From 324fae0a503743965db683893c71f1d97105d172 Mon Sep 17 00:00:00 2001 From: "github-actions[bot]" <41898282+github-actions[bot]@users.noreply.github.com> Date: Mon, 7 Oct 2024 00:38:31 +0000 Subject: [PATCH] generated content from 2024-10-07 --- mapping.csv | 85 +++++++++++++++++++ ...-00c2e140-ff99-4ec9-ab33-9f07c102a6ea.json | 22 +++++ ...-01d646b9-d49e-4d96-856f-98baaa6af736.json | 22 +++++ ...-01e079e0-4693-400d-ba2c-a77c7318159a.json | 22 +++++ ...-01ee318e-189d-49fc-94c0-0bb4ba24b520.json | 22 +++++ ...-04b5b430-f691-494c-b0d0-bdc7666ed9b6.json | 22 +++++ ...-089e60b0-53af-4d6f-858a-93957459a2ad.json | 22 +++++ ...-0cd88755-daae-445c-aadc-3ebe71d78737.json | 22 +++++ ...-10a0a8d6-7440-4092-8238-7d91018a4150.json | 22 +++++ ...-15224143-3098-4ba2-b49c-9b8ec025223e.json | 22 +++++ ...-19cb36c4-3f45-4e2e-936d-765aaf5cb6a7.json | 22 +++++ ...-1db9d64b-4944-4798-83dd-fa4462de887f.json | 22 +++++ ...-24cb630e-1460-4804-a4b9-f1253a6a0f55.json | 22 +++++ ...-2fdb26b5-ad39-4e35-a924-2f6fdbe115a3.json | 22 +++++ ...-375c906b-55db-4aba-90e2-c99de7d8711d.json | 22 +++++ ...-3c02b785-5719-4bf8-a0c2-deb33f59ce50.json | 22 +++++ ...-3cb04f32-f689-4475-94b8-162d49bec670.json | 22 +++++ ...-3dde3e5e-1823-49a3-8039-d9f8b6cca88c.json | 22 +++++ ...-3f36173a-482a-42fd-a50c-909ce4b90497.json | 22 +++++ ...-3fea440e-c0eb-495b-a3df-68d8608d09cf.json | 22 +++++ ...-4342482c-7e4e-41fe-b02c-9ddcef013716.json | 22 +++++ ...-52517846-4592-43b9-b615-fd42f9483352.json | 22 +++++ ...-5281029c-c758-4aa1-b32f-de46594f22f8.json | 22 +++++ ...-54fb52e0-ab02-4e4b-866d-070b24eadf4d.json | 22 +++++ ...-567c057e-5f01-40db-9251-7954e0772e93.json | 22 +++++ ...-58d74b99-de16-4db5-a042-fb40e39c9f92.json | 22 +++++ ...-5c3e84b7-808e-4b1f-b6f9-8905dc05956b.json | 22 +++++ ...-61a0de56-43c7-4e84-8767-b8dd00d5f26b.json | 22 +++++ ...-69a2e77c-c5ac-48d4-b5c9-eefe4fba7d5a.json | 22 +++++ ...-6bfc5384-e109-444b-8680-068086feebaa.json | 22 +++++ ...-6f6022ab-4cf1-4589-b992-c49b8487860d.json | 22 +++++ ...-757ca35c-c496-453c-a792-abcbea2ef613.json | 22 +++++ ...-7805d1a8-327b-45d5-8106-9010229b89bf.json | 22 +++++ ...-7f26a94e-b16e-4022-9744-1903f904e409.json | 22 +++++ ...-8406610c-f29f-43a2-9845-f82b15040043.json | 22 +++++ ...-87d3d686-d67e-4b42-89e8-94e6eb5b8a9c.json | 22 +++++ ...-884f64eb-3a1b-4658-8d28-15421175d0af.json | 22 +++++ ...-8cfa1ceb-7236-47d1-9666-93818785a2bf.json | 22 +++++ ...-8f443ce9-e19d-4b3c-a3df-163934d8632d.json | 22 +++++ ...-8f859827-ae8b-4221-9f74-3fa663de0175.json | 22 +++++ ...-90637280-1077-4cf1-a6d5-6a89a238eb1c.json | 22 +++++ ...-9445d72b-bd20-45b9-af61-2200eb6fdd69.json | 22 +++++ ...-9583adb7-8aca-46eb-bba1-c8ce3f4df59f.json | 22 +++++ ...-983b410e-9c75-4d2f-9f70-1fb3f70bc6c4.json | 22 +++++ ...-9867ce77-6794-46db-9dbb-3a3269e4cf63.json | 22 +++++ ...-9a813fce-8feb-4425-bf9c-678af52c944c.json | 22 +++++ ...-9b67d269-4fee-4716-9eed-da45d67d1c57.json | 22 +++++ ...-9c8c04be-46fe-4f4e-b6dc-c0c38704c4fc.json | 22 +++++ ...-9d190988-a87e-4766-8cd2-fb482a3784cc.json | 22 +++++ ...-9d6dffbe-b066-4b43-9c47-984d531eb3c0.json | 22 +++++ ...-9e0ab9f6-3821-411a-9c2e-bb3138fc295a.json | 22 +++++ ...-9e42de07-89d6-4bbb-b6b2-4164682672a8.json | 22 +++++ ...-a01ded8d-514d-432d-9827-e6aaefbbdf22.json | 22 +++++ ...-a2fddc50-743c-4c93-80ec-812038123286.json | 22 +++++ ...-a4c910c2-4918-42f3-82c1-3220dde38862.json | 22 +++++ ...-a77c7404-7c01-440b-a439-2e3fc8d4901c.json | 22 +++++ ...-ada3cfb2-d3f9-47f6-a286-6ff7024284a5.json | 22 +++++ ...-aecccf9b-0caa-4fc5-81a6-0c3b61aef0e2.json | 22 +++++ ...-b2607de6-fa70-4d67-b067-7294dffa5f84.json | 22 +++++ ...-baeb5b30-d6f5-4233-94c0-3dfed0d25437.json | 22 +++++ ...-be25dfcb-805b-478f-a07d-95554e3ee187.json | 22 +++++ ...-beb5e33e-0f40-4b5d-a8c7-88ee493d56f2.json | 22 +++++ ...-bec7c0d8-b270-473f-a5cd-55382ab34b75.json | 22 +++++ ...-c236625b-fa3b-411d-bbd7-7088c7af6f6c.json | 22 +++++ ...-c3020694-c943-446e-ba55-c6c1202371ab.json | 22 +++++ ...-c7e132fe-8c39-4769-a85f-a515fbdbc533.json | 22 +++++ ...-cae32f1b-e6c6-4c02-b1d8-6fa88efe235a.json | 22 +++++ ...-cb34ece0-c50c-484f-bbb9-68df6e3e8a57.json | 22 +++++ ...-de09ad80-272b-4183-a61a-d3c482677f94.json | 22 +++++ ...-e294e8bc-52e7-4051-8fdc-41358d8e293f.json | 22 +++++ ...-e463e12a-c291-4f97-9139-f91d59192e20.json | 22 +++++ ...-e649e165-beec-461a-a3ed-1e6a63933605.json | 22 +++++ ...-e73907ce-4f15-4133-845c-e0cead89c683.json | 22 +++++ ...-e967363c-939e-42f2-bc2c-b775a309f97f.json | 22 +++++ ...-ea2e787e-e367-4ebe-946f-cd23c104068c.json | 22 +++++ ...-ee1a8f88-8ab8-4b5f-a837-2306a1ddfa48.json | 22 +++++ ...-f2696654-3d5c-4fbf-9637-5f46c9d16ddc.json | 22 +++++ ...-f50704e6-f037-4290-a7e4-019ece8a7cfa.json | 22 +++++ ...-f54e806d-0180-4213-9f3a-7201de4497c9.json | 22 +++++ ...-f8c3780e-0190-433a-b926-15c014bd365d.json | 22 +++++ ...-fa783a91-6292-477d-b69a-ec87c7172bb8.json | 22 +++++ ...-feae5b3d-d106-4ba4-990a-6a2cb30118aa.json | 22 +++++ ...-ff27d4c4-6494-4ed5-81d6-82ab71a9eedc.json | 22 +++++ ...-ff6d6451-dfe4-48ba-8824-96dd024ad6c3.json | 22 +++++ ...-ff756e09-9089-4edc-a139-898044a33c7d.json | 22 +++++ ...-ff82dbb4-30ec-49e3-afeb-c1ac6f1f8f8d.json | 22 +++++ 86 files changed, 1955 insertions(+) create mode 100644 objects/vulnerability/vulnerability--00c2e140-ff99-4ec9-ab33-9f07c102a6ea.json create mode 100644 objects/vulnerability/vulnerability--01d646b9-d49e-4d96-856f-98baaa6af736.json create mode 100644 objects/vulnerability/vulnerability--01e079e0-4693-400d-ba2c-a77c7318159a.json create mode 100644 objects/vulnerability/vulnerability--01ee318e-189d-49fc-94c0-0bb4ba24b520.json create mode 100644 objects/vulnerability/vulnerability--04b5b430-f691-494c-b0d0-bdc7666ed9b6.json create mode 100644 objects/vulnerability/vulnerability--089e60b0-53af-4d6f-858a-93957459a2ad.json create mode 100644 objects/vulnerability/vulnerability--0cd88755-daae-445c-aadc-3ebe71d78737.json create mode 100644 objects/vulnerability/vulnerability--10a0a8d6-7440-4092-8238-7d91018a4150.json create mode 100644 objects/vulnerability/vulnerability--15224143-3098-4ba2-b49c-9b8ec025223e.json create mode 100644 objects/vulnerability/vulnerability--19cb36c4-3f45-4e2e-936d-765aaf5cb6a7.json create mode 100644 objects/vulnerability/vulnerability--1db9d64b-4944-4798-83dd-fa4462de887f.json create mode 100644 objects/vulnerability/vulnerability--24cb630e-1460-4804-a4b9-f1253a6a0f55.json create mode 100644 objects/vulnerability/vulnerability--2fdb26b5-ad39-4e35-a924-2f6fdbe115a3.json create mode 100644 objects/vulnerability/vulnerability--375c906b-55db-4aba-90e2-c99de7d8711d.json create mode 100644 objects/vulnerability/vulnerability--3c02b785-5719-4bf8-a0c2-deb33f59ce50.json create mode 100644 objects/vulnerability/vulnerability--3cb04f32-f689-4475-94b8-162d49bec670.json create mode 100644 objects/vulnerability/vulnerability--3dde3e5e-1823-49a3-8039-d9f8b6cca88c.json create mode 100644 objects/vulnerability/vulnerability--3f36173a-482a-42fd-a50c-909ce4b90497.json create mode 100644 objects/vulnerability/vulnerability--3fea440e-c0eb-495b-a3df-68d8608d09cf.json create mode 100644 objects/vulnerability/vulnerability--4342482c-7e4e-41fe-b02c-9ddcef013716.json create mode 100644 objects/vulnerability/vulnerability--52517846-4592-43b9-b615-fd42f9483352.json create mode 100644 objects/vulnerability/vulnerability--5281029c-c758-4aa1-b32f-de46594f22f8.json create mode 100644 objects/vulnerability/vulnerability--54fb52e0-ab02-4e4b-866d-070b24eadf4d.json create mode 100644 objects/vulnerability/vulnerability--567c057e-5f01-40db-9251-7954e0772e93.json create mode 100644 objects/vulnerability/vulnerability--58d74b99-de16-4db5-a042-fb40e39c9f92.json create mode 100644 objects/vulnerability/vulnerability--5c3e84b7-808e-4b1f-b6f9-8905dc05956b.json create mode 100644 objects/vulnerability/vulnerability--61a0de56-43c7-4e84-8767-b8dd00d5f26b.json create mode 100644 objects/vulnerability/vulnerability--69a2e77c-c5ac-48d4-b5c9-eefe4fba7d5a.json create mode 100644 objects/vulnerability/vulnerability--6bfc5384-e109-444b-8680-068086feebaa.json create mode 100644 objects/vulnerability/vulnerability--6f6022ab-4cf1-4589-b992-c49b8487860d.json create mode 100644 objects/vulnerability/vulnerability--757ca35c-c496-453c-a792-abcbea2ef613.json create mode 100644 objects/vulnerability/vulnerability--7805d1a8-327b-45d5-8106-9010229b89bf.json create mode 100644 objects/vulnerability/vulnerability--7f26a94e-b16e-4022-9744-1903f904e409.json create mode 100644 objects/vulnerability/vulnerability--8406610c-f29f-43a2-9845-f82b15040043.json create mode 100644 objects/vulnerability/vulnerability--87d3d686-d67e-4b42-89e8-94e6eb5b8a9c.json create mode 100644 objects/vulnerability/vulnerability--884f64eb-3a1b-4658-8d28-15421175d0af.json create mode 100644 objects/vulnerability/vulnerability--8cfa1ceb-7236-47d1-9666-93818785a2bf.json create mode 100644 objects/vulnerability/vulnerability--8f443ce9-e19d-4b3c-a3df-163934d8632d.json create mode 100644 objects/vulnerability/vulnerability--8f859827-ae8b-4221-9f74-3fa663de0175.json create mode 100644 objects/vulnerability/vulnerability--90637280-1077-4cf1-a6d5-6a89a238eb1c.json create mode 100644 objects/vulnerability/vulnerability--9445d72b-bd20-45b9-af61-2200eb6fdd69.json create mode 100644 objects/vulnerability/vulnerability--9583adb7-8aca-46eb-bba1-c8ce3f4df59f.json create mode 100644 objects/vulnerability/vulnerability--983b410e-9c75-4d2f-9f70-1fb3f70bc6c4.json create mode 100644 objects/vulnerability/vulnerability--9867ce77-6794-46db-9dbb-3a3269e4cf63.json create mode 100644 objects/vulnerability/vulnerability--9a813fce-8feb-4425-bf9c-678af52c944c.json create mode 100644 objects/vulnerability/vulnerability--9b67d269-4fee-4716-9eed-da45d67d1c57.json create mode 100644 objects/vulnerability/vulnerability--9c8c04be-46fe-4f4e-b6dc-c0c38704c4fc.json create mode 100644 objects/vulnerability/vulnerability--9d190988-a87e-4766-8cd2-fb482a3784cc.json create mode 100644 objects/vulnerability/vulnerability--9d6dffbe-b066-4b43-9c47-984d531eb3c0.json create mode 100644 objects/vulnerability/vulnerability--9e0ab9f6-3821-411a-9c2e-bb3138fc295a.json create mode 100644 objects/vulnerability/vulnerability--9e42de07-89d6-4bbb-b6b2-4164682672a8.json create mode 100644 objects/vulnerability/vulnerability--a01ded8d-514d-432d-9827-e6aaefbbdf22.json create mode 100644 objects/vulnerability/vulnerability--a2fddc50-743c-4c93-80ec-812038123286.json create mode 100644 objects/vulnerability/vulnerability--a4c910c2-4918-42f3-82c1-3220dde38862.json create mode 100644 objects/vulnerability/vulnerability--a77c7404-7c01-440b-a439-2e3fc8d4901c.json create mode 100644 objects/vulnerability/vulnerability--ada3cfb2-d3f9-47f6-a286-6ff7024284a5.json create mode 100644 objects/vulnerability/vulnerability--aecccf9b-0caa-4fc5-81a6-0c3b61aef0e2.json create mode 100644 objects/vulnerability/vulnerability--b2607de6-fa70-4d67-b067-7294dffa5f84.json create mode 100644 objects/vulnerability/vulnerability--baeb5b30-d6f5-4233-94c0-3dfed0d25437.json create mode 100644 objects/vulnerability/vulnerability--be25dfcb-805b-478f-a07d-95554e3ee187.json create mode 100644 objects/vulnerability/vulnerability--beb5e33e-0f40-4b5d-a8c7-88ee493d56f2.json create mode 100644 objects/vulnerability/vulnerability--bec7c0d8-b270-473f-a5cd-55382ab34b75.json create mode 100644 objects/vulnerability/vulnerability--c236625b-fa3b-411d-bbd7-7088c7af6f6c.json create mode 100644 objects/vulnerability/vulnerability--c3020694-c943-446e-ba55-c6c1202371ab.json create mode 100644 objects/vulnerability/vulnerability--c7e132fe-8c39-4769-a85f-a515fbdbc533.json create mode 100644 objects/vulnerability/vulnerability--cae32f1b-e6c6-4c02-b1d8-6fa88efe235a.json create mode 100644 objects/vulnerability/vulnerability--cb34ece0-c50c-484f-bbb9-68df6e3e8a57.json create mode 100644 objects/vulnerability/vulnerability--de09ad80-272b-4183-a61a-d3c482677f94.json create mode 100644 objects/vulnerability/vulnerability--e294e8bc-52e7-4051-8fdc-41358d8e293f.json create mode 100644 