Skip to content

Commit

Permalink
generated content from 2024-08-03
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Aug 3, 2024
1 parent 1f11cfd commit 57180f3
Show file tree
Hide file tree
Showing 67 changed files with 1,518 additions and 0 deletions.
66 changes: 66 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -245256,3 +245256,69 @@ vulnerability,CVE-2024-41144,vulnerability--2d0499ff-73f8-4bee-972c-d7be5ba8c07e
vulnerability,CVE-2024-41162,vulnerability--f298b108-b55a-44bd-b224-c8b55ea188f2
vulnerability,CVE-2024-41260,vulnerability--a30354ea-754f-4be5-b13d-72810d5bfa67
vulnerability,CVE-2024-41259,vulnerability--c478cc29-b8da-4cd1-af61-3ea4686d6550
vulnerability,CVE-2024-42348,vulnerability--6b252e8f-37f5-4c2c-8a25-354e1617ece1
vulnerability,CVE-2024-42459,vulnerability--ae6fcb1d-7853-49da-b489-87feb7acaecd
vulnerability,CVE-2024-42349,vulnerability--54ef4428-6819-478c-afc6-afd13ba43d2e
vulnerability,CVE-2024-42460,vulnerability--4f06a7dd-688a-4b57-a148-cb53bafe0fdc
vulnerability,CVE-2024-42461,vulnerability--ec17a625-1947-4fba-817d-bf2dbb030742
vulnerability,CVE-2024-42458,vulnerability--78643724-ab28-479d-871e-ac9958e36ea9
vulnerability,CVE-2024-39392,vulnerability--c5dda2cb-32ef-4677-8207-54e877331d37
vulnerability,CVE-2024-39396,vulnerability--3331f959-bbdc-4817-ba90-6dd8cf0ec20f
vulnerability,CVE-2024-6704,vulnerability--631ec529-5482-4539-9a5c-36c39bee90f3
vulnerability,CVE-2024-6567,vulnerability--a89a80c4-fca7-4280-989d-93c6dfc096ee
vulnerability,CVE-2024-28298,vulnerability--7d3de013-ff18-4024-b352-677dc3441f29
vulnerability,CVE-2024-28297,vulnerability--63f76703-29cb-4380-a16f-6c7fa9f7c661
vulnerability,CVE-2024-27181,vulnerability--fbaa60bf-bd10-4dc0-b1c5-fb6d9c03aa9d
vulnerability,CVE-2024-27182,vulnerability--ace5d48a-f248-4726-a1b4-dfe11d7c980b
vulnerability,CVE-2024-33895,vulnerability--fc84398a-256a-43bc-9c9e-8fc3504c68d7
vulnerability,CVE-2024-33896,vulnerability--1a7cb8f5-2cd3-40b8-915b-cbe9fc81778f
vulnerability,CVE-2024-33894,vulnerability--608a5f70-066a-4487-b4e4-031ba8a1003f
vulnerability,CVE-2024-33893,vulnerability--15c984af-bae5-43dc-9997-94337a6e5844
vulnerability,CVE-2024-33892,vulnerability--67d253d7-0d0f-4bba-a186-dea80b848a68
vulnerability,CVE-2024-5595,vulnerability--cd4dfe77-2342-49e9-91f4-66dac020a10d
vulnerability,CVE-2024-22278,vulnerability--4206528b-4cbc-4e32-b5af-3540895ad5f9
vulnerability,CVE-2024-22169,vulnerability--9573c31c-cb25-417e-b1f7-7c9b1987fc5a
vulnerability,CVE-2024-38881,vulnerability--a75400fa-49e9-4c83-a0cc-9bd7db9d1cae
vulnerability,CVE-2024-38886,vulnerability--4896c477-a420-4c7e-8b11-0eeba39d2f59
vulnerability,CVE-2024-38877,vulnerability--90adfcf0-9308-48a3-89d0-c8b3dd1883ad
vulnerability,CVE-2024-38482,vulnerability--4311e374-4454-47ec-8da5-a5cb2fb501c3
vulnerability,CVE-2024-38776,vulnerability--ee2735fc-84b5-4f1a-bc4e-175c0c548aec
vulnerability,CVE-2024-38889,vulnerability--4c9f8395-bb37-4324-9b84-97afd72ad688
vulnerability,CVE-2024-38883,vulnerability--8f8fdc0b-f597-41bb-809b-e37239c8c20b
vulnerability,CVE-2024-38879,vulnerability--f0172127-fa2e-449f-8b27-bc7f03c394ef
vulnerability,CVE-2024-38887,vulnerability--247e4aa9-d21b-4de4-91c8-1760fe330e03
vulnerability,CVE-2024-38891,vulnerability--5cf4f71c-ecba-43b4-ba3d-26a5f599bd72
vulnerability,CVE-2024-38884,vulnerability--005c943b-ec1c-4bda-a491-9790bf8e439b
vulnerability,CVE-2024-38882,vulnerability--926125ad-1415-4b0c-b20a-a7f33effc432
vulnerability,CVE-2024-38888,vulnerability--c6aa1ceb-d8ab-4d1f-b6cd-8c1d96eeeed6
vulnerability,CVE-2024-38890,vulnerability--5b408614-c7e5-4913-8248-c4c02a71976e
vulnerability,CVE-2024-38878,vulnerability--8bed6e2b-993b-477c-8c1a-dde275494b68
vulnerability,CVE-2024-38876,vulnerability--4cc30c43-03fa-4cba-90a5-4ed39ef1c3f7
