Skip to content

Commit

Permalink
generated content from 2024-11-17
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Nov 17, 2024
1 parent c59dc94 commit a81e6d6
Show file tree
Hide file tree
Showing 51 changed files with 1,150 additions and 0 deletions.
50 changes: 50 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -256430,3 +256430,53 @@ vulnerability,CVE-2023-2332,vulnerability--0a342bc6-6426-42f2-94b6-1913852efc8c
vulnerability,CVE-2023-0737,vulnerability--07831246-8934-4a40-937d-db61dd8717f5
vulnerability,CVE-2023-0109,vulnerability--fe5ec6f0-9bda-49bd-8601-37b268960710
vulnerability,CVE-2023-4679,vulnerability--05309d64-82f1-43a3-9eab-aeea8d4bcec7
vulnerability,CVE-2024-52408,vulnerability--04e3357c-25ff-47f5-b75d-460dfb4e0ee4
vulnerability,CVE-2024-52405,vulnerability--9c425336-dc06-4ab5-ae31-9b9a17a40114
vulnerability,CVE-2024-52403,vulnerability--b6138e6a-a70d-4d85-8516-5157910185b5
vulnerability,CVE-2024-52409,vulnerability--ab892110-75f2-4dc4-b372-1c6e1145adf7
vulnerability,CVE-2024-52406,vulnerability--afac21dc-1b16-4ef1-9136-7cff15735de3
vulnerability,CVE-2024-52399,vulnerability--3854c1a5-31ea-420a-915b-96f690d84800
vulnerability,CVE-2024-52400,vulnerability--e52b9601-5b45-455c-8a81-308ad15796e3
vulnerability,CVE-2024-52410,vulnerability--2f96a527-3883-4893-b1da-a9f8c6293dec
vulnerability,CVE-2024-52397,vulnerability--3ea4b303-337c-412d-ba4e-869b5fa37a76
vulnerability,CVE-2024-52404,vulnerability--cf0b6f82-b61e-402e-9cb5-d3d63d2de050
vulnerability,CVE-2024-52412,vulnerability--df23cb56-427d-4096-90e4-ac3ccef077b2
vulnerability,CVE-2024-52398,vulnerability--f07501cd-5478-4d25-ad4d-830b72c31f9b
vulnerability,CVE-2024-52386,vulnerability--266cacde-4dbf-4746-82d8-bdfefcab4305
vulnerability,CVE-2024-52407,vulnerability--e92699ac-e1a1-4b5f-88a0-f1cf1fb0e1ef
vulnerability,CVE-2024-52415,vulnerability--d25eff1d-8594-40f7-9753-f7a68b6ed4db
vulnerability,CVE-2024-52416,vulnerability--a9e9283d-31fe-4201-824b-82aa484142b9
vulnerability,CVE-2024-52414,vulnerability--92be7f40-acb3-46a3-8374-b0257c793e98
vulnerability,CVE-2024-52411,vulnerability--383ea81b-52e8-45d9-a5c6-6565db95bd4d
vulnerability,CVE-2024-52413,vulnerability--f207a3d0-e4cb-4407-a113-7f0ed614f20d
vulnerability,CVE-2024-10262,vulnerability--b95a1319-37bc-4db5-9160-b5b7097050f3
vulnerability,CVE-2024-10614,vulnerability--e44ecc99-d6c4-429b-8b91-04faae1a53cd
vulnerability,CVE-2024-10645,vulnerability--631364e0-d99e-498e-a1d3-c86e5cd88ec7
vulnerability,CVE-2024-10533,vulnerability--129344c2-10f3-43e0-aaf5-c4735d772d57
vulnerability,CVE-2024-10795,vulnerability--e395ed0e-c4f4-4e62-b79a-6c917c020c84
vulnerability,CVE-2024-10592,vulnerability--21991122-3a85-44ba-87d3-dc5f0bdd4cf5
vulnerability,CVE-2024-10883,vulnerability--aba4ba04-753c-41a5-854d-e03296673242
vulnerability,CVE-2024-10786,vulnerability--1a1108d0-d08c-42b9-bab7-23ea0596561f
vulnerability,CVE-2024-10147,vulnerability--f0fdfc83-f72e-4b89-992f-3d213df33aee
vulnerability,CVE-2024-10884,vulnerability--368091c1-8af8-4947-b063-a385feaea7ed
vulnerability,CVE-2024-10017,vulnerability--4fba3995-1f1e-459a-8f7c-e15b775ad67a
vulnerability,CVE-2024-10875,vulnerability--dc84fb72-98a6-4c5e-bad5-21264554e7d2
vulnerability,CVE-2024-10728,vulnerability--fbaeb3d4-231e-4ab9-b7d8-4b7b8ae9bd25
vulnerability,CVE-2024-10015,vulnerability--6600c12b-efdb-4918-bcac-371cbfa6e136
vulnerability,CVE-2024-10861,vulnerability--0d4ff980-f1d0-44ae-9c8b-a0e5bddbb5c6
vulnerability,CVE-2024-9887,vulnerability--c4ce4ca1-7747-4ff2-bd04-b462b421ee94
vulnerability,CVE-2024-9192,vulnerability--1950f46c-f6ba-4ed0-ace8-b18a1dc4d8ca
vulnerability,CVE-2024-9839,vulnerability--50325131-bc54-4cf1-a07f-1f5843bbce21
vulnerability,CVE-2024-9935,vulnerability--96ecc318-732e-4c6c-89e4-1d1b6220e100
vulnerability,CVE-2024-9938,vulnerability--6028758c-2a43-4932-8f8b-e00d18b1553b
vulnerability,CVE-2024-9849,vulnerability--220b9837-1e8a-4055-94e3-4ae4841891d1
vulnerability,CVE-2024-9850,vulnerability--4f71a904-1e14-45a9-9e40-151fc905df18
vulnerability,CVE-2024-9386,vulnerability--8100879c-ad3d-4b78-b85b-6aa55158df03
vulnerability,CVE-2024-9615,vulnerability--13f36479-dea2-45f8-93ed-ea2d8acf1630
vulnerability,CVE-2024-11118,vulnerability--88c176f0-66ac-4ad9-94fe-f4fc04a4cd96
vulnerability,CVE-2024-11092,vulnerability--4823c65f-7474-4ab0-b298-57e8bfd96a83
vulnerability,CVE-2024-11094,vulnerability--69ed3285-5265-4b49-a6fc-133eaa7bbc14
vulnerability,CVE-2024-11085,vulnerability--a034ef7e-5ae3-47ad-a39e-28390b880056
vulnerability,CVE-2024-8873,vulnerability--8797c43e-767e-4411-9615-828d9ac6da28
