Skip to content

Commit

Permalink
generated content from 2024-09-04
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Sep 4, 2024
1 parent 99a2bac commit 00378b6
Show file tree
Hide file tree
Showing 71 changed files with 1,610 additions and 0 deletions.
70 changes: 70 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -248074,3 +248074,73 @@ vulnerability,CVE-2024-6921,vulnerability--790a6737-335c-4c10-a246-19daeff76bcb
vulnerability,CVE-2024-6919,vulnerability--f0b92ad2-40b0-4dbb-a422-de357185a8b4
vulnerability,CVE-2024-6920,vulnerability--66737ef6-33fb-4dfa-9c87-5c0ac5bfe775
vulnerability,CVE-2023-7279,vulnerability--6c1d6026-52a0-43d5-90d1-349216d81186
vulnerability,CVE-2024-41436,vulnerability--5a2d0f2e-f1a5-4259-bbff-988dcf7ed3f7
vulnerability,CVE-2024-41435,vulnerability--ce0d7b38-6e87-446e-aa68-5093483209b9
vulnerability,CVE-2024-41434,vulnerability--a7151ac4-1453-4c54-9fbf-e8939bb17eec
vulnerability,CVE-2024-41433,vulnerability--7679ca98-7495-4b4a-aebb-86761b53be54
vulnerability,CVE-2024-44809,vulnerability--496bb722-d75f-4274-93d6-3872c0b1b4ad
vulnerability,CVE-2024-44921,vulnerability--6f6b7296-52ac-4e85-b000-8619f0214c48
vulnerability,CVE-2024-44920,vulnerability--e2dd7d10-b19b-430f-9668-693bf7cdaa18
vulnerability,CVE-2024-34463,vulnerability--74a8cedb-6a3a-4b88-8d1e-c9a0b37a7a4f
vulnerability,CVE-2024-42057,vulnerability--45b90bba-a9d5-4d3f-8c38-02a257e937f2
vulnerability,CVE-2024-42903,vulnerability--f6e5191b-5de6-4c6f-81c1-f916870aa48a
vulnerability,CVE-2024-42058,vulnerability--9b25fe7b-3856-49bd-89d0-d2aec5d8d690
vulnerability,CVE-2024-42991,vulnerability--b37adafa-bd63-4586-9468-b863dc458cb0
vulnerability,CVE-2024-42061,vulnerability--6bdea516-ad6f-4969-aded-5b6c3cc49c73
vulnerability,CVE-2024-42902,vulnerability--39a69667-c905-4a8d-9453-152768b8c399
vulnerability,CVE-2024-42059,vulnerability--7af0d1b7-e102-4497-acec-e5d4b9130c90
vulnerability,CVE-2024-42904,vulnerability--d33ace75-db65-4628-a6c5-88edb98f9df2
vulnerability,CVE-2024-42901,vulnerability--f0c0ce13-b93a-4ff1-b215-2056a53951ee
vulnerability,CVE-2024-42060,vulnerability--d960ed86-3c30-412a-9551-8790f45081cd
vulnerability,CVE-2024-38456,vulnerability--7af59fb7-3e85-434e-98c2-92457515b022
vulnerability,CVE-2024-38811,vulnerability--a0e1b5eb-9339-4cef-b16b-056460e0b5eb
vulnerability,CVE-2024-33663,vulnerability--e14243d3-bb78-41d5-bb74-8fded7bb5414
vulnerability,CVE-2024-7654,vulnerability--d0d7e8f4-4b3a-46b3-83c9-f019dc74b399
vulnerability,CVE-2024-7203,vulnerability--874c4386-b959-4cb7-91d7-1a6ba6210436
vulnerability,CVE-2024-7346,vulnerability--b5823286-2c82-4360-8843-43b8d62a4d66
vulnerability,CVE-2024-7345,vulnerability--b63ed5e7-7a47-4dde-af7c-ba75f40412a4
vulnerability,CVE-2024-7261,vulnerability--b87a0fae-0ef0-4270-984e-ec1aa03cb875
vulnerability,CVE-2024-7970,vulnerability--f84465c7-c184-42ac-b34f-9627b67079c9
vulnerability,CVE-2024-43412,vulnerability--23de53bc-0495-45a1-99c5-d90b98894bc3
vulnerability,CVE-2024-43803,vulnerability--973002c9-8857-4425-a32e-fd36a18eb070
vulnerability,CVE-2024-43413,vulnerability--300f3f18-7203-4f44-97dd-82e194c5e791
vulnerability,CVE-2024-5412,vulnerability--93592a0e-e8d1-4a1e-b010-bb7455dddb91
vulnerability,CVE-2024-37136,vulnerability--68038a3e-20f8-4a92-bae0-02b94e8d9fac
vulnerability,CVE-2024-4629,vulnerability--e266e631-5491-4420-bc67-e81c73fefe51
vulnerability,CVE-2024-4259,vulnerability--1054d4f9-e931-4e4c-bed2-71c6780b5b28
vulnerability,CVE-2024-8382,vulnerability--cd2a17a1-1ea6-4872-8ce9-1aa903e76c21
vulnerability,CVE-2024-8389,vulnerability--25e32006-5ca5-4300-948c-48615e020916
vulnerability,CVE-2024-8362,vulnerability--deb20ca3-d417-43e3-a03a-a1f8b39fc857
vulnerability,CVE-2024-8383,vulnerability--c3edddac-4ae2-4ca1-b429-5bc745512ec5
vulnerability,CVE-2024-8381,vulnerability--656be563-0e2d-4691-a0f0-86aa75001387
