Skip to content

Commit

Permalink
generated content from 2024-08-17
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Aug 17, 2024
1 parent 0306020 commit 3cb0297
Show file tree
Hide file tree
Showing 55 changed files with 1,242 additions and 0 deletions.
54 changes: 54 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -246623,3 +246623,57 @@ vulnerability,CVE-2024-6347,vulnerability--b74afb25-7294-4523-ac45-1b7c4e6f2e5a
vulnerability,CVE-2024-6534,vulnerability--04b590db-0615-421a-a5e3-db8931a7a48c
vulnerability,CVE-2024-6533,vulnerability--b3847302-e7f4-4469-b025-55edfe89fda0
vulnerability,CVE-2024-32231,vulnerability--7a79000c-e0ff-4be7-af0c-7165b53b7bab
vulnerability,CVE-2022-33162,vulnerability--51b1f96e-8638-46de-bb5b-b0fe224c7451
vulnerability,CVE-2022-3399,vulnerability--53d52a80-bc9c-454c-ba9a-61b9ba278b36
vulnerability,CVE-2024-25837,vulnerability--978c97fd-2d65-4165-a873-8c499fd30bb7
vulnerability,CVE-2024-25008,vulnerability--46963c43-de1a-4bfc-97b0-7d996c58b921
vulnerability,CVE-2024-2175,vulnerability--018a2b76-5f36-4e9a-994c-7f4f0d648560
vulnerability,CVE-2024-42486,vulnerability--7179e93f-7160-4316-8058-6de60f9d6993
vulnerability,CVE-2024-42465,vulnerability--d329c14e-55cc-470d-bbdd-519b97bb64f8
vulnerability,CVE-2024-42639,vulnerability--07dd35d5-9e55-402d-8bba-34f17890c98d
vulnerability,CVE-2024-42850,vulnerability--50b673ae-6df3-4ee8-b687-de57be4716d2
vulnerability,CVE-2024-42634,vulnerability--4fc62ed9-b65d-44fe-8793-0a0b373a6f3e
vulnerability,CVE-2024-42637,vulnerability--deb54812-8e7d-48d0-8eb0-8ce30005b757
vulnerability,CVE-2024-42758,vulnerability--88c1d0c0-c978-49a2-9cb2-059b903a2315
vulnerability,CVE-2024-42994,vulnerability--5619ae02-3ad1-46fc-8f42-8e043b212f00
vulnerability,CVE-2024-42995,vulnerability--575dcd01-d9d7-4032-a4a5-fce2f0138daa
vulnerability,CVE-2024-42849,vulnerability--dcde4f5e-2ee5-4547-81ae-bf8a7af84136
vulnerability,CVE-2024-42463,vulnerability--46bc7ecb-dad6-4b7e-bf38-35fd32e744f9
vulnerability,CVE-2024-42466,vulnerability--e383de95-6010-47f1-9d5e-52b7f79249f1
vulnerability,CVE-2024-42638,vulnerability--2127aafa-a7cf-465b-8aed-6c2adf8d61a6
vulnerability,CVE-2024-42464,vulnerability--a68cbed5-b608-4e3e-9b9c-f41a23581131
vulnerability,CVE-2024-42462,vulnerability--3148e586-658b-4184-9e62-cd154fac487e
vulnerability,CVE-2024-7630,vulnerability--2146b7ac-d0f1-4e66-aece-6d94bdbd24c5
vulnerability,CVE-2024-7886,vulnerability--42ea3fc4-011b-49c2-a23b-efd353b248ec
vulnerability,CVE-2024-7144,vulnerability--e97001f7-146d-4ba9-9eb6-abb50c4d075a
vulnerability,CVE-2024-7301,vulnerability--7032769c-aee5-46c8-83e5-35ad1540a0f8
vulnerability,CVE-2024-7146,vulnerability--4fd1e068-983e-4e32-92a4-790cddb5ab3d
vulnerability,CVE-2024-7147,vulnerability--d58ef9d1-6b6e-4c44-b38a-61c33f4e7e81
vulnerability,CVE-2024-7852,vulnerability--07e3496f-09d2-4d1e-ad12-776aa776ff3d
vulnerability,CVE-2024-7145,vulnerability--9a3dc15a-1545-4781-a053-00da4f275e15
vulnerability,CVE-2024-7136,vulnerability--b8f4955d-994c-43b4-a6c8-561f5d9596fe
vulnerability,CVE-2024-7422,vulnerability--39e11913-d17d-4ad9-a275-8bc73a417026
vulnerability,CVE-2024-7853,vulnerability--e36c2020-ef6a-425e-88a4-1db8e168acb4
vulnerability,CVE-2024-7501,vulnerability--602f6aa8-8495-48a6-9847-095fcfe0bd9f
vulnerability,CVE-2024-7646,vulnerability--50beb9f2-59fb-49c2-abf7-6d0a0439bd66
vulnerability,CVE-2024-43807,vulnerability--450c8a70-0495-4e1b-83a1-7ab55a578dd3
vulnerability,CVE-2024-43808,vulnerability--aec49fc2-cc70-4019-8455-af3d9cce4dfa
vulnerability,CVE-2024-43472,vulnerability--7e699af7-a905-4840-ae3c-07781be7fb97
vulnerability,CVE-2024-43042,vulnerability--56b9a9da-cefb-4ec1-b76f-b65d7b63bc8b
vulnerability,CVE-2024-43395,vulnerability--fac5015c-0f26-48dd-b6a5-b181f3b67148
vulnerability,CVE-2024-43006,vulnerability--893234a4-fd4c-4f06-b5f6-bb82d8e039b9
vulnerability,CVE-2024-43381,vulnerability--77e96c36-b3dd-46d6-bba1-2b8329c689ea
vulnerability,CVE-2024-43809,vulnerability--4233663b-d805-425e-84ce-8f05ce4f5c5e
vulnerability,CVE-2024-43009,vulnerability--df61e48f-a56a-4348-a80a-7b3db60c76e3
vulnerability,CVE-2024-43005,vulnerability--e632a404-e366-4cb6-a4b0-90df010b5dbd
vulnerability,CVE-2024-43011,vulnerability--fceda105-ff37-471b-8d43-a04b150e6ad9
vulnerability,CVE-2024-5209,vulnerability--c6f10e5c-6a02-4449-88dd-e5f67adbc582
vulnerability,CVE-2024-5210,vulnerability--cd78e71e-04a4-4033-8435-6d7ab6ce8c29
vulnerability,CVE-2024-4781,vulnerability--5fdee0c5-232e-43ef-ace4-b4382fa0f201
vulnerability,CVE-2024-4782,vulnerability--2cff4f96-29b6-40b1-b951-cadc6517fb7e
vulnerability,CVE-2024-4763,vulnerability--f98e5979-e253-4533-832c-63bda5b45dfc
vulnerability,CVE-2024-6004,vulnerability--11b4a3fe-a67f-4df2-b293-2a4af51b11d1