objects/vulnerability/vulnerability--e463e12a-c291-4f97-9139-f91d59192e20.json create mode 100644 objects/vulnerability/vulnerability--e649e165-beec-461a-a3ed-1e6a63933605.json create mode 100644 objects/vulnerability/vulnerability--e73907ce-4f15-4133-845c-e0cead89c683.json create mode 100644 objects/vulnerability/vulnerability--e967363c-939e-42f2-bc2c-b775a309f97f.json create mode 100644 objects/vulnerability/vulnerability--ea2e787e-e367-4ebe-946f-cd23c104068c.json create mode 100644 objects/vulnerability/vulnerability--ee1a8f88-8ab8-4b5f-a837-2306a1ddfa48.json create mode 100644 objects/vulnerability/vulnerability--f2696654-3d5c-4fbf-9637-5f46c9d16ddc.json create mode 100644 objects/vulnerability/vulnerability--f50704e6-f037-4290-a7e4-019ece8a7cfa.json create mode 100644 objects/vulnerability/vulnerability--f54e806d-0180-4213-9f3a-7201de4497c9.json create mode 100644 objects/vulnerability/vulnerability--f8c3780e-0190-433a-b926-15c014bd365d.json create mode 100644 objects/vulnerability/vulnerability--fa783a91-6292-477d-b69a-ec87c7172bb8.json create mode 100644 objects/vulnerability/vulnerability--feae5b3d-d106-4ba4-990a-6a2cb30118aa.json create mode 100644 objects/vulnerability/vulnerability--ff27d4c4-6494-4ed5-81d6-82ab71a9eedc.json create mode 100644 objects/vulnerability/vulnerability--ff6d6451-dfe4-48ba-8824-96dd024ad6c3.json create mode 100644 objects/vulnerability/vulnerability--ff756e09-9089-4edc-a139-898044a33c7d.json create mode 100644 objects/vulnerability/vulnerability--ff82dbb4-30ec-49e3-afeb-c1ac6f1f8f8d.json diff --git a/mapping.csv b/mapping.csv index a9ea581d786..794cdd399b1 100644 --- a/mapping.csv +++ b/mapping.csv @@ -250979,3 +250979,88 @@ vulnerability,CVE-2024-47391,vulnerability--771c6bbb-8a0f-47ac-805d-5bdb13d9a5b5 vulnerability,CVE-2024-47375,vulnerability--13f62cc7-44e3-437c-ad23-b1fb12e2f074 vulnerability,CVE-2024-47840,vulnerability--56305fe9-a6c0-4555-beff-61298e597579 vulnerability,CVE-2024-47395,vulnerability--52eecd0f-ff4d-4dcd-bc24-be1b277c0f48 +vulnerability,CVE-2024-45252,vulnerability--9583adb7-8aca-46eb-bba1-c8ce3f4df59f +vulnerability,CVE-2024-45251,vulnerability--8f443ce9-e19d-4b3c-a3df-163934d8632d +vulnerability,CVE-2024-45248,vulnerability--aecccf9b-0caa-4fc5-81a6-0c3b61aef0e2 +vulnerability,CVE-2024-45245,vulnerability--3c02b785-5719-4bf8-a0c2-deb33f59ce50 +vulnerability,CVE-2024-45246,vulnerability--7f26a94e-b16e-4022-9744-1903f904e409 +vulnerability,CVE-2024-45249,vulnerability--a01ded8d-514d-432d-9827-e6aaefbbdf22 +vulnerability,CVE-2024-45250,vulnerability--87d3d686-d67e-4b42-89e8-94e6eb5b8a9c +vulnerability,CVE-2024-45454,vulnerability--8cfa1ceb-7236-47d1-9666-93818785a2bf +vulnerability,CVE-2024-45247,vulnerability--6f6022ab-4cf1-4589-b992-c49b8487860d +vulnerability,CVE-2024-9560,vulnerability--9867ce77-6794-46db-9dbb-3a3269e4cf63 +vulnerability,CVE-2024-9561,vulnerability--19cb36c4-3f45-4e2e-936d-765aaf5cb6a7 +vulnerability,CVE-2024-9553,vulnerability--3dde3e5e-1823-49a3-8039-d9f8b6cca88c +vulnerability,CVE-2024-9563,vulnerability--567c057e-5f01-40db-9251-7954e0772e93 +vulnerability,CVE-2024-9554,vulnerability--01d646b9-d49e-4d96-856f-98baaa6af736 +vulnerability,CVE-2024-9549,vulnerability--52517846-4592-43b9-b615-fd42f9483352 +vulnerability,CVE-2024-9556,vulnerability--9d6dffbe-b066-4b43-9c47-984d531eb3c0 +vulnerability,CVE-2024-9558,vulnerability--9a813fce-8feb-4425-bf9c-678af52c944c +vulnerability,CVE-2024-9559,vulnerability--ff82dbb4-30ec-49e3-afeb-c1ac6f1f8f8d +vulnerability,CVE-2024-9550,vulnerability--90637280-1077-4cf1-a6d5-6a89a238eb1c +vulnerability,CVE-2024-9557,vulnerability--9e42de07-89d6-4bbb-b6b2-4164682672a8 +vulnerability,CVE-2024-9555,vulnerability--5c3e84b7-808e-4b1f-b6f9-8905dc05956b +vulnerability,CVE-2024-9551,vulnerability--e649e165-beec-461a-a3ed-1e6a63933605 +vulnerability,CVE-2024-9552,vulnerability--bec7c0d8-b270-473f-a5cd-55382ab34b75 +vulnerability,CVE-2024-9562,vulnerability--01ee318e-189d-49fc-94c0-0bb4ba24b520 +vulnerability,CVE-2024-44042,vulnerability--c7e132fe-8c39-4769-a85f-a515fbdbc533 +vulnerability,CVE-2024-44027,vulnerability--24cb630e-1460-4804-a4b9-f1253a6a0f55 +vulnerability,CVE-2024-44029,vulnerability--beb5e33e-0f40-4b5d-a8c7-88ee493d56f2 +vulnerability,CVE-2024-44033,vulnerability--58d74b99-de16-4db5-a042-fb40e39c9f92 +vulnerability,CVE-2024-44040,vulnerability--be25dfcb-805b-478f-a07d-95554e3ee187 +vulnerability,CVE-2024-44032,vulnerability--7805d1a8-327b-45d5-8106-9010229b89bf +vulnerability,CVE-2024-44010,vulnerability--fa783a91-6292-477d-b69a-ec87c7172bb8 +vulnerability,CVE-2024-44045,vulnerability--de09ad80-272b-4183-a61a-d3c482677f94 +vulnerability,CVE-2024-44025,vulnerability--375c906b-55db-4aba-90e2-c99de7d8711d +vulnerability,CVE-2024-44024,vulnerability--f54e806d-0180-4213-9f3a-7201de4497c9 +vulnerability,CVE-2024-44028,vulnerability--0cd88755-daae-445c-aadc-3ebe71d78737 +vulnerability,CVE-2024-44022,vulnerability--e294e8bc-52e7-4051-8fdc-41358d8e293f +vulnerability,CVE-2024-44039,vulnerability--feae5b3d-d106-4ba4-990a-6a2cb30118aa +vulnerability,CVE-2024-44026,vulnerability--4342482c-7e4e-41fe-b02c-9ddcef013716 +vulnerability,CVE-2024-44037,vulnerability--01e079e0-4693-400d-ba2c-a77c7318159a +vulnerability,CVE-2024-44036,vulnerability--69a2e77c-c5ac-48d4-b5c9-eefe4fba7d5a +vulnerability,CVE-2024-44043,vulnerability--ff27d4c4-6494-4ed5-81d6-82ab71a9eedc +vulnerability,CVE-2024-44041,vulnerability--10a0a8d6-7440-4092-8238-7d91018a4150 +vulnerability,CVE-2024-44035,vulnerability--c236625b-fa3b-411d-bbd7-7088c7af6f6c +vulnerability,CVE-2024-44046,vulnerability--baeb5b30-d6f5-4233-94c0-3dfed0d25437 +vulnerability,CVE-2024-47336,vulnerability--ada3cfb2-d3f9-47f6-a286-6ff7024284a5 +vulnerability,CVE-2024-47360,vulnerability--f2696654-3d5c-4fbf-9637-5f46c9d16ddc +vulnerability,CVE-2024-47348,vulnerability--cae32f1b-e6c6-4c02-b1d8-6fa88efe235a +vulnerability,CVE-2024-47345,vulnerability--54fb52e0-ab02-4e4b-866d-070b24eadf4d +vulnerability,CVE-2024-47366,vulnerability--e73907ce-4f15-4133-845c-e0cead89c683 +vulnerability,CVE-2024-47310,vulnerability--3cb04f32-f689-4475-94b8-162d49bec670 +vulnerability,CVE-2024-47326,vulnerability--6bfc5384-e109-444b-8680-068086feebaa +vulnerability,CVE-2024-47364,vulnerability--e967363c-939e-42f2-bc2c-b775a309f97f +vulnerability,CVE-2024-47306,vulnerability--00c2e140-ff99-4ec9-ab33-9f07c102a6ea +vulnerability,CVE-2024-47340,vulnerability--884f64eb-3a1b-4658-8d28-15421175d0af +vulnerability,CVE-2024-47650,vulnerability--a4c910c2-4918-42f3-82c1-3220dde38862 +vulnerability,CVE-2024-47355,vulnerability--a77c7404-7c01-440b-a439-2e3fc8d4901c +vulnerability,CVE-2024-47307,vulnerability--b2607de6-fa70-4d67-b067-7294dffa5f84 +vulnerability,CVE-2024-47301,vulnerability--a2fddc50-743c-4c93-80ec-812038123286 +vulnerability,CVE-2024-47300,vulnerability--3f36173a-482a-42fd-a50c-909ce4b90497 +vulnerability,CVE-2024-47365,vulnerability--c3020694-c943-446e-ba55-c6c1202371ab +vulnerability,CVE-2024-47347,vulnerability--ff756e09-9089-4edc-a139-898044a33c7d +vulnerability,CVE-2024-47356,vulnerability--cb34ece0-c50c-484f-bbb9-68df6e3e8a57 +vulnerability,CVE-2024-47357,vulnerability--04b5b430-f691-494c-b0d0-bdc7666ed9b6 +vulnerability,CVE-2024-47333,vulnerability--15224143-3098-4ba2-b49c-9b8ec025223e +vulnerability,CVE-2024-47320,vulnerability--9d190988-a87e-4766-8cd2-fb482a3784cc +vulnerability,CVE-2024-47349,vulnerability--089e60b0-53af-4d6f-858a-93957459a2ad +vulnerability,CVE-2024-47299,vulnerability--983b410e-9c75-4d2f-9f70-1fb3f70bc6c4 +vulnerability,CVE-2024-47338,vulnerability--ff6d6451-dfe4-48ba-8824-96dd024ad6c3 +vulnerability,CVE-2024-47329,vulnerability--5281029c-c758-4aa1-b32f-de46594f22f8 +vulnerability,CVE-2024-47332,vulnerability--757ca35c-c496-453c-a792-abcbea2ef613 +vulnerability,CVE-2024-47341,vulnerability--ee1a8f88-8ab8-4b5f-a837-2306a1ddfa48 +vulnerability,CVE-2024-47313,vulnerability--2fdb26b5-ad39-4e35-a924-2f6fdbe115a3 +vulnerability,CVE-2024-47350,vulnerability--3fea440e-c0eb-495b-a3df-68d8608d09cf +vulnerability,CVE-2024-47367,vulnerability--9b67d269-4fee-4716-9eed-da45d67d1c57 +vulnerability,CVE-2024-47346,vulnerability--f50704e6-f037-4290-a7e4-019ece8a7cfa +vulnerability,CVE-2024-47363,vulnerability--1db9d64b-4944-4798-83dd-fa4462de887f +vulnerability,CVE-2024-47297,vulnerability--9445d72b-bd20-45b9-af61-2200eb6fdd69 +vulnerability,CVE-2024-47298,vulnerability--e463e12a-c291-4f97-9139-f91d59192e20 +vulnerability,CVE-2024-47322,vulnerability--61a0de56-43c7-4e84-8767-b8dd00d5f26b +vulnerability,CVE-2024-47368,vulnerability--ea2e787e-e367-4ebe-946f-cd23c104068c +vulnerability,CVE-2024-47343,vulnerability--9e0ab9f6-3821-411a-9c2e-bb3138fc295a +vulnerability,CVE-2024-47342,vulnerability--8f859827-ae8b-4221-9f74-3fa663de0175 +vulnerability,CVE-2024-47327,vulnerability--f8c3780e-0190-433a-b926-15c014bd365d +vulnerability,CVE-2024-47352,vulnerability--9c8c04be-46fe-4f4e-b6dc-c0c38704c4fc +vulnerability,CVE-2024-47339,vulnerability--8406610c-f29f-43a2-9845-f82b15040043 diff --git a/objects/vulnerability/vulnerability--00c2e140-ff99-4ec9-ab33-9f07c102a6ea.json b/objects/vulnerability/vulnerability--00c2e140-ff99-4ec9-ab33-9f07c102a6ea.json new file mode 100644 index 00000000000..72d1c0a72cb --- /dev/null +++ b/objects/vulnerability/vulnerability--00c2e140-ff99-4ec9-ab33-9f07c102a6ea.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--95bb880f-ce66-44b1-8f23-11c2413b27e7", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--00c2e140-ff99-4ec9-ab33-9f07c102a6ea", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.378909Z", + "modified": "2024-10-07T00:38:04.378909Z", + "name": "CVE-2024-47306", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Copy Content Protection Team Secure Copy Content Protection and Content Locking allows Stored XSS.This issue affects Secure Copy Content Protection and Content Locking: from n/a through 4.2.3.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47306" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--01d646b9-d49e-4d96-856f-98baaa6af736.json b/objects/vulnerability/vulnerability--01d646b9-d49e-4d96-856f-98baaa6af736.json new file mode 100644 index 00000000000..8f6f7d0444a --- /dev/null +++ b/objects/vulnerability/vulnerability--01d646b9-d49e-4d96-856f-98baaa6af736.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4f4f5414-22de-410b-ba2d-e004f6b12e7e", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--01d646b9-d49e-4d96-856f-98baaa6af736", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.096387Z", + "modified": "2024-10-07T00:38:03.096387Z", + "name": "CVE-2024-9554", + "description": "A vulnerability classified as problematic was found in Sovell Smart Canteen System up to 3.0.7303.30513. Affected by this vulnerability is the function Check_ET_CheckPwdz201 of the file suanfa.py of the component Password Reset Handler. The manipulation leads to authorization bypass. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9554" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--01e079e0-4693-400d-ba2c-a77c7318159a.json b/objects/vulnerability/vulnerability--01e079e0-4693-400d-ba2c-a77c7318159a.json new file mode 100644 index 00000000000..71158a83573 --- /dev/null +++ b/objects/vulnerability/vulnerability--01e079e0-4693-400d-ba2c-a77c7318159a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--8f6cfd07-61a1-463e-805d-a11dee7a9138", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--01e079e0-4693-400d-ba2c-a77c7318159a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.761151Z", + "modified": "2024-10-07T00:38:03.761151Z", + "name": "CVE-2024-44037", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in MagePeople Team Multipurpose Ticket Booking Manager allows Stored XSS.This issue affects Multipurpose Ticket Booking Manager: from n/a through 4.2.2.