vulnerability,CVE-2024-8387,vulnerability--9e5c6d33-f5c9-4db3-baeb-b119d5fc8a2f
vulnerability,CVE-2024-8385,vulnerability--94dfe4f0-d3d6-4e37-a03e-d10e39bb5bfa
vulnerability,CVE-2024-8388,vulnerability--250b90b3-ee18-417a-8660-8d37102a1212
vulnerability,CVE-2024-8399,vulnerability--1c2078cd-0465-4b74-9bbd-409999679e1f
vulnerability,CVE-2024-8384,vulnerability--d8d59af0-2e62-4981-8248-ae2175065c7c
vulnerability,CVE-2024-8380,vulnerability--bfe10f8f-ad60-4b41-8ee1-37c0a5885969
vulnerability,CVE-2024-8374,vulnerability--a79d0c05-eebe-45ab-9001-042ecd1b5d01
vulnerability,CVE-2024-8386,vulnerability--e41d3504-fd3c-48c2-8921-145823d58959
vulnerability,CVE-2024-3655,vulnerability--1eeacd15-bc20-4c7a-9f60-3661b222fef3
vulnerability,CVE-2024-45616,vulnerability--ee3e1633-8fa2-4af6-b126-bc6d8df2168e
vulnerability,CVE-2024-45586,vulnerability--33bd66d5-5dca-48fb-98af-16c1e2efa91f
vulnerability,CVE-2024-45587,vulnerability--b2f794d7-42cc-422b-a78c-0d12a4e0a136
vulnerability,CVE-2024-45615,vulnerability--b61074e0-dcd7-4b7b-919d-168b345f4047
vulnerability,CVE-2024-45678,vulnerability--3b147ee4-de1d-4b9e-847d-1be0682c8b60
vulnerability,CVE-2024-45619,vulnerability--18c8f684-1cc1-445a-88a4-2e79aa186b9f
vulnerability,CVE-2024-45390,vulnerability--f840d381-9fbb-46dc-bd3e-43d53fe087d8
vulnerability,CVE-2024-45617,vulnerability--c823f4bb-d38f-4f8e-903e-b9d2310123e1
vulnerability,CVE-2024-45310,vulnerability--c2b6f3a3-560e-47d2-9cdc-58996e561f31
vulnerability,CVE-2024-45620,vulnerability--0b104850-b1c8-452b-87cd-6c8e08472686
vulnerability,CVE-2024-45391,vulnerability--40d7163a-2405-4813-873c-f23604be5af8
vulnerability,CVE-2024-45307,vulnerability--a1d884f4-5148-4221-a948-3e45a8154c77
vulnerability,CVE-2024-45389,vulnerability--0ccfd071-781c-4e90-9c3d-043400c216cc
vulnerability,CVE-2024-45180,vulnerability--d6ee7a9b-6ec1-456b-8818-b5f9fe189bb9
vulnerability,CVE-2024-45618,vulnerability--f63c9ffb-1484-4493-8b39-5d75d5c8ba02
vulnerability,CVE-2024-45394,vulnerability--a23b665f-5a9a-46fa-bd87-4cb4a27c999a
vulnerability,CVE-2024-45588,vulnerability--7cf5f20d-9782-410f-bd4d-a5c82c8aea55
vulnerability,CVE-2024-6473,vulnerability--72b0501e-764d-47ba-8e86-ae9e120cc870
vulnerability,CVE-2024-6119,vulnerability--8b0b6611-d013-4b84-b5df-102cd3716472
vulnerability,CVE-2024-6343,vulnerability--500baed5-4cde-48b0-b1a7-509e0d94e7f1
vulnerability,CVE-2024-6232,vulnerability--c2621e6e-ff39-4bc9-8c99-4b67b61e044d
vulnerability,CVE-2023-49233,vulnerability--16aa053d-6a0f-4b44-a196-184d2be3a2f0
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--df16d69f-401b-4ef4-b065-b936006a88ae",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0b104850-b1c8-452b-87cd-6c8e08472686",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-04T00:19:39.702342Z",
"modified": "2024-09-04T00:19:39.702342Z",
"name": "CVE-2024-45620",
"description": "A vulnerability was found in the pkcs15-init tool in OpenSC. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled with data, initialized parts of the buffer can be incorrectly accessed.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-45620"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--53d6fc36-57a7-4f8d-890d-70df17b11d58",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0ccfd071-781c-4e90-9c3d-043400c216cc",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-04T00:19:39.71265Z",
"modified": "2024-09-04T00:19:39.71265Z",
"name": "CVE-2024-45389",
