Skip to content

Commit

Permalink
generated content from 2024-10-06
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Oct 6, 2024
1 parent a61341e commit c2597aa
Show file tree
Hide file tree
Showing 83 changed files with 1,886 additions and 0 deletions.
82 changes: 82 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -250897,3 +250897,85 @@ vulnerability,CVE-2024-47911,vulnerability--ddeaaa18-98e7-4fe4-89cd-48114a6cc185
vulnerability,CVE-2024-47768,vulnerability--611df18b-c008-491a-990b-d88b03fc8d07
vulnerability,CVE-2023-26770,vulnerability--99551817-ff1d-4489-8b4d-dd5ec26252c7
vulnerability,CVE-2023-26771,vulnerability--800fba47-383d-4b57-b2b7-d3d2414deeb8
vulnerability,CVE-2024-9161,vulnerability--d8b2de2c-0013-4dce-a00e-bebc93456b53
vulnerability,CVE-2024-9455,vulnerability--e51574b8-c3f1-4224-8158-61640b640cfe
vulnerability,CVE-2024-9146,vulnerability--554944ab-37fc-4e9b-9d63-e7aff6b8b595
vulnerability,CVE-2024-9528,vulnerability--e698da5f-93d5-44c0-9e6b-fa7cd06d0f77
vulnerability,CVE-2024-9533,vulnerability--bfce78d3-89df-40c9-bba9-1556e2ca82c8
vulnerability,CVE-2024-9534,vulnerability--12e3936e-a1db-4f18-8d2d-698ee34e84f3
vulnerability,CVE-2024-9532,vulnerability--352abe3e-df29-48f7-b683-53a37fc44a21
vulnerability,CVE-2024-9385,vulnerability--48e54b4e-cdb8-4068-86c8-4bbe1390709e
vulnerability,CVE-2024-9535,vulnerability--d2862e6e-74c4-40f9-812a-afe32b83eb4f
vulnerability,CVE-2024-9417,vulnerability--8eaea767-b202-4830-8fc6-672697a133a8
vulnerability,CVE-2024-9314,vulnerability--122e0151-83f6-4149-9bfc-ff67d823edc7
vulnerability,CVE-2024-9536,vulnerability--214a4f49-fa37-49f5-9f52-a650d70ae38a
vulnerability,CVE-2024-8743,vulnerability--535040ca-ff24-4b34-bb55-6c9632e18a88
vulnerability,CVE-2024-8486,vulnerability--95f8890e-c2ce-4ea7-9197-b7df37070a73
vulnerability,CVE-2024-44018,vulnerability--53584e68-4c35-49ef-95e9-f659cd604260
vulnerability,CVE-2024-44013,vulnerability--0922bead-f108-4efe-bce9-6685e1409b31
vulnerability,CVE-2024-44016,vulnerability--36e5922f-b10a-4a84-9abb-7d7e5732fbf5
vulnerability,CVE-2024-44015,vulnerability--e569ce20-fa2c-4079-bd42-d19ef76f548b
vulnerability,CVE-2024-44023,vulnerability--3e919a8a-75d2-4f3b-af03-3c22000e066c
vulnerability,CVE-2024-44012,vulnerability--9e33dc58-1162-4c4d-8b9a-e443a568f5fe
vulnerability,CVE-2024-44011,vulnerability--eb5679b0-edc1-4bc0-ad7f-ae7d1c651592
vulnerability,CVE-2024-44034,vulnerability--e79a00e5-231e-410b-ac6b-eec86e6d5eec
vulnerability,CVE-2024-44014,vulnerability--ecc20cef-7a1b-4af8-9b83-ad743776cd81
vulnerability,CVE-2024-47643,vulnerability--2cabef24-db83-4d0d-9211-932686ad6878
vulnerability,CVE-2024-47386,vulnerability--045ff291-0375-4589-b846-47c867d550ee
vulnerability,CVE-2024-47385,vulnerability--be61281b-6a88-495e-9cbb-b4a85e345b7f
vulnerability,CVE-2024-47629,vulnerability--9d306d3f-b967-4b95-85ea-32fd806147ab
vulnerability,CVE-2024-47632,vulnerability--6d33ae9a-5b51-4d99-8c6f-ec4d7451c4e4
vulnerability,CVE-2024-47621,vulnerability--e2a33116-55e1-41b8-95df-ca299bbcab8d
vulnerability,CVE-2024-47623,vulnerability--04219ad5-4f67-4750-b317-01ec05aa4f5b
vulnerability,CVE-2024-47316,vulnerability--8e91bfd0-5493-4ad7-984d-f572d8296cd0
vulnerability,CVE-2024-47627,vulnerability--34990f4e-c3ac-48fb-8729-fb1421a8bf32
vulnerability,CVE-2024-47390,vulnerability--659d2f72-764a-45a1-adab-fba7824fe1bf
vulnerability,CVE-2024-47630,vulnerability--de894023-a045-4ffe-b4b5-0675a2752975
vulnerability,CVE-2024-47388,vulnerability--2f913beb-994a-47cc-8af0-4cec0761142a
vulnerability,CVE-2024-47647,vulnerability--88d4a063-eeff-42f0-8f95-f7891439ffdf
