Skip to content

Commit

Permalink
generated content from 2024-09-26
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Sep 26, 2024
1 parent f3b03e1 commit 18e1208
Show file tree
Hide file tree
Showing 43 changed files with 966 additions and 0 deletions.
42 changes: 42 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -250059,3 +250059,45 @@ vulnerability,CVE-2023-5359,vulnerability--be9e548a-ca2b-4e5a-9a06-124acdc1190b
vulnerability,CVE-2021-38963,vulnerability--f40d15e8-04ab-43dd-8e4f-8ed0fea5e36a
vulnerability,CVE-2022-43845,vulnerability--5f61187a-6c15-457c-9fa3-7df7c5d4cb25
vulnerability,CVE-2022-2439,vulnerability--15b9dda5-d7f4-45f9-b2ec-9cf129f9c394
vulnerability,CVE-2024-3866,vulnerability--92c90417-c3ac-495c-9c36-caa194860431
vulnerability,CVE-2024-9169,vulnerability--63f50c49-9f1e-42b8-9854-5086678235d3
vulnerability,CVE-2024-9069,vulnerability--a985b603-da9c-4436-a232-5ce7b72ebcb4
vulnerability,CVE-2024-9068,vulnerability--4408e14d-32ec-4fec-a094-abecb2a93883
vulnerability,CVE-2024-9027,vulnerability--4ace7aef-1950-4eb1-91c8-e68583ab0407
vulnerability,CVE-2024-9024,vulnerability--ad12b03b-31ac-4f79-85c3-b5edb098df8e
vulnerability,CVE-2024-9073,vulnerability--a4852da8-4540-4e47-8f9b-8279f09d5490
vulnerability,CVE-2024-9028,vulnerability--712f7b3b-f9d7-4aa4-bdcf-419cff8d162c
vulnerability,CVE-2024-8549,vulnerability--819f2105-a1dd-4c20-9f48-f7d7d7ed2e64
vulnerability,CVE-2024-8621,vulnerability--661a3cb3-72e0-4fd9-bd83-516b18ce00ca
vulnerability,CVE-2024-8275,vulnerability--3d129973-ed80-4801-a21b-70358871dac9
vulnerability,CVE-2024-8349,vulnerability--ec3d71e5-8e2b-44b4-b3b9-14086208a668
vulnerability,CVE-2024-8350,vulnerability--170dc622-3b05-49cc-b8de-ad20eee0d624
vulnerability,CVE-2024-8481,vulnerability--665c570c-760a-45a6-91b9-c91b156fe95b
vulnerability,CVE-2024-8668,vulnerability--cd1c3834-6a0f-4c72-9e40-cd0b958c87c4
vulnerability,CVE-2024-8483,vulnerability--a4b4b3b5-6223-43f4-81ce-59b982b7f6d0
vulnerability,CVE-2024-8434,vulnerability--49b32489-109c-40d3-91c3-acf108be3383
vulnerability,CVE-2024-8514,vulnerability--efa95efa-08dc-4322-8f84-543e2f8a0db4
vulnerability,CVE-2024-8658,vulnerability--3c1800bb-d59a-4c54-a022-23212234ae4f
vulnerability,CVE-2024-8485,vulnerability--93ae6e6a-2c3a-44d2-8e18-54a74478420b
vulnerability,CVE-2024-8713,vulnerability--da12521d-916f-4274-bfc6-fa86e5fd0b3e
vulnerability,CVE-2024-8290,vulnerability--5fc2fef1-3953-41d8-be35-2b20e58d8ead
vulnerability,CVE-2024-8175,vulnerability--edce108f-14f2-489f-bd42-e4d098ac05f5
vulnerability,CVE-2024-8678,vulnerability--ab5fda40-f876-46cb-b544-80f85800c4d7
vulnerability,CVE-2024-8910,vulnerability--b162b160-819f-4e52-83ab-e8fdf069b69d
vulnerability,CVE-2024-8515,vulnerability--d968ed5d-7dbf-4972-aa09-1537626f2eaa
vulnerability,CVE-2024-8516,vulnerability--8831c52d-6068-47db-96fb-057def0a790f
vulnerability,CVE-2024-8476,vulnerability--a8289117-0e08-4ae7-abc7-da799db78486
vulnerability,CVE-2024-8484,vulnerability--8eca0c08-88da-497a-89ff-90ed58b0e919
vulnerability,CVE-2024-8741,vulnerability--e2594717-5f0f-46a0-a0cb-e2d2ce33f513
vulnerability,CVE-2024-40761,vulnerability--7f4e6b5d-593a-4e27-aebe-a44dc9fb6a7d
vulnerability,CVE-2024-23454,vulnerability--70002f17-16f6-42af-b4ef-1876af6023d0
vulnerability,CVE-2024-6590,vulnerability--ea9bd7ce-1a4d-492d-9429-36e6c0683664
vulnerability,CVE-2024-6845,vulnerability--823559be-71ae-46ef-91b8-63e5cbaa948a
vulnerability,CVE-2024-7892,vulnerability--8c86873b-b888-4c11-9805-8380707a85ae
vulnerability,CVE-2024-7878,vulnerability--af635b88-6e6d-4ccc-a2b0-412515cf95a3
vulnerability,CVE-2024-7386,vulnerability--b1a4aa8b-0e3d-4d19-8349-4051979d7bdc
vulnerability,CVE-2024-7491,vulnerability--a66c57be-8c70-4d4f-b483-e9f8efcd6383
vulnerability,CVE-2024-7385,vulnerability--ade8f434-9b59-4ce7-b61b-2a71415936df
vulnerability,CVE-2024-7426,vulnerability--c3fc97ec-2f95-4dde-b752-ef42cc2d1abd
vulnerability,CVE-2024-7617,vulnerability--e1500a8f-912d-4868-a869-1792ebf06811
vulnerability,CVE-2024-47303,vulnerability--7ae33acb-fae8-4603-80f7-561c9100ddfc
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--843b7114-a98f-473f-b68f-ae8766e1e61f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--170dc622-3b05-49cc-b8de-ad20eee0d624",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-26T01:43:02.242441Z",
