Skip to content

Commit

Permalink
generated content from 2024-08-15
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Aug 15, 2024
1 parent f8f69a1 commit 338e523
Show file tree
Hide file tree
Showing 204 changed files with 4,669 additions and 0 deletions.
203 changes: 203 additions & 0 deletions mapping.csv

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a9854749-6572-493f-b05a-a21dd97d6161",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--019bae8d-7b22-444d-9cd7-c81ab80197b6",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-15T00:18:26.172934Z",
"modified": "2024-08-15T00:18:26.172934Z",
"name": "CVE-2024-25576",
"description": "improper access control in firmware for some Intel(R) FPGA products before version 24.1 may allow a privileged user to enable escalation of privilege via local access.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-25576"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ddf00dd7-2cc0-459a-8594-6469d3f81452",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--02b7bb07-db0d-46e0-9683-9ff71f9d087a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-15T00:18:26.537324Z",
"modified": "2024-08-15T00:18:26.537324Z",
"name": "CVE-2024-42435",
"description": "Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-42435"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--79fb4337-a095-439a-9a4e-e9146f35f4c0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--058fee90-e38d-4ab7-97a0-92c754142f37",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-15T00:18:26.214057Z",
"modified": "2024-08-15T00:18:26.214057Z",
"name": "CVE-2024-25157",
"description": "An authentication bypass vulnerability in GoAnywhere MFT prior to 7.6.0 allows Admin Users with access to the Agent Console to circumvent some permission checks when attempting to visit other pages. This could lead to unauthorized information disclosure or modification.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-25157"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--1ba6c513-b582-4aee-a7db-531c53141d24",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0afa08ca-eaef-4898-b87d-ccf77705cfe7",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-15T00:18:26.228407Z",
"modified": "2024-08-15T00:18:26.228407Z",
"name": "CVE-2024-23491",
"description": "Uncontrolled search path in some Intel(R) Distribution for GDB software before version 2024.0.1 may allow an authenticated user to potentially enable escalation of privilege via local access.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-23491"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--163d7ef3-653a-4561-b815-f3eb2b823787",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0c588201-8a29-4e37-a56a-d1a4b1ec25bf",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-15T00:18:27.108882Z",
"modified": "2024-08-15T00:18:27.108882Z",
"name": "CVE-2024-7792",
"description": "A vulnerability was found in SourceCodester Task Progress Tracker 1.0. It has been classified as critical. Affected is an unknown function of the file /endpoint/delete-task.php. The manipulation of the argument task leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-7792"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b6a4dbf1-4452-4972-ac04-3302396fa5ea",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0c77d24c-66ac-4969-b6e1-cff63c6cdc40",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-15T00:18:27.267955Z",
"modified": "2024-08-15T00:18:27.267955Z",
"name": "CVE-2024-39419",
"description": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and modify minor information. Exploitation of this issue does not require user interaction.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-39419"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6d0da35b-72b2-4363-a077-608020613089",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--10f7b489-f85e-4b8a-b253-9b03a492f8fc",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-15T00:18:27.784406Z",
"modified": "2024-08-15T00:18:27.784406Z",
"name": "CVE-2024-22376",
"description": "Uncontrolled search path element in some installation software for Intel(R) Ethernet Adapter Driver Pack before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-22376"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--051abeea-0dc0-4e42-8985-6ed3c63267b0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--11ceac87-d644-46d4-8219-7ab8eaeaf2ba",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-15T00:18:27.286351Z",
"modified": "2024-08-15T00:18:27.286351Z",
"name": "CVE-2024-39417",
"description": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and disclose minor information. Exploitation of this issue does not require user interaction.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-39417"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--4f8aad2c-88d1-4582-b5a0-28f97a247a3d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--14d14d32-4949-43f4-8943-76401853e66a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-15T00:18:27.278395Z",
"modified": "2024-08-15T00:18:27.278395Z",
"name": "CVE-2024-39390",
"description": "InDesign Desktop versions ID19.4, ID18.5.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-39390"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ed3caee7-db54-4842-9d02-9a53793b4be2",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--16ad5fa3-91b4-40f2-a19b-7325e10b39c6",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-15T00:18:26.055603Z",
"modified": "2024-08-15T00:18:26.055603Z",
"name": "CVE-2024-41856",
"description": "Illustrator versions 28.5, 27.9.4 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-41856"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b6e41617-e142-4e91-92ea-5b9486e82d6c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--194f8a92-145d-49f3-9525-107dde23d67b",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-15T00:18:29.418119Z",
"modified": "2024-08-15T00:18:29.418119Z",
"name": "CVE-2023-43489",
"description": "Improper access control for some Intel(R) CIP software before version 2.4.10717 may allow an authenticated user to potentially enable denial of service via local access.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-43489"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6aee0e28-d6e0-4e10-b88e-b98be0de40c6",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1ad3781d-e90d-428a-a941-f7764f0e72a3",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-15T00:18:27.144561Z",
"modified": "2024-08-15T00:18:27.144561Z",
"name": "CVE-2024-7729",
"description": "The CAYIN Technology CMS lacks proper access control, allowing unauthenticated remote attackers to download arbitrary CGI files.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-7729"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6c5001b4-5666-472e-a46f-8deb8426dfd6",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1ad757fc-ee1c-410d-bf78-513fe4609fef",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-15T00:18:27.131575Z",
"modified": "2024-08-15T00:18:27.131575Z",
"name": "CVE-2024-7347",
"description": "NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow an attacker to over-read NGINX worker memory resulting in its termination, using a specially crafted mp4 file. The issue only affects NGINX if it is built with the ngx_http_mp4_module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted mp4 file with the ngx_http_mp4_module.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-7347"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--8feb7683-5304-428c-a8a6-8a22c8a6ad06",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1ae365d8-b5a8-42f2-bef3-56e29cf3e483",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-15T00:18:30.140693Z",
"modified": "2024-08-15T00:18:30.140693Z",
"name": "CVE-2023-50315",
"description": "IBM WebSphere Application Server 8.5 and 9.0 could allow an attacker with access to the network to conduct spoofing attacks. An attacker could exploit this vulnerability using a certificate issued by a trusted authority to obtain sensitive information. IBM X-Force ID: 274714.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-50315"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--26557c7e-7792-43ba-8ac3-ecd447f308d6",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1bbbf8f5-95fc-4557-9ed3-6ee9e813d015",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-15T00:18:27.226513Z",
"modified": "2024-08-15T00:18:27.226513Z",
"name": "CVE-2024-39411",
"description": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and disclose minor information. Exploitation of this issue does not require user interaction.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-39411"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--31407746-57c3-4abb-adb5-3b9bcaf6c255",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1c694864-084c-4dd2-8d06-3404e547a6d3",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-15T00:18:27.252449Z",
"modified": "2024-08-15T00:18:27.252449Z",
"name": "CVE-2024-39389",
"description": "InDesign Desktop versions ID19.4, ID18.5.2 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-39389"
}
]
}
]
}
Loading

0 comments on commit 338e523

Please sign in to comment.