"description": "Pagefind, a fully static search library, initializes its dynamic JavaScript and WebAssembly files relative to the location of the first script the user loads. This information is gathered by looking up the value of `document.currentScript.src`. Prior to Pagefind version 1.1.1, it is possible to \"clobber\" this lookup with otherwise benign HTML on the page. This will cause `document.currentScript.src` to resolve as an external domain, which will then be used by Pagefind to load dependencies. This exploit would only work in the case that an attacker could inject HTML to a live, hosted, website. In these cases, this would act as a way to escalate the privilege available to an attacker. This assumes they have the ability to add some elements to the page (for example, `img` tags with a `name` attribute), but not others, as adding a `script` to the page would itself be the cross-site scripting vector. Pagefind has tightened this resolution in version 1.1.1 by ensuring the source is loaded from a valid script element. There are no reports of this being exploited in the wild via Pagefind.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-45389"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--f778296e-b34e-4b59-91ee-16432046eb0d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1054d4f9-e931-4e4c-bed2-71c6780b5b28",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-04T00:19:39.582042Z",
"modified": "2024-09-04T00:19:39.582042Z",
"name": "CVE-2024-4259",
"description": "Improper Privilege Management vulnerability in SAMPAŞ Holding AKOS allows Collect Data as Provided by Users.This issue affects AKOS: through 20240902. \n\nNOTE: The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-4259"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5eeec6e8-dc12-4577-93d2-8bd906dea57c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--16aa053d-6a0f-4b44-a196-184d2be3a2f0",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-04T00:19:41.74514Z",
"modified": "2024-09-04T00:19:41.74514Z",
"name": "CVE-2023-49233",
"description": "Insufficient access checks in Visual Planning Admin Center 8 before v.1 Build 240207 allow attackers in possession of a non-administrative Visual Planning account to utilize functions normally reserved for administrators. The affected functions allow attackers to obtain different types of configured credentials and potentially elevate their privileges to administrator level.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-49233"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--69b164f9-bcb9-48d0-abeb-36e9726cc0ed",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--18c8f684-1cc1-445a-88a4-2e79aa186b9f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-04T00:19:39.695204Z",
"modified": "2024-09-04T00:19:39.695204Z",
"name": "CVE-2024-45619",
"description": "A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled with data, initialized parts of the buffer can be incorrectly accessed.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-45619"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--cb981ee6-0956-4d69-98c6-968f9ed5b216",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1c2078cd-0465-4b74-9bbd-409999679e1f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-04T00:19:39.611529Z",
"modified": "2024-09-04T00:19:39.611529Z",
"name": "CVE-2024-8399",
"description": "Websites could utilize Javascript links to spoof URL addresses in the Focus navigation bar This vulnerability affects Focus for iOS < 130.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8399"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ab051e36-95a3-410e-b4f1-06964308a341",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1eeacd15-bc20-4c7a-9f60-3661b222fef3",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-04T00:19:39.657209Z",
"modified": "2024-09-04T00:19:39.657209Z",
"name": "CVE-2024-3655",