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-44037" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--01ee318e-189d-49fc-94c0-0bb4ba24b520.json b/objects/vulnerability/vulnerability--01ee318e-189d-49fc-94c0-0bb4ba24b520.json new file mode 100644 index 00000000000..4653b3290e0 --- /dev/null +++ b/objects/vulnerability/vulnerability--01ee318e-189d-49fc-94c0-0bb4ba24b520.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--5c93a15b-9be8-4500-bf4f-532564da8066", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--01ee318e-189d-49fc-94c0-0bb4ba24b520", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.130822Z", + "modified": "2024-10-07T00:38:03.130822Z", + "name": "CVE-2024-9562", + "description": "A vulnerability classified as critical was found in D-Link DIR-605L 2.13B01 BETA. This vulnerability affects the function formSetWizard1/formSetWizard2. The manipulation of the argument curTime leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9562" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--04b5b430-f691-494c-b0d0-bdc7666ed9b6.json b/objects/vulnerability/vulnerability--04b5b430-f691-494c-b0d0-bdc7666ed9b6.json new file mode 100644 index 00000000000..3d9d5f678fb --- /dev/null +++ b/objects/vulnerability/vulnerability--04b5b430-f691-494c-b0d0-bdc7666ed9b6.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--acffe8e0-d381-413d-b006-c0a6dc634066", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--04b5b430-f691-494c-b0d0-bdc7666ed9b6", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.397082Z", + "modified": "2024-10-07T00:38:04.397082Z", + "name": "CVE-2024-47357", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Leevio Happy Addons for Elementor allows Stored XSS.This issue affects Happy Addons for Elementor: from n/a through 3.12.0.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47357" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--089e60b0-53af-4d6f-858a-93957459a2ad.json b/objects/vulnerability/vulnerability--089e60b0-53af-4d6f-858a-93957459a2ad.json new file mode 100644 index 00000000000..9acf99eb8fb --- /dev/null +++ b/objects/vulnerability/vulnerability--089e60b0-53af-4d6f-858a-93957459a2ad.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3fea7211-9be7-442e-81d7-b562c3678a56", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--089e60b0-53af-4d6f-858a-93957459a2ad", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.402662Z", + "modified": "2024-10-07T00:38:04.402662Z", + "name": "CVE-2024-47349", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPMobile.App allows Reflected XSS.This issue affects WPMobile.App: from n/a through 11.50.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47349" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0cd88755-daae-445c-aadc-3ebe71d78737.json b/objects/vulnerability/vulnerability--0cd88755-daae-445c-aadc-3ebe71d78737.json new file mode 100644 index 00000000000..15021340208 --- /dev/null +++ b/objects/vulnerability/vulnerability--0cd88755-daae-445c-aadc-3ebe71d78737.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--46ee052b-24e1-4ea1-8a1f-974f1ad6e97a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0cd88755-daae-445c-aadc-3ebe71d78737", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.746414Z", + "modified": "2024-10-07T00:38:03.746414Z", + "name": "CVE-2024-44028", + "description": "Cross-Site Request Forgery (CSRF) vulnerability in Nicejob NiceJob allows Stored XSS.This issue affects NiceJob: from n/a before 3.6.5.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-44028" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--10a0a8d6-7440-4092-8238-7d91018a4150.json b/objects/vulnerability/vulnerability--10a0a8d6-7440-4092-8238-7d91018a4150.json new file mode 100644 index 00000000000..aa04a9ee183 --- /dev/null +++ b/objects/vulnerability/vulnerability--10a0a8d6-7440-4092-8238-7d91018a4150.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--7400e6be-dae3-42e3-acb7-313bc21fa027", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--10a0a8d6-7440-4092-8238-7d91018a4150", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.768107Z", + "modified": "2024-10-07T00:38:03.768107Z", + "name": "CVE-2024-44041", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Martin Gibson IdeaPush allows Stored XSS.This issue affects IdeaPush: from n/a through 8.66.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-44041" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--15224143-3098-4ba2-b49c-9b8ec025223e.json b/objects/vulnerability/vulnerability--15224143-3098-4ba2-b49c-9b8ec025223e.json new file mode 100644 index 00000000000..77f5870e919 --- /dev/null +++ b/objects/vulnerability/vulnerability--15224143-3098-4ba2-b49c-9b8ec025223e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--6dd038c9-7960-4217-aa32-97f33d786a1a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--15224143-3098-4ba2-b49c-9b8ec025223e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.400514Z", + "modified": "2024-10-07T00:38:04.400514Z", + "name": "CVE-2024-47333", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Team Tangible Loops & Logic allows Reflected XSS.This issue affects Loops & Logic: from n/a through 4.1.4.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47333" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--19cb36c4-3f45-4e2e-936d-765aaf5cb6a7.json b/objects/vulnerability/vulnerability--19cb36c4-3f45-4e2e-936d-765aaf5cb6a7.json new file mode 100644 index 00000000000..0198b27519d --- /dev/null +++ b/objects/vulnerability/vulnerability--19cb36c4-3f45-4e2e-936d-765aaf5cb6a7.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--8c95c66f-b4c3-4609-ba66-a6c6dc5d37e7", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--19cb36c4-3f45-4e2e-936d-765aaf5cb6a7", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.088747Z", + "modified": "2024-10-07T00:38:03.088747Z", + "name": "CVE-2024-9561", + "description": "A vulnerability classified as critical has been found in D-Link DIR-605L 2.13B01 BETA. This affects the function formSetWAN_Wizard51/formSetWAN_Wizard52. The manipulation of the argument curTime leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9561" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--1db9d64b-4944-4798-83dd-fa4462de887f.json b/objects/vulnerability/vulnerability--1db9d64b-4944-4798-83dd-fa4462de887f.json new file mode 100644 index 00000000000..fa9cfb104ea --- /dev/null +++ b/objects/vulnerability/vulnerability--1db9d64b-4944-4798-83dd-fa4462de887f.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--112f07d3-13cc-4da8-9a05-ab89e5dce394", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--1db9d64b-4944-4798-83dd-fa4462de887f", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.425065Z", + "modified": "2024-10-07T00:38:04.425065Z", + "name": "CVE-2024-47363", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Blockspare allows Stored XSS.This issue affects Blockspare: from n/a through 3.2.4.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47363" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--24cb630e-1460-4804-a4b9-f1253a6a0f55.json b/objects/vulnerability/vulnerability--24cb630e-1460-4804-a4b9-f1253a6a0f55.json new file mode 100644 index 00000000000..5d51176421f --- /dev/null +++ b/objects/vulnerability/vulnerability--24cb630e-1460-4804-a4b9-f1253a6a0f55.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3d8d25a1-e9af-401f-924b-ff72b460262e", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--24cb630e-1460-4804-a4b9-f1253a6a0f55", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.721194Z", + "modified": "2024-10-07T00:38:03.721194Z", + "name": "CVE-2024-44027", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in TemeGUM Gum Elementor Addon allows Stored XSS.This issue affects Gum Elementor Addon: from n/a through 1.3.6.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-44027" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--2fdb26b5-ad39-4e35-a924-2f6fdbe115a3.json b/objects/vulnerability/vulnerability--2fdb26b5-ad39-4e35-a924-2f6fdbe115a3.json new file mode 100644 index 00000000000..c194905c6af --- /dev/null +++ b/objects/vulnerability/vulnerability--2fdb26b5-ad39-4e35-a924-2f6fdbe115a3.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--2a5d537c-d331-4d5c-a19e-b329852218ee", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--2fdb26b5-ad39-4e35-a924-2f6fdbe115a3", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.416509Z", + "modified": "2024-10-07T00:38:04.416509Z", + "name": "CVE-2024-47313", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Catch Themes Catch Base allows Stored XSS.This issue affects Catch Base: from n/a through 3.4.6.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47313" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--375c906b-55db-4aba-90e2-c99de7d8711d.json b/objects/vulnerability/vulnerability--375c906b-55db-4aba-90e2-c99de7d8711d.json new file mode 100644 index 00000000000..bce09e36d9b --- /dev/null +++ b/objects/vulnerability/vulnerability--375c906b-55db-4aba-90e2-c99de7d8711d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ffb7bf1b-b0a7-4157-b6a6-87021b43258d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--375c906b-55db-4aba-90e2-c99de7d8711d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.741964Z", + "modified": "2024-10-07T00:38:03.741964Z", + "name": "CVE-2024-44025", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Nicejob NiceJob allows Stored XSS.This issue affects NiceJob: from n/a before 3.6.5.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-44025" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--3c02b785-5719-4bf8-a0c2-deb33f59ce50.json b/objects/vulnerability/vulnerability--3c02b785-5719-4bf8-a0c2-deb33f59ce50.json new file mode 100644 index 00000000000..9182781c58d --- /dev/null +++ b/objects/vulnerability/vulnerability--3c02b785-5719-4bf8-a0c2-deb33f59ce50.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9c981448-a79b-4b66-b268-38d43334db0f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--3c02b785-5719-4bf8-a0c2-deb33f59ce50", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:02.929627Z", + "modified": "2024-10-07T00:38:02.929627Z", + "name": "CVE-2024-45245", + "description": "Diebold Nixdorf – CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-45245" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--3cb04f32-f689-4475-94b8-162d49bec670.json b/objects/vulnerability/vulnerability--3cb04f32-f689-4475-94b8-162d49bec670.json new file mode 100644 index 00000000000..c5cc4bda303 --- /dev/null +++ b/objects/vulnerability/vulnerability--3cb04f32-f689-4475-94b8-162d49bec670.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--39fea606-9c7a-4c52-8ec0-f316fcebfaa3", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--3cb04f32-f689-4475-94b8-162d49bec670", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.374472Z", + "modified": "2024-10-07T00:38:04.374472Z", + "name": "CVE-2024-47310", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ARI Soft ARI Fancy Lightbox allows Stored XSS.This issue affects ARI Fancy Lightbox: from n/a through 1.3.17.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47310" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--3dde3e5e-1823-49a3-8039-d9f8b6cca88c.json b/objects/vulnerability/vulnerability--3dde3e5e-1823-49a3-8039-d9f8b6cca88c.json new file mode 100644 index 00000000000..51527eed605 --- /dev/null +++ b/objects/vulnerability/vulnerability--3dde3e5e-1823-49a3-8039-d9f8b6cca88c.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b086db93-5082-4b48-9064-43f9413b14a0", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--3dde3e5e-1823-49a3-8039-d9f8b6cca88c", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.090354Z", + "modified": "2024-10-07T00:38:03.090354Z", + "name": "CVE-2024-9553", + "description": "A vulnerability classified as critical has been found in D-Link DIR-605L 2.13B01 BETA. This affects the function formdumpeasysetup of the file /goform/formdumpeasysetup. The manipulation of the argument curTime leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9553" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--3f36173a-482a-42fd-a50c-909ce4b90497.json b/objects/vulnerability/vulnerability--3f36173a-482a-42fd-a50c-909ce4b90497.json new file mode 100644 index 00000000000..6ab6b276deb --- /dev/null +++ b/objects/vulnerability/vulnerability--3f36173a-482a-42fd-a50c-909ce4b90497.