023-0737,vulnerability--5b13e5ca-40d3-4d03-bc8d-42dd656bea02
vulnerability,CVE-2023-0109,vulnerability--0f185454-fe2e-4d2a-84de-6741f9d1a392
vulnerability,CVE-2023-4679,vulnerability--d7a85643-5e8f-42dd-98e8-f4e1245d2689
vulnerability,CVE-2024-52408,vulnerability--90b3fb4c-3983-4570-8da9-c37d2c9daad8
vulnerability,CVE-2024-52405,vulnerability--7bf2f4c3-5f6b-49e1-acaf-938f4a8b13e6
vulnerability,CVE-2024-52403,vulnerability--106f12d6-b85b-479c-bddd-a4031e802d1c
vulnerability,CVE-2024-52409,vulnerability--508fb4d1-627c-4145-a5d7-cb11e7890ddb
vulnerability,CVE-2024-52406,vulnerability--05ab03c5-bc36-47f3-aa47-52a843151007
vulnerability,CVE-2024-52399,vulnerability--7440e82a-7602-4121-b8e7-3039baf95789
vulnerability,CVE-2024-52400,vulnerability--bd141df9-1f28-4e0b-a88e-d448903c6853
vulnerability,CVE-2024-52410,vulnerability--1a47febd-8d81-4199-8317-b0e0e07eea70
vulnerability,CVE-2024-52397,vulnerability--63673306-1f1d-4f33-a419-d0967452c633
vulnerability,CVE-2024-52404,vulnerability--1f68fbe8-bfd0-4a3b-b344-e8b89748ecf8
vulnerability,CVE-2024-52412,vulnerability--b292634e-7ee2-471e-a29c-0047ee22cc37
vulnerability,CVE-2024-52398,vulnerability--4dd4ed5f-158a-40f2-a5c9-39a2baba6687
vulnerability,CVE-2024-52386,vulnerability--65f374d8-f9e0-45c8-a03b-8fb0d5d58686
vulnerability,CVE-2024-52407,vulnerability--0296eca6-e38f-40f1-806d-162480da53a9
vulnerability,CVE-2024-52415,vulnerability--14edfde4-88cb-4204-baef-92c022bcc281
vulnerability,CVE-2024-52416,vulnerability--fce9161f-c6cb-43e9-81dd-347de213e6dc
vulnerability,CVE-2024-52414,vulnerability--76a5d11b-8783-429d-9345-3f05c6668ba4
vulnerability,CVE-2024-52411,vulnerability--b666b30a-7915-400f-8d2b-37598e57c96a
vulnerability,CVE-2024-52413,vulnerability--3106b8df-72ae-4a04-9b37-7efcc46cc540
vulnerability,CVE-2024-10262,vulnerability--167e07db-26c9-4a38-96b4-33fbe786bc56
vulnerability,CVE-2024-10614,vulnerability--bea7d6d2-f40e-433a-926e-d4db635fdac9
vulnerability,CVE-2024-10645,vulnerability--eeeeb9b1-3f96-419d-b7ec-d7ba6c8c43bc
vulnerability,CVE-2024-10533,vulnerability--f6c1cd48-90d1-484e-82c2-c45c5ea6678f
vulnerability,CVE-2024-10795,vulnerability--49937f54-4d99-4854-a277-f194142d7003
vulnerability,CVE-2024-10592,vulnerability--9bd9d75f-3150-49b3-a7f3-15833e77dcf3
vulnerability,CVE-2024-10883,vulnerability--efa0c1f6-bafe-454a-99a2-fff4e287942d
vulnerability,CVE-2024-10786,vulnerability--40b5f81a-976d-4080-ad62-159d939251c4
vulnerability,CVE-2024-10147,vulnerability--9876e861-3599-4ecc-97f3-25ec4d14d226
vulnerability,CVE-2024-10884,vulnerability--798b4816-b528-4cbc-81b1-1d77aa5d2838
vulnerability,CVE-2024-10017,vulnerability--7767fbbe-183e-46bf-b7b9-1df69c1380fc
vulnerability,CVE-2024-10875,vulnerability--1f47e8a7-0007-4e89-991e-deaba6b46205
vulnerability,CVE-2024-10728,vulnerability--75902dda-4d35-4d98-90a4-a6ded28501fb
vulnerability,CVE-2024-10015,vulnerability--a1700a11-197d-44ca-a49c-ab41173e29b4
vulnerability,CVE-2024-10861,vulnerability--fe1c3039-959e-461b-9218-f83d1a8e39c2
vulnerability,CVE-2024-9887,vulnerability--66e8558d-98bb-441b-b813-f58a179e2b30
vulnerability,CVE-2024-9192,vulnerability--6b94bd3f-942d-45d4-b459-2b1065ca5104
vulnerability,CVE-2024-9839,vulnerability--3ae62e1e-a081-4ee8-a360-0e28cec4bb67
vulnerability,CVE-2024-9935,vulnerability--d5a27728-d482-4a68-b459-52fc7af9611c
vulnerability,CVE-2024-9938,vulnerability--8494863e-8784-48e8-9562-411f5b54de72
vulnerability,CVE-2024-9849,vulnerability--28ade759-b8e3-481b-90ff-b2302f96d05e
vulnerability,CVE-2024-9850,vulnerability--d5c18e55-cc44-48ce-984a-c1dcab527310
vulnerability,CVE-2024-9386,vulnerability--b4328708-4c9f-4058-b691-69ae87cdd733
vulnerability,CVE-2024-9615,vulnerability--34a854b4-9bee-45c5-be7a-290cd48d573a
vulnerability,CVE-2024-11118,vulnerability--003ed57d-8450-44e7-8cb2-8ffe184ea78e
vulnerability,CVE-2024-11092,vulnerability--a2be424e-affd-471a-b3d2-4ff0e1404bdd
vulnerability,CVE-2024-11094,vulnerability--9ebdfb56-0b03-4105-b902-534796afa879
vulnerability,CVE-2024-11085,vulnerability--36bddcac-22c3-4357-9507-3323311fc992
vulnerability,CVE-2024-8873,vulnerability--8a295cdc-faf2-4c99-9574-e69f62b345d0
vulnerability,CVE-2024-8856,vulnerability--08fc41f2-b0fd-476e-952c-66260bb5ec9d