vulnerability,CVE-2024-6460,vulnerability--a1124b02-fbe4-4ede-bdec-f3e352bd1a64
vulnerability,CVE-2024-6098,vulnerability--38c4dfbc-6e85-474a-8a0e-e39741a3a961
vulnerability,CVE-2023-47728,vulnerability--a0b40a3d-ce26-481e-9b01-045acd5b570b
vulnerability,CVE-2023-7049,vulnerability--2797b01e-c1ba-4927-bcd4-153dc67a2320
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d6d3d42d-2277-4df9-9bdf-5941c366c2b3",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--018a2b76-5f36-4e9a-994c-7f4f0d648560",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-17T00:17:57.052733Z",
"modified": "2024-08-17T00:17:57.052733Z",
"name": "CVE-2024-2175",
"description": "An insecure permissions vulnerability was reported in Lenovo Display Control Center (LDCC) and Lenovo Accessories and Display Manager (LADM)\n\n that could allow a local attacker to escalate privileges.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-2175"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--36855254-57d1-4083-961d-01c415a8a0b6",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--07dd35d5-9e55-402d-8bba-34f17890c98d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-17T00:17:57.139171Z",
"modified": "2024-08-17T00:17:57.139171Z",
"name": "CVE-2024-42639",
"description": "H3C GR1100-P v100R009 was discovered to use a hardcoded password in /etc/shadow, which allows attackers to log in as root.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-42639"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9e544a64-d046-4403-a30a-35e1c019f5d7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--07e3496f-09d2-4d1e-ad12-776aa776ff3d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-17T00:17:57.546954Z",
"modified": "2024-08-17T00:17:57.546954Z",
"name": "CVE-2024-7852",
"description": "A vulnerability was found in SourceCodester Yoga Class Registration System 1.0 and classified as problematic. This issue affects some unknown processing of the file /admin/inquiries/view_inquiry.php. The manipulation of the argument message leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-7852"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9376e068-9703-43a5-97ed-59716fbbf707",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--11b4a3fe-a67f-4df2-b293-2a4af51b11d1",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-17T00:17:58.447648Z",
"modified": "2024-08-17T00:17:58.447648Z",
"name": "CVE-2024-6004",
"description": "A denial-of-service vulnerability was reported in some Lenovo printers that could allow an unauthenticated attacker on a shared network to deny printer connections until the system is rebooted.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-6004"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--583d7e1e-0805-4fc0-942f-11433269a1eb",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2127aafa-a7cf-465b-8aed-6c2adf8d61a6",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-17T00:17:57.174291Z",
"modified": "2024-08-17T00:17:57.174291Z",
"name": "CVE-2024-42638",
"description": "H3C Magic B1ST v100R012 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-42638"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e3775a26-9e71-4432-8e9e-263d58a58006",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2146b7ac-d0f1-4e66-aece-6d94bdbd24c5",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-17T00:17:57.522842Z",
"modified": "2024-08-17T00:17:57.522842Z",
"name": "CVE-2024-7630",
"description": "The Relevanssi – A Better Search plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 4.22.2 via the relevanssi_do_query() due to insufficient limitations on the posts that are returned when searching. This makes it possible for unauthenticated attackers to extract potentially sensitive information from password protected posts.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-7630"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--fcf7e07f-f8b0-4277-bea5-9c16eb10cf4e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2797b01e-c1ba-4927-bcd4-153dc67a2320",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-17T00:17:59.62055Z",
"modified": "2024-08-17T00:17:59.62055Z",
"name": "CVE-2023-7049",
"description": "The Custom Field For WP Job Manager plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.2 via the the 'cm_fieldshow' shortcode due to missing validation on the 'job_id' user controlled key. This makes it possible for authenticated attackers, with contributor-level access and above, to expose potentially sensitive post metadata.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-7049"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--58e8d2d3-296c-48b3-ba0c-2f4d8a72586e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2cff4f96-29b6-40b1-b951-cadc6517fb7e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-17T00:17:58.361179Z",