vulnerability,CVE-2024-47626,vulnerability--89e6a174-5cc0-454c-b4a6-999443d92c50
vulnerability,CVE-2024-47371,vulnerability--6d743b88-a535-4488-8e69-397b91b7aee5
vulnerability,CVE-2024-47639,vulnerability--8ee8a6a4-8781-4ca5-866f-5a5826ce6484
vulnerability,CVE-2024-47646,vulnerability--dcccf3aa-9ab1-43d5-a118-2e869c043d45
vulnerability,CVE-2024-47379,vulnerability--d075499d-1e7a-4d54-92f4-3b2f9fa057cc
vulnerability,CVE-2024-47378,vulnerability--1615d7fd-3a26-4197-b28a-5f567508c7c0
vulnerability,CVE-2024-47849,vulnerability--c8fe33e7-f521-429c-8f2a-42f8cffb32ec
vulnerability,CVE-2024-47373,vulnerability--22fd8586-9a5c-4a72-8c86-ee918eaab0b8
vulnerability,CVE-2024-47381,vulnerability--bd2d3285-ce6e-4104-a2cf-baf715442ced
vulnerability,CVE-2024-47387,vulnerability--f5b82727-3ee5-4eb3-9982-d8121fd86ba2
vulnerability,CVE-2024-47628,vulnerability--0d420bb8-f46b-4e84-af88-e7a2204a2ed1
vulnerability,CVE-2024-47370,vulnerability--1dacaf20-1107-4a14-8bf9-7e14814e6ef3
vulnerability,CVE-2024-47841,vulnerability--a780c8b4-a445-47c3-80e2-07d7fb677ee5
vulnerability,CVE-2024-47393,vulnerability--693fbb9a-ada7-40e7-b394-20770cc50daf
vulnerability,CVE-2024-47383,vulnerability--521109f1-78fd-484e-851a-0f793fbb3c22
vulnerability,CVE-2024-47638,vulnerability--220d743b-7ac8-4c43-921a-758827aa157a
vulnerability,CVE-2024-47384,vulnerability--84c92a1d-66a3-49ac-9368-54b952fd314b
vulnerability,CVE-2024-47309,vulnerability--bd305faa-460d-409c-bc58-034728d35ae0
vulnerability,CVE-2024-47624,vulnerability--e6bc5d1b-10d7-4cd3-aea2-961e157a0d83
vulnerability,CVE-2024-47323,vulnerability--c9d90089-f76e-4ace-aca8-89be703c6aa8
vulnerability,CVE-2024-47324,vulnerability--d1f2e357-77d4-4a8a-ac74-f71d016b515e
vulnerability,CVE-2024-47622,vulnerability--b64b380e-5b2a-40af-946d-31510605c130
vulnerability,CVE-2024-47644,vulnerability--c9e9738d-d14f-4be7-9e1e-69639822f683
vulnerability,CVE-2024-47846,vulnerability--f9f946f5-7ee4-4ce2-a988-5281bf95a784
vulnerability,CVE-2024-47377,vulnerability--fb872207-c944-4e8d-aa0e-feea1f388c12
vulnerability,CVE-2024-47389,vulnerability--98c62c82-90bb-48b3-9a7c-9e7bd30139d3
vulnerability,CVE-2024-47372,vulnerability--0ff60d8e-3823-41aa-99b7-77056e1dba5f
vulnerability,CVE-2024-47376,vulnerability--e636fd6f-5d0f-4c5a-b37b-6af3140dbe11
vulnerability,CVE-2024-47635,vulnerability--03396931-387e-43f8-9b8d-a61d35f6d822
vulnerability,CVE-2024-47845,vulnerability--066dfa6c-2b33-49bf-a566-1261a9c813e5
vulnerability,CVE-2024-47847,vulnerability--8677670c-908e-47a2-8a9d-b79af47aaca1
vulnerability,CVE-2024-47380,vulnerability--ae423e5d-b866-4875-b6b5-5c1a3ca3b191
vulnerability,CVE-2024-47374,vulnerability--70f79b83-4ad4-423a-9128-0065d65c8d2f
vulnerability,CVE-2024-47319,vulnerability--65d49e13-9e62-44c3-827b-03ae5784f10c
vulnerability,CVE-2024-47625,vulnerability--3dbd53da-2096-45cd-8add-dc6b3c5f9d56
vulnerability,CVE-2024-47633,vulnerability--40f56575-391a-410d-bd09-31fd31d370ff
vulnerability,CVE-2024-47631,vulnerability--1c8b9999-53c0-4729-948a-5b76b6626f49
vulnerability,CVE-2024-47369,vulnerability--04b85dee-71b5-4ed4-84de-8dd3c1870e63
vulnerability,CVE-2024-47382,vulnerability--9a832ab8-10d4-40bb-9d0f-9cbbe0601fd6
vulnerability,CVE-2024-47642,vulnerability--7e8fbf79-621c-45a8-8493-66830d686070
vulnerability,CVE-2024-47394,vulnerability--9fbf3ffe-1128-496d-b5b5-e386c0dfd0bb
vulnerability,CVE-2024-47392,vulnerability--c9f04cac-2795-41b2-a98a-df39faf61bda
vulnerability,CVE-2024-47391,vulnerability--7f84747d-b5f0-4973-ac8c-500749dbdeaa
vulnerability,CVE-2024-47375,vulnerability--bda71293-c834-4f94-9cef-07cddaf4a1f1
vulnerability,CVE-2024-47840,vulnerability--73aecb0d-9d19-414d-8db3-a60e12032556