vulnerability,CVE-2024-8856,vulnerability--c6a326b4-e03a-4681-aca0-b58d21c962ce
vulnerability,CVE-2024-6628,vulnerability--8cf5aba6-648a-44aa-b4d9-472087c2755f
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d886ab89-5641-4e3f-8763-06fe33e82659",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--04e3357c-25ff-47f5-b75d-460dfb4e0ee4",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-17T00:41:26.851833Z",
"modified": "2024-11-17T00:41:26.851833Z",
"name": "CVE-2024-52408",
"description": "Unrestricted Upload of File with Dangerous Type vulnerability in Team PushAssist Push Notifications for WordPress by PushAssist allows Upload a Web Shell to a Web Server.This issue affects Push Notifications for WordPress by PushAssist: from n/a through 3.0.8.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-52408"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--558c06a3-cd94-4cf4-b7eb-079b48870b3e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0d4ff980-f1d0-44ae-9c8b-a0e5bddbb5c6",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-17T00:41:27.054817Z",
"modified": "2024-11-17T00:41:27.054817Z",
"name": "CVE-2024-10861",
"description": "The Popup Box – Create Countdown, Coupon, Video, Contact Form Popups plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the deactivate_plugin_option() function in all versions up to, and including, 4.9.7. This makes it possible for unauthenticated attackers to update the 'ays_pb_upgrade_plugin' option with arbitrary data.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10861"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e134137d-bef2-4e68-bce1-e2bbe3223c35",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--129344c2-10f3-43e0-aaf5-c4735d772d57",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-17T00:41:27.009237Z",
"modified": "2024-11-17T00:41:27.009237Z",
"name": "CVE-2024-10533",
"description": "The WP Chat App plugin for WordPress is vulnerable to unauthorized plugin installation due to a missing capability check on the ajax_install_plugin() function in all versions up to, and including, 3.6.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install the filebird plugin.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10533"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6919f160-c94c-41f7-9e41-1644098b9c22",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--13f36479-dea2-45f8-93ed-ea2d8acf1630",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-17T00:41:27.123948Z",
"modified": "2024-11-17T00:41:27.123948Z",
"name": "CVE-2024-9615",
"description": "The BulkPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 0.3.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9615"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--c84628b7-2543-47ed-bdf2-89e9b35300f6",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1950f46c-f6ba-4ed0-ace8-b18a1dc4d8ca",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-17T00:41:27.087801Z",
"modified": "2024-11-17T00:41:27.087801Z",
"name": "CVE-2024-9192",
"description": "The WordPress Video Robot - The Ultimate Video Importer plugin for WordPress is vulnerable to privilege escalation due to insufficient validation on user meta that can be updated in the wpvr_rate_request_result() function in all versions up to, and including, 1.20.0. This makes it possible for authenticated attackers, with subscriber-level access and above, to update their user meta on a WordPress site. This can be leveraged to update their capabilities to that of an administrator.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9192"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--92e89a93-8bf4-436e-9046-582118547df2",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1a1108d0-d08c-42b9-bab7-23ea0596561f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-17T00:41:27.02035Z",
"modified": "2024-11-17T00:41:27.02035Z",
"name": "CVE-2024-10786",
"description": "The Simple Local Avatars plugin for WordPress is vulnerable to unauthorized modification of datadue to a missing capability check on the sla_clear_user_cache function in all versions up to, and including, 2.7.11. This makes it possible for authenticated attackers, with Subscriber-level access and above, to clear user caches.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10786"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--079ff285-de79-4b49-955a-7f904f09d422",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--21991122-3a85-44ba-87d3-dc5f0bdd4cf5",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-17T00:41:27.014696Z",
