Skip to content

Commit

Permalink
generated content from 2024-12-15
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Dec 15, 2024
1 parent e609f03 commit 9d0eb98
Show file tree
Hide file tree
Showing 51 changed files with 1,150 additions and 0 deletions.
50 changes: 50 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -260197,3 +260197,53 @@ vulnerability,CVE-2023-32520,vulnerability--0ec7ef10-31fc-4981-8986-3c8e72364c94
vulnerability,CVE-2023-32519,vulnerability--1c335afb-230d-469c-a683-84365b7376d8
vulnerability,CVE-2023-28990,vulnerability--803e6faa-fd42-4acf-b6ce-c5e5f0076149
vulnerability,CVE-2023-27456,vulnerability--cccd5f2c-3b5e-41e4-981a-09463f4dbd48
vulnerability,CVE-2024-12474,vulnerability--2f7a1d72-e691-422b-a9c4-76a8ce455cb5
vulnerability,CVE-2024-12555,vulnerability--b90b007b-6d65-413a-8272-acd1c68abe9a
vulnerability,CVE-2024-12459,vulnerability--9dff4615-1866-4830-9baf-5f69099cb3f4
vulnerability,CVE-2024-12502,vulnerability--6dcffb41-b67f-431d-8cf5-ab3a2d536db4
vulnerability,CVE-2024-12523,vulnerability--1932f6c1-2606-4750-aa0a-37b295959c44
vulnerability,CVE-2024-12447,vulnerability--d178fb9e-d706-4818-a10b-4058d15a684d
vulnerability,CVE-2024-12448,vulnerability--f3981510-d61f-4597-b99b-6d2246cf375a
vulnerability,CVE-2024-12501,vulnerability--88ea7e89-fcfd-4ab2-a195-fd22669fa7d5
vulnerability,CVE-2024-12578,vulnerability--44f7fbab-a4e9-47b1-aba6-70f88df55413
vulnerability,CVE-2024-12458,vulnerability--5a865f6f-dcd9-464c-9a2b-ff8d59e90ea1
vulnerability,CVE-2024-12517,vulnerability--ef571054-3625-4ef1-bb74-7280834ea632
vulnerability,CVE-2024-12422,vulnerability--1db25090-ba4c-4616-9bce-2eef4e30f93d
vulnerability,CVE-2024-12628,vulnerability--79dacd34-01a5-4907-b577-1ed3a2a53be7
vulnerability,CVE-2024-12446,vulnerability--fc767d41-40ec-49ce-bb8f-94ddd6b501a4
vulnerability,CVE-2024-12411,vulnerability--8216e0a4-9eed-4102-8d13-920b5c45980e
vulnerability,CVE-2024-10646,vulnerability--fe0dd64b-f262-4dbd-8785-0e1046508301
vulnerability,CVE-2024-10690,vulnerability--43a6e748-7a10-4efe-9c50-0b4b44fe03e3
vulnerability,CVE-2024-9698,vulnerability--13603984-6116-4105-a85d-81bb4428811a
vulnerability,CVE-2024-11759,vulnerability--4e7c581a-10ae-4567-b942-2bffe51aa9c7
vulnerability,CVE-2024-11755,vulnerability--2074dd9f-34b5-41a3-86b1-4a9823b768dd
vulnerability,CVE-2024-11867,vulnerability--dea79ecf-ce7b-4973-b9d1-525e0307c319
vulnerability,CVE-2024-11888,vulnerability--80907858-d92c-4aee-8ab6-05568c4f25f5
vulnerability,CVE-2024-11877,vulnerability--b4a346d9-62eb-4bcc-b674-35385a678742
vulnerability,CVE-2024-11712,vulnerability--838a5440-5c70-461a-9519-0c650a18ebd0
vulnerability,CVE-2024-11714,vulnerability--1580b088-8e39-4e27-b844-af538b227487
vulnerability,CVE-2024-11751,vulnerability--5ada2295-c207-4572-aece-c21e9c2a1387
vulnerability,CVE-2024-11095,vulnerability--e5913a5f-5d32-48c5-978e-2ecf6db560b8
vulnerability,CVE-2024-11752,vulnerability--bb02ff4a-321b-4965-9f4f-54bc499624c6
vulnerability,CVE-2024-11855,vulnerability--aa0f5b03-99ac-4d71-b3c5-b5e12d049ccf
vulnerability,CVE-2024-11462,vulnerability--f9d7727e-87cc-45f2-9c8c-8a49e77e9111
vulnerability,CVE-2024-11713,vulnerability--e3cc35b1-d2b8-4eed-9fcf-349be1c4835b
vulnerability,CVE-2024-11894,vulnerability--61922e23-f3ad-434f-883b-0bc18477295f
vulnerability,CVE-2024-11869,vulnerability--77583ed6-5b4b-492d-beaa-720296141692
vulnerability,CVE-2024-11889,vulnerability--64365c96-c97b-4b0c-b691-ea07bf7cbb92
vulnerability,CVE-2024-11876,vulnerability--34e33700-cd9b-40bd-84a1-faf3297933d8
vulnerability,CVE-2024-11721,vulnerability--7e31cd16-1025-459e-9e3b-8a33a246379e
vulnerability,CVE-2024-11763,vulnerability--4434d04a-c925-4f08-a67d-a6bfad815bcd
vulnerability,CVE-2024-11720,vulnerability--45d8be72-0d61-40ad-99d2-545690e2e936
vulnerability,CVE-2024-11873,vulnerability--1fddb4bc-d194-4e87-abf9-176067f9391c
vulnerability,CVE-2024-11879,vulnerability--21241652-00d7-40b4-8a7a-94b730fe7bac
vulnerability,CVE-2024-11710,vulnerability--326f04de-8074-44e5-b67b-8dffb9b57b90
vulnerability,CVE-2024-11715,vulnerability--7e7e5560-d6dd-41ad-add6-91892fd23cef
