Skip to content

Commit

Permalink
generated content from 2024-11-21
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Nov 21, 2024
1 parent 3f9fac2 commit ad92189
Show file tree
Hide file tree
Showing 123 changed files with 2,806 additions and 0 deletions.
122 changes: 122 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -257031,3 +257031,125 @@ vulnerability,CVE-2018-9339,vulnerability--276c680a-7402-4ed8-8676-ba6a566ef01f
vulnerability,CVE-2018-9421,vulnerability--31794af8-16a2-4b4b-b820-5ea77c9ac254
vulnerability,CVE-2018-9456,vulnerability--07b6688b-dad4-45c9-a074-722aa9a87246
vulnerability,CVE-2018-9365,vulnerability--7a6786fa-4cfe-495a-a9b5-d3651deec419
vulnerability,CVE-2024-51208,vulnerability--6124da26-d79a-4c85-954c-21d97e0f8450
vulnerability,CVE-2024-51209,vulnerability--268f8874-65f4-4307-8aa0-005e6eb9fe79
vulnerability,CVE-2024-51151,vulnerability--9f28ea8b-3d48-4f34-820d-de767c661958
vulnerability,CVE-2024-51163,vulnerability--0cc0df9e-52a7-43b7-b981-952119905394
vulnerability,CVE-2024-51162,vulnerability--b781a805-371d-48c9-9848-8859d7f5a004
vulnerability,CVE-2024-48531,vulnerability--fdb7869f-a47b-441f-8454-831313611e3f
vulnerability,CVE-2024-48536,vulnerability--200b18bb-d0c8-4ae9-b11a-196a1a260152
vulnerability,CVE-2024-48895,vulnerability--1d774df9-34d5-4a79-9621-e381e6376c5a
vulnerability,CVE-2024-48534,vulnerability--3720b69f-dd87-4754-967e-c89fbd034a48
vulnerability,CVE-2024-48530,vulnerability--7c9f650a-880e-4c65-9ec2-eceb4f9b670b
vulnerability,CVE-2024-48982,vulnerability--76c9ceb8-b954-4863-814e-f51470663fb4
vulnerability,CVE-2024-48533,vulnerability--6517eaf7-44bc-4974-912b-cbb6ea23bcc2
vulnerability,CVE-2024-48985,vulnerability--d84d26f8-c703-43cd-8154-0756215993da
vulnerability,CVE-2024-48986,vulnerability--af991285-e61f-4ae2-9175-84e9a66562f3
vulnerability,CVE-2024-48983,vulnerability--1cb3639a-90bc-4b86-8de3-cac3663c5687
vulnerability,CVE-2024-48981,vulnerability--7a291730-fe5a-4035-912d-30134f97e189
vulnerability,CVE-2024-48899,vulnerability--2d67290c-123e-40f0-8f6b-1ac996e6a596
vulnerability,CVE-2024-48984,vulnerability--9e4c83b2-b00c-4cb5-814b-37a86e7cf1c2
vulnerability,CVE-2024-48535,vulnerability--7b7e97c4-024d-433a-b70a-9269f5e56b08
vulnerability,CVE-2024-52442,vulnerability--243ceb6d-702a-461f-b746-af439f600f06
vulnerability,CVE-2024-52473,vulnerability--7dc21e66-1922-458f-b285-61e2d1839ca2
vulnerability,CVE-2024-52440,vulnerability--2e29c6f3-505d-4426-acf6-fd6e0cb643b4
vulnerability,CVE-2024-52451,vulnerability--21943dc2-b49d-4a92-8e2a-e39b2835667f
vulnerability,CVE-2024-52447,vulnerability--dced2a7b-e4c9-4bda-9f49-92a07b184572
vulnerability,CVE-2024-52441,vulnerability--539579a2-39cb-4b4c-bd37-3fe8ffa6f345
vulnerability,CVE-2024-52437,vulnerability--37115755-732e-4e98-9774-7dbdbcee8a67
vulnerability,CVE-2024-52701,vulnerability--c081c9a0-4390-4e30-b367-655190515939
vulnerability,CVE-2024-52614,vulnerability--6fef9bf2-b2dd-46d6-b5c5-23c8b0fab995
vulnerability,CVE-2024-52677,vulnerability--6e7407c7-11b4-4740-8547-2ee2357b2769
vulnerability,CVE-2024-52755,vulnerability--5becfa09-e206-4921-a610-bc9a0a9e8189
