Skip to content

Commit

Permalink
generated content from 2024-07-14
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Jul 14, 2024
1 parent 724b3eb commit c8af2fc
Show file tree
Hide file tree
Showing 50 changed files with 1,127 additions and 0 deletions.
49 changes: 49 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -243317,3 +243317,52 @@ vulnerability,CVE-2024-40549,vulnerability--ac74a02e-6871-4823-af59-4092668efa41
vulnerability,CVE-2024-40999,vulnerability--ef611326-2a3e-42ea-a396-1bcb888e2d2e
vulnerability,CVE-2024-40542,vulnerability--838aa505-b944-4da9-a230-07f44add1961
vulnerability,CVE-2023-41093,vulnerability--26ad1608-03f0-4be8-a525-8bd5e7dd466c
vulnerability,CVE-2024-5744,vulnerability--8792df9d-930a-404d-a306-f437c5d336f2
vulnerability,CVE-2024-5286,vulnerability--a0fe7b14-28b2-4b31-8b7a-b08d99211341
vulnerability,CVE-2024-5075,vulnerability--b52aeab9-1899-455b-954a-2515371b2f4c
vulnerability,CVE-2024-5032,vulnerability--93267b67-ec28-4586-99a2-1fd253c2a65b
vulnerability,CVE-2024-5167,vulnerability--38b78a2e-dc56-4b00-a1da-6957ce4b150a
vulnerability,CVE-2024-5281,vulnerability--ffa14a96-936b-4d38-87cb-009c370046e2
vulnerability,CVE-2024-5287,vulnerability--2fc4f3f7-f1e2-48db-a113-00701a571c62
vulnerability,CVE-2024-5034,vulnerability--f02f2c45-3da7-48cc-9dee-7d929de15d07
vulnerability,CVE-2024-5713,vulnerability--47fdddff-5d21-4b68-add4-c089c1a6b350
vulnerability,CVE-2024-5074,vulnerability--39a2f017-45cd-47ff-b904-45bc6fcd446b
vulnerability,CVE-2024-5079,vulnerability--a1d0e9e4-ec0d-40d5-a470-ff1e83227eeb
vulnerability,CVE-2024-5151,vulnerability--ae885179-74c6-4451-9177-bad32edddd35
vulnerability,CVE-2024-5080,vulnerability--b42748c8-0ced-4a9f-9cb5-a2add723a78c
vulnerability,CVE-2024-5283,vulnerability--d2f94d7b-7f11-417f-93b6-ee5e9a541e07
vulnerability,CVE-2024-5028,vulnerability--afa13d7e-c580-4060-99eb-c89b5c856d9a
vulnerability,CVE-2024-5644,vulnerability--9dea6965-bf71-402b-98d7-3c1e211a1976
vulnerability,CVE-2024-5715,vulnerability--6a7996f3-9a3b-489e-ade4-d5f4fced2d7a
vulnerability,CVE-2024-5280,vulnerability--04d9a08c-4586-4882-889c-fb2cdf6e1af4
vulnerability,CVE-2024-5442,vulnerability--c8ca0166-f90b-47bf-ab41-57cb28891103
vulnerability,CVE-2024-5575,vulnerability--1bd57d77-ed19-43e8-8243-f4f06c2b260b
vulnerability,CVE-2024-5284,vulnerability--d990c367-1e8c-44aa-80fd-251abb89d5a7
vulnerability,CVE-2024-5076,vulnerability--f7b7df78-cc42-43f7-b58a-9868acdf87de
vulnerability,CVE-2024-5450,vulnerability--cdc57db1-d286-470e-9542-07282ea62b49
vulnerability,CVE-2024-5472,vulnerability--49514b7d-9dcf-4e86-a065-e60603215301
vulnerability,CVE-2024-5627,vulnerability--6ef5707d-95b2-4703-9c98-ffea48ee7480
vulnerability,CVE-2024-5282,vulnerability--59a258a0-351d-4555-8624-23bd603d7b63
vulnerability,CVE-2024-5002,vulnerability--6c90ea4b-e0c7-4fce-a0b7-d10232098cda
vulnerability,CVE-2024-5033,vulnerability--7e52fdaa-0cca-4719-a089-9a41a7814540
vulnerability,CVE-2024-5077,vulnerability--45d7054e-b813-45f6-86e2-4f9f48264290
vulnerability,CVE-2024-3632,vulnerability--184c8860-81fa-4275-8c84-a63423036e23
vulnerability,CVE-2024-3710,vulnerability--1da6a32c-76ca-43f7-b1e7-b0276705e89d
vulnerability,CVE-2024-3964,vulnerability--465b0fd0-a9e9-4bce-93a5-2ca2cced0da1
vulnerability,CVE-2024-3753,vulnerability--41255bb1-1633-4947-8bea-631d6b78a6c0
vulnerability,CVE-2024-3963,vulnerability--7d5bee1d-30fc-4d0b-8a6e-517f0df0924e
vulnerability,CVE-2024-3026,vulnerability--cf18856f-3d44-403e-ab1a-b5311ec03bed
vulnerability,CVE-2024-3919,vulnerability--4b1d2b17-8155-4771-99a9-ec9e4936c33d
vulnerability,CVE-2024-3751,vulnerability--a9185eca-f528-413e-a2db-44ecaff76ddf
vulnerability,CVE-2024-2870,vulnerability--96f16d15-d01e-40a9-9b41-db3d1c91d7b0
vulnerability,CVE-2024-4217,vulnerability--2982ed12-b899-435d-b32f-d4abfadc6ecb
vulnerability,CVE-2024-4752,vulnerability--15ae8d5c-1f2b-44c2-90b3-a3a298e0e1c6
vulnerability,CVE-2024-4272,vulnerability--c32c9be8-54bf-4fb7-b670-2e29e5232df9
vulnerability,CVE-2024-4977,vulnerability--60682b80-9800-4bed-b8bb-2a891b0d68cb
