Skip to content

Commit

Permalink
generated content from 2024-11-15
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Nov 15, 2024
1 parent cc2635e commit 22a1bf0
Show file tree
Hide file tree
Showing 148 changed files with 3,381 additions and 0 deletions.
147 changes: 147 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -256061,3 +256061,150 @@ vulnerability,CVE-2022-45157,vulnerability--50c97660-fd44-42f9-a998-6b52a653120a
vulnerability,CVE-2023-38920,vulnerability--ee973544-1fb8-46bb-a4d2-11a9c0dabc53
vulnerability,CVE-2023-35686,vulnerability--0c1e28f5-f31b-4ede-84b2-073bf3d3d1ad
vulnerability,CVE-2023-35659,vulnerability--f3c99933-8d30-4eaa-9329-846266712ef5
vulnerability,CVE-2017-13227,vulnerability--92067f9b-7288-43cf-b0c7-063a7ad23d11
vulnerability,CVE-2024-51688,vulnerability--49c2ce4f-c8a1-42cc-bfed-ec505d4965a0
vulnerability,CVE-2024-51684,vulnerability--63c99e97-2f7e-45a8-a6dd-3ba2240bac41
vulnerability,CVE-2024-51659,vulnerability--5749fce0-d673-49dd-af6f-d4c93c7730e9
vulnerability,CVE-2024-51679,vulnerability--9ff20deb-f22a-4c66-aeb9-c67326efbd80
vulnerability,CVE-2024-51156,vulnerability--e10e34d4-f95f-449e-937d-0ca1e2641b76
vulnerability,CVE-2024-51687,vulnerability--463a984a-e24b-41ea-b8da-66b22683b0ab
vulnerability,CVE-2024-51658,vulnerability--c4fe0a3c-5692-443c-a486-13a9c8e4c429
vulnerability,CVE-2024-48973,vulnerability--748ff4bf-9097-45f5-a71f-39e9232066c6
vulnerability,CVE-2024-48970,vulnerability--aebe29b9-f989-4814-a5c4-42a2c43efe5e
vulnerability,CVE-2024-48966,vulnerability--1c7463d9-7331-4858-8ce0-6c621d55f129
vulnerability,CVE-2024-48967,vulnerability--f0d16e98-bc7a-450f-9007-d18ba3bf3c64
vulnerability,CVE-2024-48284,vulnerability--1438fc61-5953-4da1-b9d8-d7690da93459
vulnerability,CVE-2024-48974,vulnerability--8ce9aac8-4d26-4ec5-8707-a0849c53afe6
vulnerability,CVE-2024-48971,vulnerability--6d7b305e-b91f-4250-b7e7-44ebd55f9717
vulnerability,CVE-2024-52371,vulnerability--d3352d79-489a-4be5-bd79-6c3bd6ab1c35
vulnerability,CVE-2024-52376,vulnerability--04ff89d8-75d1-4632-8206-25848b3fe28a
vulnerability,CVE-2024-52379,vulnerability--db1e1197-98c7-4847-acb8-62d1b5bece60
vulnerability,CVE-2024-52524,vulnerability--1151824c-1357-4094-bff4-37551d3d3cf3
vulnerability,CVE-2024-52302,vulnerability--bdb834ba-d571-4788-b268-2e85b9cbde50
vulnerability,CVE-2024-52308,vulnerability--2913a27b-730f-4040-8a67-302ee0fda622
vulnerability,CVE-2024-52505,vulnerability--ef9c8aa2-230b-4274-af58-1d7f1059036a
vulnerability,CVE-2024-52374,vulnerability--7053d376-7073-40be-a4a9-02bb939a4df1
vulnerability,CVE-2024-52375,vulnerability--a55b6de7-1d00-4308-9f6d-0ce63a71e33f
vulnerability,CVE-2024-52370,vulnerability--a7fb3c40-3c88-4739-8d70-861fed75fc6a
vulnerability,CVE-2024-52396,vulnerability--0289cefb-298c-4051-96d4-62ab7099d424
vulnerability,CVE-2024-52613,vulnerability--b6679853-2095-4c8b-9c3f-d3007c8d0899
vulnerability,CVE-2024-52378,vulnerability--7c4bd41a-3572-4b3a-b0bb-1ac211102d80
vulnerability,CVE-2024-52381,vulnerability--0a67a8a6-b671-4b09-8cd0-2ba75850efa4
vulnerability,CVE-2024-52380,vulnerability--812e07a9-2848-4b2e-9942-3388c88a8ae2
vulnerability,CVE-2024-52369,vulnerability--d4ab1f2f-3351-4881-b060-46b68988a290
vulnerability,CVE-2024-52372,vulnerability--b1af9f43-e0f8-4a1e-bd59-8fa191c80f94
vulnerability,CVE-2024-52393,vulnerability--9eb97035-081b-4de3-8352-c65d69a57c59
vulnerability,CVE-2024-52384,vulnerability--7eeab6f5-a872-4549-b02e-dad4b2bbed5d
vulnerability,CVE-2024-52382,vulnerability--e46b18ef-abf6-4315-a97b-239009f34cf4