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1c46a91d-cf13-45f9-ad7f-e89b5795bb2c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--3f36173a-482a-42fd-a50c-909ce4b90497", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.389801Z", + "modified": "2024-10-07T00:38:04.389801Z", + "name": "CVE-2024-47300", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CubeWP CubeWP Forms – All-in-One Form Builder allows Stored XSS.This issue affects CubeWP Forms – All-in-One Form Builder: from n/a through 1.1.1.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47300" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--3fea440e-c0eb-495b-a3df-68d8608d09cf.json b/objects/vulnerability/vulnerability--3fea440e-c0eb-495b-a3df-68d8608d09cf.json new file mode 100644 index 00000000000..833fb6b6740 --- /dev/null +++ b/objects/vulnerability/vulnerability--3fea440e-c0eb-495b-a3df-68d8608d09cf.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3d49ee03-04ba-4b51-be27-c809cc0b1ea8", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--3fea440e-c0eb-495b-a3df-68d8608d09cf", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.417529Z", + "modified": "2024-10-07T00:38:04.417529Z", + "name": "CVE-2024-47350", + "description": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in YITH YITH WooCommerce Ajax Search allows SQL Injection.This issue affects YITH WooCommerce Ajax Search: from n/a through 2.8.0.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47350" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--4342482c-7e4e-41fe-b02c-9ddcef013716.json b/objects/vulnerability/vulnerability--4342482c-7e4e-41fe-b02c-9ddcef013716.json new file mode 100644 index 00000000000..408587a438e --- /dev/null +++ b/objects/vulnerability/vulnerability--4342482c-7e4e-41fe-b02c-9ddcef013716.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9e87cef6-77d2-4278-950f-4823323878e6", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--4342482c-7e4e-41fe-b02c-9ddcef013716", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.759202Z", + "modified": "2024-10-07T00:38:03.759202Z", + "name": "CVE-2024-44026", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in NicheAddons Charity Addon for Elementor allows Stored XSS.This issue affects Charity Addon for Elementor: from n/a through 1.3.0.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-44026" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--52517846-4592-43b9-b615-fd42f9483352.json b/objects/vulnerability/vulnerability--52517846-4592-43b9-b615-fd42f9483352.json new file mode 100644 index 00000000000..de1487d1a4a --- /dev/null +++ b/objects/vulnerability/vulnerability--52517846-4592-43b9-b615-fd42f9483352.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--8b8cae36-cc85-4435-abce-7330fb556cd0", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--52517846-4592-43b9-b615-fd42f9483352", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.099718Z", + "modified": "2024-10-07T00:38:03.099718Z", + "name": "CVE-2024-9549", + "description": "A vulnerability was found in D-Link DIR-605L 2.13B01 BETA and classified as critical. This issue affects the function formEasySetupWizard/formEasySetupWizard2 of the file /goform/formEasySetupWizard. The manipulation of the argument curTime leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9549" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--5281029c-c758-4aa1-b32f-de46594f22f8.json b/objects/vulnerability/vulnerability--5281029c-c758-4aa1-b32f-de46594f22f8.json new file mode 100644 index 00000000000..db59fe231e7 --- /dev/null +++ b/objects/vulnerability/vulnerability--5281029c-c758-4aa1-b32f-de46594f22f8.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3185338c-b1b1-4e57-878d-a945d19c0d7b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--5281029c-c758-4aa1-b32f-de46594f22f8", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.410162Z", + "modified": "2024-10-07T00:38:04.410162Z", + "name": "CVE-2024-47329", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in QuomodoSoft ElementsReady Addons for Elementor allows Stored XSS.This issue affects ElementsReady Addons for Elementor: from n/a through 6.4.0.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47329" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--54fb52e0-ab02-4e4b-866d-070b24eadf4d.json b/objects/vulnerability/vulnerability--54fb52e0-ab02-4e4b-866d-070b24eadf4d.json new file mode 100644 index 00000000000..53c08f69e1e --- /dev/null +++ b/objects/vulnerability/vulnerability--54fb52e0-ab02-4e4b-866d-070b24eadf4d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--0d3fa7f1-144a-4582-b9cc-d262cffd56b8", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--54fb52e0-ab02-4e4b-866d-070b24eadf4d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.371755Z", + "modified": "2024-10-07T00:38:04.371755Z", + "name": "CVE-2024-47345", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Brainstorm Force Starter Templates allows Stored XSS.This issue affects Starter Templates: from n/a through 4.4.0.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47345" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--567c057e-5f01-40db-9251-7954e0772e93.json b/objects/vulnerability/vulnerability--567c057e-5f01-40db-9251-7954e0772e93.json new file mode 100644 index 00000000000..bcb388c898a --- /dev/null +++ b/objects/vulnerability/vulnerability--567c057e-5f01-40db-9251-7954e0772e93.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--cc4db287-9f24-4d7a-9168-8dac5df396fb", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--567c057e-5f01-40db-9251-7954e0772e93", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.092065Z", + "modified": "2024-10-07T00:38:03.092065Z", + "name": "CVE-2024-9563", + "description": "A vulnerability, which was classified as critical, has been found in D-Link DIR-605L 2.13B01 BETA. This issue affects the function formWlanSetup_Wizard of the file /goform/formWlanSetup_Wizard. The manipulation of the argument webpage leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9563" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--58d74b99-de16-4db5-a042-fb40e39c9f92.json b/objects/vulnerability/vulnerability--58d74b99-de16-4db5-a042-fb40e39c9f92.json new file mode 100644 index 00000000000..639b08fb167 --- /dev/null +++ b/objects/vulnerability/vulnerability--58d74b99-de16-4db5-a042-fb40e39c9f92.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--58220f41-3beb-4b0d-8ff0-33436a9387ae", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--58d74b99-de16-4db5-a042-fb40e39c9f92", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.730198Z", + "modified": "2024-10-07T00:38:03.730198Z", + "name": "CVE-2024-44033", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in NicheAddons Primary Addon for Elementor allows Stored XSS.This issue affects Primary Addon for Elementor: from n/a through 1.5.7.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-44033" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--5c3e84b7-808e-4b1f-b6f9-8905dc05956b.json b/objects/vulnerability/vulnerability--5c3e84b7-808e-4b1f-b6f9-8905dc05956b.json new file mode 100644 index 00000000000..56d51f3d759 --- /dev/null +++ b/objects/vulnerability/vulnerability--5c3e84b7-808e-4b1f-b6f9-8905dc05956b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--dc4550b3-f27f-4dbe-ab9f-15df15307211", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--5c3e84b7-808e-4b1f-b6f9-8905dc05956b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.123554Z", + "modified": "2024-10-07T00:38:03.123554Z", + "name": "CVE-2024-9555", + "description": "A vulnerability, which was classified as critical, has been found in D-Link DIR-605L 2.13B01 BETA. Affected by this issue is the function formSetEasy_Wizard of the file /goform/formSetEasy_Wizard. The manipulation of the argument curTime leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9555" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--61a0de56-43c7-4e84-8767-b8dd00d5f26b.json b/objects/vulnerability/vulnerability--61a0de56-43c7-4e84-8767-b8dd00d5f26b.json new file mode 100644 index 00000000000..eecda4dec7e --- /dev/null +++ b/objects/vulnerability/vulnerability--61a0de56-43c7-4e84-8767-b8dd00d5f26b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--dd01450a-6640-42f7-b3cb-b9decf7f4199", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--61a0de56-43c7-4e84-8767-b8dd00d5f26b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.429225Z", + "modified": "2024-10-07T00:38:04.429225Z", + "name": "CVE-2024-47322", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ex-Themes WP Timeline – Vertical and Horizontal timeline plugin allows Reflected XSS.This issue affects WP Timeline – Vertical and Horizontal timeline plugin: from n/a through 3.6.7.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47322" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--69a2e77c-c5ac-48d4-b5c9-eefe4fba7d5a.json b/objects/vulnerability/vulnerability--69a2e77c-c5ac-48d4-b5c9-eefe4fba7d5a.json new file mode 100644 index 00000000000..24bbbff8d72 --- /dev/null +++ b/objects/vulnerability/vulnerability--69a2e77c-c5ac-48d4-b5c9-eefe4fba7d5a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4e807058-af12-4067-ae32-070782f2a72c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--69a2e77c-c5ac-48d4-b5c9-eefe4fba7d5a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.763643Z", + "modified": "2024-10-07T00:38:03.763643Z", + "name": "CVE-2024-44036", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Pierre Lebedel Kodex Posts likes allows Stored XSS.This issue affects Kodex Posts likes: from n/a through 2.5.0.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-44036" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--6bfc5384-e109-444b-8680-068086feebaa.json b/objects/vulnerability/vulnerability--6bfc5384-e109-444b-8680-068086feebaa.json new file mode 100644 index 00000000000..415dc6cad57 --- /dev/null +++ b/objects/vulnerability/vulnerability--6bfc5384-e109-444b-8680-068086feebaa.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d73e09c2-3cd1-41e4-8bad-556c6663983d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--6bfc5384-e109-444b-8680-068086feebaa", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.376147Z", + "modified": "2024-10-07T00:38:04.376147Z", + "name": "CVE-2024-47326", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ILLID Share This Image allows Reflected XSS.This issue affects Share This Image: from n/a through 2.01.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47326" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--6f6022ab-4cf1-4589-b992-c49b8487860d.json b/objects/vulnerability/vulnerability--6f6022ab-4cf1-4589-b992-c49b8487860d.json new file mode 100644 index 00000000000..3148b42855e --- /dev/null +++ b/objects/vulnerability/vulnerability--6f6022ab-4cf1-4589-b992-c49b8487860d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ece3353f-f6d8-419f-ab9d-a52d8e2df365", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--6f6022ab-4cf1-4589-b992-c49b8487860d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:02.962498Z", + "modified": "2024-10-07T00:38:02.962498Z", + "name": "CVE-2024-45247", + "description": "Sonarr – CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-45247" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--757ca35c-c496-453c-a792-abcbea2ef613.json b/objects/vulnerability/vulnerability--757ca35c-c496-453c-a792-abcbea2ef613.json new file mode 100644 index 00000000000..25003e34c25 --- /dev/null +++ b/objects/vulnerability/vulnerability--757ca35c-c496-453c-a792-abcbea2ef613.