Skip to content

Commit

Permalink
generated content from 2024-11-13
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Nov 13, 2024
1 parent acb87b9 commit f21e117
Show file tree
Hide file tree
Showing 342 changed files with 7,843 additions and 0 deletions.
341 changes: 341 additions & 0 deletions mapping.csv

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9df06a27-1d3a-4a0e-a256-8c55953a2940",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--001074ac-4ae3-4229-94ea-dace86c1c179",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-13T00:20:50.078478Z",
"modified": "2024-11-13T00:20:50.078478Z",
"name": "CVE-2021-27701",
"description": "SOCIFI Socifi Guest wifi as SAAS is affected by Cross Site Request Forgery (CSRF) via the Socifi wifi portal. The application does not contain a CSRF token and request validation. An attacker can Add/Modify any random user data by sending a crafted CSRF request.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2021-27701"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--2ae17d2c-b174-425c-89d3-1e24053ae2d0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0026fb67-9a3b-4598-a12d-d6052e3175ab",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-13T00:20:44.500303Z",
"modified": "2024-11-13T00:20:44.500303Z",
"name": "CVE-2024-10943",
"description": "An\nauthentication bypass vulnerability exists in the affected product. The\nvulnerability exists due to shared secrets across accounts and could allow a threat\nactor to impersonate a user if the threat actor is able to enumerate additional\ninformation required during authentication.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10943"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b18d07a4-88a8-458a-9f00-42676ee321d2",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0069fcab-3eb7-4cd2-b0b0-913740ab9f3f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-13T00:20:46.1002Z",
"modified": "2024-11-13T00:20:46.1002Z",
"name": "CVE-2024-23983",
"description": "Improper handling of canonical URL-encoding may lead to bypass not properly constrained by request rules.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-23983"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--1c19884f-b3b7-420b-896e-b6b74ee607b0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--02ac4c98-8d6b-4d21-8c82-29b1be70402a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-13T00:20:44.775306Z",
"modified": "2024-11-13T00:20:44.775306Z",
"name": "CVE-2024-50601",
"description": "Persistent and reflected XSS vulnerabilities in the themeMode cookie and _h URL parameter of Axigen Mail Server up to version 10.5.28 allow attackers to execute arbitrary Javascript. Exploitation could lead to session hijacking, data leakage, and further exploitation via a multi-stage attack. Fixed in versions 10.3.3.67, 10.4.42, and 10.5.29.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-50601"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--f11adbb5-31e1-48dc-beb7-2a30a0329e98",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--03183130-b128-4f19-ace2-567986fc8183",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-13T00:20:44.683803Z",
"modified": "2024-11-13T00:20:44.683803Z",
"name": "CVE-2024-47942",
"description": "A vulnerability has been identified in Solid Edge SE2024 (All versions < V224.0 Update 9). The affected applications suffer from a DLL hijacking vulnerability. This could allow an attacker to execute arbitrary code via placing a crafted DLL file on the system.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-47942"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d33f7df1-39d0-474f-89e9-579b1e3079c0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--034644fc-1db3-4e2d-ad94-8a9bfcf9197f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-13T00:20:44.582031Z",
"modified": "2024-11-13T00:20:44.582031Z",
"name": "CVE-2024-9843",
"description": "A buffer over-read in Ivanti Secure Access Client before 22.7R4 allows a local unauthenticated attacker to cause a denial of service.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9843"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3afaab1f-8253-4214-b838-0f40ab6125ed",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--043627e3-59b0-44e8-b969-bfc0cd7dadad",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-13T00:20:50.118745Z",
"modified": "2024-11-13T00:20:50.118745Z",
"name": "CVE-2021-27702",
"description": "Sercomm Router Etisalat Model S3- AC2100 is affected by Incorrect Access Control via the diagnostic utility in the router dashboard.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2021-27702"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--700c0e89-ede0-4103-a620-360083686ce1",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--04755de4-fec8-4386-860d-6271c4bb7f4f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-13T00:20:44.688843Z",
"modified": "2024-11-13T00:20:44.688843Z",