vulnerability,CVE-2024-4602,vulnerability--433a064e-9de7-4ecb-9342-d269fefa5ebc
vulnerability,CVE-2024-4269,vulnerability--23224e57-73e7-46a1-bbf2-919bcd0dff92
vulnerability,CVE-2024-6574,vulnerability--ecab99bd-d9af-422d-b8fa-9fe5ee53a16a
vulnerability,CVE-2024-6465,vulnerability--d9811518-ddb2-461b-86d3-705fcf4cf29f
vulnerability,CVE-2024-6070,vulnerability--9314409a-35fd-4e7e-99b9-03453f2f377d
vulnerability,CVE-2023-39329,vulnerability--9b608f1a-1ec8-41a7-82a9-62fb77df2967
vulnerability,CVE-2023-39327,vulnerability--4ae740d3-436e-4b88-a37b-5ee9b0edeade
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--53f52d5c-7bce-4e63-92f2-f3bdb4056eca",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--04d9a08c-4586-4882-889c-fb2cdf6e1af4",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-07-14T00:34:54.516425Z",
"modified": "2024-07-14T00:34:54.516425Z",
"name": "CVE-2024-5280",
"description": "The wp-affiliate-platform WordPress plugin before 6.5.1 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make non-logged in users execute an XSS payload via a CSRF attack",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-5280"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7150f10d-e4b8-4eac-8846-51a117b53067",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--15ae8d5c-1f2b-44c2-90b3-a3a298e0e1c6",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-07-14T00:34:55.058257Z",
"modified": "2024-07-14T00:34:55.058257Z",
"name": "CVE-2024-4752",
"description": "The EventON WordPress plugin before 2.2.15 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-4752"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--052f627c-db39-4921-84f4-698d535590dc",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--184c8860-81fa-4275-8c84-a63423036e23",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-07-14T00:34:54.557214Z",
"modified": "2024-07-14T00:34:54.557214Z",
"name": "CVE-2024-3632",
"description": "The Smart Image Gallery WordPress plugin before 1.0.19 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-3632"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--fda4366a-06e9-4278-9e3d-78230af33d81",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1bd57d77-ed19-43e8-8243-f4f06c2b260b",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-07-14T00:34:54.520573Z",
"modified": "2024-07-14T00:34:54.520573Z",
"name": "CVE-2024-5575",
"description": "The Ditty WordPress plugin before 3.1.43 does not sanitise and escape some of its blocks' settings, which could allow high privilege users such as authors to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-5575"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--f4ed4422-21ba-4811-be69-cbaada96a7ac",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1da6a32c-76ca-43f7-b1e7-b0276705e89d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-07-14T00:34:54.564513Z",
"modified": "2024-07-14T00:34:54.564513Z",
"name": "CVE-2024-3710",
"description": "The Image Photo Gallery Final Tiles Grid WordPress plugin before 3.6.0 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admin",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-3710"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--92cccd34-a316-4102-88f2-14ef8ba1d7c2",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--23224e57-73e7-46a1-bbf2-919bcd0dff92",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-07-14T00:34:55.089612Z",
"modified": "2024-07-14T00:34:55.089612Z",
"name": "CVE-2024-4269",
"description": "The SVG Block WordPress plugin before 1.1.20 does not sanitize SVG file contents, which enables users with at least the author role to SVG with malicious JavaScript to conduct Stored XSS attacks.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-4269"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--8cb33c98-3b35-46d7-b861-c67e77ab4299",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2982ed12-b899-435d-b32f-d4abfadc6ecb",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-07-14T00:34:55.056184Z",