vulnerability,CVE-2024-52444,vulnerability--f288034a-1d68-4580-8f46-30bc1649f16f
vulnerability,CVE-2024-52769,vulnerability--97675622-2089-4622-85f2-452f6d366bb7
vulnerability,CVE-2024-52770,vulnerability--cee39f59-5d5a-4c38-a775-252c8716a0d2
vulnerability,CVE-2024-52581,vulnerability--2395c6cc-b111-4c87-b111-d92796f35024
vulnerability,CVE-2024-52796,vulnerability--079695fc-addc-4cba-b804-390d9618292e
vulnerability,CVE-2024-52739,vulnerability--a3847305-5b2a-4c8b-a794-14eb73a798b3
vulnerability,CVE-2024-52446,vulnerability--f75b6548-2a73-4c46-8460-46c191934381
vulnerability,CVE-2024-52470,vulnerability--7ba01079-0add-4cc1-a354-82152bdb3333
vulnerability,CVE-2024-52771,vulnerability--583a4ecd-0437-4724-a356-8ac3d7088c76
vulnerability,CVE-2024-52471,vulnerability--22f611e3-fe48-4ce0-bdc8-c93c912196c5
vulnerability,CVE-2024-52725,vulnerability--89ca6223-8b2a-43de-948a-145a6cf4e714
vulnerability,CVE-2024-52765,vulnerability--3540e1b0-f862-4bca-8319-12d81ebc9dbf
vulnerability,CVE-2024-52598,vulnerability--9a90f43f-e8cc-4b54-827f-75ec9c70c1a2
vulnerability,CVE-2024-52597,vulnerability--fb04e9f6-236f-4c99-8da3-ace19a83e4ba
vulnerability,CVE-2024-52438,vulnerability--61dce463-72c5-4f5c-a4cf-82ecbf4c5dff
vulnerability,CVE-2024-52450,vulnerability--411cd270-b521-4e1a-b981-2016fe37c65c
vulnerability,CVE-2024-52439,vulnerability--9a66d72c-2e03-45a5-97a7-8024b736f000
vulnerability,CVE-2024-52757,vulnerability--372afce3-b7c4-46b4-b73a-e686675d8656
vulnerability,CVE-2024-52449,vulnerability--8f03062c-74af-4e2d-a6e8-6c089d8fb616
vulnerability,CVE-2024-52445,vulnerability--14e3fed8-7e88-4552-a1f7-290104e66f3f
vulnerability,CVE-2024-52033,vulnerability--21574974-8d98-404b-9ccf-589d52ebed00
vulnerability,CVE-2024-52443,vulnerability--0eca3f37-84f3-4bcf-adbe-6094eb40268d
vulnerability,CVE-2024-52448,vulnerability--3f42dd3c-722d-40b7-8e10-e7ec983d01a2
vulnerability,CVE-2024-52754,vulnerability--6f036588-2d2c-47d8-8a80-cdb879903ee7
vulnerability,CVE-2024-52702,vulnerability--ae91a199-02fd-4827-b4f8-1fa3cfeca05f
vulnerability,CVE-2024-52472,vulnerability--0c2e2819-9136-496f-849c-ce416c08e314
vulnerability,CVE-2024-45690,vulnerability--bd264cc7-8841-4e48-9dd5-0ca7131467fc
vulnerability,CVE-2024-45511,vulnerability--a0360d4c-33c5-4d7c-b2ad-5790749c29f1
vulnerability,CVE-2024-45689,vulnerability--695d2048-ad1e-4ffb-9c50-ab338eda43c9
vulnerability,CVE-2024-45510,vulnerability--889d2488-79aa-486a-a644-15e3fc381e0f
vulnerability,CVE-2024-45691,vulnerability--7e2a6188-0f8c-4f83-ba93-e82fdbe98be3
vulnerability,CVE-2024-10515,vulnerability--85862ee4-2c6c-4b9d-a0d3-53b0c0bae91f
vulnerability,CVE-2024-10891,vulnerability--230655d6-0eac-49c9-948a-ac449c3fda84
vulnerability,CVE-2024-10127,vulnerability--83acc0a5-b362-4dfd-927d-5acc396bc3f6
vulnerability,CVE-2024-10855,vulnerability--ccddbd92-6700-4be8-a092-0c335af0cc23
vulnerability,CVE-2024-10520,vulnerability--a423ae73-6711-4bbd-8e36-7fb4dffc6470
vulnerability,CVE-2024-10900,vulnerability--95c3a126-f819-4ab0-b0d5-e78ea5c2bf7b
vulnerability,CVE-2024-10365,vulnerability--06f55f1f-c541-4b93-a6be-cf2989a174dc
vulnerability,CVE-2024-10126,vulnerability--7a505fb1-fea3-44f3-90cb-384af8d89dda
