Skip to content

Commit

Permalink
generated content from 2024-10-05
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Oct 5, 2024
1 parent f3c32d8 commit a61341e
Show file tree
Hide file tree
Showing 90 changed files with 2,047 additions and 0 deletions.
89 changes: 89 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -250808,3 +250808,92 @@ vulnerability,CVE-2024-47618,vulnerability--a7cff793-7390-40b6-9e01-5e508ca3c545
vulnerability,CVE-2024-47554,vulnerability--54b36a99-268b-4c3b-ae97-6e5d9c0024a5
vulnerability,CVE-2024-47136,vulnerability--d5f010e7-b9d7-4e67-b98a-409cf970ea05
vulnerability,CVE-2023-37822,vulnerability--283e46fe-cc1e-4dd2-afc3-62fad20ebaed
vulnerability,CVE-2024-43687,vulnerability--187089bb-916e-4578-81ae-78f3b6d6e064
vulnerability,CVE-2024-43686,vulnerability--8eb6a8f3-cc6f-4eb6-83d5-9b48a044cf1f
vulnerability,CVE-2024-43684,vulnerability--0a67d47a-4e56-4dd7-9595-c99cc3e31d24
vulnerability,CVE-2024-43685,vulnerability--f639ea7e-3cb1-4efb-b9e5-f58007eeb1d2
vulnerability,CVE-2024-43683,vulnerability--78838ba8-5cbb-43b5-aea4-d6da9967e446
vulnerability,CVE-2024-9204,vulnerability--a537ee39-c28e-4575-9639-4529aeb3cdf6
vulnerability,CVE-2024-9054,vulnerability--c402f6b4-cc0d-48de-b4e2-b9d0c07bfe7f
vulnerability,CVE-2024-9242,vulnerability--9b5b7e1d-6fce-412d-8d05-e0c955a81bc5
vulnerability,CVE-2024-9410,vulnerability--00d5f9e5-6c37-4413-8915-c4eb24af2a7b
vulnerability,CVE-2024-9482,vulnerability--fa228e50-87f6-4be7-8f54-a00650f69768
vulnerability,CVE-2024-9484,vulnerability--d87a403a-9e45-4ac1-ba19-0205130d6f00
vulnerability,CVE-2024-9237,vulnerability--72997a7e-8df6-44f0-9b16-c3ac470f3c66
vulnerability,CVE-2024-9421,vulnerability--17b10849-6471-4bdc-a848-56cd1933d632
vulnerability,CVE-2024-9353,vulnerability--2216e329-3204-4d31-a47e-ee41ff45b2fc
vulnerability,CVE-2024-9372,vulnerability--8b45b67f-413d-4595-b040-b8e73f90947c
vulnerability,CVE-2024-9345,vulnerability--4e14ab9c-d513-4d18-81a3-8c1f17bcc208
vulnerability,CVE-2024-9483,vulnerability--bb50aa01-d4c4-4af8-b14a-9b75f2492c68
vulnerability,CVE-2024-9271,vulnerability--aabc2d70-020a-4275-baeb-1ba126a6894b
vulnerability,CVE-2024-9306,vulnerability--1e7e876a-9949-4ad0-a207-872185809770
vulnerability,CVE-2024-9071,vulnerability--d32f5404-ba3a-4907-b7a8-7b43e91bb654
vulnerability,CVE-2024-9481,vulnerability--377ffe20-00f0-4445-944c-8f36ff33398d
vulnerability,CVE-2024-9515,vulnerability--81240b12-7041-48a6-b468-f0992de09b7d
vulnerability,CVE-2024-9349,vulnerability--ebcdcff8-8b9f-4af5-8994-635f39fb3d7e
vulnerability,CVE-2024-9513,vulnerability--712a722e-2681-4edd-86f1-6ec7e193068e
vulnerability,CVE-2024-9384,vulnerability--34e8eb35-b388-4465-8539-4ed291e42b59
vulnerability,CVE-2024-9368,vulnerability--8f039810-f449-493f-a838-2e44ab98d653
vulnerability,CVE-2024-9514,vulnerability--faab51da-acba-4bf9-98dc-b224596b2617
vulnerability,CVE-2024-9375,vulnerability--1b18155f-acd6-4b94-9f58-077dcf1ba21d
vulnerability,CVE-2024-9445,vulnerability--1221adbc-1c1a-4025-b554-8e9af193e8f2
vulnerability,CVE-2024-9435,vulnerability--b6d8dbda-aaf7-464f-8c5e-b772ae1d8859
vulnerability,CVE-2024-8149,vulnerability--a0a5b08a-d86b-4ef9-95f6-c28b6df4596d
vulnerability,CVE-2024-8148,vulnerability--98e01118-5320-4dc8-a501-f259473a9567
vulnerability,CVE-2024-8520,vulnerability--aa9cb0c5-c9cb-4706-a7b0-6a1e30f74b36
vulnerability,CVE-2024-8519,vulnerability--16f2bbf5-a6ea-4953-bc64-626f41f5dbe0
vulnerability,CVE-2024-8802,vulnerability--8e38ce08-4bfd-48cd-a6d0-116ec1e1b68e
vulnerability,CVE-2024-8804,vulnerability--f4d11e20-1c33-43ee-b837-c38c6228f5a4
vulnerability,CVE-2024-8499,vulnerability--f95d7867-889d-4c79-a886-795ec874c470