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d522d434-3972-4e8e-99a2-dfdf67bf7d01", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--757ca35c-c496-453c-a792-abcbea2ef613", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.411409Z", + "modified": "2024-10-07T00:38:04.411409Z", + "name": "CVE-2024-47332", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in wowDevs Sky Addons for Elementor allows Stored XSS.This issue affects Sky Addons for Elementor: from n/a through 2.5.11.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47332" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7805d1a8-327b-45d5-8106-9010229b89bf.json b/objects/vulnerability/vulnerability--7805d1a8-327b-45d5-8106-9010229b89bf.json new file mode 100644 index 00000000000..62bad6ca593 --- /dev/null +++ b/objects/vulnerability/vulnerability--7805d1a8-327b-45d5-8106-9010229b89bf.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c622bda3-4318-40c8-a334-52be9ea8a324", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7805d1a8-327b-45d5-8106-9010229b89bf", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.734788Z", + "modified": "2024-10-07T00:38:03.734788Z", + "name": "CVE-2024-44032", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in NicheAddons Restaurant & Cafe Addon for Elementor allows Stored XSS.This issue affects Restaurant & Cafe Addon for Elementor: from n/a through 1.5.5.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-44032" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7f26a94e-b16e-4022-9744-1903f904e409.json b/objects/vulnerability/vulnerability--7f26a94e-b16e-4022-9744-1903f904e409.json new file mode 100644 index 00000000000..3e5cde5ffa5 --- /dev/null +++ b/objects/vulnerability/vulnerability--7f26a94e-b16e-4022-9744-1903f904e409.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--7f51bec1-5047-442b-bc9b-813aae153f2b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7f26a94e-b16e-4022-9744-1903f904e409", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:02.932395Z", + "modified": "2024-10-07T00:38:02.932395Z", + "name": "CVE-2024-45246", + "description": "Diebold Nixdorf – CWE-427: Uncontrolled Search Path Element", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-45246" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8406610c-f29f-43a2-9845-f82b15040043.json b/objects/vulnerability/vulnerability--8406610c-f29f-43a2-9845-f82b15040043.json new file mode 100644 index 00000000000..784a54536e9 --- /dev/null +++ b/objects/vulnerability/vulnerability--8406610c-f29f-43a2-9845-f82b15040043.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b42a3cee-0a5b-4719-97e6-e5ce46ad1230", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8406610c-f29f-43a2-9845-f82b15040043", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.442385Z", + "modified": "2024-10-07T00:38:04.442385Z", + "name": "CVE-2024-47339", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in James Ward WP Mail Catcher allows Reflected XSS.This issue affects WP Mail Catcher: from n/a through 2.1.9.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47339" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--87d3d686-d67e-4b42-89e8-94e6eb5b8a9c.json b/objects/vulnerability/vulnerability--87d3d686-d67e-4b42-89e8-94e6eb5b8a9c.json new file mode 100644 index 00000000000..6e6e001cb5d --- /dev/null +++ b/objects/vulnerability/vulnerability--87d3d686-d67e-4b42-89e8-94e6eb5b8a9c.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b121ada8-3171-40af-88ab-1a3ebea973fa", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--87d3d686-d67e-4b42-89e8-94e6eb5b8a9c", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:02.956785Z", + "modified": "2024-10-07T00:38:02.956785Z", + "name": "CVE-2024-45250", + "description": "ZKteco – CWE 200 Exposure of Sensitive Information to an Unauthorized Actor", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-45250" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--884f64eb-3a1b-4658-8d28-15421175d0af.json b/objects/vulnerability/vulnerability--884f64eb-3a1b-4658-8d28-15421175d0af.json new file mode 100644 index 00000000000..596e3824e02 --- /dev/null +++ b/objects/vulnerability/vulnerability--884f64eb-3a1b-4658-8d28-15421175d0af.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--92c164fe-188f-4834-8948-52ae92bc508c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--884f64eb-3a1b-4658-8d28-15421175d0af", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.380109Z", + "modified": "2024-10-07T00:38:04.380109Z", + "name": "CVE-2024-47340", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in PickPlugins Post Grid and Gutenberg Blocks allows Stored XSS.This issue affects Post Grid and Gutenberg Blocks: from n/a through 2.2.89.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47340" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8cfa1ceb-7236-47d1-9666-93818785a2bf.json b/objects/vulnerability/vulnerability--8cfa1ceb-7236-47d1-9666-93818785a2bf.json new file mode 100644 index 00000000000..27ee65fd590 --- /dev/null +++ b/objects/vulnerability/vulnerability--8cfa1ceb-7236-47d1-9666-93818785a2bf.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--44d7b24e-89e7-4eae-850d-325c126624f5", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8cfa1ceb-7236-47d1-9666-93818785a2bf", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:02.958037Z", + "modified": "2024-10-07T00:38:02.958037Z", + "name": "CVE-2024-45454", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Unlimited Elements Unlimited Elements For Elementor (Free Widgets, Addons, Templates) allows Reflected XSS.This issue affects Unlimited Elements For Elementor (Free Widgets, Addons, Templates): from n/a through 1.5.121.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-45454" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8f443ce9-e19d-4b3c-a3df-163934d8632d.json b/objects/vulnerability/vulnerability--8f443ce9-e19d-4b3c-a3df-163934d8632d.json new file mode 100644 index 00000000000..ddac9b20f82 --- /dev/null +++ b/objects/vulnerability/vulnerability--8f443ce9-e19d-4b3c-a3df-163934d8632d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c26615ee-7e05-4480-9b21-bec632b91249", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8f443ce9-e19d-4b3c-a3df-163934d8632d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:02.924998Z", + "modified": "2024-10-07T00:38:02.924998Z", + "name": "CVE-2024-45251", + "description": "Elsight – CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-45251" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8f859827-ae8b-4221-9f74-3fa663de0175.json b/objects/vulnerability/vulnerability--8f859827-ae8b-4221-9f74-3fa663de0175.json new file mode 100644 index 00000000000..a0beb6f1cdf --- /dev/null +++ b/objects/vulnerability/vulnerability--8f859827-ae8b-4221-9f74-3fa663de0175.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--8836b5ec-1e9f-4a39-ba39-6fa436334257", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8f859827-ae8b-4221-9f74-3fa663de0175", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.434388Z", + "modified": "2024-10-07T00:38:04.434388Z", + "name": "CVE-2024-47342", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in PickPlugins Accordion accordions allows Stored XSS.This issue affects Accordion: from n/a through 2.2.99.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47342" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--90637280-1077-4cf1-a6d5-6a89a238eb1c.json b/objects/vulnerability/vulnerability--90637280-1077-4cf1-a6d5-6a89a238eb1c.json new file mode 100644 index 00000000000..3135a20a91e --- /dev/null +++ b/objects/vulnerability/vulnerability--90637280-1077-4cf1-a6d5-6a89a238eb1c.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b64d7802-6cf3-4686-bd6a-8ef6be7e82fe", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--90637280-1077-4cf1-a6d5-6a89a238eb1c", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.10858Z", + "modified": "2024-10-07T00:38:03.10858Z", + "name": "CVE-2024-9550", + "description": "A vulnerability was found in D-Link DIR-605L 2.13B01 BETA. It has been classified as critical. Affected is the function formLogDnsquery of the file /goform/formLogDnsquery. The manipulation of the argument curTime leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9550" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9445d72b-bd20-45b9-af61-2200eb6fdd69.json b/objects/vulnerability/vulnerability--9445d72b-bd20-45b9-af61-2200eb6fdd69.json new file mode 100644 index 00000000000..8d7abf57e81 --- /dev/null +++ b/objects/vulnerability/vulnerability--9445d72b-bd20-45b9-af61-2200eb6fdd69.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3d46a21c-55ff-4b22-bd7b-b1ae1ca8a231", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9445d72b-bd20-45b9-af61-2200eb6fdd69", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.427115Z", + "modified": "2024-10-07T00:38:04.427115Z", + "name": "CVE-2024-47297", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CodePeople CP Polls allows Reflected XSS.This issue affects CP Polls: from n/a through 1.0.74.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47297" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9583adb7-8aca-46eb-bba1-c8ce3f4df59f.json b/objects/vulnerability/vulnerability--9583adb7-8aca-46eb-bba1-c8ce3f4df59f.json new file mode 100644 index 00000000000..5141c263121 --- /dev/null +++ b/objects/vulnerability/vulnerability--9583adb7-8aca-46eb-bba1-c8ce3f4df59f.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b1f6ed90-5ffb-4625-a0b5-4eed7dcbb28f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9583adb7-8aca-46eb-bba1-c8ce3f4df59f", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:02.850519Z", + "modified": "2024-10-07T00:38:02.850519Z", + "name": "CVE-2024-45252", + "description": "Elsight – CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-45252" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--983b410e-9c75-4d2f-9f70-1fb3f70bc6c4.json b/objects/vulnerability/vulnerability--983b410e-9c75-4d2f-9f70-1fb3f70bc6c4.json new file mode 100644 index 00000000000..436ccfe4ed7 --- /dev/null +++ b/objects/vulnerability/vulnerability--983b410e-9c75-4d2f-9f70-1fb3f70bc6c4.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1b47dc04-700d-4fa3-bacb-ac6fc7908667", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--983b410e-9c75-4d2f-9f70-1fb3f70bc6c4", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.404285Z", + "modified": "2024-10-07T00:38:04.404285Z", + "name": "CVE-2024-47299", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in SeedProd Coming Soon Page, Under Construction & Maintenance Mode by SeedProd allows Stored XSS.This issue affects Coming Soon Page, Under Construction & Maintenance Mode by SeedProd: from n/a through 6.17.4.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47299" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9867ce77-6794-46db-9dbb-3a3269e4cf63.json b/objects/vulnerability/vulnerability--9867ce77-6794-46db-9dbb-3a3269e4cf63.json new file mode 100644 index 00000000000..e7df3e36b2f --- /dev/null +++ b/objects/vulnerability/vulnerability--9867ce77-6794-46db-9dbb-3a3269e4cf63.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--61bebf5e-762d-4cb8-a8b6-ffa1754e29d8", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9867ce77-6794-46db-9dbb-3a3269e4cf63", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.087528Z", + "modified": "2024-10-07T00:38:03.087528Z", + "name": "CVE-2024-9560", + "description": "A vulnerability was found in ESAFENET CDG V5. It has been rated as critical. Affected by this issue is the function delCatelogs of the file /CDGServer3/document/Catelogs;logindojojs?command=DelCatelogs. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9560" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9a813fce-8feb-4425-bf9c-678af52c944c.json b/objects/vulnerability/vulnerability--9a813fce-8feb-4425-bf9c-678af52c944c.json new file mode 100644 index 00000000000..23b5e5b39d8 --- /dev/null +++ b/objects/vulnerability/vulnerability--9a813fce-8feb-4425-bf9c-678af52c944c.