Skip to content

Commit

Permalink
generated content from 2025-01-30
Browse files Browse the repository at this point in the history
  • Loading branch information
gitadvisor committed Jan 30, 2025
1 parent 38e5f97 commit f731a86
Show file tree
Hide file tree
Showing 39 changed files with 874 additions and 0 deletions.
38 changes: 38 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -265625,3 +265625,41 @@ vulnerability,CVE-2025-0844,vulnerability--9d1c0897-1666-46c3-a189-ba186d324002
vulnerability,CVE-2025-0847,vulnerability--3fa0832d-6406-433f-982c-b61b29a2f7b4
vulnerability,CVE-2025-0849,vulnerability--e1cf36b6-212b-4351-a91e-2d84219bc1cf
vulnerability,CVE-2025-0848,vulnerability--0d559547-ac44-4cd2-97d9-ab95c886af73
vulnerability,CVE-2024-12638,vulnerability--c838f065-09d4-4b67-a85a-37f3f3219c37
vulnerability,CVE-2024-12921,vulnerability--e4b9077b-836b-4cc4-a228-e3b490fa0c7e
vulnerability,CVE-2024-12709,vulnerability--c1c98e00-9091-4933-9ad7-ccf4eeed9fb7
vulnerability,CVE-2024-12708,vulnerability--9274d9ce-6873-40d2-98bb-4b6f554f50a3
vulnerability,CVE-2024-12409,vulnerability--3a5bb3fe-12c4-43f0-9fdd-4885c6299b9c
vulnerability,CVE-2024-12163,vulnerability--75244fff-9fa3-457b-b910-ced3f99fea96
vulnerability,CVE-2024-12400,vulnerability--9150e36e-4568-4621-a57b-13586ee85b7a
vulnerability,CVE-2024-12524,vulnerability--dd4ec438-46cc-40d5-9cef-2aa8c64d35a5
vulnerability,CVE-2024-10309,vulnerability--85265719-237a-46a4-922a-52478dde0575
vulnerability,CVE-2024-13453,vulnerability--cc4a5a47-4ad4-497e-93d8-08f51a053566
vulnerability,CVE-2024-13694,vulnerability--44ca2c3e-276b-4339-9f32-14bbbb3f5de4
vulnerability,CVE-2024-13706,vulnerability--1834f5c6-3244-43e5-80d2-c75886159324
vulnerability,CVE-2024-13758,vulnerability--5e0d8569-6437-48e4-a83a-ce9652693404
vulnerability,CVE-2024-13380,vulnerability--4514f0c6-7ea8-44b2-8873-8580446ae163
vulnerability,CVE-2024-13457,vulnerability--5e41da66-23f1-46a0-b941-93899e7293e7
vulnerability,CVE-2024-13466,vulnerability--c53e9007-9971-49cc-9f03-f2f728f72bbc
vulnerability,CVE-2024-13470,vulnerability--70dd581a-bc85-439c-85f2-a054daf23926
vulnerability,CVE-2024-13732,vulnerability--e56853d4-4df1-479e-8344-e9bdf0184e40
vulnerability,CVE-2024-13642,vulnerability--01df0c60-2689-4989-affd-3ed2797671bf
vulnerability,CVE-2022-43916,vulnerability--ff6da8b9-296f-4bd0-a244-916e98aef40c
vulnerability,CVE-2025-21107,vulnerability--cc652a3b-8f19-4646-b429-565998d7b020
vulnerability,CVE-2025-23374,vulnerability--4dc84aed-06ab-4561-b5f5-3b325366d2c7
vulnerability,CVE-2025-23007,vulnerability--4a25f2bc-406d-41c4-bfbd-d707abb8d86c
vulnerability,CVE-2025-0374,vulnerability--b825495f-1c42-4381-8e09-e35034ee7b9e
vulnerability,CVE-2025-0861,vulnerability--1f41097c-174b-47cb-a44c-2ec383c67cf4
vulnerability,CVE-2025-0747,vulnerability--a9156317-4ef1-4d44-9d5f-d371f71f66ec
vulnerability,CVE-2025-0742,vulnerability--0d03145a-196c-4ed0-af63-bca492089e34
vulnerability,CVE-2025-0743,vulnerability--6b4791f8-4ef6-4273-8f5f-4a1a414e6067
vulnerability,CVE-2025-0662,vulnerability--2f766287-6ff9-4197-9509-0d2a57318cfd
vulnerability,CVE-2025-0740,vulnerability--fc5b4bb9-6058-43ac-a012-5e5dba2027d9
vulnerability,CVE-2025-0739,vulnerability--7bc0e2af-78a2-4280-8337-0774364be4ed
vulnerability,CVE-2025-0860,vulnerability--49f27122-b3c0-4086-a708-d07aeca32ddb
vulnerability,CVE-2025-0746,vulnerability--d02d411b-73c4-4edd-99b9-762b1bf51ac5
vulnerability,CVE-2025-0744,vulnerability--7755bf99-3fd6-46dc-b58c-46844b84c2fc
vulnerability,CVE-2025-0741,vulnerability--d0744f7a-47bd-4819-a09a-bb6178b718ce
vulnerability,CVE-2025-0745,vulnerability--e5397d48-b34d-41ae-810b-30c0ec2ff827
vulnerability,CVE-2025-0373,vulnerability--56e48df1-eb09-41cb-be00-ca185f0b15d1
vulnerability,CVE-2025-0834,vulnerability--b15ebce3-48a4-4c11-9be5-5bfc94083135
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--50ef01f0-faad-40b0-a780-487ae3bf0d44",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--01df0c60-2689-4989-affd-3ed2797671bf",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-30T13:23:31.762059Z",
"modified": "2025-01-30T13:23:31.762059Z",
"name": "CVE-2024-13642",