vulnerability,CVE-2024-52383,vulnerability--bb01c5d4-aff6-4a5a-9de8-87eb0d951795
vulnerability,CVE-2024-52373,vulnerability--6851bb67-a8ac-49b2-80b4-35bb2149c579
vulnerability,CVE-2024-52377,vulnerability--d6b91f4b-c70c-444e-8a48-6744e6b09bac
vulnerability,CVE-2024-45642,vulnerability--4128606b-82ee-4ae7-bf96-3eaee7e40748
vulnerability,CVE-2024-45670,vulnerability--03e62483-cc30-4577-9353-cf01489e0a5c
vulnerability,CVE-2024-45253,vulnerability--bb731048-0741-4d30-8449-ed50497fe8bd
vulnerability,CVE-2024-45254,vulnerability--ca689694-0456-401a-a8aa-46146811d30c
vulnerability,CVE-2024-45099,vulnerability--239e7efd-d02a-4463-811b-425a3d6e5024
vulnerability,CVE-2024-10394,vulnerability--a4f841b5-be74-495f-9299-a9d0e6e6ef10
vulnerability,CVE-2024-10396,vulnerability--9a7c9b6f-6af2-4825-bacb-7aca5e780763
vulnerability,CVE-2024-10976,vulnerability--db4356bd-c54f-4c8d-b810-b48950403fa3
vulnerability,CVE-2024-10921,vulnerability--466d28fc-cfc7-4243-9fa0-6f003e02f6cb
vulnerability,CVE-2024-10146,vulnerability--9eb1b7ab-55f9-47aa-9e4a-fdbf58e00fef
vulnerability,CVE-2024-10977,vulnerability--3e465c1d-2373-4a16-9f10-f0a5606e9332
vulnerability,CVE-2024-10978,vulnerability--e191f933-dd78-46ec-862b-7499990d034b
vulnerability,CVE-2024-10397,vulnerability--268ce7a0-fe96-4edd-92f9-39d32261c965
vulnerability,CVE-2024-10571,vulnerability--5e791325-5d5b-4d33-9001-0782a952f444
vulnerability,CVE-2024-10979,vulnerability--0a1ee655-761c-4062-98d3-4b3ed1d343ae
vulnerability,CVE-2024-10962,vulnerability--b19e83fc-9882-46cb-9774-bae49baff955
vulnerability,CVE-2024-9472,vulnerability--04637fe6-c46c-4f3b-9eb9-1af8088c8650
vulnerability,CVE-2024-9693,vulnerability--6c3ce34d-eedb-4634-aa30-dbcc903c5116
vulnerability,CVE-2024-9633,vulnerability--826a5b2f-e1b5-4c30-bc77-e99d9a77076b
vulnerability,CVE-2024-9186,vulnerability--c7412866-d641-42b4-b085-999f29306683
vulnerability,CVE-2024-9832,vulnerability--b385c912-1432-4f27-973c-d0b5f71bbebe
vulnerability,CVE-2024-9834,vulnerability--0fcec6bd-5ed6-4525-b2f8-730f7b5b6013
vulnerability,CVE-2024-39707,vulnerability--1ca8de37-7227-4ac7-8a64-c9fab7698dfe
vulnerability,CVE-2024-47914,vulnerability--12e1148f-57fc-48ac-8c71-15c335675fd9
vulnerability,CVE-2024-47916,vulnerability--58a46aee-dc7e-4a36-9168-1f483b78c6d6
vulnerability,CVE-2024-47915,vulnerability--2a15fa4b-1ebe-41ab-9246-c89faa15b920
vulnerability,CVE-2024-50830,vulnerability--08305511-5a9f-40f7-9593-14a9aa63e355
vulnerability,CVE-2024-50305,vulnerability--20c0b236-d2f9-408b-b7b6-d5d3447a481e
vulnerability,CVE-2024-50842,vulnerability--32663d86-7684-4ce1-89f9-fba0f2ab1f75
vulnerability,CVE-2024-50839,vulnerability--2ce59bb2-a8ea-4616-bf9e-76ab18578200
vulnerability,CVE-2024-50836,vulnerability--53725a38-6767-4450-85fb-f0aff020ed3d
vulnerability,CVE-2024-50826,vulnerability--5c3e5ea7-0e49-4ada-9d77-d4a6d4992416
vulnerability,CVE-2024-50832,vulnerability--ceb22baa-2085-4e30-b52e-9ab81ab69e44
vulnerability,CVE-2024-50834,vulnerability--ea45e64b-8e6c-4fc5-a43b-1ac2f41009df
vulnerability,CVE-2024-50824,vulnerability--1a14f3a7-888e-4c74-8c8f-469770be7255
vulnerability,CVE-2024-50833,vulnerability--5cf0a1f1-1397-46eb-aa2e-91ee6a44bbc3
vulnerability,CVE-2024-50841,vulnerability--f750c514-7443-4b42-b462-03802520ec95
vulnerability,CVE-2024-50838,vulnerability--24943e28-c6cc-4bfe-a094-8b221090b932
vulnerability,CVE-2024-50827,vulnerability--6682d7fa-5bd5-4aec-8804-4d32c5b2e6e8
vulnerability,CVE-2024-50843,vulnerability--9d47b388-dc15-4f17-88aa-79fab33b83db
