Skip to content

Commit

Permalink
generated content from 2024-10-01
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Oct 1, 2024
1 parent 4fda6f4 commit 1d3b65a
Show file tree
Hide file tree
Showing 68 changed files with 1,541 additions and 0 deletions.
67 changes: 67 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -250481,3 +250481,70 @@ vulnerability,CVE-2024-9327,vulnerability--064ea39b-59b5-4cd9-8553-9a4f565a6ec1
vulnerability,CVE-2024-9326,vulnerability--7a9bee5b-7d36-4710-88e9-fecfa54df9ad
vulnerability,CVE-2024-9324,vulnerability--aa10b9d7-48bd-47d2-8263-fd0fdde551ee
vulnerability,CVE-2024-9325,vulnerability--cdb854ec-e0d4-43d1-8760-fa82affc38d1
vulnerability,CVE-2024-42496,vulnerability--8bc4ab45-3e02-4653-9696-060a75dedb67
vulnerability,CVE-2024-42017,vulnerability--54a365b2-cf68-40e5-9292-11f53b41a32b
vulnerability,CVE-2024-45993,vulnerability--246b0139-d695-4413-b0ac-25fc18716dcc
vulnerability,CVE-2024-45772,vulnerability--ab3c78c2-e14a-4c33-9b1e-1d8c5f500061
vulnerability,CVE-2024-45920,vulnerability--50baace7-b4e2-4b80-b0ca-96ee1474762f
vulnerability,CVE-2024-45073,vulnerability--51a88192-c5cc-4027-9383-a5ee50049a4d
vulnerability,CVE-2024-45792,vulnerability--25b908b1-6f69-4d1f-ae00-68302c056bd2
vulnerability,CVE-2024-45200,vulnerability--4a73dd45-48d0-417b-8c6d-0df2a2352c86
vulnerability,CVE-2024-3635,vulnerability--382a9aea-0056-4830-8400-2c09ed553a51
vulnerability,CVE-2024-35495,vulnerability--8c8385f7-19c2-4410-8135-9894b17667fd
vulnerability,CVE-2024-9329,vulnerability--9c1ccf10-1f39-47bf-9735-ad2ba4227b5b
vulnerability,CVE-2024-9158,vulnerability--0d24d6db-1c65-4735-ae6d-ead284420f2a
vulnerability,CVE-2024-9194,vulnerability--3b36b72a-b9ed-4850-8085-ea615a92fb5f
vulnerability,CVE-2024-8453,vulnerability--fcb414c2-94a3-46c8-a69e-5724da505162
vulnerability,CVE-2024-8448,vulnerability--a0e90513-abf0-4027-b6e3-618d9d543d2e
vulnerability,CVE-2024-8450,vulnerability--e6ea4d0d-26e4-4639-92b8-c8dd85ffbaec
vulnerability,CVE-2024-8459,vulnerability--ba0d06df-80cc-4f15-a464-4b7c863d5a35
vulnerability,CVE-2024-8379,vulnerability--f72b7e89-804c-4715-b58a-8f8355dde910
vulnerability,CVE-2024-8283,vulnerability--0faa7e1e-c1e3-4bab-a4f4-b0892f5173c4
vulnerability,CVE-2024-8455,vulnerability--135f8f48-9940-4488-9d58-b6b2279c5276
vulnerability,CVE-2024-8452,vulnerability--c55212f8-2850-4437-b215-932999768e19
vulnerability,CVE-2024-8449,vulnerability--ece0f1d3-bb17-457f-a71b-c2dcd774a201
vulnerability,CVE-2024-8239,vulnerability--0aae116d-9f96-4e01-bc55-a5c0f2006657
vulnerability,CVE-2024-8451,vulnerability--698161db-0c9a-4553-b57a-361374b20def
vulnerability,CVE-2024-8457,vulnerability--983c05d4-51fd-4510-b046-581dc6002588
vulnerability,CVE-2024-8454,vulnerability--7fddb250-d007-4a4e-9fa3-fae65b3e31d8
vulnerability,CVE-2024-8456,vulnerability--0ac614d3-41bc-4b15-899c-c921b43c0c9f
vulnerability,CVE-2024-8536,vulnerability--3aed8595-a9c2-4e30-9554-33044489c457
vulnerability,CVE-2024-8458,vulnerability--ce297f21-7a3d-4ca7-b15c-d991c920ae88
vulnerability,CVE-2024-46549,vulnerability--6d3c992d-f5b9-482d-8780-8fc5c0ff3e2b
vulnerability,CVE-2024-46313,vulnerability--f0f84f54-9481-477a-9b17-37e5e8dbae23
vulnerability,CVE-2024-46540,vulnerability--a0652455-4e96-4b81-bcf7-454c37f00665
vulnerability,CVE-2024-46511,vulnerability--1c5e54a0-54b4-4045-a4b0-ae343970985d
vulnerability,CVE-2024-46510,vulnerability--ee9f4d0c-a239-4c97-9214-d571b547aabb
vulnerability,CVE-2024-46869,vulnerability--0fae70c6-3c27-4768-a3f8-c534c3c87b74
vulnerability,CVE-2024-46503,vulnerability--02c01c61-c401-41ef-b65d-4c789ab69269