vulnerability,CVE-2024-6628,vulnerability--53cc0516-0e43-4d08-a17c-e239aa14c40c
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--13a9f263-c31b-4fef-8fb5-4080a126a976",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--003ed57d-8450-44e7-8cb2-8ffe184ea78e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-17T00:23:35.35117Z",
"modified": "2024-11-17T00:23:35.35117Z",
"name": "CVE-2024-11118",
"description": "The 404 Error Monitor plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1. This is due to missing or incorrect nonce validation on the updatePluginSettings() function. This makes it possible for unauthenticated attackers to make changes to plugin settings and clear up all the error logs via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11118"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--54ae34ac-c712-4817-b004-946c06e89350",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0296eca6-e38f-40f1-806d-162480da53a9",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-17T00:23:34.791694Z",
"modified": "2024-11-17T00:23:34.791694Z",
"name": "CVE-2024-52407",
"description": "Unrestricted Upload of File with Dangerous Type vulnerability in codeSavory BasePress Migration Tools allows Upload a Web Shell to a Web Server.This issue affects BasePress Migration Tools: from n/a through 1.0.0.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-52407"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6394b6e8-6ce8-4776-84be-7124f959df8c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--05ab03c5-bc36-47f3-aa47-52a843151007",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-17T00:23:34.760968Z",
"modified": "2024-11-17T00:23:34.760968Z",
"name": "CVE-2024-52406",
"description": "Unrestricted Upload of File with Dangerous Type vulnerability in Wibergs Web CSV to html allows Upload a Web Shell to a Web Server.This issue affects CSV to html: from n/a through 3.04.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-52406"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a627ba26-66a2-4fef-9856-fcbf79b984f3",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--08fc41f2-b0fd-476e-952c-66260bb5ec9d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-17T00:23:35.626207Z",
"modified": "2024-11-17T00:23:35.626207Z",
"name": "CVE-2024-8856",
"description": "The Backup and Staging by WP Time Capsule plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the the UploadHandler.php file and no direct file access prevention in all versions up to, and including, 1.22.21. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8856"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3d3a6afd-3c15-4d12-bfb3-5141541f7dc3",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--106f12d6-b85b-479c-bddd-a4031e802d1c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-17T00:23:34.755287Z",
"modified": "2024-11-17T00:23:34.755287Z",
"name": "CVE-2024-52403",
"description": "Unrestricted Upload of File with Dangerous Type vulnerability in WPExperts User Management allows Upload a Web Shell to a Web Server.This issue affects User Management: from n/a through 1.1.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-52403"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7dcd1f05-8bca-41e0-ad40-1cf444e17948",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--14edfde4-88cb-4204-baef-92c022bcc281",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-17T00:23:34.793934Z",
"modified": "2024-11-17T00:23:34.793934Z",
"name": "CVE-2024-52415",
"description": "Cross-Site Request Forgery (CSRF) vulnerability in Skpstorm SK WP Settings Backup allows Object Injection.This issue affects SK WP Settings Backup: from n/a through 1.0.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-52415"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--0fbf2eb9-c4a5-4e89-b2f6-975cf3fda824",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--167e07db-26c9-4a38-96b4-33fbe786bc56",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-17T00:23:34.873833Z",
"modified": "2024-11-17T00:23:34.873833Z",
"name": "CVE-2024-10262",