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b56845b0-ae92-42f0-b6c5-d4eec29109da", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9a813fce-8feb-4425-bf9c-678af52c944c", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.10262Z", + "modified": "2024-10-07T00:38:03.10262Z", + "name": "CVE-2024-9558", + "description": "A vulnerability was found in D-Link DIR-605L 2.13B01 BETA and classified as critical. This issue affects the function formSetWanPPTP of the file /goform/formSetWanPPTP. The manipulation of the argument webpage leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9558" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9b67d269-4fee-4716-9eed-da45d67d1c57.json b/objects/vulnerability/vulnerability--9b67d269-4fee-4716-9eed-da45d67d1c57.json new file mode 100644 index 00000000000..853195557d5 --- /dev/null +++ b/objects/vulnerability/vulnerability--9b67d269-4fee-4716-9eed-da45d67d1c57.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--2d4f47ee-b2a2-4709-b278-53e231992239", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9b67d269-4fee-4716-9eed-da45d67d1c57", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.420439Z", + "modified": "2024-10-07T00:38:04.420439Z", + "name": "CVE-2024-47367", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in YITH YITH WooCommerce Product Add-Ons allows Reflected XSS.This issue affects YITH WooCommerce Product Add-Ons: from n/a through 4.13.0.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47367" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9c8c04be-46fe-4f4e-b6dc-c0c38704c4fc.json b/objects/vulnerability/vulnerability--9c8c04be-46fe-4f4e-b6dc-c0c38704c4fc.json new file mode 100644 index 00000000000..0975daa7600 --- /dev/null +++ b/objects/vulnerability/vulnerability--9c8c04be-46fe-4f4e-b6dc-c0c38704c4fc.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9248f316-60e2-44fb-85f7-95e23ea164f0", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9c8c04be-46fe-4f4e-b6dc-c0c38704c4fc", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.440262Z", + "modified": "2024-10-07T00:38:04.440262Z", + "name": "CVE-2024-47352", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Xylus Themes WP Bulk Delete allows Reflected XSS.This issue affects WP Bulk Delete: from n/a through 1.3.1.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47352" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9d190988-a87e-4766-8cd2-fb482a3784cc.json b/objects/vulnerability/vulnerability--9d190988-a87e-4766-8cd2-fb482a3784cc.json new file mode 100644 index 00000000000..72efe11af7d --- /dev/null +++ b/objects/vulnerability/vulnerability--9d190988-a87e-4766-8cd2-fb482a3784cc.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--74568ca7-853c-4739-87de-43222db0dfff", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9d190988-a87e-4766-8cd2-fb482a3784cc", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.401561Z", + "modified": "2024-10-07T00:38:04.401561Z", + "name": "CVE-2024-47320", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WS Form WS Form LITE allows Stored XSS.This issue affects WS Form LITE: from n/a through 1.9.238.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47320" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9d6dffbe-b066-4b43-9c47-984d531eb3c0.json b/objects/vulnerability/vulnerability--9d6dffbe-b066-4b43-9c47-984d531eb3c0.json new file mode 100644 index 00000000000..c071cd6ec42 --- /dev/null +++ b/objects/vulnerability/vulnerability--9d6dffbe-b066-4b43-9c47-984d531eb3c0.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4b830aaf-7d40-4e04-b95e-33aa73f05161", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9d6dffbe-b066-4b43-9c47-984d531eb3c0", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.101067Z", + "modified": "2024-10-07T00:38:03.101067Z", + "name": "CVE-2024-9556", + "description": "A vulnerability, which was classified as critical, was found in D-Link DIR-605L 2.13B01 BETA. This affects the function formSetEnableWizard of the file /goform/formSetEnableWizard. The manipulation of the argument curTime leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9556" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9e0ab9f6-3821-411a-9c2e-bb3138fc295a.json b/objects/vulnerability/vulnerability--9e0ab9f6-3821-411a-9c2e-bb3138fc295a.json new file mode 100644 index 00000000000..4e49aa199ec --- /dev/null +++ b/objects/vulnerability/vulnerability--9e0ab9f6-3821-411a-9c2e-bb3138fc295a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--a5af6ab0-8cae-4f9e-9705-c16285c1c714", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9e0ab9f6-3821-411a-9c2e-bb3138fc295a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.432594Z", + "modified": "2024-10-07T00:38:04.432594Z", + "name": "CVE-2024-47343", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kraftplugins Mega Elements allows Stored XSS.This issue affects Mega Elements: from n/a through 1.2.4.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47343" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9e42de07-89d6-4bbb-b6b2-4164682672a8.json b/objects/vulnerability/vulnerability--9e42de07-89d6-4bbb-b6b2-4164682672a8.json new file mode 100644 index 00000000000..17064f3b112 --- /dev/null +++ b/objects/vulnerability/vulnerability--9e42de07-89d6-4bbb-b6b2-4164682672a8.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--a21acdea-fb09-44d6-a504-5234f154129a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9e42de07-89d6-4bbb-b6b2-4164682672a8", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.112845Z", + "modified": "2024-10-07T00:38:03.112845Z", + "name": "CVE-2024-9557", + "description": "A vulnerability has been found in D-Link DIR-605L 2.13B01 BETA and classified as critical. This vulnerability affects the function formSetWanPPPoE of the file /goform/formSetWanPPPoE. The manipulation of the argument webpage leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9557" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a01ded8d-514d-432d-9827-e6aaefbbdf22.json b/objects/vulnerability/vulnerability--a01ded8d-514d-432d-9827-e6aaefbbdf22.json new file mode 100644 index 00000000000..71af4b34c77 --- /dev/null +++ b/objects/vulnerability/vulnerability--a01ded8d-514d-432d-9827-e6aaefbbdf22.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d9fe9e81-f286-4238-a23e-9b5b43b2f283", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a01ded8d-514d-432d-9827-e6aaefbbdf22", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:02.948657Z", + "modified": "2024-10-07T00:38:02.948657Z", + "name": "CVE-2024-45249", + "description": "Cavok – CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-45249" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a2fddc50-743c-4c93-80ec-812038123286.json b/objects/vulnerability/vulnerability--a2fddc50-743c-4c93-80ec-812038123286.json new file mode 100644 index 00000000000..47b18b617d8 --- /dev/null +++ b/objects/vulnerability/vulnerability--a2fddc50-743c-4c93-80ec-812038123286.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ea792594-ad4c-4255-b46a-85ea6ef446d5", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a2fddc50-743c-4c93-80ec-812038123286", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.388594Z", + "modified": "2024-10-07T00:38:04.388594Z", + "name": "CVE-2024-47301", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Bit Form Bit Form – Contact Form Plugin allows Stored XSS.This issue affects Bit Form – Contact Form Plugin: from n/a through 2.13.10.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47301" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a4c910c2-4918-42f3-82c1-3220dde38862.json b/objects/vulnerability/vulnerability--a4c910c2-4918-42f3-82c1-3220dde38862.json new file mode 100644 index 00000000000..151a3550bca --- /dev/null +++ b/objects/vulnerability/vulnerability--a4c910c2-4918-42f3-82c1-3220dde38862.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--379e1b1f-2d96-4642-ba76-1fad12b0b35d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a4c910c2-4918-42f3-82c1-3220dde38862", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.383398Z", + "modified": "2024-10-07T00:38:04.383398Z", + "name": "CVE-2024-47650", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Axton WP-WebAuthn allows Stored XSS.This issue affects WP-WebAuthn: from n/a through 1.3.1.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47650" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a77c7404-7c01-440b-a439-2e3fc8d4901c.json b/objects/vulnerability/vulnerability--a77c7404-7c01-440b-a439-2e3fc8d4901c.json new file mode 100644 index 00000000000..7faf627e22f --- /dev/null +++ b/objects/vulnerability/vulnerability--a77c7404-7c01-440b-a439-2e3fc8d4901c.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--17179b48-29bd-4515-acfb-7e049bcb127a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a77c7404-7c01-440b-a439-2e3fc8d4901c", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.385055Z", + "modified": "2024-10-07T00:38:04.385055Z", + "name": "CVE-2024-47355", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CozyThemes Cozy Blocks allows Stored XSS.This issue affects Cozy Blocks: from n/a through 2.0.11.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47355" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ada3cfb2-d3f9-47f6-a286-6ff7024284a5.json b/objects/vulnerability/vulnerability--ada3cfb2-d3f9-47f6-a286-6ff7024284a5.json new file mode 100644 index 00000000000..afda7e61e28 --- /dev/null +++ b/objects/vulnerability/vulnerability--ada3cfb2-d3f9-47f6-a286-6ff7024284a5.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--33f4953b-59ec-48c0-a9e6-33517b49ec53", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ada3cfb2-d3f9-47f6-a286-6ff7024284a5", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.360443Z", + "modified": "2024-10-07T00:38:04.360443Z", + "name": "CVE-2024-47336", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Vladimir Statsenko Terms descriptions allows Stored XSS.This issue affects Terms descriptions: from n/a through 3.4.6.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47336" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--aecccf9b-0caa-4fc5-81a6-0c3b61aef0e2.json b/objects/vulnerability/vulnerability--aecccf9b-0caa-4fc5-81a6-0c3b61aef0e2.json new file mode 100644 index 00000000000..f4c22fc6a04 --- /dev/null +++ b/objects/vulnerability/vulnerability--aecccf9b-0caa-4fc5-81a6-0c3b61aef0e2.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--6af43fdc-e0cb-4d16-b07f-6cd7d9decffa", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--aecccf9b-0caa-4fc5-81a6-0c3b61aef0e2", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:02.926514Z", + "modified": "2024-10-07T00:38:02.926514Z", + "name": "CVE-2024-45248", + "description": "Multi-DNC – CWE-35: Path Traversal: '.../...//'", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-45248" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--b2607de6-fa70-4d67-b067-7294dffa5f84.json b/objects/vulnerability/vulnerability--b2607de6-fa70-4d67-b067-7294dffa5f84.json new file mode 100644 index 00000000000..b94adc35625 --- /dev/null +++ b/objects/vulnerability/vulnerability--b2607de6-fa70-4d67-b067-7294dffa5f84.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4bf6a468-4cfd-4411-b2ad-ac9a7b4e109d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b2607de6-fa70-4d67-b067-7294dffa5f84", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.387041Z", + "modified": "2024-10-07T00:38:04.387041Z", + "name": "CVE-2024-47307", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Essential Plugin Meta slider and carousel with lightbox allows Stored XSS.This issue affects Meta slider and carousel with lightbox: from n/a through 2.0.1.