vulnerability,CVE-2024-46293,vulnerability--3eebafee-1d8a-480e-a207-f801a4a04c35
vulnerability,CVE-2024-46635,vulnerability--0685a9ea-58d7-4cee-9806-4e685c7caaaa
vulnerability,CVE-2024-46548,vulnerability--39171148-70cf-4731-bcd1-2481c22136e7
vulnerability,CVE-2024-46475,vulnerability--39c2925e-3cb8-43a5-b7a0-046783eaa6e3
vulnerability,CVE-2024-46280,vulnerability--05c6f49a-6402-41db-bfc1-a94149b8a9b2
vulnerability,CVE-2024-6051,vulnerability--eb25daad-6d8a-4e98-8fbd-5d464ccbe803
vulnerability,CVE-2024-6394,vulnerability--1d641541-178e-4c1b-80d2-56d4280c9680
vulnerability,CVE-2024-28810,vulnerability--202f1458-5b9b-48b8-aed5-d857ca7f6e37
vulnerability,CVE-2024-28813,vulnerability--4babc917-eac3-4c23-b1c8-cf29ebba5344
vulnerability,CVE-2024-28808,vulnerability--15396577-4c58-4f7f-ba6e-e8e6b61bd1bd
vulnerability,CVE-2024-28812,vulnerability--09f954b0-d738-4230-8560-d75e1eb704aa
vulnerability,CVE-2024-28809,vulnerability--8e12afb9-cb73-4ae5-98ed-5e083716791a
vulnerability,CVE-2024-28807,vulnerability--6bf07d1d-f573-47c8-88d2-1d7a76655da2
vulnerability,CVE-2024-28811,vulnerability--9bfe4ca7-3507-472c-b3ce-79f8cbb741d9
vulnerability,CVE-2024-7671,vulnerability--b1a5078f-bbbd-40a7-b087-a37e18ca8bf8
vulnerability,CVE-2024-7675,vulnerability--7104ea51-6855-4322-8e50-c3afab7bb80d
vulnerability,CVE-2024-7672,vulnerability--d4f05b07-4634-44d1-b0d2-9a16d69f7196
vulnerability,CVE-2024-7673,vulnerability--a384ec1b-e590-48e2-bbac-88bc217274c8
vulnerability,CVE-2024-7670,vulnerability--8641ac17-a162-40cf-92cc-27798c4350f4
vulnerability,CVE-2024-7674,vulnerability--631056c9-f6db-4916-ad05-4fc2a5ba3ec0
vulnerability,CVE-2024-41999,vulnerability--4092dc58-6c12-46a9-b608-23f44f3adf33
vulnerability,CVE-2024-47532,vulnerability--ec310c81-4cff-4245-9f2d-4d5922b7ce87
vulnerability,CVE-2024-47536,vulnerability--d4e3e094-80a8-4451-a7e5-9de893df9790
vulnerability,CVE-2024-47641,vulnerability--6507ac6b-1c5f-4ebf-bf86-1835e259b9c9
vulnerability,CVE-2024-47530,vulnerability--ce29637e-aee3-4507-be64-3e998d43c6dc
vulnerability,CVE-2024-47178,vulnerability--4ad5dc2f-7b1f-417c-b46d-790a744687a0
vulnerability,CVE-2024-47531,vulnerability--321184ec-d090-4fd3-8889-402e40f010c6
vulnerability,CVE-2024-47067,vulnerability--b4a110d2-8ba5-4178-8108-4d20dbd7d18f
vulnerability,CVE-2024-47063,vulnerability--203e7813-143a-478b-8909-ef40fd103c3e
vulnerability,CVE-2024-47064,vulnerability--8558eb24-767f-48e4-96c8-39285f009bd2
vulnerability,CVE-2024-47172,vulnerability--7c3ffd7e-6441-49f5-98f4-3d8bd68c62ac
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--97edc7d6-4b4a-43ae-b369-634962124f89",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--02c01c61-c401-41ef-b65d-4c789ab69269",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-01T00:22:59.791275Z",
"modified": "2024-10-01T00:22:59.791275Z",
"name": "CVE-2024-46503",
"description": "An issue in the _readFileSync function of Simple-Spellchecker v1.0.2 allows attackers to read arbitrary files via a directory traversal.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-46503"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--c4fe7155-3780-4641-8432-a65a2dc0db09",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--05c6f49a-6402-41db-bfc1-a94149b8a9b2",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-01T00:22:59.814988Z",
"modified": "2024-10-01T00:22:59.814988Z",
"name": "CVE-2024-46280",