vulnerability,CVE-2024-46409,vulnerability--686908f9-eb44-41cf-bf2a-b0cbf292ff7e
vulnerability,CVE-2024-46078,vulnerability--68d0352f-fb4e-40de-a025-d3298de86327
vulnerability,CVE-2024-46077,vulnerability--2bced902-31fb-4b04-a0a5-313d6785c948
vulnerability,CVE-2024-46486,vulnerability--81f5e199-d535-4ac8-abd6-cc9ce0bd1ea8
vulnerability,CVE-2024-6400,vulnerability--fe41f0d0-f34e-4e7a-8c2e-c9fa6fa0f915
vulnerability,CVE-2024-6443,vulnerability--c59bd65d-486e-436b-80bc-7a280f3a287e
vulnerability,CVE-2024-6444,vulnerability--d4db594c-b905-43d9-ba05-af8d316c2907
vulnerability,CVE-2024-6442,vulnerability--7dcf836a-ebf0-4b33-8dfe-16c1ed21f2f8
vulnerability,CVE-2024-25702,vulnerability--6a680d0d-7434-4d60-b5d6-e90bae274bf9
vulnerability,CVE-2024-25701,vulnerability--d87e0ab6-d64d-4499-b558-1b0ac687a117
vulnerability,CVE-2024-25694,vulnerability--d98a5979-8225-45da-80fe-68df112e5f07
vulnerability,CVE-2024-25691,vulnerability--3c901b74-9425-4b75-a3dc-5ad707059193
vulnerability,CVE-2024-25707,vulnerability--156c920d-1fd3-432e-a709-65ba2c4da3b5
vulnerability,CVE-2024-44439,vulnerability--703b1b09-0758-40dd-a220-dae395531a45
vulnerability,CVE-2024-7801,vulnerability--f2fc4318-bb01-4d6a-8e57-060974792594
vulnerability,CVE-2024-41514,vulnerability--2f609d12-f1f7-43cd-bfb2-b49f3b6b3fe5
vulnerability,CVE-2024-41516,vulnerability--36fc72fd-1a43-4d7b-b5c5-7917f6e67430
vulnerability,CVE-2024-41511,vulnerability--8cccfbbf-5239-4396-bbd3-12ecda273591
vulnerability,CVE-2024-41513,vulnerability--b9de0f78-46e2-44f9-88e2-463e41f5974c
vulnerability,CVE-2024-41515,vulnerability--c7000505-5174-4864-a083-cd275b12a7a4
vulnerability,CVE-2024-41512,vulnerability--655b90d3-3964-499a-8855-8b96f2954db0
vulnerability,CVE-2024-37869,vulnerability--03f7f64b-db23-4fd5-9eee-6376063a4b5e
vulnerability,CVE-2024-37868,vulnerability--9370b655-9c7f-4613-970a-86d7fc237e3f
vulnerability,CVE-2024-38040,vulnerability--4337c99e-cf08-4fa5-ae9f-805c3c3c3e05
vulnerability,CVE-2024-38039,vulnerability--6af7a44a-ef3d-4791-9472-0625947d99aa
vulnerability,CVE-2024-38037,vulnerability--72344865-4489-429b-9cbc-4bf30e199d30
vulnerability,CVE-2024-38036,vulnerability--edb76401-ad8e-4c3d-84b2-0aebefa453a9
vulnerability,CVE-2024-38038,vulnerability--58c7f0cc-320f-4723-90dd-7f2f96d79292
vulnerability,CVE-2024-47657,vulnerability--970e52f8-b468-4fe8-904a-b7bfb9ca43b9
vulnerability,CVE-2024-47913,vulnerability--9495056e-7c75-4f31-a370-bc01bc9dd09e
vulnerability,CVE-2024-47769,vulnerability--ae995f81-a96c-452a-92fb-7519cb404bde
vulnerability,CVE-2024-47850,vulnerability--2835c614-e9d4-47b8-9cd1-03ed29c55919
vulnerability,CVE-2024-47790,vulnerability--18773681-f227-409c-a324-64724ec545de
vulnerability,CVE-2024-47789,vulnerability--6cffa3fb-7f15-44cb-bd43-2f86b7715996
vulnerability,CVE-2024-47183,vulnerability--58ab3cd3-37b3-4fd1-8624-2836645d536a
vulnerability,CVE-2024-47652,vulnerability--a2e37f4b-0470-4732-b077-c39da495687c
vulnerability,CVE-2024-47656,vulnerability--d2443194-c87b-4585-867e-58e608f11aa3
vulnerability,CVE-2024-47211,vulnerability--983d22c9-2133-48eb-9c9d-3adeefbe3671
vulnerability,CVE-2024-47654,vulnerability--f358f9f8-8f90-4635-b381-abb12c61a43c
vulnerability,CVE-2024-47764,vulnerability--9fb79433-0c46-4505-9ca6-a2b71ba992ee
vulnerability,CVE-2024-47854,vulnerability--38449df4-b6f3-44f7-8dd1-517ac8565a99
vulnerability,CVE-2024-47651,vulnerability--298f4340-5e60-452b-be83-4201dba3c3f5
vulnerability,CVE-2024-47848,vulnerability--6944e1ae-12a1-4dec-932d-8e56cb29ab22
vulnerability,CVE-2024-47765,vulnerability--3d1dfe26-a33e-4ebe-924d-7fa4b2ebd9df
vulnerability,CVE-2024-47855,vulnerability--9f86d7ca-7027-4232-a761-7ff9e12eab2c