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47307" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--baeb5b30-d6f5-4233-94c0-3dfed0d25437.json b/objects/vulnerability/vulnerability--baeb5b30-d6f5-4233-94c0-3dfed0d25437.json new file mode 100644 index 00000000000..d57df37d7e2 --- /dev/null +++ b/objects/vulnerability/vulnerability--baeb5b30-d6f5-4233-94c0-3dfed0d25437.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--2a6c23f8-ecc0-47d8-aad5-5b8c01d08af4", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--baeb5b30-d6f5-4233-94c0-3dfed0d25437", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.772918Z", + "modified": "2024-10-07T00:38:03.772918Z", + "name": "CVE-2024-44046", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Themify Themify – WooCommerce Product Filter allows Stored XSS.This issue affects Themify – WooCommerce Product Filter: from n/a through 1.5.1.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-44046" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--be25dfcb-805b-478f-a07d-95554e3ee187.json b/objects/vulnerability/vulnerability--be25dfcb-805b-478f-a07d-95554e3ee187.json new file mode 100644 index 00000000000..19b864588d2 --- /dev/null +++ b/objects/vulnerability/vulnerability--be25dfcb-805b-478f-a07d-95554e3ee187.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--aeaff8ed-e5a5-41e8-a81e-a2e12f9fdd7e", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--be25dfcb-805b-478f-a07d-95554e3ee187", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.732001Z", + "modified": "2024-10-07T00:38:03.732001Z", + "name": "CVE-2024-44040", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Plainware ShiftController Employee Shift Scheduling allows Stored XSS.This issue affects ShiftController Employee Shift Scheduling: from n/a through 4.9.64.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-44040" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--beb5e33e-0f40-4b5d-a8c7-88ee493d56f2.json b/objects/vulnerability/vulnerability--beb5e33e-0f40-4b5d-a8c7-88ee493d56f2.json new file mode 100644 index 00000000000..d3fa9d35916 --- /dev/null +++ b/objects/vulnerability/vulnerability--beb5e33e-0f40-4b5d-a8c7-88ee493d56f2.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--227a23a9-d5ec-4a5b-93dc-6db52d42ca6c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--beb5e33e-0f40-4b5d-a8c7-88ee493d56f2", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.726196Z", + "modified": "2024-10-07T00:38:03.726196Z", + "name": "CVE-2024-44029", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in David Garlitz viala allows Reflected XSS.This issue affects viala: from n/a through 1.3.1.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-44029" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--bec7c0d8-b270-473f-a5cd-55382ab34b75.json b/objects/vulnerability/vulnerability--bec7c0d8-b270-473f-a5cd-55382ab34b75.json new file mode 100644 index 00000000000..d91cc102a5a --- /dev/null +++ b/objects/vulnerability/vulnerability--bec7c0d8-b270-473f-a5cd-55382ab34b75.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9e72e6ab-f93f-46dd-bcd2-f58c0eaa2a47", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--bec7c0d8-b270-473f-a5cd-55382ab34b75", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.12975Z", + "modified": "2024-10-07T00:38:03.12975Z", + "name": "CVE-2024-9552", + "description": "A vulnerability was found in D-Link DIR-605L 2.13B01 BETA. It has been rated as critical. Affected by this issue is the function formSetWanNonLogin of the file /goform/formSetWanNonLogin. The manipulation of the argument webpage leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9552" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c236625b-fa3b-411d-bbd7-7088c7af6f6c.json b/objects/vulnerability/vulnerability--c236625b-fa3b-411d-bbd7-7088c7af6f6c.json new file mode 100644 index 00000000000..107a3d4f1ce --- /dev/null +++ b/objects/vulnerability/vulnerability--c236625b-fa3b-411d-bbd7-7088c7af6f6c.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--5971df1c-6e13-466b-a7b0-97761adcd45a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c236625b-fa3b-411d-bbd7-7088c7af6f6c", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.769379Z", + "modified": "2024-10-07T00:38:03.769379Z", + "name": "CVE-2024-44035", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in TemeGUM Gum Elementor Addon allows Stored XSS.This issue affects Gum Elementor Addon: from n/a through 1.3.7.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-44035" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c3020694-c943-446e-ba55-c6c1202371ab.json b/objects/vulnerability/vulnerability--c3020694-c943-446e-ba55-c6c1202371ab.json new file mode 100644 index 00000000000..293b8920c53 --- /dev/null +++ b/objects/vulnerability/vulnerability--c3020694-c943-446e-ba55-c6c1202371ab.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--2d9b72f5-71d6-42e7-baec-9d523fdc851a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c3020694-c943-446e-ba55-c6c1202371ab", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.392263Z", + "modified": "2024-10-07T00:38:04.392263Z", + "name": "CVE-2024-47365", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Atakan Au Automatically Hierarchic Categories in Menu allows Stored XSS.This issue affects Automatically Hierarchic Categories in Menu: from n/a through 2.0.5.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47365" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c7e132fe-8c39-4769-a85f-a515fbdbc533.json b/objects/vulnerability/vulnerability--c7e132fe-8c39-4769-a85f-a515fbdbc533.json new file mode 100644 index 00000000000..7e55b9a3655 --- /dev/null +++ b/objects/vulnerability/vulnerability--c7e132fe-8c39-4769-a85f-a515fbdbc533.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d5c840dd-5943-4330-9d21-4b731c3c2d65", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c7e132fe-8c39-4769-a85f-a515fbdbc533", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.717755Z", + "modified": "2024-10-07T00:38:03.717755Z", + "name": "CVE-2024-44042", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Fahad Mahmood WP Datepicker allows Stored XSS.This issue affects WP Datepicker: from n/a through 2.1.1.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-44042" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--cae32f1b-e6c6-4c02-b1d8-6fa88efe235a.json b/objects/vulnerability/vulnerability--cae32f1b-e6c6-4c02-b1d8-6fa88efe235a.json new file mode 100644 index 00000000000..8deb0f28dca --- /dev/null +++ b/objects/vulnerability/vulnerability--cae32f1b-e6c6-4c02-b1d8-6fa88efe235a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--930b7173-1c03-4834-8d3b-14149c8d686f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--cae32f1b-e6c6-4c02-b1d8-6fa88efe235a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.369142Z", + "modified": "2024-10-07T00:38:04.369142Z", + "name": "CVE-2024-47348", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WaspThemes YellowPencil Visual CSS Style Editor allows Reflected XSS.This issue affects YellowPencil Visual CSS Style Editor: from n/a through 7.6.4.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47348" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--cb34ece0-c50c-484f-bbb9-68df6e3e8a57.json b/objects/vulnerability/vulnerability--cb34ece0-c50c-484f-bbb9-68df6e3e8a57.json new file mode 100644 index 00000000000..e107d4abd1c --- /dev/null +++ b/objects/vulnerability/vulnerability--cb34ece0-c50c-484f-bbb9-68df6e3e8a57.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--a96c0a56-f574-4290-b261-bb40671ad54c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--cb34ece0-c50c-484f-bbb9-68df6e3e8a57", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.395262Z", + "modified": "2024-10-07T00:38:04.395262Z", + "name": "CVE-2024-47356", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Catch Themes Create allows Stored XSS.This issue affects Create: from n/a through 2.9.1.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47356" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--de09ad80-272b-4183-a61a-d3c482677f94.json b/objects/vulnerability/vulnerability--de09ad80-272b-4183-a61a-d3c482677f94.json new file mode 100644 index 00000000000..6a32932703c --- /dev/null +++ b/objects/vulnerability/vulnerability--de09ad80-272b-4183-a61a-d3c482677f94.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f8a2ca50-6526-4867-ad0b-ce14498180ee", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--de09ad80-272b-4183-a61a-d3c482677f94", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.740212Z", + "modified": "2024-10-07T00:38:03.740212Z", + "name": "CVE-2024-44045", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kevon Adonis WP Abstracts allows Stored XSS.This issue affects WP Abstracts: from n/a through 2.6.5.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-44045" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e294e8bc-52e7-4051-8fdc-41358d8e293f.json b/objects/vulnerability/vulnerability--e294e8bc-52e7-4051-8fdc-41358d8e293f.json new file mode 100644 index 00000000000..d09466f3286 --- /dev/null +++ b/objects/vulnerability/vulnerability--e294e8bc-52e7-4051-8fdc-41358d8e293f.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--62be3a17-3714-44d0-a4ab-64421f066fae", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e294e8bc-52e7-4051-8fdc-41358d8e293f", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.748907Z", + "modified": "2024-10-07T00:38:03.748907Z", + "name": "CVE-2024-44022", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Trustmary Review & testimonial widgets allows Stored XSS.This issue affects Review & testimonial widgets: from n/a through 1.0.5.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-44022" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e463e12a-c291-4f97-9139-f91d59192e20.json b/objects/vulnerability/vulnerability--e463e12a-c291-4f97-9139-f91d59192e20.json new file mode 100644 index 00000000000..407c089273a --- /dev/null +++ b/objects/vulnerability/vulnerability--e463e12a-c291-4f97-9139-f91d59192e20.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f372e355-9725-45e4-a8fa-281219106220", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e463e12a-c291-4f97-9139-f91d59192e20", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.428209Z", + "modified": "2024-10-07T00:38:04.428209Z", + "name": "CVE-2024-47298", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in BoldThemes Bold Page Builder allows Stored XSS.This issue affects Bold Page Builder: from n/a through 5.1.1.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47298" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e649e165-beec-461a-a3ed-1e6a63933605.json b/objects/vulnerability/vulnerability--e649e165-beec-461a-a3ed-1e6a63933605.json new file mode 100644 index 00000000000..bcc95a3d9b9 --- /dev/null +++ b/objects/vulnerability/vulnerability--e649e165-beec-461a-a3ed-1e6a63933605.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--18f54b2f-50ad-40ea-b4b2-568156ca68ae", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e649e165-beec-461a-a3ed-1e6a63933605", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.12713Z", + "modified": "2024-10-07T00:38:03.12713Z", + "name": "CVE-2024-9551", + "description": "A vulnerability was found in D-Link DIR-605L 2.13B01 BETA. It has been declared as critical. Affected by this vulnerability is the function formSetWanL2TP of the file /goform/formSetWanL2TP. The manipulation of the argument webpage leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9551" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e73907ce-4f15-4133-845c-e0cead89c683.json b/objects/vulnerability/vulnerability--e73907ce-4f15-4133-845c-e0cead89c683.json new file mode 100644 index 00000000000..dcaeb126cde --- /dev/null +++ b/objects/vulnerability/vulnerability--e73907ce-4f15-4133-845c-e0cead89c683.