Skip to content

Commit

Permalink
generated content from 2024-11-28
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Nov 28, 2024
1 parent c88f461 commit 79b47fe
Show file tree
Hide file tree
Showing 83 changed files with 1,886 additions and 0 deletions.
82 changes: 82 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -257967,3 +257967,85 @@ vulnerability,CVE-2018-11922,vulnerability--27551bf0-7896-4319-9c8f-65e8b12aa002
vulnerability,CVE-2018-11816,vulnerability--71cca58d-14be-49fd-826c-a535ce46f4ce
vulnerability,CVE-2018-11952,vulnerability--bacd47e9-4480-4662-be2f-8f1a3a2e2130
vulnerability,CVE-2018-5852,vulnerability--0527e73a-1223-4e9d-99b5-7c4a7696b140
vulnerability,CVE-2017-13323,vulnerability--7d342426-481d-49a0-8c8b-cae26fd73575
vulnerability,CVE-2017-13320,vulnerability--74edbbff-ebc7-4730-ae8f-8e7cc3d3ca4e
vulnerability,CVE-2017-13316,vulnerability--c921f471-2859-4526-9634-fb5558023887
vulnerability,CVE-2017-13319,vulnerability--6299f518-8ed6-4697-9962-68192ddf4c53
vulnerability,CVE-2017-13321,vulnerability--c12f6dbf-09e0-4d6f-89d9-a95bd00c5bae
vulnerability,CVE-2024-51228,vulnerability--f1b482ba-e0e6-432c-8c78-d7ba768bc0e3
vulnerability,CVE-2024-52951,vulnerability--472c7979-c34b-4464-b2f5-1f79ad51e426
vulnerability,CVE-2024-52959,vulnerability--e146976e-298f-4fb7-86e7-c70e4029215e
vulnerability,CVE-2024-52958,vulnerability--cda702ba-dcdf-4981-b4a8-11f627d4c30e
vulnerability,CVE-2024-52323,vulnerability--b48df4a2-f180-42e4-bb3d-207f77be7747
vulnerability,CVE-2024-10521,vulnerability--68376059-d804-4e29-9af0-a7a459f23f41
vulnerability,CVE-2024-10580,vulnerability--b4fe717a-fe99-4e73-b9ec-88c17b6fbb53
vulnerability,CVE-2024-10175,vulnerability--472eeaff-b472-4bb5-a60c-b8f33e5c7408
vulnerability,CVE-2024-10895,vulnerability--0bc90b2d-f9cb-4814-b54a-7197c8481a54
vulnerability,CVE-2024-9369,vulnerability--f9cd0b6d-51bb-4271-bcc6-299acd378c91
vulnerability,CVE-2024-47181,vulnerability--bdccf974-fa41-45d4-b6c8-38835524cfd5
vulnerability,CVE-2024-7025,vulnerability--a46cb72a-5ed7-4878-89d1-74fd95bf885c
vulnerability,CVE-2024-11820,vulnerability--c70e8a2b-1f77-45ac-98fb-488c39e661ee
vulnerability,CVE-2024-11083,vulnerability--1d551232-3259-44e1-90e9-bf09d8567c2a
vulnerability,CVE-2024-11794,vulnerability--7d776514-4f4b-4a67-9511-0131430812ec
vulnerability,CVE-2024-11797,vulnerability--00c35ab6-32ff-41bb-ac41-957c80fafb44
vulnerability,CVE-2024-11795,vulnerability--626da8ed-17fe-4a31-b580-6b9592c5784d
vulnerability,CVE-2024-11796,vulnerability--8f45a5ac-48ce-4685-82cb-d63a0faecaaa
vulnerability,CVE-2024-11667,vulnerability--1bfa18ad-2119-4e03-a42c-69b727fbb9fa
vulnerability,CVE-2024-11792,vulnerability--d141d322-85b4-434c-b639-5e30a6037e5f
vulnerability,CVE-2024-11219,vulnerability--c5dce56b-f603-4ce2-a5d2-7624d14ab915
vulnerability,CVE-2024-11803,vulnerability--1cb5afa4-693f-4c02-b5b5-9d411776f464
vulnerability,CVE-2024-11791,vulnerability--b05f5b73-fcad-4625-89ae-6077e5423c88
vulnerability,CVE-2024-11860,vulnerability--5524bdc8-98fc-4c73-aa18-057da2f56c2f
vulnerability,CVE-2024-11799,vulnerability--557811a3-1c94-4088-9ec7-32502d5eb0e7
vulnerability,CVE-2024-11801,vulnerability--9f5b98c5-0e49-4f5a-b2e2-eac391bb3309
vulnerability,CVE-2024-11025,vulnerability--7411eca4-8661-4d10-a3a3-56cdba58ca3c
vulnerability,CVE-2024-11862,vulnerability--784f9247-f3ec-43ff-87f2-df5fa5b53d76
vulnerability,CVE-2024-11800,vulnerability--7847118c-0c9e-420a-97c1-03c1873839c5
vulnerability,CVE-2024-11790,vulnerability--20cd4d93-6a34-4cfc-af30-f09d1d5720ed
vulnerability,CVE-2024-11789,vulnerability--04d201dc-51bf-4d33-a9bd-22d32751daca
