Skip to content

Commit

Permalink
generated content from 2024-12-11
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Dec 11, 2024
1 parent a70cfba commit 61c5cd8
Show file tree
Hide file tree
Showing 336 changed files with 7,705 additions and 0 deletions.
335 changes: 335 additions & 0 deletions mapping.csv

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--191f8493-3a13-42d5-861d-dea7700a5ea8",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--031e366e-30a7-45ab-a376-bcc49ec17c5c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-11T00:22:47.427281Z",
"modified": "2024-12-11T00:22:47.427281Z",
"name": "CVE-2024-52859",
"description": "Adobe Experience Manager versions 6.5.21 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-52859"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b1d56f7b-6d90-4819-939b-9cb50a0b7177",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--031f7bf1-523f-471d-bcad-661039fdb578",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-11T00:22:49.223872Z",
"modified": "2024-12-11T00:22:49.223872Z",
"name": "CVE-2024-49530",
"description": "Acrobat Reader versions 24.005.20307, 24.001.30213, 24.001.30193, 20.005.30730, 20.005.30710 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-49530"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e804cb4b-1dfb-4990-bf39-8a6d6aa3bd5e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--03bc7d6d-441a-474c-b8f9-b21a5300a66b",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-11T00:22:47.356416Z",
"modified": "2024-12-11T00:22:47.356416Z",
"name": "CVE-2024-52858",
"description": "Adobe Experience Manager versions 6.5.21 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-52858"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6b101570-57b1-4dd3-a9b2-3feb70960694",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--05750443-73f3-4567-b4e2-2ddbbd36cd99",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-11T00:22:47.569114Z",
"modified": "2024-12-11T00:22:47.569114Z",
"name": "CVE-2024-10708",
"description": "The System Dashboard WordPress plugin before 2.8.15 does not validate user input used in a path, which could allow high privilege users such as admin to perform path traversal attacks an read arbitrary files on the server",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10708"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--0463923a-0887-48f1-ba65-264107529165",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--05d1ff7f-1a56-408f-bfca-de2444ae9f28",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-11T00:22:49.263002Z",
"modified": "2024-12-11T00:22:49.263002Z",
"name": "CVE-2024-49551",
"description": "Media Encoder versions 25.0, 24.6.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-49551"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--10b37e93-9b4f-4586-8a71-3eccfb75d8f3",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--05d6e850-2b7b-4dc7-b512-fb3d10a7f3a8",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-11T00:22:47.939837Z",
"modified": "2024-12-11T00:22:47.939837Z",
"name": "CVE-2024-7572",
"description": "Insufficient permissions in Ivanti DSM before version 2024.3.5740 allows a local authenticated attacker to delete arbitrary files.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-7572"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--af74cab8-4547-4cae-a013-2b002bad52aa",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--071b9e8e-e75d-4a51-9133-be06173cfacd",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-11T00:22:50.065358Z",
"modified": "2024-12-11T00:22:50.065358Z",
"name": "CVE-2024-43712",
"description": "Adobe Experience Manager versions 6.5.21 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could allow an attacker to execute arbitrary code in the context of the victim's browser. This issue occurs when data from a user-controllable source is improperly sanitized before being used in the Document Object Model (DOM) of a web page, leading to the execution of malicious scripts. Exploitation of this issue requires user interaction, such as tricking a victim into clicking a link or navigating to a malicious website.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-43712"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--fdaa1350-26f8-4d9a-a443-e3b48230ee76",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--092b924d-ba9c-428a-bb7b-6f8794822c82",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-11T00:22:49.202521Z",
"modified": "2024-12-11T00:22:49.202521Z",
"name": "CVE-2024-49062",
"description": "Microsoft SharePoint Information Disclosure Vulnerability",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-49062"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--490b8fa1-2531-42f4-860d-b3876544a689",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0c501129-58f3-4ebf-9469-c5000d8cc39f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-11T00:22:48.062949Z",
