Skip to content

Commit

Permalink
generated content from 2024-11-14
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Nov 14, 2024
1 parent f21e117 commit 67e1777
Show file tree
Hide file tree
Showing 233 changed files with 5,336 additions and 0 deletions.
232 changes: 232 additions & 0 deletions mapping.csv

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--4807e4f8-8769-4b11-9e93-ee8584ad58e7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--00fd3e2e-9675-4eb9-af39-2440047b8264",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-14T00:20:35.646491Z",
"modified": "2024-11-14T00:20:35.646491Z",
"name": "CVE-2024-50970",
"description": "A SQL injection vulnerability in orderview1.php of Itsourcecode Online Furniture Shopping Project 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-50970"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9409c514-b8a9-4b4d-8af6-37b6a9927a93",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--016f4cfa-00c7-48e6-9bfc-0adf32e3b189",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-14T00:20:35.104804Z",
"modified": "2024-11-14T00:20:35.104804Z",
"name": "CVE-2024-48900",
"description": "A vulnerability was found in Moodle. Additional checks are required to ensure users with permission to view badge recipients can only access lists of those they are intended to have access to.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-48900"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d876a926-f6cf-44a2-89d4-c9476957e367",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--01e09050-c6e1-47a7-98a9-f0a9b6ce303b",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-14T00:20:35.8841Z",
"modified": "2024-11-14T00:20:35.8841Z",
"name": "CVE-2024-34023",
"description": "Untrusted pointer dereference in some Intel(R) Graphics Drivers may allow an authenticated user to potentially enable escalation of privilege via local access.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-34023"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--0673b760-a6aa-449b-895d-b642433436a9",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--04746481-2d83-47dd-bbbb-b11089e1bd6b",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-14T00:20:35.916089Z",
"modified": "2024-11-14T00:20:35.916089Z",
"name": "CVE-2024-34164",
"description": "Uncontrolled search path element in some Intel(R) MAS software before version 2.5 may allow an authenticated user to potentially enable escalation of privilege via local access.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-34164"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d1258930-869c-4a9b-8f2c-ed3904154dba",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--04b36a0a-2e98-4464-a495-40e50bf34728",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-14T00:20:35.48485Z",
"modified": "2024-11-14T00:20:35.48485Z",
"name": "CVE-2024-9477",
"description": "** UNSUPPPORTED WHEN ASSIGNED ** Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in AirTies Air4443 Firmware allows Cross-Site Scripting (XSS).This issue affects Air4443 Firmware: through 14102024.\n\n\nNOTE: The vendor was contacted and it was learned that the product classified as End-of-Life and End-of-Support.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9477"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--cc17c94f-2d1a-4be9-86e7-699eee19185c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0530b3e9-eb4a-42df-9d0e-8e45d385901c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-14T00:20:36.642813Z",
"modified": "2024-11-14T00:20:36.642813Z",
"name": "CVE-2024-37027",
"description": "Improper Input validation in some Intel(R) VTune(TM) Profiler software before version 2024.2.0 may allow an authenticated user to potentially enable denial of service via local access.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-37027"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--61ca8d49-43f8-4096-86a2-0c8685aa518a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0658444c-2ee6-4e56-ac97-9836c46884be",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-14T00:20:34.986687Z",
"modified": "2024-11-14T00:20:34.986687Z",
"name": "CVE-2024-24985",
"description": "Exposure of resource to wrong sphere in some Intel(R) processors with Intel(R) ACTM may allow a privileged user to potentially enable escalation of privilege via local access.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-24985"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--edc53224-f8ba-4fb1-afd8-f103b7b1277b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0719aac7-563c-4ea9-ab61-7d4afdff9c19",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-14T00:20:35.935541Z",
"modified": "2024-11-14T00:20:35.935541Z",
"name": "CVE-2024-34782",
"description": "SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote authenticated attacker with admin privileges to achieve remote code execution.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-34782"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--92cbe329-c934-4d48-9dc9-94673717c39c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--07bac0b0-869b-4a0f-8a05-fc88580eba6f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-14T00:20:37.208773Z",
