Skip to content

Commit

Permalink
generated content from 2025-01-30
Browse files Browse the repository at this point in the history
  • Loading branch information
gitadvisor committed Jan 30, 2025
1 parent f731a86 commit bdc1e5f
Show file tree
Hide file tree
Showing 37 changed files with 828 additions and 0 deletions.
36 changes: 36 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -265663,3 +265663,39 @@ vulnerability,CVE-2025-0741,vulnerability--d0744f7a-47bd-4819-a09a-bb6178b718ce
vulnerability,CVE-2025-0745,vulnerability--e5397d48-b34d-41ae-810b-30c0ec2ff827
vulnerability,CVE-2025-0373,vulnerability--56e48df1-eb09-41cb-be00-ca185f0b15d1
vulnerability,CVE-2025-0834,vulnerability--b15ebce3-48a4-4c11-9be5-5bfc94083135
vulnerability,CVE-2024-12177,vulnerability--9f3a3d1e-0fd1-48a6-a7fc-e4b8e200bb98
vulnerability,CVE-2024-12102,vulnerability--30d3996d-004b-40ce-bcdd-0e482536f53c
vulnerability,CVE-2024-12444,vulnerability--02ab8cdc-b034-491a-91b4-fae61856597a
vulnerability,CVE-2024-12129,vulnerability--d86aeeab-8932-41b8-a9ef-4ac8ccc9c050
vulnerability,CVE-2024-12299,vulnerability--122fe386-129e-4009-a063-d44e3e559a7f
vulnerability,CVE-2024-12861,vulnerability--352f0f33-b610-4fe3-b870-955adfeaf561
vulnerability,CVE-2024-12320,vulnerability--aafd6dbf-a282-40e3-b082-0327f2f94e3f
vulnerability,CVE-2024-12822,vulnerability--aa5495d4-d4b2-46f4-bd90-e419809b1fa5
vulnerability,CVE-2024-12269,vulnerability--50f7d4a8-79a7-4e40-a629-5e820a06cf87
vulnerability,CVE-2024-12821,vulnerability--192303b8-630f-4f94-85a1-4cede7189103
vulnerability,CVE-2024-12451,vulnerability--abb749b4-f569-4f0b-9d5c-fb88e8302842
vulnerability,CVE-2024-10591,vulnerability--e0276f64-03e4-4ecf-8b2d-ab86a1156db6
vulnerability,CVE-2024-10847,vulnerability--8d67a84c-89d7-49a7-a967-f7249cab59d1
vulnerability,CVE-2024-13664,vulnerability--940f2f6e-bf77-4355-a888-a5eb8163241d
vulnerability,CVE-2024-13661,vulnerability--7c3a5ecf-6ed3-493a-8dd0-1793430c08a2
vulnerability,CVE-2024-13646,vulnerability--e61ee5c7-dbe8-4b5e-9d45-aa50be37612e
vulnerability,CVE-2024-13400,vulnerability--01997790-1ecb-411f-8720-16394e8990f6
vulnerability,CVE-2024-13652,vulnerability--2c689c7a-992a-4844-9dc4-d30162b3d6cb
vulnerability,CVE-2024-13670,vulnerability--628b5dc5-05f4-4223-81d3-a6237e395444
vulnerability,CVE-2024-13707,vulnerability--a9e951ae-e229-410f-805a-20d9ac7eb073
vulnerability,CVE-2024-13596,vulnerability--fe670ae2-93c5-4099-afac-38e4ce0cb19f
vulnerability,CVE-2024-13742,vulnerability--87f32c4e-ff21-42bb-a2e6-bb3d3c7b6ee0
vulnerability,CVE-2024-13549,vulnerability--a5133643-3f0f-4c59-b4ad-b3bfbb65cb14
vulnerability,CVE-2024-13715,vulnerability--0c396378-094b-42ff-a13f-d28511c30984
vulnerability,CVE-2024-13671,vulnerability--d5bd0140-68ed-472b-a43d-a6ff6c750c4f
vulnerability,CVE-2024-13705,vulnerability--076c57b1-0726-4c7f-a654-b63fa4f30bb6
vulnerability,CVE-2024-13460,vulnerability--3c8e1b02-4c1b-453f-bfbb-8ca85bd0727e
vulnerability,CVE-2024-13349,vulnerability--cfd17090-29f3-40cb-a654-5143e19b988f
vulnerability,CVE-2024-13720,vulnerability--c3e559e6-21bf-4f07-887c-4970d8021f79
vulnerability,CVE-2024-13700,vulnerability--f5493c56-8daf-4ef9-85a8-9da65a1772af
vulnerability,CVE-2024-13512,vulnerability--390d9ba7-3a8e-4d0d-8971-48fca1780102
vulnerability,CVE-2024-8494,vulnerability--7baa1577-4733-4923-b45c-03396190cdc1
vulnerability,CVE-2024-11600,vulnerability--9fe76624-7f9b-4cd9-a3e1-df450ce8a4fd
vulnerability,CVE-2024-11583,vulnerability--398b3c15-e2f5-418c-be20-a21cb1c61aa4
vulnerability,CVE-2025-0870,vulnerability--64a8019c-6565-47a9-998a-d98eae90a828
vulnerability,CVE-2025-0869,vulnerability--77b13730-07d5-4ce0-9e85-3ddb07dd2da0
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--bab64713-e26a-48b1-af18-51f6537f602d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--01997790-1ecb-411f-8720-16394e8990f6",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-30T14:18:14.834242Z",
"modified": "2025-01-30T14:18:14.834242Z",
"name": "CVE-2024-13400",
"description": "The Kona Gallery Block plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \"Kona: Instagram for Gutenberg\" Block, specifically in the \"align\" attribute, in all versions up to, and including, 1.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-13400"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--c999cbd5-ab69-4777-93cb-a6475ffaf15b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--02ab8cdc-b034-491a-91b4-fae61856597a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-30T14:18:13.842318Z",
"modified": "2025-01-30T14:18:13.842318Z",
"name": "CVE-2024-12444",
"description": "The WP Dispensary plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wpd_menu' shortcode in all versions up to, and including, 4.5.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12444"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--c8e0502b-8ac9-48c9-afb3-2c220e7cd8f0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--076c57b1-0726-4c7f-a654-b63fa4f30bb6",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-30T14:18:14.864216Z",
"modified": "2025-01-30T14:18:14.864216Z",
"name": "CVE-2024-13705",
"description": "The StageShow plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 9.8.6. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-13705"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--be654d7d-ba00-4395-97eb-eeb88ed03c0c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0c396378-094b-42ff-a13f-d28511c30984",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-30T14:18:14.852492Z",
"modified": "2025-01-30T14:18:14.852492Z",
"name": "CVE-2024-13715",
"description": "The zStore Manager Basic plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the zstore_clear_cache() function in all versions up to, and including, 3.311. This makes it possible for authenticated attackers, with Subscriber-level access and above, to clear the plugin's cache.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-13715"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--1c3f97e4-5ef7-44aa-a59b-599f5c351e0c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--122fe386-129e-4009-a063-d44e3e559a7f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-30T14:18:13.851232Z",