"description": "The The Drop Shadow Boxes plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.7.14. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10262"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a3ec96be-85fe-44a9-a577-861b55512784",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1a47febd-8d81-4199-8317-b0e0e07eea70",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-17T00:23:34.772213Z",
"modified": "2024-11-17T00:23:34.772213Z",
"name": "CVE-2024-52410",
"description": "Deserialization of Untrusted Data vulnerability in Phoenixheart Referrer Detector allows Object Injection.This issue affects Referrer Detector: from n/a through 4.2.1.0.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-52410"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--59af1f55-3345-45bb-9093-3c04ce7f6567",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1f47e8a7-0007-4e89-991e-deaba6b46205",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-17T00:23:34.916959Z",
"modified": "2024-11-17T00:23:34.916959Z",
"name": "CVE-2024-10875",
"description": "The Gallery Manager plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_Query_Arg without appropriate escaping on the URL in all versions up to, and including, 1.6.58. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10875"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--964c2d92-cabc-4833-a843-4e94ce5f4470",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1f68fbe8-bfd0-4a3b-b344-e8b89748ecf8",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-17T00:23:34.776625Z",
"modified": "2024-11-17T00:23:34.776625Z",
"name": "CVE-2024-52404",
"description": "Unrestricted Upload of File with Dangerous Type vulnerability in Bigfive CF7 Reply Manager.This issue affects CF7 Reply Manager: from n/a through 1.2.3.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-52404"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--35ead5c3-8f80-42db-aea6-670a1574f248",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--28ade759-b8e3-481b-90ff-b2302f96d05e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-17T00:23:34.994079Z",
"modified": "2024-11-17T00:23:34.994079Z",
"name": "CVE-2024-9849",
"description": "The 3D FlipBook, PDF Viewer, PDF Embedder – Real 3D FlipBook WordPress Plugin plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'r3dfb_save_thumbnail_callback' function in all versions up to, and including, 4.6. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9849"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--57e3bd10-a4f1-41d9-bfa8-4e2e7f61461c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--3106b8df-72ae-4a04-9b37-7efcc46cc540",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-17T00:23:34.806059Z",
"modified": "2024-11-17T00:23:34.806059Z",
"name": "CVE-2024-52413",
"description": "Deserialization of Untrusted Data vulnerability in DMC Airin Blog allows Object Injection.This issue affects Airin Blog: from n/a through 1.6.1.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-52413"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--fea5baed-5adb-458a-ac03-16d2f35a0e53",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--34a854b4-9bee-45c5-be7a-290cd48d573a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-17T00:23:35.006904Z",
"modified": "2024-11-17T00:23:35.006904Z",
"name": "CVE-2024-9615",
"description": "The BulkPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 0.3.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9615"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--4c423031-065e-4a1b-ae49-3841c8151dcd",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--36bddcac-22c3-4357-9507-3323311fc992",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-17T00:23:35.367412Z",
"modified": "2024-11-17T00:23:35.367412Z",
"name": "CVE-2024-11085",
"description": "The WP Log Viewer plugin for WordPress is vulnerable to unauthorized use of functionality due to a missing capability check on several AJAX actions in all versions up to, and including, 1.2.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to access logs, update plugin-related user settings and general plugin settings.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11085"
}
]
}
]
}
Loading

0 comments on commit 91bab8f

Please sign in to comment.