vulnerability,CVE-2024-50825,vulnerability--75cf0f8b-ec3c-483a-8567-a2fd9c03f170
vulnerability,CVE-2024-50835,vulnerability--07dd254f-de87-42fc-ab59-619fa6273905
vulnerability,CVE-2024-50968,vulnerability--3213dc60-79d8-4b94-92e6-8f6fd44a3e60
vulnerability,CVE-2024-50840,vulnerability--851771fe-932a-4ac4-9cbd-75bce61fa4f6
vulnerability,CVE-2024-50837,vulnerability--06d06a9f-781c-4b7f-bf97-341e37be431e
vulnerability,CVE-2024-50823,vulnerability--6ec2f16d-0691-4a04-98cd-f164365a8b43
vulnerability,CVE-2024-50829,vulnerability--d2058969-54d4-4849-9b71-3f23efb6d79a
vulnerability,CVE-2024-50306,vulnerability--42e388b5-e273-4e13-9fff-07361e3bd558
vulnerability,CVE-2024-50831,vulnerability--922e7942-8847-4995-a6b0-bbfee070c809
vulnerability,CVE-2024-50828,vulnerability--0c838cb8-e7c8-4434-b9e5-4f32acac501f
vulnerability,CVE-2024-7730,vulnerability--c45975f2-7b3c-4966-90bf-f1862db59bbf
vulnerability,CVE-2024-7124,vulnerability--d5612c74-e639-43b6-94f5-8b9552ad8df8
vulnerability,CVE-2024-7404,vulnerability--aa2cdbc7-d695-4063-9301-d88338f386ae
vulnerability,CVE-2024-7787,vulnerability--0425bb76-5e24-4ce7-9eda-6b9e19c4885b
vulnerability,CVE-2024-11136,vulnerability--7701992b-6eb3-4227-8cb7-d5eb43d78b1c
vulnerability,CVE-2024-11214,vulnerability--16a43e7a-a046-4a8c-9ec0-d103591040f5
vulnerability,CVE-2024-11213,vulnerability--f9cc7ec3-6d0c-4750-b85f-050a675b4da3
vulnerability,CVE-2024-11210,vulnerability--f520ce49-228e-4312-b8dc-cc614374ac3c
vulnerability,CVE-2024-11208,vulnerability--619ac90c-a0e4-41e0-83b2-5cd6270ddb08
vulnerability,CVE-2024-11212,vulnerability--5efa77c7-8a0c-4eaa-a522-f807aea46039
vulnerability,CVE-2024-11211,vulnerability--6aa7d5e7-87c2-4880-84d8-634a81028966
vulnerability,CVE-2024-11206,vulnerability--00d0e296-dd03-49a1-b0a2-372e7d642acf
vulnerability,CVE-2024-11209,vulnerability--638435ff-1221-470a-819a-091e04977b47
vulnerability,CVE-2024-11207,vulnerability--7aac80c8-2707-4d62-842b-d1f27bd2c3ec
vulnerability,CVE-2024-11215,vulnerability--072b17e0-0cf8-41eb-b3be-31a70373a40b
vulnerability,CVE-2024-3502,vulnerability--38297286-af44-4bca-a30a-4c12d85ffa10
vulnerability,CVE-2024-3447,vulnerability--3552b49c-e216-416a-8054-77c0855eba44
vulnerability,CVE-2024-3379,vulnerability--d9a3b02f-a872-4762-a400-b97862a96733
vulnerability,CVE-2024-3760,vulnerability--8cfb6c48-5ea3-4d02-a02b-0422080d189b
vulnerability,CVE-2024-3501,vulnerability--1156a1f1-689b-4dd7-b417-bbb1dc5c8686
vulnerability,CVE-2024-8648,vulnerability--ae769ad2-575b-4af0-ae67-1cf1dc3b328d
vulnerability,CVE-2024-8180,vulnerability--8a333000-30c5-460c-8f05-94339dc016c6
vulnerability,CVE-2024-38479,vulnerability--1f697f9b-8710-49b0-9ef6-2ff804b25228
vulnerability,CVE-2024-40579,vulnerability--baac16fc-b0fb-4d44-b46d-71f6a05b6938
vulnerability,CVE-2024-31695,vulnerability--a01a2c5d-302c-4ddc-a6d4-692f04c975e2
vulnerability,CVE-2024-41209,vulnerability--1674ea49-f344-49fb-ab49-e7e792056f4c
vulnerability,CVE-2024-41206,vulnerability--d1580d06-952a-4b69-b87d-35ff21f27e0b
vulnerability,CVE-2024-41217,vulnerability--71ef0500-6d0e-4d4c-94ec-5a77b149f86b
vulnerability,CVE-2024-37285,vulnerability--8421e74e-e3fb-4dce-9151-19956245d8ca
vulnerability,CVE-2024-49362,vulnerability--71896b35-44ae-4dfe-a651-0242b51ccf04
vulnerability,CVE-2024-49025,vulnerability--6c78fc18-afab-41ef-a9fe-8a765cae5e9b
vulnerability,CVE-2024-49777,vulnerability--5ddaf00b-1605-4a10-8960-0293d1bcce25
vulnerability,CVE-2024-49776,vulnerability--699e5309-83ae-40a1-a0af-acce6ec532c7
