Skip to content

Commit

Permalink
generated content from 2025-02-20
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Feb 20, 2025
1 parent 1594881 commit 55327a4
Show file tree
Hide file tree
Showing 126 changed files with 2,875 additions and 0 deletions.
125 changes: 125 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -267779,3 +267779,128 @@ vulnerability,CVE-2025-0796,vulnerability--5566356b-888a-408e-a412-6baad41d1e19
vulnerability,CVE-2025-0424,vulnerability--432c6971-8f9d-4b85-bced-6f2e66fdc4c6
vulnerability,CVE-2025-0622,vulnerability--b178f571-9a15-4b3e-ad77-fc8e3072ed1b
vulnerability,CVE-2025-0422,vulnerability--ed67e855-6204-4e3f-a261-ee17ebf8a157
vulnerability,CVE-2024-5706,vulnerability--14b2ed93-7584-42e7-9273-61837ba34d46
vulnerability,CVE-2024-5705,vulnerability--76d72b79-81cd-4330-bb42-26589e7c5ce3
vulnerability,CVE-2024-37362,vulnerability--6b9f1be6-3658-4a38-b808-1d45dc3115bb
vulnerability,CVE-2024-37359,vulnerability--a55840f8-06af-470e-a972-2212e4baa585
vulnerability,CVE-2024-37361,vulnerability--fe8d7571-dc12-4fd3-ac21-e9ed42008783
vulnerability,CVE-2024-37360,vulnerability--ec1e2803-f767-40dd-8801-83eb967a5938
vulnerability,CVE-2024-37363,vulnerability--9af43b39-1f96-4d99-b53d-d142461b4fb8
vulnerability,CVE-2024-28776,vulnerability--0d323cea-8b83-4ffe-8689-3b5d03d0a559
vulnerability,CVE-2024-28780,vulnerability--d3012c38-0886-4e68-a237-b81ba11c180e
vulnerability,CVE-2024-28777,vulnerability--b2140c9a-888e-483f-bdce-9caac511d36f
vulnerability,CVE-2024-57262,vulnerability--9ebb69be-8ba3-47f6-a420-6c05ebb8dd1e
vulnerability,CVE-2024-57261,vulnerability--f4e5c5f6-5e70-4e03-aa52-a7218d95b643
vulnerability,CVE-2024-12339,vulnerability--45ab0e31-7180-4289-b87d-967d79742f8d
vulnerability,CVE-2024-12284,vulnerability--3540893c-5af1-414e-9009-4f09acb916ed
vulnerability,CVE-2024-12173,vulnerability--57285280-0948-4625-bc03-f720af2672c4
vulnerability,CVE-2024-12522,vulnerability--ac062e33-b8d8-439b-a2da-286b22b305e3
vulnerability,CVE-2024-12069,vulnerability--aa98b31b-3cda-4a6b-86e4-a9ef5ae3de2b
vulnerability,CVE-2024-53974,vulnerability--26040cbb-2038-45a7-b7a6-ed5ab0244c2a
vulnerability,CVE-2024-45081,vulnerability--3c51cdbe-8468-4f98-ba02-687d84e18559
vulnerability,CVE-2024-45777,vulnerability--5d2619a5-074f-4ad0-a243-e8e288c32460
vulnerability,CVE-2024-45084,vulnerability--8b8dc3e4-dbfd-4284-be9a-06adb96b6589
vulnerability,CVE-2024-6697,vulnerability--ba68104a-c9cd-433b-8a9e-f31506d28790
vulnerability,CVE-2024-6696,vulnerability--bf35ca4a-00e1-4859-945a-3addd74dd98a
vulnerability,CVE-2024-52902,vulnerability--5a45c1f1-58d9-42a3-ac25-2bc9c8c7f480
vulnerability,CVE-2024-52541,vulnerability--0b841742-aa9a-43bb-8c42-36e19bd36b1f
vulnerability,CVE-2024-13489,vulnerability--b5f84f00-1074-4a49-ac1f-1c13382cb90e
vulnerability,CVE-2024-13364,vulnerability--a49f167a-b3ef-489f-b989-8f453d7ddeaf
vulnerability,CVE-2024-13483,vulnerability--8bc3f43a-0eec-4932-b7a3-e04672fdf88a
vulnerability,CVE-2024-13591,vulnerability--b1f2ee8b-73de-48ec-9937-0c231fb8e0b7
vulnerability,CVE-2024-13231,vulnerability--c103a1eb-c506-4898-b5fd-6f9d64f0aac1
vulnerability,CVE-2024-13674,vulnerability--7dd36f5f-4882-4932-a267-edce6aed98f2
