Skip to content

Commit

Permalink
generated content from 2024-10-08
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Oct 8, 2024
1 parent 16d5bd9 commit b60e7d2
Show file tree
Hide file tree
Showing 109 changed files with 2,484 additions and 0 deletions.
108 changes: 108 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -251064,3 +251064,111 @@ vulnerability,CVE-2024-47342,vulnerability--1b6ad094-0ede-428a-82ba-366ceee4ba1b
vulnerability,CVE-2024-47327,vulnerability--e187abce-1460-4e94-8a0f-f4489d44d24c
vulnerability,CVE-2024-47352,vulnerability--a10517dd-6e20-4ea2-9cf6-3014cfb48d3a
vulnerability,CVE-2024-47339,vulnerability--519f7658-c32b-47e9-97f5-b7a16ca8deea
vulnerability,CVE-2024-45873,vulnerability--2290c864-9fc1-457c-b9a3-3eb2d4307292
vulnerability,CVE-2024-45293,vulnerability--2afb9a5e-ea03-4267-8a22-a20797c8598b
vulnerability,CVE-2024-45060,vulnerability--70d406a5-c352-41e6-a316-a3e981bdcdfe
vulnerability,CVE-2024-45933,vulnerability--61fed9ec-7415-444e-ad81-79fcf9f6f2b4
vulnerability,CVE-2024-45051,vulnerability--09fe3bdb-9a54-4e15-a35f-1358ccd2cdce
vulnerability,CVE-2024-45919,vulnerability--cfe5403c-dcb9-4e57-a6b9-1ac392b5565a
vulnerability,CVE-2024-45932,vulnerability--39e0704c-6879-43f7-8be7-f673655dcb18
vulnerability,CVE-2024-45297,vulnerability--3f94cb6b-b9c5-46bc-9bf1-6f0393ae0643
vulnerability,CVE-2024-45292,vulnerability--ce5d6de7-b760-4037-885e-89abdc1d0166
vulnerability,CVE-2024-45290,vulnerability--053b6985-321b-41d8-bdb2-0060ccc5e8d2
vulnerability,CVE-2024-45894,vulnerability--810574e7-8f85-4016-84d6-3041d4112323
vulnerability,CVE-2024-45153,vulnerability--259cf6c8-0be1-4c0c-a08f-587d92a70b40
vulnerability,CVE-2024-45291,vulnerability--1042f9d4-829e-4d85-b1e1-ad6a9f5605fa
vulnerability,CVE-2024-45874,vulnerability--cc339f92-6815-4aeb-9b2f-e5d10cf1cb15
vulnerability,CVE-2024-9566,vulnerability--d6dc205c-09b5-41d2-976d-10d8fac4982c
vulnerability,CVE-2024-9576,vulnerability--84fb243a-e570-4322-bfb5-314d0fc90cd0
vulnerability,CVE-2024-9567,vulnerability--073ee2fa-f72a-4fea-b6a9-a221e39669ab
vulnerability,CVE-2024-9565,vulnerability--d17fc2ba-1091-42d1-863b-d225b4743583
vulnerability,CVE-2024-9569,vulnerability--686ce635-f690-4360-aaf5-8abbbde84ab4
vulnerability,CVE-2024-9572,vulnerability--cbdab172-fec5-4e97-9e47-13aec442b33d
vulnerability,CVE-2024-9573,vulnerability--8597ee95-6463-472d-be8b-b10e0bb5d6f6
vulnerability,CVE-2024-9571,vulnerability--6d30b9de-94ef-491e-9845-239b66a82575
vulnerability,CVE-2024-9574,vulnerability--ec00cb9e-c2f0-4c1a-9f09-633484979674
vulnerability,CVE-2024-9570,vulnerability--682fc019-c0be-4182-ad71-4df069465dce
vulnerability,CVE-2024-9564,vulnerability--572e6c53-59ca-4ada-8125-fec3e37956a8
vulnerability,CVE-2024-9568,vulnerability--6147e57b-113d-48f3-9497-a59e7a8e1e42
vulnerability,CVE-2024-47968,vulnerability--688b4102-4a46-41be-ae69-9c2c4130f66f
vulnerability,CVE-2024-47558,vulnerability--74ba7c74-72ed-474a-876a-0e6a3c40a015
vulnerability,CVE-2024-47781,vulnerability--b42082f9-ff85-4680-a504-812d321f777d
vulnerability,CVE-2024-47973,vulnerability--dff8e74b-95b2-4471-a473-4a5d037d727e
vulnerability,CVE-2024-47557,vulnerability--bafcfc19-9290-4168-9c12-d6cf7a8d289d
vulnerability,CVE-2024-47559,vulnerability--f81c0dab-1904-47ce-9dff-308f97539be6
vulnerability,CVE-2024-47814,vulnerability--7633eee5-565b-4139-a5a3-91917e111943
vulnerability,CVE-2024-47971,vulnerability--9c102962-1bea-47ca-810b-67a99cacce0e
vulnerability,CVE-2024-47079,vulnerability--d678eb92-77fe-475f-b58a-2fc8b515c3ba
vulnerability,CVE-2024-47972,vulnerability--c2a88a1e-8c16-46d3-b52c-fa6bec03d748
vulnerability,CVE-2024-47967,vulnerability--e9555de0-f42d-41b9-a192-8ed5a798e284
vulnerability,CVE-2024-47610,vulnerability--a489275a-5fd6-46ae-8cbc-5c0bdf7ef540
vulnerability,CVE-2024-47344,vulnerability--ea3b2f9d-c04a-4b23-88f8-25294a46eca1