vulnerability,CVE-2024-47655,vulnerability--c9abee61-24b1-418e-bfee-88effe7883f2
vulnerability,CVE-2024-47653,vulnerability--468ff703-927b-4e0e-a6af-1fcf5ab971b0
vulnerability,CVE-2024-47910,vulnerability--e60bccbb-8ba3-40d9-b712-f71509a7a580
vulnerability,CVE-2024-47911,vulnerability--ddeaaa18-98e7-4fe4-89cd-48114a6cc185
vulnerability,CVE-2024-47768,vulnerability--611df18b-c008-491a-990b-d88b03fc8d07
vulnerability,CVE-2023-26770,vulnerability--99551817-ff1d-4489-8b4d-dd5ec26252c7
vulnerability,CVE-2023-26771,vulnerability--800fba47-383d-4b57-b2b7-d3d2414deeb8
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--fea209fb-17e2-4c94-a43a-5fa7adfe1a61",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--00d5f9e5-6c37-4413-8915-c4eb24af2a7b",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-05T00:20:13.036075Z",
"modified": "2024-10-05T00:20:13.036075Z",
"name": "CVE-2024-9410",
"description": "Ada.cx's Sentry configuration allowed for blind server-side request forgeries (SSRF) through the use of a data scraping endpoint.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9410"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--876183e1-c0a5-423c-814b-2dcd8c1f169d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--03f7f64b-db23-4fd5-9eee-6376063a4b5e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-05T00:20:14.203069Z",
"modified": "2024-10-05T00:20:14.203069Z",
"name": "CVE-2024-37869",
"description": "File Upload vulnerability in Itsourcecode Online Discussion Forum Project v.1.0 allows a remote attacker to execute arbitrary code via the \"poster.php\" file, and the uploaded file was received using the \"$- FILES\" variable",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-37869"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--68e28029-e641-4958-ade9-ade607418afd",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0a67d47a-4e56-4dd7-9595-c99cc3e31d24",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-05T00:20:12.474618Z",
"modified": "2024-10-05T00:20:12.474618Z",
"name": "CVE-2024-43684",
"description": "Cross-Site Request Forgery (CSRF) vulnerability in Microchip TimeProvider 4100 allows Cross Site Request Forgery, Cross-Site Scripting (XSS).This issue affects TimeProvider 4100: from 1.0.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-43684"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--fe57a3ce-de76-4c05-ad44-5a6fc843f03c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1221adbc-1c1a-4025-b554-8e9af193e8f2",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-05T00:20:13.081216Z",
"modified": "2024-10-05T00:20:13.081216Z",
"name": "CVE-2024-9445",
"description": "The Display Medium Posts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's display_medium_posts shortcode in all versions up to, and including, 5.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9445"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--cc40d200-661f-4d5e-94b2-b995e4a5562e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--156c920d-1fd3-432e-a709-65ba2c4da3b5",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-05T00:20:13.617301Z",
"modified": "2024-10-05T00:20:13.617301Z",
"name": "CVE-2024-25707",
"description": "There is a reflected cross site scripting in Esri Portal for ArcGIS 11.1 and below on Windows and Linux x64 allows a remote authenticated attacker with administrative access to supply a crafted string which could potentially execute arbitrary JavaScript code in the their own browser (Self XSS). A user cannot be phished into clicking a link to execute code.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-25707"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5752d11c-a7e2-4244-af16-196683d386e3",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--16f2bbf5-a6ea-4953-bc64-626f41f5dbe0",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-05T00:20:13.118821Z",