vulnerability,CVE-2024-49778,vulnerability--d559507d-2af8-4f57-a095-f659205683cc
vulnerability,CVE-2024-2552,vulnerability--dd0d4468-1155-4982-92ed-a563a45cdd9b
vulnerability,CVE-2024-2551,vulnerability--cf6b6785-b68e-46bb-a0e4-b0c069162cf3
vulnerability,CVE-2024-2550,vulnerability--eff327d6-1bea-476f-859a-1024503bf329
vulnerability,CVE-2024-42188,vulnerability--9f3e4d25-6c05-47c1-a126-833540505fb2
vulnerability,CVE-2024-1682,vulnerability--7d0d5b81-df8e-4e97-9704-d5cedbca5eec
vulnerability,CVE-2024-4343,vulnerability--56db748d-a296-4e96-b5f0-5283fa493ccf
vulnerability,CVE-2024-4311,vulnerability--211a0550-2e80-4563-a3ff-29a92ecd56f4
vulnerability,CVE-2024-5917,vulnerability--58488ae1-4a31-45e4-935b-2f3730cb3352
vulnerability,CVE-2024-5919,vulnerability--98b52c74-7e28-4e17-a70e-415520742e82
vulnerability,CVE-2024-5125,vulnerability--6a01b442-004c-4940-9a19-3c3ce1e2d8c9
vulnerability,CVE-2024-5918,vulnerability--c6b36d2f-1a2f-4104-be57-4fa7eb036c3f
vulnerability,CVE-2024-5920,vulnerability--4d12b0ca-3b34-4a4e-9834-e8dada233c67
vulnerability,CVE-2024-5082,vulnerability--9162f380-7ddc-4163-801c-c7c398f33bf8
vulnerability,CVE-2024-5083,vulnerability--43f1fc83-4da1-4eb2-8957-f516ef4ca8ca
vulnerability,CVE-2024-6068,vulnerability--8215c431-1409-4673-bffa-b9e6dd6a0e52
vulnerability,CVE-2022-31666,vulnerability--7a4ac646-48fe-4235-b3c5-a7b900302450
vulnerability,CVE-2022-31669,vulnerability--c0f04206-c454-4192-9835-25075122233f
vulnerability,CVE-2022-31667,vulnerability--9b347c2f-6c16-4ab9-96fb-c8017e079e1d
vulnerability,CVE-2022-31670,vulnerability--7bf44a55-5c71-403f-b557-7a78df6e7a82
vulnerability,CVE-2022-31668,vulnerability--1b6c0929-d046-4c50-9881-f30212f8ffbf
vulnerability,CVE-2022-31671,vulnerability--35acace8-1d47-42dc-b85b-e884d8b806ea
vulnerability,CVE-2022-2232,vulnerability--b8a6c6e8-cfc0-41e4-a0fd-e8f929e053b4
vulnerability,CVE-2023-34049,vulnerability--b6e67f2d-6053-41e0-a0c1-8344cda4a09a
vulnerability,CVE-2023-4458,vulnerability--6663e851-3dc2-45a0-8842-2ca203262c2f
vulnerability,CVE-2023-4134,vulnerability--4ee77bd1-4764-46e4-a74c-a43db2839d6e
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--1801065c-b304-42b1-9862-76a536edada3",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--00d0e296-dd03-49a1-b0a2-372e7d642acf",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-15T00:38:53.695469Z",
"modified": "2024-11-15T00:38:53.695469Z",
"name": "CVE-2024-11206",
"description": "Unauthorized access vulnerability in the mobile application (com.transsion.phoenix) can lead to the leakage of user information.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11206"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b4db1651-6856-47e8-bf7f-48dace7e1e07",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0289cefb-298c-4051-96d4-62ab7099d424",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-15T00:38:53.087219Z",
"modified": "2024-11-15T00:38:53.087219Z",
"name": "CVE-2024-52396",
"description": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in realmag777 WOLF allows Path Traversal.This issue affects WOLF: from n/a through 1.0.8.3.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-52396"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7de8e7cb-db1e-4441-bccb-75b3193df2ed",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--03e62483-cc30-4577-9353-cf01489e0a5c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-15T00:38:53.143162Z",
"modified": "2024-11-15T00:38:53.143162Z",
"name": "CVE-2024-45670",
