Skip to content

Commit

Permalink
generated content from 2024-10-07
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Oct 7, 2024
1 parent 064f5b3 commit 324fae0
Show file tree
Hide file tree
Showing 86 changed files with 1,955 additions and 0 deletions.
85 changes: 85 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -250979,3 +250979,88 @@ vulnerability,CVE-2024-47391,vulnerability--771c6bbb-8a0f-47ac-805d-5bdb13d9a5b5
vulnerability,CVE-2024-47375,vulnerability--13f62cc7-44e3-437c-ad23-b1fb12e2f074
vulnerability,CVE-2024-47840,vulnerability--56305fe9-a6c0-4555-beff-61298e597579
vulnerability,CVE-2024-47395,vulnerability--52eecd0f-ff4d-4dcd-bc24-be1b277c0f48
vulnerability,CVE-2024-45252,vulnerability--9583adb7-8aca-46eb-bba1-c8ce3f4df59f
vulnerability,CVE-2024-45251,vulnerability--8f443ce9-e19d-4b3c-a3df-163934d8632d
vulnerability,CVE-2024-45248,vulnerability--aecccf9b-0caa-4fc5-81a6-0c3b61aef0e2
vulnerability,CVE-2024-45245,vulnerability--3c02b785-5719-4bf8-a0c2-deb33f59ce50
vulnerability,CVE-2024-45246,vulnerability--7f26a94e-b16e-4022-9744-1903f904e409
vulnerability,CVE-2024-45249,vulnerability--a01ded8d-514d-432d-9827-e6aaefbbdf22
vulnerability,CVE-2024-45250,vulnerability--87d3d686-d67e-4b42-89e8-94e6eb5b8a9c
vulnerability,CVE-2024-45454,vulnerability--8cfa1ceb-7236-47d1-9666-93818785a2bf
vulnerability,CVE-2024-45247,vulnerability--6f6022ab-4cf1-4589-b992-c49b8487860d
vulnerability,CVE-2024-9560,vulnerability--9867ce77-6794-46db-9dbb-3a3269e4cf63
vulnerability,CVE-2024-9561,vulnerability--19cb36c4-3f45-4e2e-936d-765aaf5cb6a7
vulnerability,CVE-2024-9553,vulnerability--3dde3e5e-1823-49a3-8039-d9f8b6cca88c
vulnerability,CVE-2024-9563,vulnerability--567c057e-5f01-40db-9251-7954e0772e93
vulnerability,CVE-2024-9554,vulnerability--01d646b9-d49e-4d96-856f-98baaa6af736
vulnerability,CVE-2024-9549,vulnerability--52517846-4592-43b9-b615-fd42f9483352
vulnerability,CVE-2024-9556,vulnerability--9d6dffbe-b066-4b43-9c47-984d531eb3c0
vulnerability,CVE-2024-9558,vulnerability--9a813fce-8feb-4425-bf9c-678af52c944c
vulnerability,CVE-2024-9559,vulnerability--ff82dbb4-30ec-49e3-afeb-c1ac6f1f8f8d
vulnerability,CVE-2024-9550,vulnerability--90637280-1077-4cf1-a6d5-6a89a238eb1c
vulnerability,CVE-2024-9557,vulnerability--9e42de07-89d6-4bbb-b6b2-4164682672a8
vulnerability,CVE-2024-9555,vulnerability--5c3e84b7-808e-4b1f-b6f9-8905dc05956b
vulnerability,CVE-2024-9551,vulnerability--e649e165-beec-461a-a3ed-1e6a63933605
vulnerability,CVE-2024-9552,vulnerability--bec7c0d8-b270-473f-a5cd-55382ab34b75
vulnerability,CVE-2024-9562,vulnerability--01ee318e-189d-49fc-94c0-0bb4ba24b520
vulnerability,CVE-2024-44042,vulnerability--c7e132fe-8c39-4769-a85f-a515fbdbc533
vulnerability,CVE-2024-44027,vulnerability--24cb630e-1460-4804-a4b9-f1253a6a0f55
vulnerability,CVE-2024-44029,vulnerability--beb5e33e-0f40-4b5d-a8c7-88ee493d56f2
vulnerability,CVE-2024-44033,vulnerability--58d74b99-de16-4db5-a042-fb40e39c9f92
vulnerability,CVE-2024-44040,vulnerability--be25dfcb-805b-478f-a07d-95554e3ee187
vulnerability,CVE-2024-44032,vulnerability--7805d1a8-327b-45d5-8106-9010229b89bf
vulnerability,CVE-2024-44010,vulnerability--fa783a91-6292-477d-b69a-ec87c7172bb8
vulnerability,CVE-2024-44045,vulnerability--de09ad80-272b-4183-a61a-d3c482677f94
vulnerability,CVE-2024-44025,vulnerability--375c906b-55db-4aba-90e2-c99de7d8711d
vulnerability,CVE-2024-44024,vulnerability--f54e806d-0180-4213-9f3a-7201de4497c9
vulnerability,CVE-2024-44028,vulnerability--0cd88755-daae-445c-aadc-3ebe71d78737
vulnerability,CVE-2024-44022,vulnerability--e294e8bc-52e7-4051-8fdc-41358d8e293f
vulnerability,CVE-2024-44039,vulnerability--feae5b3d-d106-4ba4-990a-6a2cb30118aa
