Skip to content

Commit

Permalink
generated content from 2024-08-24
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Aug 24, 2024
1 parent b55cd68 commit 2facfa4
Show file tree
Hide file tree
Showing 79 changed files with 1,794 additions and 0 deletions.
78 changes: 78 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -247358,3 +247358,81 @@ vulnerability,CVE-2024-35151,vulnerability--b6ff0c13-9ca1-4cef-9092-09ce3ef86968
vulnerability,CVE-2024-32939,vulnerability--0de901fb-95ee-4120-b962-48e5367e0dd8
vulnerability,CVE-2023-7260,vulnerability--97b3c281-bd85-48df-a89e-e2161e658950
vulnerability,CVE-2023-6452,vulnerability--2ed10d2c-9280-407b-a500-61950e497a3c
vulnerability,CVE-2024-41846,vulnerability--9a9e79f1-68f9-49ec-a0e1-a574d18a84cb
vulnerability,CVE-2024-41842,vulnerability--2895e8ff-ab56-402a-a306-532134435542
vulnerability,CVE-2024-41150,vulnerability--5870d1f8-f7b6-47e7-ba9c-5d3c84a9f954
vulnerability,CVE-2024-41875,vulnerability--c2592383-d02b-4ba9-89b9-4d599e669f6f
vulnerability,CVE-2024-41844,vulnerability--b505363f-953d-4e6f-8f02-f3a92eb16201
vulnerability,CVE-2024-41845,vulnerability--72df4fc5-2012-4d80-9cd9-65626c5989a8
vulnerability,CVE-2024-41876,vulnerability--f1e7b3f1-de84-429a-b4d5-c9d10f1cfd93
vulnerability,CVE-2024-41841,vulnerability--a52ceba6-aee3-44e4-877a-88245c66149c
vulnerability,CVE-2024-41847,vulnerability--f7f955b5-ad65-4ab1-bc75-199372cb5c82
vulnerability,CVE-2024-41878,vulnerability--e364cf63-35f6-4e9a-b708-4f6c4541a475
vulnerability,CVE-2024-41849,vulnerability--d3643675-84db-4fa7-96d9-7308b27c0898
vulnerability,CVE-2024-41848,vulnerability--97f3d887-3f6c-4c48-8a66-b8147d9a8323
vulnerability,CVE-2024-41877,vulnerability--ac16e83d-3a9d-473b-b6aa-48aa097aa365
vulnerability,CVE-2024-41843,vulnerability--c64d3207-3381-43cf-9e36-4bb0b0795082
vulnerability,CVE-2024-44386,vulnerability--421b0b8e-cd94-4e4c-907b-03ef5dceb138
vulnerability,CVE-2024-44387,vulnerability--58a1a231-b2ce-4320-a37e-a426eb8489b4
vulnerability,CVE-2024-44381,vulnerability--af5a3e36-1d3a-4559-aac5-ce37a8590240
vulnerability,CVE-2024-44390,vulnerability--a054c1e5-3cd5-4e7e-b329-b252211aaac3
vulnerability,CVE-2024-44382,vulnerability--585c1f02-ce48-4c1e-84cc-15482a0230fb
vulnerability,CVE-2024-40111,vulnerability--05b9a8ba-d755-4f15-8fc8-0bd2be167a7b
vulnerability,CVE-2024-40766,vulnerability--04b00b96-ec79-4ded-b528-3139e030b1de
vulnerability,CVE-2024-42918,vulnerability--f790617e-39dc-4bf4-840b-19bbd85b11fb
vulnerability,CVE-2024-42766,vulnerability--1715353b-a1c4-47bd-a6fa-b3e5795f3398
vulnerability,CVE-2024-42636,vulnerability--9c6de8f2-ae78-46bd-93ed-fdc3b44ad5dd
vulnerability,CVE-2024-42992,vulnerability--67e42ac2-fd3f-4ed7-bc03-c410aff7da6f
vulnerability,CVE-2024-42852,vulnerability--70feab55-b718-4dd5-bae4-5a594f11add5
vulnerability,CVE-2024-42914,vulnerability--e6f8bfe2-7514-480e-96ee-63727c924374
vulnerability,CVE-2024-42531,vulnerability--1eeb22b0-cd0c-4dc0-8af7-52fe598f1974
vulnerability,CVE-2024-42523,vulnerability--bfbb399d-499b-453f-9663-9848e3f88dda
vulnerability,CVE-2024-42756,vulnerability--249d855c-db49-40e5-bbc0-ebfdf969007e
vulnerability,CVE-2024-42845,vulnerability--b51655cb-8af9-4f0a-8537-0eb981257317
vulnerability,CVE-2024-42764,vulnerability--c698eddc-0a2e-456b-be6d-13c536267ced
vulnerability,CVE-2024-42915,vulnerability--d7e4a28d-ba77-4140-a622-85ef2e54fa45
vulnerability,CVE-2024-42040,vulnerability--3e1accd7-f493-4478-b077-e721382f1317
vulnerability,CVE-2024-42364,vulnerability--850ddc33-2b6e-4715-a899-aaffbaf5f835
vulnerability,CVE-2024-42765,vulnerability--1c8cf0a2-55f9-4654-ae4d-54c3d8c21a53
vulnerability,CVE-2024-38207,vulnerability--32ad169b-9062-497f-b322-d91e494339a1
vulnerability,CVE-2024-38869,vulnerability--d7e12368-1abd-4079-a34e-c16514ec3568