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--a61e1b2c-aa40-4c10-9399-f6be96baa65b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e73907ce-4f15-4133-845c-e0cead89c683", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.373306Z", + "modified": "2024-10-07T00:38:04.373306Z", + "name": "CVE-2024-47366", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPVibes Elementor Addon Elements allows Stored XSS.This issue affects Elementor Addon Elements: from n/a through 1.13.6.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47366" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e967363c-939e-42f2-bc2c-b775a309f97f.json b/objects/vulnerability/vulnerability--e967363c-939e-42f2-bc2c-b775a309f97f.json new file mode 100644 index 00000000000..5d0807b9480 --- /dev/null +++ b/objects/vulnerability/vulnerability--e967363c-939e-42f2-bc2c-b775a309f97f.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--cafaf8ad-15b3-4392-ac72-0a249241a35f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e967363c-939e-42f2-bc2c-b775a309f97f", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.377356Z", + "modified": "2024-10-07T00:38:04.377356Z", + "name": "CVE-2024-47364", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Move addons Move Addons for Elementor allows Stored XSS.This issue affects Move Addons for Elementor: from n/a through 1.3.4.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47364" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ea2e787e-e367-4ebe-946f-cd23c104068c.json b/objects/vulnerability/vulnerability--ea2e787e-e367-4ebe-946f-cd23c104068c.json new file mode 100644 index 00000000000..86c8a209194 --- /dev/null +++ b/objects/vulnerability/vulnerability--ea2e787e-e367-4ebe-946f-cd23c104068c.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4abe25d7-801b-4601-a150-711559348fd6", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ea2e787e-e367-4ebe-946f-cd23c104068c", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.430889Z", + "modified": "2024-10-07T00:38:04.430889Z", + "name": "CVE-2024-47368", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Leap13 Premium Blocks – Gutenberg Blocks for WordPress allows Stored XSS.This issue affects Premium Blocks – Gutenberg Blocks for WordPress: from n/a through 2.1.33.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47368" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ee1a8f88-8ab8-4b5f-a837-2306a1ddfa48.json b/objects/vulnerability/vulnerability--ee1a8f88-8ab8-4b5f-a837-2306a1ddfa48.json new file mode 100644 index 00000000000..99b977249ba --- /dev/null +++ b/objects/vulnerability/vulnerability--ee1a8f88-8ab8-4b5f-a837-2306a1ddfa48.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--622a94ec-5cb7-4bbe-90d1-e7d799dceaf6", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ee1a8f88-8ab8-4b5f-a837-2306a1ddfa48", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.414869Z", + "modified": "2024-10-07T00:38:04.414869Z", + "name": "CVE-2024-47341", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Lester ‘GaMerZ’ Chan WP-DownloadManager allows Reflected XSS.This issue affects WP-DownloadManager: from n/a through 1.68.8.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47341" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f2696654-3d5c-4fbf-9637-5f46c9d16ddc.json b/objects/vulnerability/vulnerability--f2696654-3d5c-4fbf-9637-5f46c9d16ddc.json new file mode 100644 index 00000000000..0519aaf410b --- /dev/null +++ b/objects/vulnerability/vulnerability--f2696654-3d5c-4fbf-9637-5f46c9d16ddc.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b635e14f-6ab4-43bd-af90-2ef111c7a63a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f2696654-3d5c-4fbf-9637-5f46c9d16ddc", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.362274Z", + "modified": "2024-10-07T00:38:04.362274Z", + "name": "CVE-2024-47360", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Booking Algorithms BA Book Everything allows Reflected XSS.This issue affects BA Book Everything: from n/a through 1.6.20.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47360" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f50704e6-f037-4290-a7e4-019ece8a7cfa.json b/objects/vulnerability/vulnerability--f50704e6-f037-4290-a7e4-019ece8a7cfa.json new file mode 100644 index 00000000000..27230d4fba5 --- /dev/null +++ b/objects/vulnerability/vulnerability--f50704e6-f037-4290-a7e4-019ece8a7cfa.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--7fde8227-4653-4c99-b62b-7c0224b9a497", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f50704e6-f037-4290-a7e4-019ece8a7cfa", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.421895Z", + "modified": "2024-10-07T00:38:04.421895Z", + "name": "CVE-2024-47346", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Tribulant Newsletters allows Reflected XSS.This issue affects Newsletters: from n/a through 4.9.9.1.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47346" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f54e806d-0180-4213-9f3a-7201de4497c9.json b/objects/vulnerability/vulnerability--f54e806d-0180-4213-9f3a-7201de4497c9.json new file mode 100644 index 00000000000..24bbb7f7b07 --- /dev/null +++ b/objects/vulnerability/vulnerability--f54e806d-0180-4213-9f3a-7201de4497c9.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--eb73c1ae-f103-449a-ab13-055b97a3a7d2", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f54e806d-0180-4213-9f3a-7201de4497c9", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.74388Z", + "modified": "2024-10-07T00:38:03.74388Z", + "name": "CVE-2024-44024", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in NicheAddons Medical Addon for Elementor allows Stored XSS.This issue affects Medical Addon for Elementor: from n/a through 1.4.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-44024" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f8c3780e-0190-433a-b926-15c014bd365d.json b/objects/vulnerability/vulnerability--f8c3780e-0190-433a-b926-15c014bd365d.json new file mode 100644 index 00000000000..b8da483303f --- /dev/null +++ b/objects/vulnerability/vulnerability--f8c3780e-0190-433a-b926-15c014bd365d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1bb15d1b-b6e8-4c27-b69e-b998197ebc20", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f8c3780e-0190-433a-b926-15c014bd365d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.436346Z", + "modified": "2024-10-07T00:38:04.436346Z", + "name": "CVE-2024-47327", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Eyal Fitoussi GEO my WordPress allows Reflected XSS.This issue affects GEO my WordPress: from n/a through 4.5.0.3.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47327" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--fa783a91-6292-477d-b69a-ec87c7172bb8.json b/objects/vulnerability/vulnerability--fa783a91-6292-477d-b69a-ec87c7172bb8.json new file mode 100644 index 00000000000..80e1d2305a9 --- /dev/null +++ b/objects/vulnerability/vulnerability--fa783a91-6292-477d-b69a-ec87c7172bb8.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--7096be52-a9a8-42b0-9972-860328b3efb8", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--fa783a91-6292-477d-b69a-ec87c7172bb8", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.736119Z", + "modified": "2024-10-07T00:38:03.736119Z", + "name": "CVE-2024-44010", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Catch Themes Full frame allows Stored XSS.This issue affects Full frame: from n/a through 2.7.2.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-44010" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--feae5b3d-d106-4ba4-990a-6a2cb30118aa.json b/objects/vulnerability/vulnerability--feae5b3d-d106-4ba4-990a-6a2cb30118aa.json new file mode 100644 index 00000000000..38e5be9ef77 --- /dev/null +++ b/objects/vulnerability/vulnerability--feae5b3d-d106-4ba4-990a-6a2cb30118aa.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--cfb0a435-54ed-447f-9737-dc2d78ac0f12", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--feae5b3d-d106-4ba4-990a-6a2cb30118aa", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.752337Z", + "modified": "2024-10-07T00:38:03.752337Z", + "name": "CVE-2024-44039", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Travel allows Stored XSS.This issue affects WP Travel: from n/a through 9.3.1.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-44039" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ff27d4c4-6494-4ed5-81d6-82ab71a9eedc.json b/objects/vulnerability/vulnerability--ff27d4c4-6494-4ed5-81d6-82ab71a9eedc.json new file mode 100644 index 00000000000..a6e219944de --- /dev/null +++ b/objects/vulnerability/vulnerability--ff27d4c4-6494-4ed5-81d6-82ab71a9eedc.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d842f03a-508e-4335-a6b6-779d5bdb985a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ff27d4c4-6494-4ed5-81d6-82ab71a9eedc", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.765324Z", + "modified": "2024-10-07T00:38:03.765324Z", + "name": "CVE-2024-44043", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in 10Web Photo Gallery by 10Web allows Stored XSS.This issue affects Photo Gallery by 10Web: from n/a through 1.8.27.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-44043" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ff6d6451-dfe4-48ba-8824-96dd024ad6c3.json b/objects/vulnerability/vulnerability--ff6d6451-dfe4-48ba-8824-96dd024ad6c3.json new file mode 100644 index 00000000000..cc7e6816af3 --- /dev/null +++ b/objects/vulnerability/vulnerability--ff6d6451-dfe4-48ba-8824-96dd024ad6c3.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--8f392f11-10d4-4413-8f90-e41c9cf03efc", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ff6d6451-dfe4-48ba-8824-96dd024ad6c3", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.406431Z", + "modified": "2024-10-07T00:38:04.406431Z", + "name": "CVE-2024-47338", + "description": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPExpertsio WPExperts Square For GiveWP allows SQL Injection.This issue affects WPExperts Square For GiveWP: from n/a through 1.3.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47338" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ff756e09-9089-4edc-a139-898044a33c7d.json b/objects/vulnerability/vulnerability--ff756e09-9089-4edc-a139-898044a33c7d.json new file mode 100644 index 00000000000..3a0914f4329 --- /dev/null +++ b/objects/vulnerability/vulnerability--ff756e09-9089-4edc-a139-898044a33c7d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--48a011a6-a480-492f-aaf8-cd5843812acd", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ff756e09-9089-4edc-a139-898044a33c7d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:04.394126Z", + "modified": "2024-10-07T00:38:04.394126Z", + "name": "CVE-2024-47347", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Chart Builder Team Chartify allows Reflected XSS.This issue affects Chartify: from n/a through 2.7.6.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47347" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ff82dbb4-30ec-49e3-afeb-c1ac6f1f8f8d.json b/objects/vulnerability/vulnerability--ff82dbb4-30ec-49e3-afeb-c1ac6f1f8f8d.json new file mode 100644 index 00000000000..0670d298b22 --- /dev/null +++ b/objects/vulnerability/vulnerability--ff82dbb4-30ec-49e3-afeb-c1ac6f1f8f8d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--60ab156c-703f-4cac-bdb4-2bde23aa8552", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ff82dbb4-30ec-49e3-afeb-c1ac6f1f8f8d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-07T00:38:03.106534Z", + "modified": "2024-10-07T00:38:03.106534Z", + "name": "CVE-2024-9559", + "description": "A vulnerability was found in D-Link DIR-605L 2.13B01 BETA. It has been classified as critical. Affected is the function formWlanSetup of the file /goform/formWlanSetup. The manipulation of the argument webpage leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9559" + } + ] + } + ] +} \ No newline at end of file