"description": "The Stratum – Elementor Widgets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Image Hotspot widget in all versions up to, and including, 1.4.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-13642"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--db438d70-1ac6-4913-b2f2-1af8ab1eb11f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0d03145a-196c-4ed0-af63-bca492089e34",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-30T13:23:41.396851Z",
"modified": "2025-01-30T13:23:41.396851Z",
"name": "CVE-2025-0742",
"description": "An Improper Access Control vulnerability has been found in EmbedAI 2.1 and below. This vulnerability allows an authenticated attacker to obtain files stored by others users by changing the \"FILE_ID\" of the endpoint \"/embedai/files/show/<FILE_ID>\".",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0742"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3bce77a5-c374-49c8-aec1-772d9f860306",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1834f5c6-3244-43e5-80d2-c75886159324",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-30T13:23:31.726242Z",
"modified": "2025-01-30T13:23:31.726242Z",
"name": "CVE-2024-13706",
"description": "The WP Image Uploader plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'file' parameter in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-13706"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a0859e50-edca-423c-b4fe-2bbf531c6ae1",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1f41097c-174b-47cb-a44c-2ec383c67cf4",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-30T13:23:41.391841Z",
"modified": "2025-01-30T13:23:41.391841Z",
"name": "CVE-2025-0861",
"description": "The VR-Frases (collect & share quotes) plugin for WordPress is vulnerable to SQL Injection via several parameters in all versions up to, and including, 3.0.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0861"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--c1e93de1-7fad-4a24-9a6d-73ee2f44ead7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2f766287-6ff9-4197-9509-0d2a57318cfd",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-30T13:23:41.402959Z",
"modified": "2025-01-30T13:23:41.402959Z",
"name": "CVE-2025-0662",
"description": "In some cases, the ktrace facility will log the contents of kernel structures to userspace. In one such case, ktrace dumps a variable-sized sockaddr to userspace. There, the full sockaddr is copied, even when it is shorter than the full size. This can result in up to 14 uninitialized bytes of kernel memory being copied out to userspace.\n\nIt is possible for an unprivileged userspace program to leak 14 bytes of a kernel heap allocation to userspace.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0662"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e6218c64-34c5-46b0-9071-995a62ff2ec6",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--3a5bb3fe-12c4-43f0-9fdd-4885c6299b9c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-30T13:23:30.770871Z",
"modified": "2025-01-30T13:23:30.770871Z",
"name": "CVE-2024-12409",
"description": "The Simple:Press Forum plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 's' parameter in all versions up to, and including, 6.10.11 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12409"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--63c83132-aa68-4ce4-9a0e-2a17f049e810",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--44ca2c3e-276b-4339-9f32-14bbbb3f5de4",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-30T13:23:31.724288Z",
"modified": "2025-01-30T13:23:31.724288Z",
"name": "CVE-2024-13694",
"description": "The WooCommerce Wishlist (High customization, fast setup,Free Elementor Wishlist, most features) plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.8.7 via the download_pdf_file() function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to extract data from wishlists that they should not have access to.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-13694"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5eb2039c-bfa0-44b4-8a60-be9fac492ddf",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--4514f0c6-7ea8-44b2-8873-8580446ae163",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-30T13:23:31.735418Z",
"modified": "2025-01-30T13:23:31.735418Z",
"name": "CVE-2024-13380",