"modified": "2024-09-26T01:43:02.242441Z",
"name": "CVE-2024-8350",
"description": "The Uncanny Groups for LearnDash plugin for WordPress is vulnerable to user group add due to a missing capability check on the /wp-json/ulgm_management/v1/add_user/ REST API endpoint in all versions up to, and including, 6.1.0.1. This makes it possible for authenticated attackers, with group leader-level access and above, to add users to their group which ultimately allows them to leverage CVE-2024-8349 and gain admin access to the site.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8350"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--4cd30f99-75db-40b6-a6ab-e0475d170acb",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--3c1800bb-d59a-4c54-a022-23212234ae4f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-26T01:43:02.274705Z",
"modified": "2024-09-26T01:43:02.274705Z",
"name": "CVE-2024-8658",
"description": "The myCred – Loyalty Points and Rewards plugin for WordPress and WooCommerce – Give Points, Ranks, Badges, Cashback, WooCommerce rewards, and WooCommerce credits for Gamification plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the mycred_update_database() function in all versions up to, and including, 2.7.3. This makes it possible for unauthenticated attackers to upgrade an out of date database.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8658"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--82b695ea-dd46-4c51-922e-17589f8f6faf",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--3d129973-ed80-4801-a21b-70358871dac9",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-26T01:43:02.238171Z",
"modified": "2024-09-26T01:43:02.238171Z",
"name": "CVE-2024-8275",
"description": "The The Events Calendar plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter of the 'tribe_has_next_event' function in all versions up to, and including, 6.6.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Only sites that have manually added tribe_has_next_event() will be vulnerable to this SQL injection.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8275"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--653be825-942d-482e-8363-c3638d158fb4",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--4408e14d-32ec-4fec-a094-abecb2a93883",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-26T01:43:02.22139Z",
"modified": "2024-09-26T01:43:02.22139Z",
"name": "CVE-2024-9068",
"description": "The OneElements – Best Elementor Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.3.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9068"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--2735c718-ff99-400c-a93d-659f30ab7ff5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--49b32489-109c-40d3-91c3-acf108be3383",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-26T01:43:02.252983Z",
"modified": "2024-09-26T01:43:02.252983Z",
"name": "CVE-2024-8434",
"description": "The Easy Mega Menu Plugin for WordPress – ThemeHunk plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several functions hooked via AJAX in all versions up to, and including, 1.0.9. This makes it possible for authenticated attackers, with subscriber-level access and above, to perform actions like updating plugin settings.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8434"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--18e4e387-5db7-4af2-a0c9-d16cf4b6c4e0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--4ace7aef-1950-4eb1-91c8-e68583ab0407",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-26T01:43:02.222783Z",
"modified": "2024-09-26T01:43:02.222783Z",
"name": "CVE-2024-9027",
"description": "The WPZOOM Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'box' shortcode in all versions up to, and including, 1.0.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9027"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6c4ef939-d5ec-4f32-b75a-256ff8616e74",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--5fc2fef1-3953-41d8-be35-2b20e58d8ead",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-26T01:43:02.279157Z",
"modified": "2024-09-26T01:43:02.279157Z",
"name": "CVE-2024-8290",