"modified": "2024-07-14T00:34:55.056184Z",
"name": "CVE-2024-4217",
"description": "The shortcodes-ultimate-pro WordPress plugin before 7.1.5 does not properly escape some of its shortcodes' settings, making it possible for attackers with a Contributor account to conduct Stored XSS attacks.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-4217"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--be55d386-54fe-4379-b188-9949c663458d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2fc4f3f7-f1e2-48db-a113-00701a571c62",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-07-14T00:34:54.483002Z",
"modified": "2024-07-14T00:34:54.483002Z",
"name": "CVE-2024-5287",
"description": "The wp-affiliate-platform WordPress plugin before 6.5.1 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in user change them via a CSRF attack",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-5287"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--fefc15e8-1425-49a3-8bad-9071f5f64c72",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--38b78a2e-dc56-4b00-a1da-6957ce4b150a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-07-14T00:34:54.478517Z",
"modified": "2024-07-14T00:34:54.478517Z",
"name": "CVE-2024-5167",
"description": "The CM Email Registration Blacklist and Whitelist WordPress plugin before 1.4.9 does not have CSRF check when adding or deleting an item from the blacklist or whitelist, which could allow attackers to make a logged in admin add or delete settings from the blacklist or whitelist menu via a CSRF attack",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-5167"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--36a47c58-0327-4c31-a97d-2dc0b18ef90b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--39a2f017-45cd-47ff-b904-45bc6fcd446b",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-07-14T00:34:54.495716Z",
"modified": "2024-07-14T00:34:54.495716Z",
"name": "CVE-2024-5074",
"description": "The wp-eMember WordPress plugin before 10.6.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-5074"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--86c3604a-86a5-46f8-9342-b445521b0c24",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--41255bb1-1633-4947-8bea-631d6b78a6c0",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-07-14T00:34:54.571093Z",
"modified": "2024-07-14T00:34:54.571093Z",
"name": "CVE-2024-3753",
"description": "The Hostel WordPress plugin before 1.1.5.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-3753"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a372d347-82b9-4924-a980-e47bdc14844d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--433a064e-9de7-4ecb-9342-d269fefa5ebc",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-07-14T00:34:55.081455Z",
"modified": "2024-07-14T00:34:55.081455Z",
"name": "CVE-2024-4602",
"description": "The Embed Peertube Playlist WordPress plugin before 1.10 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-4602"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9d10a3ce-4f6b-423c-9dcb-9478c57029a1",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--45d7054e-b813-45f6-86e2-4f9f48264290",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-07-14T00:34:54.545045Z",
"modified": "2024-07-14T00:34:54.545045Z",
"name": "CVE-2024-5077",
"description": "The wp-eMember WordPress plugin before 10.6.6 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-5077"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--cad54f86-b842-4b8c-b3b9-51bd9afe5cad",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--465b0fd0-a9e9-4bce-93a5-2ca2cced0da1",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-07-14T00:34:54.569031Z",
"modified": "2024-07-14T00:34:54.569031Z",
"name": "CVE-2024-3964",
"description": "The Product Enquiry for WooCommerce WordPress plugin before 3.1.8 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-3964"
}
]
}
]
}
Loading

0 comments on commit c8af2fc

Please sign in to comment.