vulnerability,CVE-2024-11802,vulnerability--01fbf668-6cb2-4981-bc36-66d124ef2bbe
vulnerability,CVE-2024-11787,vulnerability--9548d55e-2a06-4bd5-a7f9-66d70e43b085
vulnerability,CVE-2024-11798,vulnerability--f85f2243-44b7-4d4e-862e-e8520150d2de
vulnerability,CVE-2024-11793,vulnerability--4c13f497-1b06-45ab-b19b-749e81eab725
vulnerability,CVE-2024-11009,vulnerability--01f7f395-e755-455f-b946-ed96b274cce7
vulnerability,CVE-2024-11933,vulnerability--d8d73177-232a-4baf-987b-0ee78a5322a6
vulnerability,CVE-2024-53859,vulnerability--a0d85dbd-036f-4097-9f00-5f0ecae10e82
vulnerability,CVE-2024-53676,vulnerability--d7dc560e-f6c5-4fcb-a6a7-94e650f8992d
vulnerability,CVE-2024-53604,vulnerability--27503a13-b05d-4365-895a-df51f6d8a81b
vulnerability,CVE-2024-53264,vulnerability--21db8295-fb27-43dd-ac3d-6cce87ed39f7
vulnerability,CVE-2024-53603,vulnerability--2a41f16e-454b-459c-ab82-64b5979bd9ee
vulnerability,CVE-2024-53858,vulnerability--ad322f53-8555-4ea4-b12e-cef3c180794c
vulnerability,CVE-2024-53920,vulnerability--390f8f0e-b58a-4a09-8119-e08107c9f6f3
vulnerability,CVE-2024-53860,vulnerability--099d0cb4-2787-4f1a-8140-c310a2785262
vulnerability,CVE-2024-53260,vulnerability--f731422a-a6a4-40f4-94b1-45fc53e759b7
vulnerability,CVE-2024-53855,vulnerability--aba36d51-8816-4cb8-9676-a5b0437072d3
vulnerability,CVE-2024-53635,vulnerability--2c0eceb9-d831-425e-887c-4beeee09e1ba
vulnerability,CVE-2024-31976,vulnerability--f6f94cd2-191e-40e7-9438-c4ca09bb22be
vulnerability,CVE-2024-41126,vulnerability--a128f9eb-e175-4a58-9abc-062edb423b75
vulnerability,CVE-2024-41125,vulnerability--c19f4223-e91a-4e78-846a-3af4d1cad018
vulnerability,CVE-2024-21703,vulnerability--5823fbc4-2d2c-4d09-b810-f62d75fbfdd7
vulnerability,CVE-2024-37816,vulnerability--bd1f1b49-3c30-48ab-a066-b55a9d3e433f
vulnerability,CVE-2024-54004,vulnerability--8e65a3a0-c406-4fad-87ba-641b7738faa8
vulnerability,CVE-2024-54003,vulnerability--53d6f79e-d1e8-4012-bb8a-b4a970006f3a
vulnerability,CVE-2024-36468,vulnerability--859b492d-91c7-4c0a-ace7-21697a228168
vulnerability,CVE-2024-36464,vulnerability--026cc5ec-db41-461d-8590-ea2070fabda0
vulnerability,CVE-2024-36467,vulnerability--c13e5bdd-4218-4126-a532-282ab2670afc
vulnerability,CVE-2024-46054,vulnerability--4851dfd8-16d5-4085-9f1a-f65df6062a19
vulnerability,CVE-2024-46055,vulnerability--8c9bcdef-f26d-4f4f-b210-9c88bb56e8fe
vulnerability,CVE-2024-42331,vulnerability--02a25eb2-3b04-4d14-bba8-587b0022a039
vulnerability,CVE-2024-42330,vulnerability--a50c7d0a-29db-41f5-a045-d3c18fe6f2b4
vulnerability,CVE-2024-42333,vulnerability--bfdfa935-fb3a-4d99-b03c-bd6716e2446e
vulnerability,CVE-2024-42326,vulnerability--8812062e-8f87-4f6f-838d-cc6685a00277
vulnerability,CVE-2024-42327,vulnerability--042f57e3-e069-4f8d-8f02-cfee306827e2
vulnerability,CVE-2024-42329,vulnerability--931942fc-9732-4166-a944-b5149324081a
vulnerability,CVE-2024-42328,vulnerability--8ff5b1d2-c077-4d20-878a-cc02637013c2
vulnerability,CVE-2024-42332,vulnerability--541c9341-7af1-4159-8e35-a758e3f8d1e2
vulnerability,CVE-2024-5921,vulnerability--92d1a64c-8bf9-4ec1-acf1-2bba735a51bd
vulnerability,CVE-2023-29001,vulnerability--048cc473-e394-466a-8867-0d184dd4b045
vulnerability,CVE-2018-9350,vulnerability--5c7cce46-a825-4898-8d90-ebc33341aa83
vulnerability,CVE-2018-9374,vulnerability--3539ebbb-12f3-48f9-b441-ab7e60011664
vulnerability,CVE-2018-9353,vulnerability--7b6eb8f4-b9a9-433b-adf9-29972f32be92
vulnerability,CVE-2018-9354,vulnerability--c078bc3d-7e52-41d6-a2b2-7d4dc4cef2d3
vulnerability,CVE-2018-9349,vulnerability--408bb6bf-9166-4285-be22-3576564f60f7
vulnerability,CVE-2018-9352,vulnerability--2f847724-c776-47ff-9c3a-095c08747a4f
