Skip to content

Commit

Permalink
generated content from 2024-12-08
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Dec 8, 2024
1 parent 4b59cde commit 18b4418
Show file tree
Hide file tree
Showing 33 changed files with 736 additions and 0 deletions.
32 changes: 32 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -258934,3 +258934,35 @@ vulnerability,CVE-2024-42196,vulnerability--97e4a9b3-7928-4f88-9983-8d0bfae470d9
vulnerability,CVE-2024-0139,vulnerability--3c57e4b2-c0b4-4656-881d-bb10c24ea8cd
vulnerability,CVE-2024-0130,vulnerability--129c26f0-daa4-41c3-b893-e7a167ef74a2
vulnerability,CVE-2024-4633,vulnerability--9948d7eb-1428-4048-9208-48094b71dacd
vulnerability,CVE-2024-12166,vulnerability--668dc1c7-b44b-403a-8595-caa7774c6fa8
vulnerability,CVE-2024-12257,vulnerability--94b2fcb0-91f6-4271-af4d-65ee42fd5491
vulnerability,CVE-2024-12115,vulnerability--01511216-b06b-4a9e-ab6a-311b467d5356
vulnerability,CVE-2024-12026,vulnerability--730f6b8f-bc78-40ab-8382-c780ef33fa56
vulnerability,CVE-2024-12165,vulnerability--dbb024c8-175d-4b92-bfd9-dd4e53ba48c8
vulnerability,CVE-2024-12270,vulnerability--37b8165f-d116-4665-9f23-04a1d044d9fc
vulnerability,CVE-2024-12128,vulnerability--26b7e09a-77de-454b-a8fd-6677c2a3ecb7
vulnerability,CVE-2024-12167,vulnerability--c8562f77-c257-4f15-ad7d-90325cae178b
vulnerability,CVE-2024-12253,vulnerability--978add90-79d0-411d-8d4a-9c7b6baeb002
vulnerability,CVE-2024-10046,vulnerability--94538229-c6f7-4828-89ca-3be668bf1d54
vulnerability,CVE-2024-47115,vulnerability--45845ac0-b964-4327-85f7-00c88b0e6fc7
vulnerability,CVE-2024-47107,vulnerability--54c52eb3-8dbb-42e7-a2b1-1372601b28cd
vulnerability,CVE-2024-7894,vulnerability--f15d9cfa-54b6-41df-8e46-7a200e5307c0
vulnerability,CVE-2024-11904,vulnerability--23357866-87b8-4394-99bd-09dbb4ab25c1
vulnerability,CVE-2024-11183,vulnerability--9cc511aa-93ff-4350-ada9-552f31e59d5c
vulnerability,CVE-2024-11367,vulnerability--f94f9f93-c6e8-4f36-aef4-a181bf6e9db8
vulnerability,CVE-2024-11329,vulnerability--f75aadfb-2f49-4a1e-8cff-a9248fc73d2e
vulnerability,CVE-2024-11374,vulnerability--54d9cdf7-4870-4ad9-8aa5-2f2ba49d256a
vulnerability,CVE-2024-11451,vulnerability--a2f9b844-ab75-4f3d-8986-80b09ec33c4c
vulnerability,CVE-2024-11010,vulnerability--c5c23165-09c7-492a-acda-7ea6a08f0e50
vulnerability,CVE-2024-11380,vulnerability--7771d8ba-df63-4936-b722-4dd30b19e147
vulnerability,CVE-2024-11457,vulnerability--8522e016-b5d2-4504-b7ad-4288c70a88f5
vulnerability,CVE-2024-11353,vulnerability--ff3d9cb0-8fc4-454f-b0a1-185daaead4f1
vulnerability,CVE-2024-11943,vulnerability--a7f1fa6a-354d-4d91-be0d-f986d67e8a53
vulnerability,CVE-2024-11501,vulnerability--e6fc9f90-f9f8-46d5-aa6b-f77807e64363
vulnerability,CVE-2024-11464,vulnerability--c15e6069-dcad-4f2d-9d6c-7854187d3668
vulnerability,CVE-2024-11436,vulnerability--3d4e4c39-e5fd-4774-9950-0631d3d0f769
vulnerability,CVE-2024-53473,vulnerability--96813c98-3d81-4015-a682-b099328b7b38
vulnerability,CVE-2024-53143,vulnerability--4a4f946a-2758-43e9-977c-7794bd00c882
vulnerability,CVE-2024-8679,vulnerability--f3c89f97-0403-4b0c-8e34-f112a3040b9a
vulnerability,CVE-2024-41762,vulnerability--a918f4ce-2146-495d-b155-e47650a0eab4
vulnerability,CVE-2024-37071,vulnerability--80c47cec-4987-442a-aaf4-75044906e6c5
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5ab276e0-ce49-46c8-873b-17893c520ad5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--01511216-b06b-4a9e-ab6a-311b467d5356",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-08T00:24:31.651667Z",
"modified": "2024-12-08T00:24:31.651667Z",
"name": "CVE-2024-12115",
"description": "The Poll Maker – Versus Polls, Anonymous Polls, Image Polls plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.5.4. This is due to missing or incorrect nonce validation on the duplicate_poll() function. This makes it possible for unauthenticated attackers to duplicate polls via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12115"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--900704b8-62a2-4e24-a378-edf32a377317",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--23357866-87b8-4394-99bd-09dbb4ab25c1",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-08T00:24:32.133297Z",