vulnerability,CVE-2024-38885,vulnerability--4930127f-3a79-4715-a548-788da1952502
vulnerability,CVE-2024-7376,vulnerability--5710e695-1e80-4d2a-bf5e-e240227cd549
vulnerability,CVE-2024-7389,vulnerability--bc3dabea-ee6d-44ae-afcc-518fbc760202
vulnerability,CVE-2024-7319,vulnerability--c5bc3942-df8b-4694-bb5d-cb40454d142f
vulnerability,CVE-2024-7373,vulnerability--7cc4c1e3-4d90-4c11-bef3-f4657ff0e1d9
vulnerability,CVE-2024-7314,vulnerability--c3daa5b9-4606-40fe-8ee3-15e130a4101e
vulnerability,CVE-2024-7377,vulnerability--e9df64ca-cc4a-426a-9001-7679bb798a56
vulnerability,CVE-2024-7029,vulnerability--19ec2ae2-eb8b-4096-a637-584e7eed64b4
vulnerability,CVE-2024-7204,vulnerability--ecfc4b40-e6b1-4bac-a5a6-5a3e55c24cfa
vulnerability,CVE-2024-7375,vulnerability--cb640b26-b81e-4850-b931-718e9d5ae144
vulnerability,CVE-2024-7323,vulnerability--6e20e83c-c0d9-469d-a57e-f2d2de5677ba
vulnerability,CVE-2024-7378,vulnerability--c79f60a6-a8cb-48d6-a0c5-b3d3062f1291
vulnerability,CVE-2024-7374,vulnerability--8bcc62b2-0458-49c8-a5fe-1cf6b7ca20ee
vulnerability,CVE-2024-3238,vulnerability--535db3cd-2c17-4396-9b1e-32e2643d13ae
vulnerability,CVE-2024-3827,vulnerability--ad636be9-966d-4858-b7ea-86b050801031
vulnerability,CVE-2024-3056,vulnerability--142833ec-8181-4d40-a1b4-0f617a17f9dd
vulnerability,CVE-2024-4643,vulnerability--b3048b91-79e7-4db2-a815-436f63cce8a7
vulnerability,CVE-2024-36268,vulnerability--24c934e8-3cc5-4812-9166-bfc5b3db5fb5
vulnerability,CVE-2024-41127,vulnerability--b4bc0735-f4dc-4669-b782-d98538741e0a
vulnerability,CVE-2024-41310,vulnerability--ad245a7a-58ae-4a8f-8031-b3d63e8efe79
vulnerability,CVE-2024-41518,vulnerability--29df04d7-2c20-4e70-831e-ac5795849a64
vulnerability,CVE-2024-41519,vulnerability--ab69a701-2459-4e8a-8aac-61d4c100c3f9
vulnerability,CVE-2024-41517,vulnerability--16e0816b-653e-46d0-8f3c-587a6be45bf9
vulnerability,CVE-2024-40721,vulnerability--72b2d476-b9aa-45e5-b011-9dac873be695
vulnerability,CVE-2024-40719,vulnerability--439f1675-3148-4f1d-b0f5-3439bdf2a20a
vulnerability,CVE-2024-40723,vulnerability--16221616-9996-4022-9388-011e83675006
vulnerability,CVE-2024-40720,vulnerability--76ab566d-ea31-45f2-a3b5-1a1ce1a82958
vulnerability,CVE-2024-40722,vulnerability--4526c27f-1cc2-4193-be0a-d5c660f8b7f3
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--948d94a8-0c9f-4027-a25e-4bdaae24f7aa",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--005c943b-ec1c-4bda-a491-9790bf8e439b",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-03T00:17:58.751984Z",
"modified": "2024-08-03T00:17:58.751984Z",
"name": "CVE-2024-38884",
"description": "An issue in Horizon Business Services Inc. Caterease 16.0.1.1663 through 24.0.1.2405 and possibly later versions, allows a local attacker to perform an Authentication Bypass attack due to improperly implemented security checks for standard authentication mechanisms",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-38884"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--07cf5c68-d1a2-421f-b377-1d2116bd0742",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--142833ec-8181-4d40-a1b4-0f617a17f9dd",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-03T00:17:58.854634Z",
"modified": "2024-08-03T00:17:58.854634Z",
"name": "CVE-2024-3056",