vulnerability,CVE-2024-47395,vulnerability--9397460d-3e94-4bdd-baf5-b8ffd66dc16a
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--aa41e4fc-a655-45d5-8442-f58ccb083be8",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--03396931-387e-43f8-9b8d-a61d35f6d822",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-06T00:22:20.713674Z",
"modified": "2024-10-06T00:22:20.713674Z",
"name": "CVE-2024-47635",
"description": "Cross-Site Request Forgery (CSRF) vulnerability in TinyPNG.This issue affects TinyPNG: from n/a through 3.4.3.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-47635"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a8522b99-3a23-4ce4-9400-edc2c1232703",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--04219ad5-4f67-4750-b317-01ec05aa4f5b",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-06T00:22:20.658159Z",
"modified": "2024-10-06T00:22:20.658159Z",
"name": "CVE-2024-47623",
"description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in GhozyLab, Inc. Gallery Lightbox allows Stored XSS.This issue affects Gallery Lightbox: from n/a through 1.0.0.39.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-47623"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5c198ceb-fdad-499a-bf96-936bc16b39a4",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--045ff291-0375-4589-b846-47c867d550ee",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-06T00:22:20.650548Z",
"modified": "2024-10-06T00:22:20.650548Z",
"name": "CVE-2024-47386",
"description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Extended The Ultimate WordPress Toolkit – WP Extended allows Reflected XSS.This issue affects The Ultimate WordPress Toolkit – WP Extended: from n/a through 3.0.8.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-47386"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--fa44ea5b-c27d-475a-b978-d99345643556",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--04b85dee-71b5-4ed4-84de-8dd3c1870e63",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-06T00:22:20.729567Z",
"modified": "2024-10-06T00:22:20.729567Z",
"name": "CVE-2024-47369",
"description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPWeb Social Auto Poster allows Reflected XSS.This issue affects Social Auto Poster: from n/a through 5.3.15.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-47369"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e1c42f58-9c92-4da6-a90b-06da2ecac03b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--066dfa6c-2b33-49bf-a566-1261a9c813e5",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-06T00:22:20.714697Z",
"modified": "2024-10-06T00:22:20.714697Z",
"name": "CVE-2024-47845",
"description": "Improper Encoding or Escaping of Output vulnerability in The Wikimedia Foundation Mediawiki - CSS Extension allows Code Injection.This issue affects Mediawiki - CSS Extension: from 1.39.X before 1.39.9, from 1.41.X before 1.41.3, from 1.42.X before 1.42.2.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-47845"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--35e9fa09-f750-42ba-9eda-9b7097475831",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0922bead-f108-4efe-bce9-6685e1409b31",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-06T00:22:20.041995Z",
"modified": "2024-10-06T00:22:20.041995Z",
"name": "CVE-2024-44013",
"description": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Innate Images LLC VR Calendar allows PHP Local File Inclusion.This issue affects VR Calendar: from n/a through 2.4.0.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-44013"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ac4d2dea-46a6-4198-b34b-cad346a63f53",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0d420bb8-f46b-4e84-af88-e7a2204a2ed1",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-06T00:22:20.683455Z",