"description": "IBM Security SOAR 51.0.1.0 and earlier contains a mechanism for users to recover or change their passwords without knowing the original password, but the user account must be compromised prior to the weak recovery mechanism.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-45670"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5083e4ae-46b4-4c7d-b66b-bf0684db3df5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0425bb76-5e24-4ce7-9eda-6b9e19c4885b",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-15T00:38:53.60971Z",
"modified": "2024-11-15T00:38:53.60971Z",
"name": "CVE-2024-7787",
"description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ITG Computer Technology vSRM Supplier Relationship Management System allows Reflected XSS, Cross-Site Scripting (XSS).This issue affects vSRM Supplier Relationship Management System: before 28.08.2024.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-7787"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--0ff72d4b-90ae-4fc9-830e-dbbbe213066f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--04637fe6-c46c-4f3b-9eb9-1af8088c8650",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-15T00:38:53.243773Z",
"modified": "2024-11-15T00:38:53.243773Z",
"name": "CVE-2024-9472",
"description": "A null pointer dereference in Palo Alto Networks PAN-OS software on PA-800 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series hardware platforms when Decryption policy is enabled allows an unauthenticated attacker to crash PAN-OS by sending specific traffic through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.\n\n\nPalo Alto Networks VM-Series, Cloud NGFW, and Prisma Access are not affected.\n\n\nThis issue only affects PA-800 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series running these specific versions of PAN-OS:\n\n * 10.2.7-h12\n * 10.2.8-h10\n * 10.2.9-h9\n * 10.2.9-h11\n * 10.2.10-h2\n * 10.2.10-h3\n * 10.2.11\n * 10.2.11-h1\n * 10.2.11-h2\n * 10.2.11-h3\n * 11.1.2-h9\n * 11.1.2-h12\n * 11.1.3-h2\n * 11.1.3-h4\n * 11.1.3-h6\n * 11.2.2\n * 11.2.2-h1",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9472"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--529c2e9a-f65c-44a1-974e-337258cea293",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--04ff89d8-75d1-4632-8206-25848b3fe28a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-15T00:38:53.071017Z",
"modified": "2024-11-15T00:38:53.071017Z",
"name": "CVE-2024-52376",
"description": "Unrestricted Upload of File with Dangerous Type vulnerability in cmsMinds Boat Rental Plugin for WordPress allows Upload a Web Shell to a Web Server.This issue affects Boat Rental Plugin for WordPress: from n/a through 1.0.1.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-52376"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--cc014613-09c5-4333-b264-e09c97002342",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--06d06a9f-781c-4b7f-bf97-341e37be431e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-15T00:38:53.477007Z",
"modified": "2024-11-15T00:38:53.477007Z",
"name": "CVE-2024-50837",
"description": "A Stored Cross-Site Scripting (XSS) vulnerability was found in /admin/admin_user.php in KASHIPARA E-learning Management System Project 1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the firstname and username parameters.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-50837"
}
]
}
]
}
Loading

0 comments on commit 22a1bf0

Please sign in to comment.