"description": "A flaw was found in Podman. This issue may allow an attacker to create a specially crafted container that, when configured to share the same IPC with at least one other container, can create a large number of IPC resources in /dev/shm. The malicious container will continue to exhaust resources until it is out-of-memory (OOM) killed. While the malicious container's cgroup will be removed, the IPC resources it created are not. Those resources are tied to the IPC namespace that will not be removed until all containers using it are stopped, and one non-malicious container is holding the namespace open. The malicious container is restarted, either automatically or by attacker control, repeating the process and increasing the amount of memory consumed. With a container configured to restart always, such as `podman run --restart=always`, this can result in a memory-based denial of service of the system.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-3056"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7c9481a4-96f2-494d-813a-9a6ee78c1dcd",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--15c984af-bae5-43dc-9997-94337a6e5844",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-03T00:17:58.416865Z",
"modified": "2024-08-03T00:17:58.416865Z",
"name": "CVE-2024-33893",
"description": "Cosy+ devices running a firmware 21.x below 21.2s10 or a firmware 22.x below 22.1s3 are vulnerable to XSS when displaying the logs due to improper input sanitization. This is fixed in version 21.2s10 and 22.1s3.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-33893"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--03cc93e9-01ff-483d-a1a0-2dfc2a7e2e01",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--16221616-9996-4022-9388-011e83675006",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-03T00:17:59.398226Z",
"modified": "2024-08-03T00:17:59.398226Z",
"name": "CVE-2024-40723",
"description": "The specific API in HWATAIServiSign Windows Version from CHANGING Information Technology does not properly validate the length of server-side inputs. When a user visits a spoofed website, unauthenticated remote attackers can cause a stack-based buffer overflow in the HWATAIServiSign, temporarily disrupting its service.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-40723"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b3a3ed76-e999-4432-a4a4-7b701f5d75f6",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--16e0816b-653e-46d0-8f3c-587a6be45bf9",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-03T00:17:59.135183Z",
"modified": "2024-08-03T00:17:59.135183Z",
"name": "CVE-2024-41517",
"description": "An Incorrect Access Control vulnerability in \"/admin/benutzer/institution/rechteverwaltung/uebersicht\" in Feripro <= v2.2.3 allows remote attackers to get a list of all users and their corresponding privileges.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-41517"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--44c54a2d-3ebd-4dbe-b984-da89c7cb6d46",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--19ec2ae2-eb8b-4096-a637-584e7eed64b4",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-03T00:17:58.796845Z",
"modified": "2024-08-03T00:17:58.796845Z",
"name": "CVE-2024-7029",
"description": "Commands can be injected over the network and executed without authentication.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-7029"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--90ac79dc-b44a-4355-8454-bceadb0b6fcb",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1a7cb8f5-2cd3-40b8-915b-cbe9fc81778f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-03T00:17:58.399851Z",
"modified": "2024-08-03T00:17:58.399851Z",
"name": "CVE-2024-33896",
"description": "Cosy+ devices running a firmware 21.x below 21.2s10 or a firmware 22.x below 22.1s3 are vulnerable to code injection due to improper parameter blacklisting. This is fixed in version 21.2s10 and 22.1s3.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-33896"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--95a2ea17-b7e2-4d7e-94e7-2dda1f37fd43",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--247e4aa9-d21b-4de4-91c8-1760fe330e03",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-03T00:17:58.741475Z",