vulnerability,CVE-2024-11770,vulnerability--6c9a8250-f081-4c46-8949-9778bf40d35a
vulnerability,CVE-2024-11865,vulnerability--3a93a1da-c031-4920-8c76-c775bded3013
vulnerability,CVE-2024-11883,vulnerability--7d8c42e7-366f-4a4f-8df7-da5f6a9abb56
vulnerability,CVE-2024-11711,vulnerability--997c7580-8004-4421-96f5-dd7f155cd4a3
vulnerability,CVE-2024-11884,vulnerability--7528d802-c7b4-48ce-8041-0d0208ca5e42
vulnerability,CVE-2024-31892,vulnerability--0c1b98ce-0533-4759-819c-65a6b29fdcbb
vulnerability,CVE-2024-31891,vulnerability--05e95094-1e5c-4f4b-ae1b-759128008131
vulnerability,CVE-2023-29476,vulnerability--b703c9c3-2733-41ed-b848-e8e9ea5363ec
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b7381752-8c9c-4162-86f1-e26d351e98b2",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--05e95094-1e5c-4f4b-ae1b-759128008131",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-15T00:43:56.405044Z",
"modified": "2024-12-15T00:43:56.405044Z",
"name": "CVE-2024-31891",
"description": "IBM Storage Scale GUI 5.1.9.0 through 5.1.9.6 and 5.2.0.0 through 5.2.1.1 \n\ncontains a local privilege escalation vulnerability. A malicious actor with command line access to the 'scalemgmt' user can elevate privileges to gain root access to the host operating system.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-31891"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--11e68bdc-c9ea-4bf3-933b-55a8eb090d8c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0c1b98ce-0533-4759-819c-65a6b29fdcbb",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-15T00:43:56.401591Z",
"modified": "2024-12-15T00:43:56.401591Z",
"name": "CVE-2024-31892",
"description": "IBM Storage Scale GUI 5.1.9.0 through 5.1.9.6 and 5.2.0.0 through 5.2.1.1 could allow a user to perform unauthorized actions after intercepting and modifying a csv file due to improper neutralization of formula elements.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-31892"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--377c22c1-6440-4836-a980-e35d5ac58779",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--13603984-6116-4105-a85d-81bb4428811a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-15T00:43:55.433842Z",
"modified": "2024-12-15T00:43:55.433842Z",
"name": "CVE-2024-9698",
"description": "The Crafthemes Demo Import plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'process_uploaded_files' function in all versions up to, and including, 3.3. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9698"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--852d623a-eb35-400e-930f-629d9c85dcdd",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1580b088-8e39-4e27-b844-af538b227487",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-15T00:43:55.81989Z",
"modified": "2024-12-15T00:43:55.81989Z",
"name": "CVE-2024-11714",
"description": "The WP Job Portal – A Complete Recruitment System for Company or Job Board website plugin for WordPress is vulnerable to SQL Injection via the 'ff' parameter of the getFieldsForVisibleCombobox() function in all versions up to, and including, 2.2.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11714"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--878dcc44-a4fb-4e6c-a0c1-8f8436a42fb7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1932f6c1-2606-4750-aa0a-37b295959c44",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-15T00:43:55.303343Z",
"modified": "2024-12-15T00:43:55.303343Z",
"name": "CVE-2024-12523",
"description": "The States Map US plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'states_map' shortcode in all versions up to, and including, 2.4.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12523"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--26b17e38-083c-4792-8eb4-67db99f3f39f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1db25090-ba4c-4616-9bce-2eef4e30f93d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-15T00:43:55.32716Z",
"modified": "2024-12-15T00:43:55.32716Z",
"name": "CVE-2024-12422",