"description": "The Alex Reservations: Smart Restaurant Booking plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'rr_form' shortcode in all versions up to, and including, 2.0.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-13380"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b7ede940-b513-474f-af69-7f460857589d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--49f27122-b3c0-4086-a708-d07aeca32ddb",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-30T13:23:41.421154Z",
"modified": "2025-01-30T13:23:41.421154Z",
"name": "CVE-2025-0860",
"description": "The VR-Frases (collect & share quotes) plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via several parameters in all versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0860"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5bcffc9c-759f-441b-9871-50c80b14ca5b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--4a25f2bc-406d-41c4-bfbd-d707abb8d86c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-30T13:23:41.334891Z",
"modified": "2025-01-30T13:23:41.334891Z",
"name": "CVE-2025-23007",
"description": "A vulnerability in the NetExtender Windows client log export function allows unauthorized access to sensitive Windows system files, potentially leading to privilege escalation.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-23007"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7377a5d8-cdbb-434e-89de-16ab36e1a214",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--4dc84aed-06ab-4561-b5f5-3b325366d2c7",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-30T13:23:41.30055Z",
"modified": "2025-01-30T13:23:41.30055Z",
"name": "CVE-2025-23374",
"description": "Dell Networking Switches running Enterprise SONiC OS, version(s) prior to 4.4.1 and 4.2.3, contain(s) an Insertion of Sensitive Information into Log File vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Information exposure.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-23374"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--21f03cca-a7e1-457d-b4a0-8b6f4b9e0973",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--56e48df1-eb09-41cb-be00-ca185f0b15d1",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-30T13:23:41.437735Z",
"modified": "2025-01-30T13:23:41.437735Z",
"name": "CVE-2025-0373",
"description": "On 64-bit systems, the implementation of VOP_VPTOFH() in the cd9660, tarfs and ext2fs filesystems overflows the destination FID buffer by 4 bytes, a stack buffer overflow.\n\nA NFS server that exports a cd9660, tarfs, or ext2fs file system can be made to panic by mounting and accessing the export with an NFS client. Further exploitation (e.g., bypassing file permission checking or remote kernel code execution) is potentially possible, though this has not been demonstrated. In particular, release kernels are compiled with stack protection enabled, and some instances of the overflow are caught by this mechanism, causing a panic.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0373"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--acfbb766-d579-4d06-ac1f-aeaf5d88c247",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--5e0d8569-6437-48e4-a83a-ce9652693404",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-30T13:23:31.729669Z",
"modified": "2025-01-30T13:23:31.729669Z",
"name": "CVE-2024-13758",
"description": "The CP Contact Form with PayPal plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.52. This is due to missing or incorrect nonce validation on the cp_contact_form_paypal_check_init_actions() function. This makes it possible for unauthenticated attackers to add discount codes via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-13758"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e2bc1c90-87f8-4560-9585-ce026d525da1",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--5e41da66-23f1-46a0-b941-93899e7293e7",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-30T13:23:31.737686Z",
"modified": "2025-01-30T13:23:31.737686Z",
"name": "CVE-2024-13457",
"description": "The Event Tickets and Registration plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.18.1 via the tc-order-id parameter due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to view order details of orders they did not place, which includes ticket prices, user emails and order date.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-13457"
}
]
}
]
}
Loading

0 comments on commit f731a86

Please sign in to comment.