vulnerability,CVE-2024-44026,vulnerability--4342482c-7e4e-41fe-b02c-9ddcef013716
vulnerability,CVE-2024-44037,vulnerability--01e079e0-4693-400d-ba2c-a77c7318159a
vulnerability,CVE-2024-44036,vulnerability--69a2e77c-c5ac-48d4-b5c9-eefe4fba7d5a
vulnerability,CVE-2024-44043,vulnerability--ff27d4c4-6494-4ed5-81d6-82ab71a9eedc
vulnerability,CVE-2024-44041,vulnerability--10a0a8d6-7440-4092-8238-7d91018a4150
vulnerability,CVE-2024-44035,vulnerability--c236625b-fa3b-411d-bbd7-7088c7af6f6c
vulnerability,CVE-2024-44046,vulnerability--baeb5b30-d6f5-4233-94c0-3dfed0d25437
vulnerability,CVE-2024-47336,vulnerability--ada3cfb2-d3f9-47f6-a286-6ff7024284a5
vulnerability,CVE-2024-47360,vulnerability--f2696654-3d5c-4fbf-9637-5f46c9d16ddc
vulnerability,CVE-2024-47348,vulnerability--cae32f1b-e6c6-4c02-b1d8-6fa88efe235a
vulnerability,CVE-2024-47345,vulnerability--54fb52e0-ab02-4e4b-866d-070b24eadf4d
vulnerability,CVE-2024-47366,vulnerability--e73907ce-4f15-4133-845c-e0cead89c683
vulnerability,CVE-2024-47310,vulnerability--3cb04f32-f689-4475-94b8-162d49bec670
vulnerability,CVE-2024-47326,vulnerability--6bfc5384-e109-444b-8680-068086feebaa
vulnerability,CVE-2024-47364,vulnerability--e967363c-939e-42f2-bc2c-b775a309f97f
vulnerability,CVE-2024-47306,vulnerability--00c2e140-ff99-4ec9-ab33-9f07c102a6ea
vulnerability,CVE-2024-47340,vulnerability--884f64eb-3a1b-4658-8d28-15421175d0af
vulnerability,CVE-2024-47650,vulnerability--a4c910c2-4918-42f3-82c1-3220dde38862
vulnerability,CVE-2024-47355,vulnerability--a77c7404-7c01-440b-a439-2e3fc8d4901c
vulnerability,CVE-2024-47307,vulnerability--b2607de6-fa70-4d67-b067-7294dffa5f84
vulnerability,CVE-2024-47301,vulnerability--a2fddc50-743c-4c93-80ec-812038123286
vulnerability,CVE-2024-47300,vulnerability--3f36173a-482a-42fd-a50c-909ce4b90497
vulnerability,CVE-2024-47365,vulnerability--c3020694-c943-446e-ba55-c6c1202371ab
vulnerability,CVE-2024-47347,vulnerability--ff756e09-9089-4edc-a139-898044a33c7d
vulnerability,CVE-2024-47356,vulnerability--cb34ece0-c50c-484f-bbb9-68df6e3e8a57
vulnerability,CVE-2024-47357,vulnerability--04b5b430-f691-494c-b0d0-bdc7666ed9b6
vulnerability,CVE-2024-47333,vulnerability--15224143-3098-4ba2-b49c-9b8ec025223e
vulnerability,CVE-2024-47320,vulnerability--9d190988-a87e-4766-8cd2-fb482a3784cc
vulnerability,CVE-2024-47349,vulnerability--089e60b0-53af-4d6f-858a-93957459a2ad
vulnerability,CVE-2024-47299,vulnerability--983b410e-9c75-4d2f-9f70-1fb3f70bc6c4
vulnerability,CVE-2024-47338,vulnerability--ff6d6451-dfe4-48ba-8824-96dd024ad6c3
vulnerability,CVE-2024-47329,vulnerability--5281029c-c758-4aa1-b32f-de46594f22f8
vulnerability,CVE-2024-47332,vulnerability--757ca35c-c496-453c-a792-abcbea2ef613
vulnerability,CVE-2024-47341,vulnerability--ee1a8f88-8ab8-4b5f-a837-2306a1ddfa48
vulnerability,CVE-2024-47313,vulnerability--2fdb26b5-ad39-4e35-a924-2f6fdbe115a3
vulnerability,CVE-2024-47350,vulnerability--3fea440e-c0eb-495b-a3df-68d8608d09cf
vulnerability,CVE-2024-47367,vulnerability--9b67d269-4fee-4716-9eed-da45d67d1c57
vulnerability,CVE-2024-47346,vulnerability--f50704e6-f037-4290-a7e4-019ece8a7cfa
vulnerability,CVE-2024-47363,vulnerability--1db9d64b-4944-4798-83dd-fa4462de887f
vulnerability,CVE-2024-47297,vulnerability--9445d72b-bd20-45b9-af61-2200eb6fdd69
vulnerability,CVE-2024-47298,vulnerability--e463e12a-c291-4f97-9139-f91d59192e20
vulnerability,CVE-2024-47322,vulnerability--61a0de56-43c7-4e84-8767-b8dd00d5f26b
vulnerability,CVE-2024-47368,vulnerability--ea2e787e-e367-4ebe-946f-cd23c104068c
vulnerability,CVE-2024-47343,vulnerability--9e0ab9f6-3821-411a-9c2e-bb3138fc295a
vulnerability,CVE-2024-47342,vulnerability--8f859827-ae8b-4221-9f74-3fa663de0175