"modified": "2024-10-05T00:20:13.118821Z",
"name": "CVE-2024-8519",
"description": "The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'um_loggedin' shortcode in all versions up to, and including, 2.8.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8519"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e74ef317-19f0-43fb-bb92-372c66004672",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--17b10849-6471-4bdc-a848-56cd1933d632",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-05T00:20:13.041592Z",
"modified": "2024-10-05T00:20:13.041592Z",
"name": "CVE-2024-9421",
"description": "The Login Logout Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'class' parameter in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9421"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d7c07fdb-34cc-4f51-8618-7aa07a6f4fca",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--187089bb-916e-4578-81ae-78f3b6d6e064",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-05T00:20:12.460008Z",
"modified": "2024-10-05T00:20:12.460008Z",
"name": "CVE-2024-43687",
"description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Microchip TimeProvider 4100 (banner config modules) allows Cross-Site Scripting (XSS).This issue affects TimeProvider 4100: from 1.0 before 2.4.7.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-43687"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5dd5f762-910c-4f1a-b8e4-a03999569c51",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--18773681-f227-409c-a324-64724ec545de",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-05T00:20:14.308284Z",
"modified": "2024-10-05T00:20:14.308284Z",
"name": "CVE-2024-47790",
"description": "** UNSUPPORTED WHEN ASSIGNED ** This vulnerability exists in D3D Security IP Camera due to usage of insecure Real-Time Streaming Protocol (RTSP) version for live video streaming. A remote attacker could exploit this vulnerability by crafting a RTSP packet leading to unauthorized access to live feed of the targeted device. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-47790"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3f63ded2-f0de-46d1-9bcf-d5bfc19a6c4f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1b18155f-acd6-4b94-9f58-077dcf1ba21d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-05T00:20:13.078257Z",
"modified": "2024-10-05T00:20:13.078257Z",
"name": "CVE-2024-9375",
"description": "The WordPress Captcha Plugin by Captcha Bank plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 4.0.36. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9375"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--42ce63ab-f1c8-43c4-baef-2f5b86b93db7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1e7e876a-9949-4ad0-a207-872185809770",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-05T00:20:13.055782Z",
"modified": "2024-10-05T00:20:13.055782Z",
"name": "CVE-2024-9306",
"description": "The WP Booking Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 10.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. In addition, site administrators have the option to grant lower-level users with access to manage the plugin's settings which may extend this vulnerability to those users.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9306"
}
]
}
]
}
Loading

0 comments on commit a61341e

Please sign in to comment.