"description": "The Import Eventbrite Events plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'page' parameter in all versions up to, and including, 1.7.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12422"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--0f914fd6-9e3f-40cd-91a0-5fc38cb3100e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1fddb4bc-d194-4e87-abf9-176067f9391c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-15T00:43:55.861914Z",
"modified": "2024-12-15T00:43:55.861914Z",
"name": "CVE-2024-11873",
"description": "The glomex oEmbed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'glomex_integration' shortcode in all versions up to, and including, 0.9.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11873"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--219c0ab4-bac4-4486-a0d9-9614d4d277bb",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2074dd9f-34b5-41a3-86b1-4a9823b768dd",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-15T00:43:55.808787Z",
"modified": "2024-12-15T00:43:55.808787Z",
"name": "CVE-2024-11755",
"description": "The IMS Countdown plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Countdown post settings in all versions up to, and including, 1.3.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11755"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--440ad517-9f03-4afc-a246-ca40c6799c5c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--21241652-00d7-40b4-8a7a-94b730fe7bac",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-15T00:43:55.863775Z",
"modified": "2024-12-15T00:43:55.863775Z",
"name": "CVE-2024-11879",
"description": "The Stripe Donation plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'stripe_donation' shortcode in all versions up to, and including, 1.2.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11879"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--873b3560-6169-4fb3-adca-68648bd77a82",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2f7a1d72-e691-422b-a9c4-76a8ce455cb5",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-15T00:43:55.285645Z",
"modified": "2024-12-15T00:43:55.285645Z",
"name": "CVE-2024-12474",
"description": "The GeoDataSource Country Region DropDown plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'gds-country-dropdown' shortcode in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12474"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e6dcdeb4-516a-419f-bf95-d5351954cfae",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--326f04de-8074-44e5-b67b-8dffb9b57b90",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-15T00:43:55.865892Z",
"modified": "2024-12-15T00:43:55.865892Z",
"name": "CVE-2024-11710",
"description": "The WP Job Portal – A Complete Recruitment System for Company or Job Board website plugin for WordPress is vulnerable to SQL Injection via the 'fieldfor', 'visibleParent' and 'id' parameters in all versions up to, and including, 2.2.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11710"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7dbd6da6-8ba3-4f17-a6bc-9c38a18f1e6e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--34e33700-cd9b-40bd-84a1-faf3297933d8",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-15T00:43:55.851567Z",
"modified": "2024-12-15T00:43:55.851567Z",
"name": "CVE-2024-11876",
"description": "The Kredeum NFTs, the easiest way to sell your NFTs directly on your WordPress site plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'kredeum_opensky' shortcode in all versions up to, and including, 1.6.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11876"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--f5c1c47f-c8f5-4d5a-ba04-3ab69b31d5cf",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--3a93a1da-c031-4920-8c76-c775bded3013",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-15T00:43:55.874602Z",
"modified": "2024-12-15T00:43:55.874602Z",
"name": "CVE-2024-11865",
"description": "The Tabs Maker plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on tab descriptions. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11865"
}
]
}
]
}
Loading

0 comments on commit 9d0eb98

Please sign in to comment.