vulnerability,CVE-2024-47556,vulnerability--290bab71-760d-46ca-af2c-08c6c7ccded1
vulnerability,CVE-2024-47772,vulnerability--1a3e5c37-f4c0-4cd3-ad42-58a9b08f3a59
vulnerability,CVE-2024-47976,vulnerability--508ed748-e8f9-4649-81a0-732491494962
vulnerability,CVE-2024-47817,vulnerability--431c7856-5905-48a4-81d8-2dfc9af46830
vulnerability,CVE-2024-47335,vulnerability--a221efd7-b878-4ff7-92ac-f355632aab05
vulnerability,CVE-2024-47975,vulnerability--31753c48-19bc-48e4-a082-89175c1cf4aa
vulnerability,CVE-2024-47969,vulnerability--8c8cdb20-dc66-434a-bb8f-f51b41817cd8
vulnerability,CVE-2024-47818,vulnerability--89f111aa-b9da-416d-aca1-06c45bf00d05
vulnerability,CVE-2024-47555,vulnerability--d6d39503-cc55-4767-8bfa-6d4925085b71
vulnerability,CVE-2024-47974,vulnerability--48e49591-dd2c-4411-a1e6-58c88e649260
vulnerability,CVE-2024-47782,vulnerability--b1b3061b-b837-4824-bfa7-d92455e6e571
vulnerability,CVE-2024-44068,vulnerability--017bebce-b7fe-42d0-8e2f-1d3933848e91
vulnerability,CVE-2024-44674,vulnerability--881ada79-dc03-461d-a08e-d40f32e70b0d
vulnerability,CVE-2024-33065,vulnerability--76fc583d-8669-4379-8593-50fb75ad6d1b
vulnerability,CVE-2024-33070,vulnerability--d24c7798-296c-4fb0-8995-9095ae22ec16
vulnerability,CVE-2024-33066,vulnerability--baddbe05-c786-45e0-817d-5f7895933d19
vulnerability,CVE-2024-33049,vulnerability--2f081804-fdcc-4387-9bd2-57d3940d08da
vulnerability,CVE-2024-33064,vulnerability--5227fcea-dce6-4acb-84d3-fc99672e5d21
vulnerability,CVE-2024-33071,vulnerability--5c8764b0-2dcb-48e2-a187-81bd5a995fdd
vulnerability,CVE-2024-33073,vulnerability--7d2ed6a5-1039-4bba-a2d7-fe88d2c3075f
vulnerability,CVE-2024-33069,vulnerability--0728d000-6810-4890-b62a-95c3f7713e67
vulnerability,CVE-2024-38425,vulnerability--49eef9b8-bf7a-452f-87d1-5e514442f36e
vulnerability,CVE-2024-38397,vulnerability--d7f21ab1-399f-4eb3-9d3e-af9d3ff2d35a
vulnerability,CVE-2024-38399,vulnerability--8fb2bc1d-49c8-402f-acf9-8ba11c0c2c73
vulnerability,CVE-2024-31227,vulnerability--4710016c-f31b-45f5-b25e-ad620d926c4f
vulnerability,CVE-2024-31228,vulnerability--2761cbfe-5110-4ff6-bcd0-dd4ef55ece4c
vulnerability,CVE-2024-31449,vulnerability--b13ea625-c5ce-4935-9bcd-521d0f1c7639
vulnerability,CVE-2024-21455,vulnerability--a16afd5f-a0c6-4df7-87c0-f8dd166524e3
vulnerability,CVE-2024-20094,vulnerability--6ed57efe-0f83-4151-a8e5-fbb335d376f3
vulnerability,CVE-2024-20092,vulnerability--486305a5-e2ed-4751-9c60-a7f73eb58e04
vulnerability,CVE-2024-20096,vulnerability--7d5989ef-cc7f-4c3f-8c54-9c6d197a576a
vulnerability,CVE-2024-20099,vulnerability--fd844f0a-ef76-470e-9c78-4f2fe27c1eec
vulnerability,CVE-2024-20098,vulnerability--f8b4e837-d81e-4a8e-8345-3d03130dcab7
vulnerability,CVE-2024-20091,vulnerability--8a61809a-9e77-4116-8b87-8127d7972c1e
vulnerability,CVE-2024-20095,vulnerability--b3a5a903-a67c-4416-aa0a-e650c2bb6ba3
vulnerability,CVE-2024-20090,vulnerability--111d7178-e333-4907-84b6-93bd3e140e57
vulnerability,CVE-2024-20101,vulnerability--0f4134c8-5188-406c-bcf0-e397662c4e79
vulnerability,CVE-2024-20097,vulnerability--0cf3cf97-a1fb-4b5f-8713-8b74d81c7578
vulnerability,CVE-2024-20103,vulnerability--c0c8b4cf-3dd3-4c73-8763-2d06abce2879
vulnerability,CVE-2024-20093,vulnerability--dc3b8a20-31f3-4fbd-bcc7-3cad9816c074
vulnerability,CVE-2024-20102,vulnerability--edba0f99-4436-4fb3-8af2-7ec5d4ada9a3
vulnerability,CVE-2024-20100,vulnerability--f33323bf-dbb8-42e0-bd7c-99e093d76c66
vulnerability,CVE-2024-23374,vulnerability--7ba83fd4-3410-4a79-b4f0-5e43a4349e11
vulnerability,CVE-2024-23370,vulnerability--c4e47816-a8fe-48a5-b1b8-9f9ebbc430aa
vulnerability,CVE-2024-23376,vulnerability--e1911a5b-3379-4725-bea9-846590b00b5a
vulnerability,CVE-2024-23379,vulnerability--b89c73f7-f100-457d-a1cf-3169c6c7db4c
vulnerability,CVE-2024-23369,vulnerability--3f27e4b2-6de2-4e31-8559-f04fce208b79
vulnerability,CVE-2024-23378,vulnerability--deda5bc3-ef17-4b61-bc96-211d2a05238f