vulnerability,CVE-2024-13711,vulnerability--4a496bcb-2749-4e85-aac0-4a4b26cce5dd
vulnerability,CVE-2024-13719,vulnerability--58449b87-35af-4bda-8047-7c33f90db94d
vulnerability,CVE-2024-13663,vulnerability--f3260fbf-0a44-4caf-ba97-385410f2199e
vulnerability,CVE-2024-13679,vulnerability--0e6a8879-cac8-479d-a2b4-20ca254b5c2c
vulnerability,CVE-2024-13736,vulnerability--cf23d958-9a89-4d68-a508-02c3df07bc93
vulnerability,CVE-2024-13712,vulnerability--264b370c-94ef-45be-8db2-1ec079cca2e7
vulnerability,CVE-2024-13491,vulnerability--0f498444-c7c8-47d9-806e-be4bdd4b756a
vulnerability,CVE-2024-13481,vulnerability--6264c5f3-b9fc-455c-90bd-f026fa6d1545
vulnerability,CVE-2024-13485,vulnerability--f1ceff02-ea17-4340-abdb-7393390f510e
vulnerability,CVE-2024-13592,vulnerability--c9582ccc-b203-416d-9f6c-da2e1488a4f7
vulnerability,CVE-2024-13660,vulnerability--87fc2115-656a-41de-8e29-da55205b860c
vulnerability,CVE-2024-13657,vulnerability--f432b9a2-3f34-4d07-b44e-e17e82e858a7
vulnerability,CVE-2024-13534,vulnerability--922d7fce-6242-4030-bc73-4294fb33fdcc
vulnerability,CVE-2024-13676,vulnerability--15897bd1-a64a-4fa8-ab93-44f86821e976
vulnerability,CVE-2024-13462,vulnerability--5e838a89-9e84-487b-9565-cdf615cfc028
vulnerability,CVE-2024-13589,vulnerability--7eb04ec5-b423-4192-a504-467e9c7049b4
vulnerability,CVE-2024-13478,vulnerability--10088c1a-31da-4e56-a088-be100581a77f
vulnerability,CVE-2024-13799,vulnerability--3904c458-a0d5-4a41-8f90-8a6ef70db2f6
vulnerability,CVE-2024-13533,vulnerability--9f09ab27-4eda-472a-b22e-d0f9cdca4cb1
vulnerability,CVE-2024-13854,vulnerability--8e59e19a-5316-40fd-9bbf-1424e7eef46e
vulnerability,CVE-2024-13479,vulnerability--d4fb6f2f-3a45-4c47-bcf2-781b6a1f210b
vulnerability,CVE-2024-13390,vulnerability--b2754b83-e8f8-4534-acb2-fee6617cdf25
vulnerability,CVE-2024-13443,vulnerability--2c7b964c-d5ce-468a-900b-750051253bfc
vulnerability,CVE-2024-13336,vulnerability--0bb89032-bf22-4151-9811-6f34388f5d45
vulnerability,CVE-2024-13339,vulnerability--10601afd-f050-4db6-8d0c-7b8cb5c50a3e
vulnerability,CVE-2024-13468,vulnerability--e464050e-26c2-47a3-9c95-c347f35f6915
vulnerability,CVE-2024-13363,vulnerability--e2f48f18-1325-480a-85b8-c04edd6da88c
vulnerability,CVE-2024-13405,vulnerability--1e153386-3647-4332-8162-935b4fe423b1
vulnerability,CVE-2024-11778,vulnerability--922f7fb3-0c17-4a01-b468-3a604779bd44
vulnerability,CVE-2024-11582,vulnerability--31a9e648-f08a-455a-9786-ff5ce86b8d81
vulnerability,CVE-2024-11753,vulnerability--3d508ce2-de1b-42c4-b984-5aaaa4c56132
vulnerability,CVE-2024-11335,vulnerability--5a2750d9-1be8-478a-9d73-d8de801e0812
vulnerability,CVE-2025-1448,vulnerability--bf9c3bd6-0783-4484-86b8-11eb99435389
vulnerability,CVE-2025-1465,vulnerability--c7f0dad5-2272-4be2-9ece-f3f3b662bec6
vulnerability,CVE-2025-1075,vulnerability--771a5fd7-8a06-4b51-b9fe-ca49df421b14
vulnerability,CVE-2025-1426,vulnerability--4a60fd98-0da2-4273-acdc-7fbcee1ce370
vulnerability,CVE-2025-1118,vulnerability--c9633fc1-d75e-4ffd-91ce-99945c49f479
vulnerability,CVE-2025-1132,vulnerability--d2720a8e-2d40-4aa5-a545-b438a3cbcfd0
vulnerability,CVE-2025-1447,vulnerability--8523e6b2-db80-4d9c-95fc-3fc6c33cfb72
vulnerability,CVE-2025-1006,vulnerability--de31fc2c-72fb-46e0-a350-823d76b176ff