vulnerability,CVE-2024-10094,vulnerability--36a03c49-fb5e-4d3e-a8fe-d421c96fe4b5
vulnerability,CVE-2024-10913,vulnerability--00f25db2-3689-4aed-864c-0e2dfc02cc71
vulnerability,CVE-2024-10872,vulnerability--19f247ca-37ac-44c7-bb7b-e5216df6f624
vulnerability,CVE-2024-10382,vulnerability--b705a530-28b7-44fb-95d7-c45613d7283c
vulnerability,CVE-2024-10899,vulnerability--48add1b6-f6a3-4d76-ae5d-b153083796b4
vulnerability,CVE-2024-10665,vulnerability--d8380731-a819-43e6-991f-199382ab94ec
vulnerability,CVE-2024-9875,vulnerability--66564933-eae6-4a95-bd3f-472b9c1e6a45
vulnerability,CVE-2024-9478,vulnerability--17a1fbdb-616b-45d3-bfe7-08632ccfcf0e
vulnerability,CVE-2024-9239,vulnerability--f94db6c1-6423-4fc8-a9ec-334510738037
vulnerability,CVE-2024-9479,vulnerability--751496c1-7d0c-4f18-b376-4237b4087172
vulnerability,CVE-2024-9653,vulnerability--30d00938-4378-4253-8f05-e722d2ba81e5
vulnerability,CVE-2024-47865,vulnerability--5fa8ef16-1864-4f2a-a5d0-adc69ba4cda6
vulnerability,CVE-2024-11489,vulnerability--32baa3ae-a878-453c-b11d-9bd1d2d55ab6
vulnerability,CVE-2024-11495,vulnerability--bde7f41f-e314-4560-9c2b-1dde8854fab9
vulnerability,CVE-2024-11404,vulnerability--72f9c85e-88fc-4f45-b19c-cfd7108fcd73
vulnerability,CVE-2024-11491,vulnerability--cd2e06cb-3801-41f5-bac9-d1baa591684a
vulnerability,CVE-2024-11485,vulnerability--8ff4719a-0d5a-4a4f-9d40-cef6f25c111e
vulnerability,CVE-2024-11154,vulnerability--4bb2fe97-4724-46f9-ac3a-c3e00d1509d6
vulnerability,CVE-2024-11492,vulnerability--db4e7484-d0b5-4ba9-85fc-496ba2f4e634
vulnerability,CVE-2024-11277,vulnerability--921cc26a-499c-4861-8526-2a2db96fee73
vulnerability,CVE-2024-11490,vulnerability--9f4062db-e83b-4c61-b63d-c03bc52b3ea9
vulnerability,CVE-2024-11487,vulnerability--e1257e03-ab23-4d25-832b-a1d81c27a473
vulnerability,CVE-2024-11406,vulnerability--dfe673dc-9c09-4793-853b-24b0f246fcf0
vulnerability,CVE-2024-11488,vulnerability--aaa820d0-d361-4a51-b65a-b083e04809b7
vulnerability,CVE-2024-11278,vulnerability--08031699-5ae9-4f6c-bb13-28aa58eb5a09
vulnerability,CVE-2024-11484,vulnerability--260a6e4e-9434-4a89-a186-d9cc63f90bc8
vulnerability,CVE-2024-11486,vulnerability--e93d3e30-fed8-43d4-8398-56924b3de46a
vulnerability,CVE-2024-11179,vulnerability--67da18c4-0ec4-4aef-8540-03819c8eb96c
vulnerability,CVE-2024-11176,vulnerability--fe9c3fe7-8a3f-40e9-b574-03e13ba6f803
vulnerability,CVE-2024-11493,vulnerability--1cc46d40-d905-4718-af28-db6458a1dc11
vulnerability,CVE-2024-11494,vulnerability--aa87bab4-2e7d-4525-adb3-94e09dc4f26d
vulnerability,CVE-2024-33439,vulnerability--a8ddc9c5-4875-4d35-aeed-74714debb45f
vulnerability,CVE-2024-8726,vulnerability--e3e09227-f37d-45a9-9a4b-306e6185fabf
vulnerability,CVE-2024-49203,vulnerability--28963455-a72e-49bb-9ae5-e6a2e58ed98d
vulnerability,CVE-2024-29292,vulnerability--1e33f521-6a5a-4b6e-b74d-6b5e82c8b340
vulnerability,CVE-2018-9485,vulnerability--37c4be73-1d43-41c4-8588-9cb0829575e2
vulnerability,CVE-2018-9474,vulnerability--dba1bef0-8c39-4509-aa41-72e894ad2133
vulnerability,CVE-2018-9472,vulnerability--db2cdac5-6558-442c-91f8-10e8de04dd77
vulnerability,CVE-2018-9479,vulnerability--acc8c701-cee2-4d8a-9ed2-f5a46ef07b0c