vulnerability,CVE-2018-9351,vulnerability--b61b3680-424b-4c89-b6a2-a268ba4a73b0
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6f4b4383-f0c5-45a4-b518-d7227e8fd2f0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--00c35ab6-32ff-41bb-ac41-957c80fafb44",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-28T00:22:18.308596Z",
"modified": "2024-11-28T00:22:18.308596Z",
"name": "CVE-2024-11797",
"description": "Fuji Electric Monitouch V-SFT V8 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of V8 files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24662.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11797"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9cf0e96f-3e45-4f9b-a55a-b190ede79516",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--01f7f395-e755-455f-b946-ed96b274cce7",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-28T00:22:18.361015Z",
"modified": "2024-11-28T00:22:18.361015Z",
"name": "CVE-2024-11009",
"description": "The Internal Linking for SEO traffic & Ranking – Auto internal links (100% automatic) plugin for WordPress is vulnerable to time-based SQL Injection via the ‘post_id’ parameter in all versions up to, and including, 1.2.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11009"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--1854f5ad-436d-4658-856a-03f3d6f39f12",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--01fbf668-6cb2-4981-bc36-66d124ef2bbe",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-28T00:22:18.348385Z",
"modified": "2024-11-28T00:22:18.348385Z",
"name": "CVE-2024-11802",
"description": "Fuji Electric Tellus Lite V-Simulator 5 V8 File Parsing Stack-Based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of V8 files in the V-Simulator 5 component. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24770.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11802"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3d12f80d-3ec6-4fb8-ae0e-fe4f61b16dd7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--026cc5ec-db41-461d-8590-ea2070fabda0",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-28T00:22:19.479719Z",
"modified": "2024-11-28T00:22:19.479719Z",
"name": "CVE-2024-36464",
"description": "When exporting media types, the password is exported in the YAML in plain text. This appears to be a best practices type issue and may have no actual impact. The user would need to have permissions to access the media types and therefore would be expected to have access to these passwords.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-36464"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--89f1c270-f1bc-4820-bc13-eac6a612f24e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--02a25eb2-3b04-4d14-bba8-587b0022a039",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-28T00:22:19.585029Z",
"modified": "2024-11-28T00:22:19.585029Z",
"name": "CVE-2024-42331",
"description": "In the src/libs/zbxembed/browser.c file, the es_browser_ctor method retrieves a heap pointer from the Duktape JavaScript engine. This heap pointer is subsequently utilized by the browser_push_error method in the src/libs/zbxembed/browser_error.c file. A use-after-free bug can occur at this stage if the wd->browser heap pointer is freed by garbage collection.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-42331"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--888e0411-2c8b-4374-92bc-6ba266b30f1d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--042f57e3-e069-4f8d-8f02-cfee306827e2",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-28T00:22:19.628705Z",
"modified": "2024-11-28T00:22:19.628705Z",