"modified": "2024-11-14T00:20:37.208773Z",
"name": "CVE-2024-32485",
"description": "Improper Input Validation in some Intel(R) VROC software before version 8.6.0.2003 may allow an authenticated user to potentially enable denial of service via local access.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-32485"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e73569cc-1dbf-4041-a4fa-623db8ddaadb",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0987bdf9-fc8a-44d9-bffe-e9319c68b46e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-14T00:20:37.166142Z",
"modified": "2024-11-14T00:20:37.166142Z",
"name": "CVE-2024-42834",
"description": "A stored cross-site scripting (XSS) vulnerability in the Create Customer API in Incognito Service Activation Center (SAC) UI v14.11 allows authenticated attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the lastName parameter.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-42834"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--397c3e13-ecfb-4c4b-91e2-43e1598650c3",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0aaa56e6-1f30-44a1-86d0-71fe3e824d5b",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-14T00:20:35.45198Z",
"modified": "2024-11-14T00:20:35.45198Z",
"name": "CVE-2024-9578",
"description": "The Hide Links plugin for WordPress is vulnerable to unauthorized shortcode execution due to do_shortcode being hooked through the comment_text filter in all versions up to and including 1.4.2. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes available on the target site.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9578"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a4e584c0-d8f8-494f-a4bd-c2ac072aa2ba",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0c233897-db41-4456-9d19-3bfe57a36957",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-14T00:20:35.747179Z",
"modified": "2024-11-14T00:20:35.747179Z",
"name": "CVE-2024-7295",
"description": "In Progress® Telerik® Report Server versions prior to 2024 Q4 (10.3.24.1112), the encryption of local asset data used an older algorithm which may allow a sophisticated actor to decrypt this information.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-7295"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--507f1c2b-c8ea-45dc-9c9d-ad9a73e5f05b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0d45415f-a00b-4db9-af86-36aa4b25b9d6",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-14T00:20:37.674726Z",
"modified": "2024-11-14T00:20:37.674726Z",
"name": "CVE-2024-43083",
"description": "In validate of WifiConfigurationUtil.java , there is a possible persistent denial of service due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-43083"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--351a4ba4-8ab8-46d9-a1b4-f82ad86758f3",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0d4e5dc5-fc46-4600-a17c-30751ba35760",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-14T00:20:36.131191Z",
"modified": "2024-11-14T00:20:36.131191Z",
"name": "CVE-2024-8937",
"description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists that could\ncause a potential arbitrary code execution after a successful Man-In-The Middle attack followed by sending a\ncrafted Modbus function call to tamper with memory area involved in the authentication process.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8937"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--090c94a6-b3bd-425d-af29-27c39d2ea6eb",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--13549501-5dbe-47f7-9a64-598a58ba5693",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-14T00:20:35.43808Z",
"modified": "2024-11-14T00:20:35.43808Z",
"name": "CVE-2024-9614",
"description": "The Constant Contact Forms by MailMunch plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.1.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9614"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--2f80e019-6dbd-44f6-bfed-758b4a898179",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--135d74fa-2bdd-4818-ad9a-6261486fc253",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-14T00:20:41.240761Z",
"modified": "2024-11-14T00:20:41.240761Z",
"name": "CVE-2022-45157",
"description": "A vulnerability has been identified in the way that Rancher stores vSphere's CPI (Cloud Provider Interface) and CSI (Container Storage Interface) credentials used to deploy clusters through the vSphere cloud provider. This issue leads to the vSphere CPI and CSI passwords being stored in a plaintext object inside Rancher. This vulnerability is only applicable to users that deploy clusters in vSphere environments.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2022-45157"
}
]
}
]
}
Loading

0 comments on commit 67e1777

Please sign in to comment.