vulnerability,CVE-2018-9481,vulnerability--03531c69-af02-44c5-95c3-e4fff552fdad
vulnerability,CVE-2018-9480,vulnerability--dbc5daea-a3a6-4db0-8553-5309014dab1f
vulnerability,CVE-2018-9487,vulnerability--998b4086-27fc-449c-ab83-f558a6284b9a
vulnerability,CVE-2018-9478,vulnerability--a1168936-5e9c-4d6c-9304-9de956c8afe4
vulnerability,CVE-2018-9484,vulnerability--facc78d1-0c79-497f-b50b-577fce8a91c1
vulnerability,CVE-2018-9477,vulnerability--7b7f2074-03f3-4b7a-9d38-0fbffe8cda67
vulnerability,CVE-2018-9475,vulnerability--3ef4359b-a480-4e4d-8c1d-004082d8ea57
vulnerability,CVE-2018-9468,vulnerability--7164a1aa-7119-4d32-9159-8d16aef7bf10
vulnerability,CVE-2018-9469,vulnerability--a1bd2c65-742b-46aa-abca-3ee94222bfee
vulnerability,CVE-2018-9483,vulnerability--3d7d2e26-965c-43fb-9b14-23ba8e64d8cd
vulnerability,CVE-2018-9482,vulnerability--cbed6b91-b43a-494e-a84f-14d409512f7b
vulnerability,CVE-2018-9471,vulnerability--c1dd2695-0c8c-4433-83cc-089d6ee1cde6
vulnerability,CVE-2018-9470,vulnerability--9a69f45d-ef66-452a-8bc4-fd9c6902eae7
vulnerability,CVE-2018-9486,vulnerability--86269b11-a26e-47fb-98e7-ffa6b5a89497
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--c8b71747-aa18-4f56-90bb-31538374da0e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--00f25db2-3689-4aed-864c-0e2dfc02cc71",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-21T00:21:59.413987Z",
"modified": "2024-11-21T00:21:59.413987Z",
"name": "CVE-2024-10913",
"description": "The Clone plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.4.6 via deserialization of untrusted input in the 'recursive_unserialized_replace' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10913"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--91f25260-3393-4439-9834-5043ef0bba05",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--03531c69-af02-44c5-95c3-e4fff552fdad",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-21T00:22:12.899497Z",
"modified": "2024-11-21T00:22:12.899497Z",
"name": "CVE-2018-9481",
"description": "In bta_hd_set_report_act of bta_hd_act.cc, there is a possible out-of-bounds read due to an integer overflow. This could lead to remote information disclosure in the Bluetooth service with no additional execution privileges needed. User interaction is not needed for exploitation.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2018-9481"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--351cac4f-d67a-4d07-acde-ce9ac4096fbb",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--06f55f1f-c541-4b93-a6be-cf2989a174dc",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-21T00:21:59.402399Z",
"modified": "2024-11-21T00:21:59.402399Z",
"name": "CVE-2024-10365",
"description": "The The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 6.0.3 via the render function in modules/widgets/tp_carousel_anything.php, modules/widgets/tp_page_scroll.php, and other widgets. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive private, pending, and draft template data.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10365"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--44a99eb0-a1d6-4df1-9444-0f8539b6b211",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--079695fc-addc-4cba-b804-390d9618292e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-21T00:21:59.258981Z",