"description": "PIX-LINK LV-WR22 RE3002-P1-01_V117.0 is vulnerable to Improper Access Control. The TELNET service is enabled with weak credentials for a root-level account, without the possibility of changing them.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-46280"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6a5070da-0d2d-4844-91e0-5e8c3eee3ee4",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0685a9ea-58d7-4cee-9806-4e685c7caaaa",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-01T00:22:59.806788Z",
"modified": "2024-10-01T00:22:59.806788Z",
"name": "CVE-2024-46635",
"description": "An issue in the API endpoint /AccountMaster/GetCurrentUserInfo of INROAD before v202402060 allows attackers to access sensitive information via a crafted payload to the UserNameOrPhoneNumber parameter.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-46635"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--09308ead-ef23-43df-befa-e8050d93f05a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--09f954b0-d738-4230-8560-d75e1eb704aa",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-01T00:23:00.243387Z",
"modified": "2024-10-01T00:23:00.243387Z",
"name": "CVE-2024-28812",
"description": "An issue was discovered in Infinera hiT 7300 5.60.50. A hidden SSH service (on the local management network interface) with hardcoded credentials allows attackers to access the appliance operating system (with highest privileges) via an SSH connection.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-28812"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3a9f09d6-92f9-4af7-90fb-0a9ce135e0f9",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0aae116d-9f96-4e01-bc55-a5c0f2006657",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-01T00:22:59.687165Z",
"modified": "2024-10-01T00:22:59.687165Z",
"name": "CVE-2024-8239",
"description": "The Starbox WordPress plugin before 3.5.3 does not properly render social media profiles URLs in certain contexts, like the malicious user's profile or pages where the starbox shortcode is used, which may be abused by users with at least the contributor role to conduct Stored XSS attacks.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8239"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--16e19b94-2e29-4d0d-88ca-27139cfb8552",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0ac614d3-41bc-4b15-899c-c921b43c0c9f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-01T00:22:59.696882Z",
"modified": "2024-10-01T00:22:59.696882Z",
"name": "CVE-2024-8456",
"description": "Certain switch models from PLANET Technology lack proper access control in firmware upload and download functionality, allowing unauthenticated remote attackers to download and upload firmware and system configurations, ultimately gaining full control of the devices.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8456"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--294c0085-f19f-4988-b744-fbe91d72326c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0d24d6db-1c65-4735-ae6d-ead284420f2a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-01T00:22:59.62022Z",
"modified": "2024-10-01T00:22:59.62022Z",
"name": "CVE-2024-9158",
"description": "A stored cross site scripting vulnerability exists in Nessus Network Monitor where an authenticated, privileged local attacker could inject arbitrary code into the NNM UI via the local CLI.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9158"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--f1ae86e2-7921-49b6-a887-ddda24111f01",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0faa7e1e-c1e3-4bab-a4f4-b0892f5173c4",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-01T00:22:59.663245Z",
"modified": "2024-10-01T00:22:59.663245Z",
"name": "CVE-2024-8283",