vulnerability,CVE-2024-38807,vulnerability--53daf9d7-2ae2-4fa4-a78b-76c712394fde
vulnerability,CVE-2024-33854,vulnerability--7b97b987-dff7-4dc7-9cdb-ac6fd1515e2e
vulnerability,CVE-2024-33853,vulnerability--2b100538-7421-4b69-a182-51365f18902f
vulnerability,CVE-2024-33852,vulnerability--3e51d03c-2e07-406e-9966-f6c10f7f5285
vulnerability,CVE-2024-36515,vulnerability--4b352335-6ede-4a28-b6f9-baf41609e835
vulnerability,CVE-2024-36516,vulnerability--01f20be7-3efe-4d5d-a2e1-e41f08f44486
vulnerability,CVE-2024-36514,vulnerability--b5560cbd-ddea-4f63-8822-e3aae6e6293f
vulnerability,CVE-2024-36517,vulnerability--985eca35-9cec-45cf-adf2-aeaf15c681ac
vulnerability,CVE-2024-7258,vulnerability--50066927-a689-4334-99ce-7e056d959c17
vulnerability,CVE-2024-7559,vulnerability--9ed98d92-9872-4442-a229-adaa2658e20e
vulnerability,CVE-2024-7986,vulnerability--735eea66-f674-4fac-9e87-eb94784e0204
vulnerability,CVE-2024-7954,vulnerability--b13f6d86-3761-447e-af6b-c0ac047b578f
vulnerability,CVE-2024-7427,vulnerability--0be6d2a1-bae0-4a5b-be23-8fc31c8fb4b4
vulnerability,CVE-2024-7428,vulnerability--1970d5f3-c9c8-464d-b47e-42bf4de26f03
vulnerability,CVE-2024-39841,vulnerability--ece644c7-d8ab-45ca-9d42-8c76992473b1
vulnerability,CVE-2024-43031,vulnerability--0d3e2a82-10ce-46ee-a014-f21ba24a9229
vulnerability,CVE-2024-43477,vulnerability--34ee47a8-e9d7-43ce-92df-df44c12104e9
vulnerability,CVE-2024-43883,vulnerability--b834be2e-675c-4676-85fb-3fab1590a17e
vulnerability,CVE-2024-43782,vulnerability--686b79a9-882d-4def-98c0-2257c8512314
vulnerability,CVE-2024-43794,vulnerability--ed5f94c1-2ce5-46e3-950b-ba23ae41bb91
vulnerability,CVE-2024-43032,vulnerability--3b17a144-a110-4d15-8925-398dfee6726c
vulnerability,CVE-2024-43105,vulnerability--a2f273b2-a555-49e1-8ca7-8200a243a819
vulnerability,CVE-2024-43791,vulnerability--a0fde316-0e25-4955-bd72-b8501cdfbbb7
vulnerability,CVE-2024-5586,vulnerability--18b4e642-9f8d-4098-ba52-4363f8602ecb
vulnerability,CVE-2024-5502,vulnerability--ecbfc939-67a8-4737-b797-5c179dcf3cb5
vulnerability,CVE-2024-5556,vulnerability--e62dde08-55cc-4afa-947f-ad75847936c8
vulnerability,CVE-2024-5466,vulnerability--9aa468d4-a149-4d39-85f2-593d87532f1b
vulnerability,CVE-2024-5467,vulnerability--868920ba-7ecf-4a66-af77-e08633a614d5
vulnerability,CVE-2024-5490,vulnerability--a6f771f8-558f-4fc3-a009-6aa3aa4eb523
vulnerability,CVE-2024-37392,vulnerability--933f91f0-888c-4131-a993-f9db8502b6f1
vulnerability,CVE-2024-37311,vulnerability--16630d73-2726-4969-9a8a-1a490824ff3b
vulnerability,CVE-2024-8112,vulnerability--a4dcaf8b-eacb-44fe-ad72-7b26066f4dd5
vulnerability,CVE-2024-8113,vulnerability--fe2177b6-ef6e-421d-bab0-c5347155c6e9
vulnerability,CVE-2024-3282,vulnerability--7ca20077-7671-4ce4-a71f-6d0f20ca94bc
vulnerability,CVE-2024-45188,vulnerability--72def80a-c472-4fdd-bbe8-9b023761f4db
vulnerability,CVE-2024-45189,vulnerability--f0e7d473-9cbd-40cb-9a67-1067f056df26
vulnerability,CVE-2024-45187,vulnerability--2bdbaf12-7c81-4706-98da-6763ea6030a1
vulnerability,CVE-2024-45190,vulnerability--bcf32aa0-4d5f-40a7-9422-779b19841b81
vulnerability,CVE-2024-6715,vulnerability--0e701bdb-1ccc-4385-9780-36aa203b54ae
vulnerability,CVE-2024-32501,vulnerability--fd443a2c-6b80-4d2a-a6b6-351561ac563a
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--f0d7bf97-1546-4382-aeda-64790879fcc4",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--01f20be7-3efe-4d5d-a2e1-e41f08f44486",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-24T00:18:04.77758Z",
"modified": "2024-08-24T00:18:04.77758Z",
"name": "CVE-2024-36516",