"name": "CVE-2024-42327",
"description": "A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability. An SQLi exists in the CUser class in the addRelatedObjects function, this function is being called from the CUser.get function which is available for every user who has API access.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-42327"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--4c56d016-5ef5-4002-a710-6ad8029afc0a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--048cc473-e394-466a-8867-0d184dd4b045",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-28T00:22:29.379901Z",
"modified": "2024-11-28T00:22:29.379901Z",
"name": "CVE-2023-29001",
"description": "Contiki-NG is an open-source, cross-platform operating system for IoT devices. The Contiki-NG operating system processes source routing headers (SRH) in its two alternative RPL protocol implementations. The IPv6 implementation uses the results of this processing to determine whether an incoming packet should be forwarded to another host. Because of missing validation of the resulting next-hop address, an uncontrolled recursion may occur in the tcpip_ipv6_output function in the os/net/ipv6/tcpip.c module when receiving a packet with a next-hop address that is a local address. Attackers that have the possibility to send IPv6 packets to the Contiki-NG host can therefore trigger deeply nested recursive calls, which can cause a stack overflow. The vulnerability has not been patched in the current release of Contiki-NG, but is expected to be patched in the next release. The problem can be fixed by applying the patch in Contiki-NG pull request #2264. Users are advised to either apply the patch manually or to wait for the next release. There are no known workarounds for this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-29001"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6b86eefc-7a2f-482c-952a-3d046a4789cb",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--04d201dc-51bf-4d33-a9bd-22d32751daca",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-28T00:22:18.346492Z",
"modified": "2024-11-28T00:22:18.346492Z",
"name": "CVE-2024-11789",
"description": "Fuji Electric Monitouch V-SFT V10 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of V10 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24448.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11789"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7dcf522c-9f0b-4612-ab88-0d9f5f2a6175",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--099d0cb4-2787-4f1a-8140-c310a2785262",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-28T00:22:18.626746Z",
"modified": "2024-11-28T00:22:18.626746Z",
"name": "CVE-2024-53860",
"description": "sp-php-email-handler is a PHP package for handling contact form submissions. Messages sent using this script are vulnerable to abuse, as the script allows anybody to specify arbitrary email recipients and include user-provided content in confirmation emails. This could enable malicious actors to use your server to send spam, phishing emails, or other malicious content, potentially damaging your domain's reputation and leading to blacklisting by email providers. Patched in version 1.0.0 by removing user-provided content from confirmation emails. All pre-release versions (alpha and beta) are vulnerable to this issue and should not be used. There are no workarounds for this issue. Users must upgrade to version 1.0.0 to mitigate the vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-53860"
}
]
}
]
}
Loading

0 comments on commit 79b47fe

Please sign in to comment.