"modified": "2024-11-17T00:41:27.014696Z",
"name": "CVE-2024-10592",
"description": "The Mapster WP Maps plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the popup class parameter in all versions up to, and including, 1.6.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10592"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9611fb81-6b6b-455c-b29b-cec876fa5d6c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--220b9837-1e8a-4055-94e3-4ae4841891d1",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-17T00:41:27.111533Z",
"modified": "2024-11-17T00:41:27.111533Z",
"name": "CVE-2024-9849",
"description": "The 3D FlipBook, PDF Viewer, PDF Embedder – Real 3D FlipBook WordPress Plugin plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'r3dfb_save_thumbnail_callback' function in all versions up to, and including, 4.6. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9849"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--4ec1c89f-f736-4f5f-8ce6-07e225f76e68",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--266cacde-4dbf-4746-82d8-bdfefcab4305",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-17T00:41:26.913122Z",
"modified": "2024-11-17T00:41:26.913122Z",
"name": "CVE-2024-52386",
"description": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Business Directory Team by RadiusTheme Classified Listing classified-listing allows PHP Local File Inclusion.This issue affects Classified Listing: from n/a through 3.1.15.1.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-52386"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--0b2d36ce-8da0-4692-85e1-1644c8ac1703",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2f96a527-3883-4893-b1da-a9f8c6293dec",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-17T00:41:26.898425Z",
"modified": "2024-11-17T00:41:26.898425Z",
"name": "CVE-2024-52410",
"description": "Deserialization of Untrusted Data vulnerability in Phoenixheart Referrer Detector allows Object Injection.This issue affects Referrer Detector: from n/a through 4.2.1.0.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-52410"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a6ad1504-c0ad-441e-86dd-2431b01c099b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--368091c1-8af8-4947-b063-a385feaea7ed",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-17T00:41:27.028001Z",
"modified": "2024-11-17T00:41:27.028001Z",
"name": "CVE-2024-10884",
"description": "The SimpleForm Contact Form Submissions plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.1.0. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10884"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--84b77423-1eae-4bc0-a81e-e5a21fa6dbe6",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--383ea81b-52e8-45d9-a5c6-6565db95bd4d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-17T00:41:26.929463Z",
"modified": "2024-11-17T00:41:26.929463Z",
"name": "CVE-2024-52411",
"description": "Deserialization of Untrusted Data vulnerability in Flowcraft UX Design Studio Advanced Personalization allows Object Injection.This issue affects Advanced Personalization: from n/a through 1.1.2.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-52411"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--cc3bb821-9b3c-49d9-82b0-8b2e877698d7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--3854c1a5-31ea-420a-915b-96f690d84800",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-17T00:41:26.892648Z",
"modified": "2024-11-17T00:41:26.892648Z",
"name": "CVE-2024-52399",
"description": "Unrestricted Upload of File with Dangerous Type vulnerability in Clarisse K. Writer Helper allows Upload a Web Shell to a Web Server.This issue affects Writer Helper: from n/a through 3.1.6.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-52399"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a1731523-2f45-454d-b2f3-745ee3b02bfc",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--3ea4b303-337c-412d-ba4e-869b5fa37a76",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-17T00:41:26.900032Z",
"modified": "2024-11-17T00:41:26.900032Z",
"name": "CVE-2024-52397",
"description": "Unrestricted Upload of File with Dangerous Type vulnerability in Davor Zeljkovic Convert Docx2post allows Upload a Web Shell to a Web Server.This issue affects Convert Docx2post: from n/a through 1.4.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-52397"
}
]
}
]
}
Loading

0 comments on commit a81e6d6

Please sign in to comment.