"description": "Zohocorp ManageEngine ADAudit Plus versions below 8000 are vulnerable to the authenticated SQL injection in dashboard.\nNote: This vulnerability is different from another vulnerability (CVE-2024-36515), both of which have affected ADAudit Plus' dashboard.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-36516"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--4471b57f-bfef-4909-83d7-541d019f6666",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--04b00b96-ec79-4ded-b528-3139e030b1de",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-24T00:18:04.308698Z",
"modified": "2024-08-24T00:18:04.308698Z",
"name": "CVE-2024-40766",
"description": "An improper access control vulnerability has been identified in the SonicWall SonicOS management access, potentially leading to unauthorized resource access and in specific conditions, causing the firewall to crash. This issue affects SonicWall Firewall Gen 5 and Gen 6 devices, as well as Gen 7 devices running SonicOS 7.0.1-5035 and older versions.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-40766"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e18f5105-0020-4ecc-99f1-36af3e096981",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--05b9a8ba-d755-4f15-8fc8-0bd2be167a7b",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-24T00:18:04.292114Z",
"modified": "2024-08-24T00:18:04.292114Z",
"name": "CVE-2024-40111",
"description": "A persistent (stored) cross-site scripting (XSS) vulnerability has been identified in Automad 2.0.0-alpha.4. This vulnerability enables an attacker to inject malicious JavaScript code into the template body. The injected code is stored within the flat file CMS and is executed in the browser of any user visiting the forum.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-40111"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--dfbef268-47fa-4dd0-ae04-10060e6c8241",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0be6d2a1-bae0-4a5b-be23-8fc31c8fb4b4",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-24T00:18:04.988088Z",
"modified": "2024-08-24T00:18:04.988088Z",
"name": "CVE-2024-7427",
"description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in OpenText™ Network Node Manager i (NNMi) could allow Cross-Site Scripting (XSS).This issue affects Network Node Manager i (NNMi): 2022.11, 2023.05, 23.4, 24.2.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-7427"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a9412365-2d22-4ac8-a02a-ab5c822b7e97",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0d3e2a82-10ce-46ee-a014-f21ba24a9229",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-24T00:18:05.225426Z",
"modified": "2024-08-24T00:18:05.225426Z",
"name": "CVE-2024-43031",
"description": "autMan v2.9.6 was discovered to contain an access control issue.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-43031"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3c28fe35-7e65-4cab-85f1-5b97bcfd1a14",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0e701bdb-1ccc-4385-9780-36aa203b54ae",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-24T00:18:05.776656Z",
"modified": "2024-08-24T00:18:05.776656Z",
"name": "CVE-2024-6715",
"description": "The Ditty WordPress plugin before 3.1.46 re-introduced a previously fixed security issue (https://wpscan.com/vulnerability/80a9eb3a-2cb1-4844-9004-ba2554b2d46c/) in v3.1.39",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-6715"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--686d24c2-f870-40e4-90a0-9a9b03417714",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--16630d73-2726-4969-9a8a-1a490824ff3b",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-24T00:18:05.551264Z",
"modified": "2024-08-24T00:18:05.551264Z",
"name": "CVE-2024-37311",