vulnerability,CVE-2024-23375,vulnerability--7d2da7d1-862c-4fd1-8df5-d2a45db7402e
vulnerability,CVE-2024-46325,vulnerability--ad77334d-8834-4611-9eae-b73b2d592bc2
vulnerability,CVE-2024-46278,vulnerability--0b5ecd6e-d45a-4d18-a42e-a7acd38f2f64
vulnerability,CVE-2024-46041,vulnerability--9fd3c846-eafc-4dbb-aa24-a33ebd582608
vulnerability,CVE-2024-46040,vulnerability--f468a305-4460-4e56-bfbb-31cf2978b336
vulnerability,CVE-2024-46446,vulnerability--ab9b4c85-cacf-4755-a3ca-063b95263ae6
vulnerability,CVE-2024-46300,vulnerability--ad6f973f-ee2a-4f6d-bc50-26b9528f29e9
vulnerability,CVE-2024-46076,vulnerability--ae56355c-92ac-4bb8-a805-e92f695d02a2
vulnerability,CVE-2024-42027,vulnerability--4131cf07-0000-4df1-9cef-e77edf620a73
vulnerability,CVE-2024-42831,vulnerability--748264ca-0883-42dc-ade4-a335069b0b43
vulnerability,CVE-2024-28709,vulnerability--dd2003e3-ded4-4d0e-a26e-c3881d272305
vulnerability,CVE-2024-28710,vulnerability--8162c684-bc8c-4548-9233-201c310233c3
vulnerability,CVE-2024-27458,vulnerability--01eeb233-d1b9-45b6-8699-729e5c89ae4c
vulnerability,CVE-2024-43047,vulnerability--ffc79d7d-b51b-4d9f-924e-7fc12fcba946
vulnerability,CVE-2024-43789,vulnerability--e693f7b2-4dbf-4ed9-a7b3-48d1aef2ff50
vulnerability,CVE-2024-43363,vulnerability--41c7de25-f203-4e66-8020-029043c858ec
vulnerability,CVE-2024-43364,vulnerability--e9ecfb48-ed97-4299-8ed9-a3398b4fa8ef
vulnerability,CVE-2024-43362,vulnerability--5800001c-97da-44c1-b595-e40e8dab4e43
vulnerability,CVE-2024-43365,vulnerability--f85467e1-b171-4992-ace1-8d026a63b151
vulnerability,CVE-2023-6361,vulnerability--8afdd32c-b191-4434-b553-d89a857b8fd7
vulnerability,CVE-2023-6362,vulnerability--543dead3-db48-42d3-bdcd-3f38427ce6a0
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--fc7fe3a3-3e6c-44e0-96b2-63482af74d5d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--017bebce-b7fe-42d0-8e2f-1d3933848e91",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-08T00:20:12.634939Z",
"modified": "2024-10-08T00:20:12.634939Z",
"name": "CVE-2024-44068",
"description": "An issue was discovered in the m2m scaler driver in Samsung Mobile Processor and Wearable Processor Exynos 9820, 9825, 980, 990, 850,and W920. A Use-After-Free in the mobile processor leads to privilege escalation.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-44068"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--39b11bb6-10cd-4cad-a7b7-dba8627ee5cb",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--01eeb233-d1b9-45b6-8699-729e5c89ae4c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-08T00:20:14.1773Z",
"modified": "2024-10-08T00:20:14.1773Z",
"name": "CVE-2024-27458",
"description": "A potential security vulnerability has been identified in the HP Hotkey Support software, which might allow local escalation of privilege. HP is releasing mitigation for the potential vulnerability. Customers using HP Programmable Key are recommended to update HP Hotkey Support.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-27458"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--268a22d9-5234-40f9-8573-e5b26f9cdfd4",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--053b6985-321b-41d8-bdb2-0060ccc5e8d2",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-08T00:20:12.152163Z",
"modified": "2024-10-08T00:20:12.152163Z",
"name": "CVE-2024-45290",