vulnerability,CVE-2025-1441,vulnerability--8a778e5a-662a-40f2-a7a4-17df87f912eb
vulnerability,CVE-2025-1065,vulnerability--045d2996-22f9-4601-9b53-6ee701f96542
vulnerability,CVE-2025-1464,vulnerability--80a10140-e848-46f8-b868-c0b0908f7eea
vulnerability,CVE-2025-1135,vulnerability--92cfda54-24be-4cb0-bec4-5adda96cea08
vulnerability,CVE-2025-1007,vulnerability--4373597c-0841-4165-9b44-173991430e52
vulnerability,CVE-2025-1024,vulnerability--641f21a0-ca29-4b37-83c6-2ae80f24e6ae
vulnerability,CVE-2025-1134,vulnerability--229872d6-641f-4d9c-a845-8c9b9c86050a
vulnerability,CVE-2025-1133,vulnerability--efd1569d-e0d7-42b2-8f14-9b3fb7f1bac5
vulnerability,CVE-2025-21355,vulnerability--5b9ac498-4e40-4276-9925-fe3f77672fad
vulnerability,CVE-2025-22622,vulnerability--5c46a36f-5145-4c3f-845e-3550ddeee2a8
vulnerability,CVE-2025-22888,vulnerability--989a56b1-cd65-4efe-a5a5-3795c6b0a25e
vulnerability,CVE-2025-20153,vulnerability--ccc19c53-c3a3-42a8-ba98-dd198764cf07
vulnerability,CVE-2025-20211,vulnerability--ec56e504-2d28-4bc9-a00f-f0bffafb2052
vulnerability,CVE-2025-20158,vulnerability--526c8939-6787-4780-9ccc-db2d26d0f452
vulnerability,CVE-2025-27092,vulnerability--a6093929-3d8f-486f-b864-1d8a17b0c50f
vulnerability,CVE-2025-27089,vulnerability--20b855e3-4354-43df-9579-167c42d46872
vulnerability,CVE-2025-27090,vulnerability--ca1c32f3-902e-45ae-a0dd-fbc8f689fe00
vulnerability,CVE-2025-24806,vulnerability--00978baa-e4b0-4ce9-8edf-cdcd276e44cc
vulnerability,CVE-2025-24989,vulnerability--2590fcb4-4406-424c-89d5-049b2130b7c1
vulnerability,CVE-2025-24841,vulnerability--9325e2e8-0543-4651-a4b2-ccb347b59f43
vulnerability,CVE-2025-24965,vulnerability--f3d5abd9-d503-4f5b-9a14-66ada3768ec5
vulnerability,CVE-2025-25942,vulnerability--6353184c-5a4d-4b6d-a2ef-3c281e761b41
vulnerability,CVE-2025-25943,vulnerability--aa07e9af-6d36-4260-96fe-b5b8f43488b2
vulnerability,CVE-2025-25947,vulnerability--66ae8e4a-00e8-453e-9728-b59906128ccd
vulnerability,CVE-2025-25054,vulnerability--291c2f5b-4e1f-45dd-ba54-5b1a25f8d755
vulnerability,CVE-2025-25944,vulnerability--f05617a4-d28c-4a8d-aaa1-c897277c705e
vulnerability,CVE-2025-25946,vulnerability--23ad66aa-be2c-4acd-9bd2-b55e87c1837d
vulnerability,CVE-2025-25196,vulnerability--e01a808c-3326-4ecd-a484-7a8b0fee224e
vulnerability,CVE-2025-25945,vulnerability--df73531e-5068-40bf-8d54-5ddedc04a3e1
vulnerability,CVE-2025-0968,vulnerability--f497c4d7-3c42-4b6a-a739-7eb4febb9006
vulnerability,CVE-2025-0893,vulnerability--5acb0eb0-8758-477b-9a54-53bca20032d0
vulnerability,CVE-2025-0865,vulnerability--503c83af-4d24-4ac4-bf37-6b3dacbbb2f4
vulnerability,CVE-2025-0999,vulnerability--d7457272-3c94-4711-bf33-d7e35a42081d
vulnerability,CVE-2025-0624,vulnerability--855d5735-43b1-4b65-9e14-3d043d0cee69
vulnerability,CVE-2025-0633,vulnerability--87bd9756-8729-4aa8-af26-ae9fe64b8a5e
vulnerability,CVE-2025-0112,vulnerability--6b7b11c9-9f0b-471e-a35e-4ac947a81563
vulnerability,CVE-2025-0916,vulnerability--cf9bec98-81e0-4146-b414-db9ee9f60166
vulnerability,CVE-2025-0677,vulnerability--d1a50a60-4a35-4766-8054-5ecd698e76fb
vulnerability,CVE-2023-46272,vulnerability--3927fc98-a2f1-4322-b012-d7fcf702397c
vulnerability,CVE-2023-46271,vulnerability--dad24515-187a-4d76-8e59-bbfde0a49c24
