diff --git a/mapping.csv b/mapping.csv index 2233fcb9fd..80c4bf37c5 100644 --- a/mapping.csv +++ b/mapping.csv @@ -255117,3 +255117,4 @@ vulnerability,CVE-2024-10998,vulnerability--e9489701-2236-4279-bbaa-ad26fa168ce5 vulnerability,CVE-2024-11000,vulnerability--5705fbf0-54d5-4cb4-8503-4f31645152db vulnerability,CVE-2024-24409,vulnerability--03c31f43-992c-4964-8f42-1006fad16f44 vulnerability,CVE-2024-50588,vulnerability--9b21218e-e09b-4eed-b0dc-2aa283ac6f0d +vulnerability,CVE-2024-10187,vulnerability--06dc9e43-b580-46c3-98ce-0d947bf05910 diff --git a/objects/vulnerability/vulnerability--06dc9e43-b580-46c3-98ce-0d947bf05910.json b/objects/vulnerability/vulnerability--06dc9e43-b580-46c3-98ce-0d947bf05910.json new file mode 100644 index 0000000000..fe7e074cd4 --- /dev/null +++ b/objects/vulnerability/vulnerability--06dc9e43-b580-46c3-98ce-0d947bf05910.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--45464161-7399-4c9d-86b4-843d57d488df", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--06dc9e43-b580-46c3-98ce-0d947bf05910", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-08T10:20:12.827651Z", + "modified": "2024-11-08T10:20:12.827651Z", + "name": "CVE-2024-10187", + "description": "The myCred – Loyalty Points and Rewards plugin for WordPress and WooCommerce – Give Points, Ranks, Badges, Cashback, WooCommerce rewards, and WooCommerce credits for Gamification plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's mycred_link shortcode in all versions up to, and including, 2.7.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-10187" + } + ] + } + ] +} \ No newline at end of file