"description": "The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.7.12 via the WCFM_Customers_Manage_Controller::processing function due to missing validation on the ID user controlled key. This makes it possible for authenticated attackers, with subscriber/customer-level access and above, to change the email address of administrator user accounts which allows them to reset the password and access the administrator account.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8290"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--f2f1a5d1-fa07-45bd-b0c5-bdbd1fdfc71d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--63f50c49-9f1e-42b8-9854-5086678235d3",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-26T01:43:02.216029Z",
"modified": "2024-09-26T01:43:02.216029Z",
"name": "CVE-2024-9169",
"description": "The LiteSpeed Cache plugin for WordPress is vulnerable to Stored Cross-Site Scripting via plugin debug settings in all versions up to, and including, 6.4.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9169"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d5ff14eb-cef5-4c97-963b-f3adfd196738",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--661a3cb3-72e0-4fd9-bd83-516b18ce00ca",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-26T01:43:02.236Z",
"modified": "2024-09-26T01:43:02.236Z",
"name": "CVE-2024-8621",
"description": "The Daily Prayer Time plugin for WordPress is vulnerable to SQL Injection via the 'max_word' attribute of the 'quran_verse' shortcode in all versions up to, and including, 2024.08.26 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8621"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--41437c65-91a1-4bfe-9347-24e33003767b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--665c570c-760a-45a6-91b9-c91b156fe95b",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-26T01:43:02.244347Z",
"modified": "2024-09-26T01:43:02.244347Z",
"name": "CVE-2024-8481",
"description": "The The Special Text Boxes plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 6.2.2. This is due to the plugin adding the filter add_filter('comment_text', 'do_shortcode'); which will run all shortcodes in comments. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8481"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--8181e8a0-e2ea-4b08-84d5-4d46dc1a8275",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--70002f17-16f6-42af-b4ef-1876af6023d0",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-26T01:43:02.496811Z",
"modified": "2024-09-26T01:43:02.496811Z",
"name": "CVE-2024-23454",
"description": "Apache Hadoop’s RunJar.run() does not set permissions for temporary directory by default. If sensitive data will be present in this file, all the other local users may be able to view the content.\nThis is because, on unix-like systems, the system temporary directory is\nshared between all local users. As such, files written in this directory,\nwithout setting the correct posix permissions explicitly, may be viewable\nby all other local users.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-23454"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--99764a63-e48c-422f-b3c7-859e4467317f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--712f7b3b-f9d7-4aa4-bdcf-419cff8d162c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-26T01:43:02.229291Z",
"modified": "2024-09-26T01:43:02.229291Z",
"name": "CVE-2024-9028",
"description": "The WP GPX Maps plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'sgpx' shortcode in all versions up to, and including, 1.7.08 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9028"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--af9e91a1-ee8c-4b62-bee9-b1eb6c58c249",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--7ae33acb-fae8-4603-80f7-561c9100ddfc",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-26T01:43:03.463718Z",
"modified": "2024-09-26T01:43:03.463718Z",
"name": "CVE-2024-47303",
"description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Livemesh Livemesh Addons for Elementor allows Stored XSS.This issue affects Livemesh Addons for Elementor: from n/a through 8.5.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-47303"
}
]
}
]
}
Loading

0 comments on commit 18e1208

Please sign in to comment.