vulnerability,CVE-2023-51296,vulnerability--bdca7d18-cd7d-483b-8233-86c1bc8a7307
vulnerability,CVE-2023-51302,vulnerability--d05eeadc-4c1e-4400-bc38-4a857a1f7716
vulnerability,CVE-2023-51297,vulnerability--08602999-0c01-4482-9d3e-4a9de101eff2
vulnerability,CVE-2023-51298,vulnerability--5f40614a-2f1a-425f-8b00-febc72943d4d
vulnerability,CVE-2023-51300,vulnerability--90fa2549-5f43-424b-84d8-4b1953dcd737
vulnerability,CVE-2023-51301,vulnerability--1b4fe9bf-bc82-45fb-ac6f-82d8aa25021b
vulnerability,CVE-2023-51299,vulnerability--f98c9e9c-6f51-4cb2-86fc-b684fb8aa6df
vulnerability,CVE-2023-51303,vulnerability--2029fff2-b84e-4338-9044-461f461e1b14
vulnerability,CVE-2023-51293,vulnerability--d12a4b2a-6794-4a83-8d97-f4ab5ff1ebce
vulnerability,CVE-2023-51305,vulnerability--e686bd6e-eb69-4f4c-a6a8-4b6bf7fa6896
vulnerability,CVE-2023-47160,vulnerability--935461fb-9fec-4482-8384-d25bc3156d99
vulnerability,CVE-2020-10095,vulnerability--1b8e10f0-b73c-4929-a2c1-911c3652e6a9
vulnerability,CVE-2020-13481,vulnerability--7e36f997-7c9e-4c5b-8f82-d99351f4d377
vulnerability,CVE-2020-35546,vulnerability--66da5862-6a8a-4c05-9291-3eb4bdec3fc1
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--4c32fc7c-10f9-495d-b616-a282c5c90592",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--00978baa-e4b0-4ce9-8edf-cdcd276e44cc",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-02-20T00:37:45.477696Z",
"modified": "2025-02-20T00:37:45.477696Z",
"name": "CVE-2025-24806",
"description": "Authelia is an open-source authentication and authorization server providing two-factor authentication and single sign-on (SSO) for applications via a web portal. If users are allowed to sign in via both username and email the regulation system treats these as separate login events. This leads to the regulation limitations being effectively doubled assuming an attacker using brute-force to find a user password. It's important to note that due to the effective operation of regulation where no user-facing sign of their regulation ban being visible either via timing or via API responses, it's effectively impossible to determine if a failure occurs due to a bad username password combination, or a effective ban blocking the attempt which heavily mitigates any form of brute-force. This occurs because the records and counting process for this system uses the method utilized for sign in rather than the effective username attribute. This has a minimal impact on account security, this impact is increased naturally in scenarios when there is no two-factor authentication required and weak passwords are used. This makes it a bit easier to brute-force a password. A patch for this issue has been applied to versions 4.38.19, and 4.39.0. Users are advised to upgrade. Users unable to upgrade should 1. Not heavily modify the default settings in a way that ends up with shorter or less frequent regulation bans. The default settings effectively mitigate any potential for this issue to be exploited. and 2. Disable the ability for users to login via an email address.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-24806"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--71c94b84-2fe4-49b2-b495-633e1785d3f3",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--045d2996-22f9-4601-9b53-6ee701f96542",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-02-20T00:37:45.241479Z",