"modified": "2024-10-06T00:22:20.683455Z",
"name": "CVE-2024-47628",
"description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in LA-Studio LA-Studio Element Kit for Elementor allows Stored XSS.This issue affects LA-Studio Element Kit for Elementor: from n/a through 1.3.9.3.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-47628"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--bc904960-4b72-4adb-98b6-67081c93abf5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0ff60d8e-3823-41aa-99b7-77056e1dba5f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-06T00:22:20.710734Z",
"modified": "2024-10-06T00:22:20.710734Z",
"name": "CVE-2024-47372",
"description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ThemeNcode LLC TNC PDF viewer allows Stored XSS.This issue affects TNC PDF viewer: from n/a through 3.1.0.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-47372"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ade9f0e3-75bc-42b7-ba0f-fcf772e85d8d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--122e0151-83f6-4149-9bfc-ff67d823edc7",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-06T00:22:19.415673Z",
"modified": "2024-10-06T00:22:19.415673Z",
"name": "CVE-2024-9314",
"description": "The Rank Math SEO – AI SEO Tools to Dominate SEO Rankings plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.0.228 via deserialization of untrusted input 'set_redirections' function. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9314"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--13505a3b-2698-400a-828e-10eeed4f30d6",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--12e3936e-a1db-4f18-8d2d-698ee34e84f3",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-06T00:22:19.398146Z",
"modified": "2024-10-06T00:22:19.398146Z",
"name": "CVE-2024-9534",
"description": "A vulnerability was found in D-Link DIR-605L 2.13B01 BETA. It has been classified as critical. Affected is the function formEasySetPassword of the file /goform/formEasySetPassword. The manipulation of the argument curTime leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9534"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e427dff6-6065-4053-aeb0-79d3d268198c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1615d7fd-3a26-4197-b28a-5f567508c7c0",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-06T00:22:20.674944Z",
"modified": "2024-10-06T00:22:20.674944Z",
"name": "CVE-2024-47378",
"description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPCOM WPCOM Member allows Reflected XSS.This issue affects WPCOM Member: from n/a through 1.5.4.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-47378"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--877332f7-3a95-4dff-8080-eedb8ebfff66",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1c8b9999-53c0-4729-948a-5b76b6626f49",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-06T00:22:20.726422Z",
"modified": "2024-10-06T00:22:20.726422Z",
"name": "CVE-2024-47631",
"description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in bPlugins LLC Logo Carousel – Clients logo carousel for WP allows Stored XSS.This issue affects Logo Carousel – Clients logo carousel for WP: from n/a through 1.2.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-47631"
}
]
}
]
}
Loading

0 comments on commit c2597aa

Please sign in to comment.