"description": "Collabora Online is a collaborative online office suite based on LibreOffice. In affected versions of Collabora Online, https connections from coolwsd to other hosts may incompletely verify the remote host's certificate's against the full chain of trust. This vulnerability is fixed in Collabora Online 24.04.4.3, 23.05.14.1, and 22.05.23.1.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-37311"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--cd1fa240-38d9-4749-8102-8a5e5117a349",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1715353b-a1c4-47bd-a6fa-b3e5795f3398",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-24T00:18:04.34369Z",
"modified": "2024-08-24T00:18:04.34369Z",
"name": "CVE-2024-42766",
"description": "Kashipara Bus Ticket Reservation System v1.0 0 is vulnerable to Incorrect Access Control via /deleteTicket.php.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-42766"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--12198ee6-2f9c-484a-85c8-ae15773e0a25",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--18b4e642-9f8d-4098-ba52-4363f8602ecb",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-24T00:18:05.387185Z",
"modified": "2024-08-24T00:18:05.387185Z",
"name": "CVE-2024-5586",
"description": "Zohocorp ManageEngine ADAudit Plus versions below 8121 are vulnerable to the authenticated SQL injection in extranet lockouts report option.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-5586"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7360e9f0-bfb6-4812-8fc6-710210484eb0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1970d5f3-c9c8-464d-b47e-42bf4de26f03",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-24T00:18:04.993388Z",
"modified": "2024-08-24T00:18:04.993388Z",
"name": "CVE-2024-7428",
"description": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in OpenText™ Network Node Manager i (NNMi) allows URL Redirector Abuse.This issue affects Network Node Manager i (NNMi): 2022.11, 2023.05, 23.4, 24.2.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-7428"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--4ac4655b-b407-473b-bd12-9bd750f12e6e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1c8cf0a2-55f9-4654-ae4d-54c3d8c21a53",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-24T00:18:04.57716Z",
"modified": "2024-08-24T00:18:04.57716Z",
"name": "CVE-2024-42765",
"description": "A SQL injection vulnerability in \"/login.php\" of the Kashipara Bus Ticket Reservation System v1.0 allows remote attackers to execute arbitrary SQL commands and bypass Login via the \"email\" or \"password\" Login page parameters.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-42765"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ba60f829-8e18-4d5e-b3f1-bdc9c2f439e1",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1eeb22b0-cd0c-4dc0-8af7-52fe598f1974",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-24T00:18:04.362751Z",
"modified": "2024-08-24T00:18:04.362751Z",
"name": "CVE-2024-42531",
"description": "Ezviz Internet PT Camera CS-CV246 D15655150 allows an unauthenticated host to access its live video stream by crafting a set of RTSP packets with a specific set of URLs that can be used to redirect the camera feed.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-42531"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--60bce86e-ebf4-4570-a838-b129b9308cce",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--249d855c-db49-40e5-bbc0-ebfdf969007e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-24T00:18:04.376678Z",
"modified": "2024-08-24T00:18:04.376678Z",
"name": "CVE-2024-42756",
"description": "An issue in Netgear DGN1000WW v.1.1.00.45 allows a remote attacker to execute arbitrary code via the Diagnostics page",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-42756"
}
]
}
]
}
Loading

0 comments on commit 2facfa4

Please sign in to comment.