"modified": "2024-12-11T00:22:48.062949Z",
"name": "CVE-2024-11928",
"description": "The iChart – Easy Charts and Graphs plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘width’ parameter in all versions up to, and including, 2.1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11928"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6da15f19-3825-402e-a561-78d56ec8ed40",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0c891db6-8e85-45b3-a01f-035acc350ba6",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-11T00:22:49.296416Z",
"modified": "2024-12-11T00:22:49.296416Z",
"name": "CVE-2024-49545",
"description": "InDesign Desktop versions ID19.5, ID18.5.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-49545"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--317f8a26-6140-4677-ac55-c97943affd7d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0cdb0bba-fe12-43ec-b961-bab3bca364dc",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-11T00:22:47.562258Z",
"modified": "2024-12-11T00:22:47.562258Z",
"name": "CVE-2024-10959",
"description": "The The Active Products Tables for WooCommerce. Use constructor to create tables plugin for WordPress is vulnerable to arbitrary shortcode execution via woot_get_smth AJAX action in all versions up to, and including, 1.0.6.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10959"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e16498ba-308e-4c54-a5a7-6e95db2756e8",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0d2c2a75-63c4-4e62-9219-b086ef7b90f5",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-11T00:22:49.116208Z",
"modified": "2024-12-11T00:22:49.116208Z",
"name": "CVE-2024-54091",
"description": "A vulnerability has been identified in Parasolid V36.1 (All versions < V36.1.225), Parasolid V37.0 (All versions < V37.0.173), Parasolid V37.1 (All versions < V37.1.109). The affected applications contain an out of bounds write vulnerability when parsing specially crafted PAR files.\r\nThis could allow an attacker to execute code in the context of the current process.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-54091"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e772ec00-d82f-4365-88d4-a9b6f96c821a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0e7073bd-68ef-41e4-98eb-a45b0459eacf",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-11T00:22:49.100921Z",
"modified": "2024-12-11T00:22:49.100921Z",
"name": "CVE-2024-54008",
"description": "An authenticated Remote Code Execution (RCE) vulnerability exists in the AirWave CLI. Successful exploitation of this vulnerability could allow a remote authenticated threat actor to run arbitrary commands as a privileged user on the underlying host.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-54008"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--1311ea92-9536-4908-9fb2-77cb2fb993a4",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0f0dba0f-4b77-434e-a339-5502e5dd735a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-11T00:22:47.460385Z",
"modified": "2024-12-11T00:22:47.460385Z",
"name": "CVE-2024-45709",
"description": "SolarWinds Web Help Desk was susceptible to a local file read vulnerability. This vulnerability requires the software be installed on Linux and configured to use non-default development/test mode making exposure to the vulnerability very limited.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-45709"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--952a5209-1ea2-42b0-85a8-9fa7efa73c77",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--100d340a-8350-494e-bee0-c29f3f581923",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-11T00:22:47.373185Z",
"modified": "2024-12-11T00:22:47.373185Z",
"name": "CVE-2024-52852",
"description": "Adobe Experience Manager versions 6.5.21 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-52852"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--02154cb8-e3ca-4014-8d3c-bfb809f4d991",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--11d55738-1ed8-49ed-af0e-543926b4d377",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-11T00:22:49.113327Z",
"modified": "2024-12-11T00:22:49.113327Z",
"name": "CVE-2024-54152",
"description": "Angular Expressions provides expressions for the Angular.JS web framework as a standalone module. Prior to version 1.4.3, an attacker can write a malicious expression that escapes the sandbox to execute arbitrary code on the system. With a more complex (undisclosed) payload, one can get full access to Arbitrary code execution on the system. The problem has been patched in version 1.4.3 of Angular Expressions. Two possible workarounds are available. One may either disable access to `__proto__` globally or make sure that one uses the function with just one argument.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-54152"
}
]
}
]
}
Loading

0 comments on commit 61c5cd8

Please sign in to comment.