vulnerability,CVE-2024-47327,vulnerability--f8c3780e-0190-433a-b926-15c014bd365d
vulnerability,CVE-2024-47352,vulnerability--9c8c04be-46fe-4f4e-b6dc-c0c38704c4fc
vulnerability,CVE-2024-47339,vulnerability--8406610c-f29f-43a2-9845-f82b15040043
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--95bb880f-ce66-44b1-8f23-11c2413b27e7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--00c2e140-ff99-4ec9-ab33-9f07c102a6ea",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-07T00:38:04.378909Z",
"modified": "2024-10-07T00:38:04.378909Z",
"name": "CVE-2024-47306",
"description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Copy Content Protection Team Secure Copy Content Protection and Content Locking allows Stored XSS.This issue affects Secure Copy Content Protection and Content Locking: from n/a through 4.2.3.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-47306"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--4f4f5414-22de-410b-ba2d-e004f6b12e7e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--01d646b9-d49e-4d96-856f-98baaa6af736",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-07T00:38:03.096387Z",
"modified": "2024-10-07T00:38:03.096387Z",
"name": "CVE-2024-9554",
"description": "A vulnerability classified as problematic was found in Sovell Smart Canteen System up to 3.0.7303.30513. Affected by this vulnerability is the function Check_ET_CheckPwdz201 of the file suanfa.py of the component Password Reset Handler. The manipulation leads to authorization bypass. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9554"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--8f6cfd07-61a1-463e-805d-a11dee7a9138",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--01e079e0-4693-400d-ba2c-a77c7318159a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-07T00:38:03.761151Z",
"modified": "2024-10-07T00:38:03.761151Z",
"name": "CVE-2024-44037",
"description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in MagePeople Team Multipurpose Ticket Booking Manager allows Stored XSS.This issue affects Multipurpose Ticket Booking Manager: from n/a through 4.2.2.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-44037"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5c93a15b-9be8-4500-bf4f-532564da8066",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--01ee318e-189d-49fc-94c0-0bb4ba24b520",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-07T00:38:03.130822Z",
"modified": "2024-10-07T00:38:03.130822Z",
"name": "CVE-2024-9562",
"description": "A vulnerability classified as critical was found in D-Link DIR-605L 2.13B01 BETA. This vulnerability affects the function formSetWizard1/formSetWizard2. The manipulation of the argument curTime leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9562"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--acffe8e0-d381-413d-b006-c0a6dc634066",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--04b5b430-f691-494c-b0d0-bdc7666ed9b6",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-07T00:38:04.397082Z",
"modified": "2024-10-07T00:38:04.397082Z",
"name": "CVE-2024-47357",
"description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Leevio Happy Addons for Elementor allows Stored XSS.This issue affects Happy Addons for Elementor: from n/a through 3.12.0.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-47357"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3fea7211-9be7-442e-81d7-b562c3678a56",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--089e60b0-53af-4d6f-858a-93957459a2ad",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-07T00:38:04.402662Z",
"modified": "2024-10-07T00:38:04.402662Z",