"description": "Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user to make improper GPU memory processing operations to gain access to already freed memory.This issue affects Bifrost GPU Kernel Driver: from r43p0 through r49p0; Valhall GPU Kernel Driver: from r43p0 through r49p0; Arm 5th Gen GPU Architecture Kernel Driver: from r43p0 through r49p0.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-3655"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b17d200c-9ff4-4270-85d8-fdeccf071374",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--23de53bc-0495-45a1-99c5-d90b98894bc3",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-04T00:19:39.17751Z",
"modified": "2024-09-04T00:19:39.17751Z",
"name": "CVE-2024-43412",
"description": "Xibo is an open source digital signage platform with a web content management system (CMS). Prior to version 4.1.0, a cross-site scripting vulnerability in Xibo CMS allows authorized users to execute arbitrary JavaScript via the file preview function. Users can upload HTML/CSS/JS files into the Xibo Library via the Generic File module to be referenced on Displays and in Layouts. This is intended functionality. When previewing these resources from the Library and Layout editor they are executed in the users browser. This will be disabled in future releases, and users are encouraged to use the new developer tools in 4.1 to design their widgets which require this type of functionality. This behavior has been changed in 4.1.0 to preview previewing of generic files. There are no workarounds for this issue.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-43412"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--8d973c5e-638f-43c7-babd-b77b9288f54e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--250b90b3-ee18-417a-8660-8d37102a1212",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-04T00:19:39.607619Z",
"modified": "2024-09-04T00:19:39.607619Z",
"name": "CVE-2024-8388",
"description": "Multiple prompts and panels from both Firefox and the Android OS could be used to obscure the notification announcing the transition to fullscreen mode after the fix for CVE-2023-6870 in Firefox 121. This could lead to spoofing the browser UI if the sudden appearance of the prompt distracted the user from noticing the visual transition happening behind the prompt. These notifications now use the Android Toast feature. \n*This bug only affects Firefox on Android. Other operating systems are unaffected.* This vulnerability affects Firefox < 130.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8388"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--dc394bb1-1353-42cc-85dd-57387317872a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--25e32006-5ca5-4300-948c-48615e020916",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-04T00:19:39.590885Z",
"modified": "2024-09-04T00:19:39.590885Z",
"name": "CVE-2024-8389",
"description": "Memory safety bugs present in Firefox 129. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 130.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8389"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--4348594f-8cf4-4616-80cf-c41d31483d0f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--300f3f18-7203-4f44-97dd-82e194c5e791",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-04T00:19:39.183012Z",
"modified": "2024-09-04T00:19:39.183012Z",
"name": "CVE-2024-43413",
"description": "Xibo is an open source digital signage platform with a web content management system (CMS). Prior to version 4.1.0, a cross-site scripting vulnerability in Xibo CMS allows authorized users to execute JavaScript via the DataSet functionality. Users can design a DataSet with a HTML column which contains JavaScript, which is intended functionality. The JavaScript gets executed on the Data Entry page and in any Layouts which reference it. This behavior has been changed in 4.1.0 to show HTML/CSS/JS as code on the Data Entry page. There are no workarounds for this issue.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-43413"
}
]
}
]
}
Loading

0 comments on commit 00378b6

Please sign in to comment.