"modified": "2024-12-08T00:24:32.133297Z",
"name": "CVE-2024-11904",
"description": "The 코드엠샵 소셜톡 plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'msntt_add_plus_talk' shortcode in all versions up to, and including, 1.2.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11904"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--77a4d9c6-758d-4287-ba1e-ccff3ef81381",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--26b7e09a-77de-454b-a8fd-6677c2a3ecb7",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-08T00:24:31.664445Z",
"modified": "2024-12-08T00:24:31.664445Z",
"name": "CVE-2024-12128",
"description": "The Simple Ecommerce Shopping Cart Plugin- Sell products through Paypal plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘monthly_sales_current_year’ parameter in all versions up to, and including, 3.1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12128"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--bd89e7f4-756c-4b1d-8e16-a038f89ede08",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--37b8165f-d116-4665-9f23-04a1d044d9fc",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-08T00:24:31.66135Z",
"modified": "2024-12-08T00:24:31.66135Z",
"name": "CVE-2024-12270",
"description": "The Beautiful taxonomy filters plugin for WordPress is vulnerable to SQL Injection via the 'selects[0][term]' parameter in all versions up to, and including, 2.4.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12270"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--41604b52-cca0-4ee7-80fc-a2e53a959e98",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--3d4e4c39-e5fd-4774-9950-0631d3d0f769",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-08T00:24:32.186488Z",
"modified": "2024-12-08T00:24:32.186488Z",
"name": "CVE-2024-11436",
"description": "The Drag & Drop Builder, Human Face Detector, Pre-built Templates, Spam Protection, User Email Notifications & more! plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'page' parameter in all versions up to, and including, 1.4.19 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11436"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--eed212a1-2cc5-4d7b-94fc-7c9e0c1d89bf",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--45845ac0-b964-4327-85f7-00c88b0e6fc7",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-08T00:24:31.862809Z",
"modified": "2024-12-08T00:24:31.862809Z",
"name": "CVE-2024-47115",
"description": "IBM AIX 7.2, 7.3 and VIOS 3.1 and 4.1 could allow a local user to execute arbitrary commands on the system due to improper neutralization of input.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-47115"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--0043cc15-aaee-49b3-a01d-022a7f121645",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--4a4f946a-2758-43e9-977c-7794bd00c882",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-08T00:24:32.43364Z",
"modified": "2024-12-08T00:24:32.43364Z",
"name": "CVE-2024-53143",
"description": "In the Linux kernel, the following vulnerability has been resolved:\n\nfsnotify: Fix ordering of iput() and watched_objects decrement\n\nEnsure the superblock is kept alive until we're done with iput().\nHolding a reference to an inode is not allowed unless we ensure the\nsuperblock stays alive, which fsnotify does by keeping the\nwatched_objects count elevated, so iput() must happen before the\nwatched_objects decrement.\nThis can lead to a UAF of something like sb->s_fs_info in tmpfs, but the\nUAF is hard to hit because race orderings that oops are more likely, thanks\nto the CHECK_DATA_CORRUPTION() block in generic_shutdown_super().\n\nAlso, ensure that fsnotify_put_sb_watched_objects() doesn't call\nfsnotify_sb_watched_objects() on a superblock that may have already been\nfreed, which would cause a UAF read of sb->s_fsnotify_info.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-53143"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b77ceac9-731c-40b4-904e-369f9401ca28",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--54c52eb3-8dbb-42e7-a2b1-1372601b28cd",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-08T00:24:31.88748Z",