"name": "CVE-2024-47349",
"description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPMobile.App allows Reflected XSS.This issue affects WPMobile.App: from n/a through 11.50.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-47349"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--46ee052b-24e1-4ea1-8a1f-974f1ad6e97a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0cd88755-daae-445c-aadc-3ebe71d78737",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-07T00:38:03.746414Z",
"modified": "2024-10-07T00:38:03.746414Z",
"name": "CVE-2024-44028",
"description": "Cross-Site Request Forgery (CSRF) vulnerability in Nicejob NiceJob allows Stored XSS.This issue affects NiceJob: from n/a before 3.6.5.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-44028"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7400e6be-dae3-42e3-acb7-313bc21fa027",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--10a0a8d6-7440-4092-8238-7d91018a4150",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-07T00:38:03.768107Z",
"modified": "2024-10-07T00:38:03.768107Z",
"name": "CVE-2024-44041",
"description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Martin Gibson IdeaPush allows Stored XSS.This issue affects IdeaPush: from n/a through 8.66.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-44041"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6dd038c9-7960-4217-aa32-97f33d786a1a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--15224143-3098-4ba2-b49c-9b8ec025223e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-07T00:38:04.400514Z",
"modified": "2024-10-07T00:38:04.400514Z",
"name": "CVE-2024-47333",
"description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Team Tangible Loops & Logic allows Reflected XSS.This issue affects Loops & Logic: from n/a through 4.1.4.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-47333"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--8c95c66f-b4c3-4609-ba66-a6c6dc5d37e7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--19cb36c4-3f45-4e2e-936d-765aaf5cb6a7",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-07T00:38:03.088747Z",
"modified": "2024-10-07T00:38:03.088747Z",
"name": "CVE-2024-9561",
"description": "A vulnerability classified as critical has been found in D-Link DIR-605L 2.13B01 BETA. This affects the function formSetWAN_Wizard51/formSetWAN_Wizard52. The manipulation of the argument curTime leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9561"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--112f07d3-13cc-4da8-9a05-ab89e5dce394",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1db9d64b-4944-4798-83dd-fa4462de887f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-07T00:38:04.425065Z",
"modified": "2024-10-07T00:38:04.425065Z",
"name": "CVE-2024-47363",
"description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Blockspare allows Stored XSS.This issue affects Blockspare: from n/a through 3.2.4.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-47363"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3d8d25a1-e9af-401f-924b-ff72b460262e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--24cb630e-1460-4804-a4b9-f1253a6a0f55",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-07T00:38:03.721194Z",
"modified": "2024-10-07T00:38:03.721194Z",
"name": "CVE-2024-44027",
"description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in TemeGUM Gum Elementor Addon allows Stored XSS.This issue affects Gum Elementor Addon: from n/a through 1.3.6.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-44027"
}
]
}
]
}
Loading

0 comments on commit 324fae0

Please sign in to comment.