"description": "PHPSpreadsheet is a pure PHP library for reading and writing spreadsheet files. It's possible for an attacker to construct an XLSX file which links media from external URLs. When opening the XLSX file, PhpSpreadsheet retrieves the image size and type by reading the file contents, if the provided path is a URL. By using specially crafted `php://filter` URLs an attacker can leak the contents of any file or URL. Note that this vulnerability is different from GHSA-w9xv-qf98-ccq4, and resides in a different component. An attacker can access any file on the server, or leak information form arbitrary URLs, potentially exposing sensitive information such as AWS IAM credentials. This issue has been addressed in release versions 1.29.2, 2.1.1, and 2.3.0. All users are advised to upgrade. There are no known workarounds for this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-45290"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3235cc8b-7cdf-4213-931b-4559f6c50d21",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0728d000-6810-4890-b62a-95c3f7713e67",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-08T00:20:12.77418Z",
"modified": "2024-10-08T00:20:12.77418Z",
"name": "CVE-2024-33069",
"description": "Transient DOS when transmission of management frame sent by host is not successful and error status is received in the host.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-33069"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e2188860-f3eb-4225-bf43-1894de3a87c5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--073ee2fa-f72a-4fea-b6a9-a221e39669ab",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-08T00:20:12.182758Z",
"modified": "2024-10-08T00:20:12.182758Z",
"name": "CVE-2024-9567",
"description": "** UNSUPPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has been found in D-Link DIR-619L B1 2.06. This issue affects the function formAdvFirewall of the file /goform/formAdvFirewall. The manipulation of the argument curTime leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9567"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--365b2fc3-589b-414c-b077-319b8d180f9c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--09fe3bdb-9a54-4e15-a35f-1358ccd2cdce",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-08T00:20:12.126455Z",
"modified": "2024-10-08T00:20:12.126455Z",
"name": "CVE-2024-45051",
"description": "Discourse is an open source platform for community discussion. A maliciously crafted email address could allow an attacker to bypass domain-based restrictions and gain access to private sites, categories and/or groups. This issue has been patched in the latest stable, beta and tests-passed version of Discourse. All users area are advised to upgrade. There are no known workarounds for this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-45051"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--bfb00b9d-d3a1-4f5e-8e76-4df7ea5a673e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0b5ecd6e-d45a-4d18-a42e-a7acd38f2f64",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-08T00:20:13.540769Z",
"modified": "2024-10-08T00:20:13.540769Z",
"name": "CVE-2024-46278",
"description": "Teedy 1.11 is vulnerable to Cross Site Scripting (XSS) via the management console.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-46278"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ddfeab7b-4ae4-450a-bdf1-71dc075028b6",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0cf3cf97-a1fb-4b5f-8713-8b74d81c7578",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-08T00:20:13.217786Z",
"modified": "2024-10-08T00:20:13.217786Z",
"name": "CVE-2024-20097",
"description": "In vdec, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09028313; Issue ID: MSV-1630.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-20097"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--f684055b-d2fd-430a-8edf-f96e98262fe8",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0f4134c8-5188-406c-bcf0-e397662c4e79",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-08T00:20:13.207236Z",
"modified": "2024-10-08T00:20:13.207236Z",
"name": "CVE-2024-20101",
"description": "In wlan driver, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08998901; Issue ID: MSV-1602.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-20101"
}
]
}
]
}
Loading

0 comments on commit b60e7d2

Please sign in to comment.