"modified": "2024-11-21T00:21:59.258981Z",
"name": "CVE-2024-52796",
"description": "Password Pusher, an open source application to communicate sensitive information over the web, comes with a configurable rate limiter. In versions prior to v1.49.0, the rate limiter could be bypassed by forging proxy headers allowing bad actors to send unlimited traffic to the site potentially causing a denial of service. In v1.49.0, a fix was implemented to only authorize proxies on local IPs which resolves this issue. As a workaround, one may add rules to one's proxy and/or firewall to not accept external proxy headers such as `X-Forwarded-*` from clients.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-52796"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--54f3e092-6a36-486c-b158-97de86996485",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--08031699-5ae9-4f6c-bb13-28aa58eb5a09",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-21T00:21:59.857971Z",
"modified": "2024-11-21T00:21:59.857971Z",
"name": "CVE-2024-11278",
"description": "The GD bbPress Attachments plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 4.7.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11278"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ba4a7540-08c4-490d-a484-b1f473c5f6c8",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0c2e2819-9136-496f-849c-ce416c08e314",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-21T00:21:59.303354Z",
"modified": "2024-11-21T00:21:59.303354Z",
"name": "CVE-2024-52472",
"description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Weather Atlas Weather Atlas Widget allows Reflected XSS.This issue affects Weather Atlas Widget: from n/a through 3.0.1.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-52472"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--66e8c9b0-969b-4ce7-a7ed-cb102ac0cfe4",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0cc0df9e-52a7-43b7-b981-952119905394",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-21T00:21:59.064442Z",
"modified": "2024-11-21T00:21:59.064442Z",
"name": "CVE-2024-51163",
"description": "Local File Inclusion vulnerability in Vegam Solutions Vegam 4i v.6.3.47.0 and earlier allows a remote attacker to obtain sensitive information via the print labelling function.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-51163"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--23c59482-3b76-418d-b6cc-c4dc4c93a260",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0eca3f37-84f3-4bcf-adbe-6094eb40268d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-21T00:21:59.28791Z",
"modified": "2024-11-21T00:21:59.28791Z",
"name": "CVE-2024-52443",
"description": "Deserialization of Untrusted Data vulnerability in Nerijus Masikonis Geolocator allows Object Injection.This issue affects Geolocator: from n/a through 1.1.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-52443"
}
]
}
]
}
Loading

0 comments on commit ad92189

Please sign in to comment.