"modified": "2024-08-17T00:17:58.361179Z",
"name": "CVE-2024-4782",
"description": "A denial-of-service vulnerability was reported in some Lenovo printers that could allow an unauthenticated attacker on a shared network to disrupt the printer's functionality until a manual system reboot occurs.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-4782"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--aa388136-689e-4b04-82bf-83480bf6bc98",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--3148e586-658b-4184-9e62-cd154fac487e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-17T00:17:57.179804Z",
"modified": "2024-08-17T00:17:57.179804Z",
"name": "CVE-2024-42462",
"description": "Improper Authentication vulnerability in upKeeper Solutions product upKeeper Manager allows Authentication Bypass.This issue affects upKeeper Manager: through 5.1.9.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-42462"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d6d5eb3b-d48a-419a-937e-b7c2089f410f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--38c4dfbc-6e85-474a-8a0e-e39741a3a961",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-17T00:17:58.488583Z",
"modified": "2024-08-17T00:17:58.488583Z",
"name": "CVE-2024-6098",
"description": "When performing an online tag generation to devices which communicate \nusing the ControlLogix protocol, a machine-in-the-middle, or a device \nthat is not configured correctly, could deliver a response leading to \nunrestricted or unregulated resource allocation. This could cause a \ndenial-of-service condition and crash the Kepware application. By \ndefault, these functions are turned off, yet they remain accessible for \nusers who recognize and require their advantages.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-6098"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--2eb1fcb3-0b46-41d9-b866-e77788c4fd50",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--39e11913-d17d-4ad9-a275-8bc73a417026",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-17T00:17:57.568665Z",
"modified": "2024-08-17T00:17:57.568665Z",
"name": "CVE-2024-7422",
"description": "The Theme My Login plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 7.1.7. This is due to missing or incorrect nonce validation on the tml_admin_save_ms_settings() function. This makes it possible for unauthenticated attackers to update the theme's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Please note that this only affects multi-site instances.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-7422"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--78ff5616-02cb-4d7a-ae24-bdcbeb2d1835",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--4233663b-d805-425e-84ce-8f05ce4f5c5e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-17T00:17:57.986104Z",
"modified": "2024-08-17T00:17:57.986104Z",
"name": "CVE-2024-43809",
"description": "In JetBrains TeamCity before 2024.07.1 reflected XSS was possible on the agentPushPreset page",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-43809"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--f3384460-2ebf-4282-831a-5a220f50262b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--42ea3fc4-011b-49c2-a23b-efd353b248ec",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-17T00:17:57.527953Z",
"modified": "2024-08-17T00:17:57.527953Z",
"name": "CVE-2024-7886",
"description": "** DISPUTED ** ** DISPUTED ** A vulnerability has been found in Scooter Software Beyond Compare up to 3.3.5.15075 and classified as critical. Affected by this vulnerability is an unknown functionality in the library 7zxa.dll. The manipulation leads to uncontrolled search path. Attacking locally is a requirement. The real existence of this vulnerability is still doubted at the moment. NOTE: The vendor explains that a system must be breached before exploiting this issue.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-7886"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a0582325-a5fe-481b-9b82-d94c69fa0eb2",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--450c8a70-0495-4e1b-83a1-7ab55a578dd3",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-17T00:17:57.800324Z",
"modified": "2024-08-17T00:17:57.800324Z",
"name": "CVE-2024-43807",
"description": "In JetBrains TeamCity before 2024.07.1 multiple stored XSS was possible on Clouds page",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-43807"
}
]
}
]
}
Loading

0 comments on commit 3cb0297

Please sign in to comment.