"modified": "2024-08-03T00:17:58.741475Z",
"name": "CVE-2024-38887",
"description": "An issue in Horizon Business Services Inc. Caterease 16.0.1.1663 through 24.0.1.2405 and possibly later versions, allows a remote attacker to expand control over the operating system from the database due to the execution of commands with unnecessary privileges.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-38887"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--cbd93c7a-9d15-4e5a-85eb-0c595f010b82",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--24c934e8-3cc5-4812-9166-bfc5b3db5fb5",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-03T00:17:58.971388Z",
"modified": "2024-08-03T00:17:58.971388Z",
"name": "CVE-2024-36268",
"description": "Improper Control of Generation of Code ('Code Injection') vulnerability in Apache InLong.\n\nThis issue affects Apache InLong: from 1.10.0 through 1.12.0, which could lead to Remote Code Execution. Users are advised to upgrade to Apache InLong's 1.13.0 or cherry-pick [1] to solve it.\n\n[1]  https://github.com/apache/inlong/pull/10251",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-36268"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--1d0f1214-e630-4379-b9b1-e90c0b7d8abd",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--29df04d7-2c20-4e70-831e-ac5795849a64",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-03T00:17:59.121373Z",
"modified": "2024-08-03T00:17:59.121373Z",
"name": "CVE-2024-41518",
"description": "An Incorrect Access Control vulnerability in \"/admin/programm/<program_id>/export/statistics\" in Feripro <= v2.2.3 allows remote attackers to export an XLSX file with information about registrations and participants.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-41518"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b9370e6c-6448-4c60-859e-ce31ea49adf0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--3331f959-bbdc-4817-ba90-6dd8cf0ec20f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-03T00:17:57.923956Z",
"modified": "2024-08-03T00:17:57.923956Z",
"name": "CVE-2024-39396",
"description": "InDesign Desktop versions ID18.5.2, ID19.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-39396"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--31059dbf-9dfb-4a53-873a-6ea14e0f5c22",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--4206528b-4cbc-4e32-b5af-3540895ad5f9",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-03T00:17:58.565208Z",
"modified": "2024-08-03T00:17:58.565208Z",
"name": "CVE-2024-22278",
"description": "Incorrect user permission validation in Harbor <v2.9.5 and Harbor <v2.10.3 allows authenticated users to modify configurations.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-22278"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--523140da-9bb9-4eaf-8a5b-0c59d4d23953",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--4311e374-4454-47ec-8da5-a5cb2fb501c3",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-03T00:17:58.723108Z",
"modified": "2024-08-03T00:17:58.723108Z",
"name": "CVE-2024-38482",
"description": "CloudLink, versions 7.1.x and 8.x, contain an Improper check or handling of Exceptional Conditions Vulnerability in Cluster Component. A highly privileged malicious user with remote access could potentially exploit this vulnerability, leading to execute unauthorized actions and retrieve sensitive information from the database.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-38482"
}
]
}
]
}
Loading

0 comments on commit 57180f3

Please sign in to comment.