"modified": "2024-12-08T00:24:31.88748Z",
"name": "CVE-2024-47107",
"description": "IBM QRadar SIEM 7.5 is vulnerable to stored cross-site scripting. This vulnerability allows authenticated users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-47107"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--0fde084a-9d42-43bc-8a29-b282b65874b4",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--54d9cdf7-4870-4ad9-8aa5-2f2ba49d256a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-08T00:24:32.152711Z",
"modified": "2024-12-08T00:24:32.152711Z",
"name": "CVE-2024-11374",
"description": "The TWChat – Send or receive messages from users plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 4.0.4. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11374"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--53eb713d-387c-446b-9a9f-1f3f2f335355",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--668dc1c7-b44b-403a-8595-caa7774c6fa8",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-08T00:24:31.639719Z",
"modified": "2024-12-08T00:24:31.639719Z",
"name": "CVE-2024-12166",
"description": "The Shortcodes Blocks Creator Ultimate plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'page' parameter in all versions up to, and including, 2.2.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12166"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--8ae4a381-bfd1-43db-a8c5-77d53ea17c3d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--730f6b8f-bc78-40ab-8382-c780ef33fa56",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-08T00:24:31.657797Z",
"modified": "2024-12-08T00:24:31.657797Z",
"name": "CVE-2024-12026",
"description": "The Message Filter for Contact Form 7 plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the saveFilter() function in all versions up to, and including, 1.6.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create new filters.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12026"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3a202a63-86c7-4cfe-b828-f0a497ed640e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--7771d8ba-df63-4936-b722-4dd30b19e147",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-08T00:24:32.156332Z",
"modified": "2024-12-08T00:24:32.156332Z",
"name": "CVE-2024-11380",
"description": "The Mini Program API plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'qvideo' shortcode in all versions up to, and including, 1.4.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11380"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--c4c36f31-26d7-444f-b2dd-c8a340c9a26f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--80c47cec-4987-442a-aaf4-75044906e6c5",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-08T00:24:32.965507Z",
"modified": "2024-12-08T00:24:32.965507Z",
"name": "CVE-2024-37071",
"description": "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 could allow an authenticated user to cause a denial of service with a specially crafted query due to improper memory allocation.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-37071"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e81dcd02-27f1-4a5d-9753-edfff7b231d1",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--8522e016-b5d2-4504-b7ad-4288c70a88f5",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-08T00:24:32.162254Z",
"modified": "2024-12-08T00:24:32.162254Z",
"name": "CVE-2024-11457",
"description": "The Feedpress Generator – External RSS Frontend Customizer plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'tab' parameter in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11457"
}
]
}
]
}
Loading

0 comments on commit 18b4418

Please sign in to comment.