"modified": "2025-01-30T14:18:13.851232Z",
"name": "CVE-2024-12299",
"description": "The System Dashboard plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the Filename parameter in all versions up to, and including, 2.8.15 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick an administrative user into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12299"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ead23a45-3061-4cb5-85f8-530dd9c74ae6",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--192303b8-630f-4f94-85a1-4cede7189103",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-30T14:18:13.876902Z",
"modified": "2025-01-30T14:18:13.876902Z",
"name": "CVE-2024-12821",
"description": "The Media Manager for UserPro plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the upm_upload_media() function in all versions up to, and including, 3.12.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12821"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6d85e32a-5bcb-4237-9fee-b0b3cd3e999d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2c689c7a-992a-4844-9dc4-d30162b3d6cb",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-30T14:18:14.837265Z",
"modified": "2025-01-30T14:18:14.837265Z",
"name": "CVE-2024-13652",
"description": "The ECPay Ecommerce for WooCommerce plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'clear_ecpay_debug_log' AJAX action in all versions up to, and including, 1.1.2411060. This makes it possible for authenticated attackers, with Subscriber-level access and above, to clear the plugin's log files.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-13652"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--0da0f884-b3f1-451c-84f9-2397a74976eb",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--30d3996d-004b-40ce-bcdd-0e482536f53c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-30T14:18:13.833841Z",
"modified": "2025-01-30T14:18:13.833841Z",
"name": "CVE-2024-12102",
"description": "The Typer Core plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.9.6 via the 'elementor-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created by Elementor that they should not have access to.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12102"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--0140c60e-617f-4930-ab50-760fbc76cb37",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--352f0f33-b610-4fe3-b870-955adfeaf561",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-30T14:18:13.85394Z",
"modified": "2025-01-30T14:18:13.85394Z",
"name": "CVE-2024-12861",
"description": "The W2S – Migrate WooCommerce to Shopify plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 1.2.1 via the 'viw2s_view_log' AJAX action. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12861"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e62a9254-db65-42f4-8bae-6193b835da24",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--390d9ba7-3a8e-4d0d-8971-48fca1780102",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-30T14:18:14.875103Z",
"modified": "2025-01-30T14:18:14.875103Z",
"name": "CVE-2024-13512",
"description": "The Wonder FontAwesome plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.8. This is due to missing or incorrect nonce validation on one of its functions. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-13512"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--13d5f5d1-381f-422c-ab4d-62e0f1feab0c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--398b3c15-e2f5-418c-be20-a21cb1c61aa4",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-30T14:18:16.234004Z",
"modified": "2025-01-30T14:18:16.234004Z",
"name": "CVE-2024-11583",
"description": "The Borderless – Widgets, Elements, Templates and Toolkit for Elementor & Gutenberg plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'remove_zipped_font' function in all versions up to, and including, 1.5.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete icon fonts that were previously uploaded.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11583"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--f8655a00-bb1d-4077-ad6b-adbd650c3fad",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--3c8e1b02-4c1b-453f-bfbb-8ca85bd0727e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-30T14:18:14.865796Z",
"modified": "2025-01-30T14:18:14.865796Z",
"name": "CVE-2024-13460",
"description": "The WE – Testimonial Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Testimonial Author Names in all versions up to, and including, 1.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-13460"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a28afdd0-3def-4fe7-ae2b-cca632161cfd",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--50f7d4a8-79a7-4e40-a629-5e820a06cf87",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-30T14:18:13.873969Z",
"modified": "2025-01-30T14:18:13.873969Z",
"name": "CVE-2024-12269",
"description": "The Safe Ai Malware Protection for WP plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the export_db() function in all versions up to, and including, 1.0.17. This makes it possible for unauthenticated attackers to retrieve a complete dump of the site's database.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12269"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--51045d6b-e5d6-4184-be55-e095fbc6da51",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--628b5dc5-05f4-4223-81d3-a6237e395444",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-30T14:18:14.838463Z",
"modified": "2025-01-30T14:18:14.838463Z",
"name": "CVE-2024-13670",
"description": "The Music Sheet Viewer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'pn_msv' shortcode in all versions up to, and including, 4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-13670"
}
]
}
]
}
Loading

0 comments on commit bdc1e5f

Please sign in to comment.