"name": "CVE-2024-47907",
"description": "A stack-based buffer overflow in IPsec of Ivanti Connect Secure before version 22.7R2.3 allows a remote unauthenticated attacker to cause a denial of service.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-47907"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--8428ecb3-f4ab-4949-b7fd-a504879b9a2a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--04a48be3-c36d-4ea9-9632-eaef706c72cd",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-13T00:20:44.722081Z",
"modified": "2024-11-13T00:20:44.722081Z",
"name": "CVE-2024-47445",
"description": "After Effects versions 23.6.9, 24.6.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-47445"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--47840c25-2cea-4731-a680-2e4c5ab2bce4",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--050110ed-c513-4ad1-8c32-41a635c1b30c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-13T00:20:44.767708Z",
"modified": "2024-11-13T00:20:44.767708Z",
"name": "CVE-2024-50317",
"description": "A null pointer dereference in Ivanti Avalanche before 6.4.6 allows a remote unauthenticated attacker to cause a denial of service.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-50317"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9ba32f62-caeb-49d4-9bd4-2581e9a4c70d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0524688a-e415-43c6-a443-a810b49e9b3c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-13T00:20:46.115037Z",
"modified": "2024-11-13T00:20:46.115037Z",
"name": "CVE-2024-23666",
"description": "A client-side enforcement of server-side security in Fortinet FortiAnalyzer-BigData \r\nat least version 7.4.0 and 7.2.0 through 7.2.6 and 7.0.1 through 7.0.6 and 6.4.5 through 6.4.7 and 6.2.5, FortiManager version 7.4.0 through 7.4.1 and 7.2.0 through 7.2.4 and 7.0.0 through 7.0.11 and 6.4.0 through 6.4.14, FortiAnalyzer version 7.4.0 through 7.4.1 and 7.2.0 through 7.2.4 and 7.0.0 through 7.0.11 and 6.4.0 through 6.4.14 allows attacker to improper access control via crafted requests.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-23666"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--91d39f6a-a311-42a3-ae44-d8aabcc2a5fb",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--071d26c0-a5fe-4dc1-bb4f-7776e9e3e8de",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-13T00:20:46.313854Z",
"modified": "2024-11-13T00:20:46.313854Z",
"name": "CVE-2024-46892",
"description": "A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 3). The affected application does not properly invalidate sessions when the associated user is deleted or disabled or their permissions are modified. This could allow an authenticated attacker to continue performing malicious actions even after their user account has been disabled.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-46892"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--426c674e-3ffa-4840-83fd-af3a48d4568c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--08862ec1-e603-43e5-8c54-22c6f0512c34",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-13T00:20:46.953034Z",
"modified": "2024-11-13T00:20:46.953034Z",
"name": "CVE-2024-43462",
"description": "SQL Server Native Client Remote Code Execution Vulnerability",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-43462"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--f82a8319-bd20-4e52-b1bb-42084ad7ecc1",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--08cabef1-4df5-475c-9c1d-06acd67c271d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-13T00:20:44.259306Z",
"modified": "2024-11-13T00:20:44.259306Z",
"name": "CVE-2024-48837",
"description": "Dell SmartFabric OS10 Software, version(s) 10.5.6.x, 10.5.5.x, 10.5.4.x, 10.5.3.x, contain(s) an Execution with Unnecessary Privileges vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-48837"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a9933373-486d-4763-8e2f-f6ccd8869e80",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--093fd410-acd8-4182-acf3-fd125a0a5162",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-13T00:20:44.837388Z",
"modified": "2024-11-13T00:20:44.837388Z",
"name": "CVE-2024-50322",
"description": "Path traversal in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a local unauthenticated attacker to achieve code execution. User interaction is required.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-50322"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--56a053e1-6d08-405b-a468-8efb59b8cd03",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0959809b-7889-4246-8da2-17e4fbe2ed2c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-13T00:20:46.040715Z",
"modified": "2024-11-13T00:20:46.040715Z",
"name": "CVE-2024-49017",
"description": "SQL Server Native Client Remote Code Execution Vulnerability",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-49017"
}
]
}
]
}
Loading

0 comments on commit f21e117

Please sign in to comment.