"modified": "2025-02-20T00:37:45.241479Z",
"name": "CVE-2025-1065",
"description": "The Visualizer: Tables and Charts Manager for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Import Data From File feature in all versions up to, and including, 3.11.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-1065"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--50dba9ab-e7a8-49bf-b4d0-9a27ca2dcbec",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--08602999-0c01-4482-9d3e-4a9de101eff2",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-02-20T00:37:46.030662Z",
"modified": "2025-02-20T00:37:46.030662Z",
"name": "CVE-2023-51297",
"description": "A lack of rate limiting in the 'Email Settings' feature of PHPJabbers Hotel Booking System v4.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-51297"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--68d771ce-987c-4352-9d0f-d5475a98cc7f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0b841742-aa9a-43bb-8c42-36e19bd36b1f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-02-20T00:37:41.276111Z",
"modified": "2025-02-20T00:37:41.276111Z",
"name": "CVE-2024-52541",
"description": "Dell Client Platform BIOS contains a Weak Authentication vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-52541"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--81cf4bc8-cda5-4283-aa7f-2229a7c85dd3",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0bb89032-bf22-4151-9811-6f34388f5d45",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-02-20T00:37:41.684563Z",
"modified": "2025-02-20T00:37:41.684563Z",
"name": "CVE-2024-13336",
"description": "The Disable Auto Updates plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4. This is due to missing or incorrect nonce validation on the 'disable-auto-updates' page. This makes it possible for unauthenticated attackers to disable all auto updates via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-13336"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--aac8cf3c-c159-48f4-b9df-a83c4818e865",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0d323cea-8b83-4ffe-8689-3b5d03d0a559",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-02-20T00:37:39.991654Z",
"modified": "2025-02-20T00:37:39.991654Z",
"name": "CVE-2024-28776",
"description": "IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 \n\nis vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-28776"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9f36fc64-1e65-4a7c-99fa-06e6c3cc8bf5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0e6a8879-cac8-479d-a2b4-20ca254b5c2c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-02-20T00:37:41.642221Z",
"modified": "2025-02-20T00:37:41.642221Z",
"name": "CVE-2024-13679",
"description": "The Widget BUY.BOX plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'buybox-widget' shortcode in all versions up to, and including, 3.1.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-13679"
}
]
}
]
}
Loading

0 comments on commit 55327a4

Please sign in to comment.