"description": "The Slider by 10Web WordPress plugin before 1.2.59 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8283"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--21cac601-1a2a-4f09-a2c1-5f090fb93718",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0fae70c6-3c27-4768-a3f8-c534c3c87b74",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-01T00:22:59.789713Z",
"modified": "2024-10-01T00:22:59.789713Z",
"name": "CVE-2024-46869",
"description": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: btintel_pcie: Allocate memory for driver private data\n\nFix driver not allocating memory for struct btintel_data which is used\nto store internal data.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-46869"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--022e9b0c-b30c-4d76-9edd-59dc7ef4df68",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--135f8f48-9940-4488-9d58-b6b2279c5276",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-01T00:22:59.678664Z",
"modified": "2024-10-01T00:22:59.678664Z",
"name": "CVE-2024-8455",
"description": "The swctrl service is used to detect and remotely manage PLANET Technology devices. For certain switch models, the authentication tokens used during communication with this service are encoded user passwords. Due to insufficient strength, unauthorized remote attackers who intercept the packets can directly crack them to obtain plaintext passwords.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8455"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--2cbf8f7e-46e9-4666-bb4a-74a4ebd877a1",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--15396577-4c58-4f7f-ba6e-e8e6b61bd1bd",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-01T00:23:00.228909Z",
"modified": "2024-10-01T00:23:00.228909Z",
"name": "CVE-2024-28808",
"description": "An issue was discovered in Infinera hiT 7300 5.60.50. Hidden functionality in the web interface allows a remote authenticated attacker to access reserved information by accessing undocumented web applications.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-28808"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5f72faa6-b2ac-4ea1-bd1d-4ffd575a1946",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1c5e54a0-54b4-4045-a4b0-ae343970985d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-01T00:22:59.780185Z",
"modified": "2024-10-01T00:22:59.780185Z",
"name": "CVE-2024-46511",
"description": "LoadZilla LLC LoadLogic v1.4.3 was discovered to contain insecure permissions vulnerability which allows a remote attacker to execute arbitrary code via the LogicLoadEc2DeployLambda and CredsGenFunction function.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-46511"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6c202f81-968f-4bff-af8d-bb621f7908ff",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1d641541-178e-4c1b-80d2-56d4280c9680",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-01T00:23:00.026456Z",
"modified": "2024-10-01T00:23:00.026456Z",
"name": "CVE-2024-6394",
"description": "A Local File Inclusion vulnerability exists in parisneo/lollms-webui versions below v9.8. The vulnerability is due to unverified path concatenation in the `serve_js` function in `app.py`, which allows attackers to perform path traversal attacks. This can lead to unauthorized access to arbitrary files on the server, potentially exposing sensitive information such as private SSH keys, configuration files, and source code.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-6394"
}
]
}
]
}
Loading

0 comments on commit 1d3b65a

Please sign in to comment.