Skip to content

Commit

Permalink
generated content from 2024-09-07
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Sep 7, 2024
1 parent fcdf3b6 commit 3d935f2
Show file tree
Hide file tree
Showing 74 changed files with 1,679 additions and 0 deletions.
73 changes: 73 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -248387,3 +248387,76 @@ vulnerability,CVE-2024-45178,vulnerability--6c39c783-8bb9-47f0-bd81-82fd64d1e4c2
vulnerability,CVE-2024-45157,vulnerability--4f08b094-acd3-4e3f-b3f3-9842c2a20a19
vulnerability,CVE-2024-45107,vulnerability--c8669e9b-5b84-4f52-9b0d-724f74ce09d1
vulnerability,CVE-2023-51712,vulnerability--89483cdd-6076-428e-9048-b4cc655fecde
vulnerability,CVE-2022-27592,vulnerability--b334c702-8e97-4a20-b505-92fdd4ef49d7
vulnerability,CVE-2024-27122,vulnerability--e443ac5f-2ee1-4a0a-9f67-a87d5de481f1
vulnerability,CVE-2024-27125,vulnerability--4432a988-9a10-426b-8c75-7c91e6eb9e0a
vulnerability,CVE-2024-27126,vulnerability--8f8d4cc3-2fc8-48f8-a2ce-38580b9b0ae6
vulnerability,CVE-2024-32763,vulnerability--81337d51-3dba-4094-bf2c-c34ddea4ec87
vulnerability,CVE-2024-32771,vulnerability--0d7b920f-d4ca-48aa-8c43-c93fa1d39e5a
vulnerability,CVE-2024-32762,vulnerability--a9a1d87d-82cf-451b-b90e-06cf57c39a0c
vulnerability,CVE-2024-44837,vulnerability--64285aea-92c2-4c73-9220-fbbdcfffad90
vulnerability,CVE-2024-44401,vulnerability--ccdde081-9443-4cd3-ad86-72110690d273
vulnerability,CVE-2024-44402,vulnerability--d5af859c-d090-4c60-8ccd-8c7e3aa59071
vulnerability,CVE-2024-44739,vulnerability--e20b32d3-2e8a-4fbc-8e90-e7495cc45a8d
vulnerability,CVE-2024-44082,vulnerability--0c9a3910-4107-4db9-af0f-ec0411805ce3
vulnerability,CVE-2024-44844,vulnerability--c9e6a823-b229-468e-a676-63b158af11c9
vulnerability,CVE-2024-44838,vulnerability--ec3b0c93-a97f-4b4c-8077-14572145b279
vulnerability,CVE-2024-44408,vulnerability--10225c4b-6237-4d6c-9795-5a26827b861d
vulnerability,CVE-2024-44845,vulnerability--93f29529-9458-46d6-b498-063ab417ee15
vulnerability,CVE-2024-44839,vulnerability--db6e132e-4282-4c5c-ab73-5d075c1a06d6
vulnerability,CVE-2024-25584,vulnerability--54171402-d272-4d58-b154-f8bac3556221
vulnerability,CVE-2024-1744,vulnerability--6bc662f5-2bbf-4516-a31a-f205d5f82908
vulnerability,CVE-2024-6792,vulnerability--b0fc01ee-65e5-4b75-b276-2098a2d53b95
vulnerability,CVE-2024-6445,vulnerability--ae4926ee-2452-4335-8ac0-dba28243f725
vulnerability,CVE-2024-38486,vulnerability--36640b97-96f0-411c-b6a2-4a676648f3ce
vulnerability,CVE-2024-38640,vulnerability--e21f6cab-637f-4c03-9134-85cdb3b31202
vulnerability,CVE-2024-38642,vulnerability--4045f6e4-4a6e-43e3-b65e-6bb82548da7c
vulnerability,CVE-2024-38641,vulnerability--d7912829-d087-4107-94e5-3458a8e6e99a
vulnerability,CVE-2024-21904,vulnerability--5142e7dd-081d-4d92-85f5-ae3a2c588abf
vulnerability,CVE-2024-21897,vulnerability--2c501b96-ed57-47b0-9ab6-3aa1bc1ff1c9
vulnerability,CVE-2024-21906,vulnerability--1eadf625-cbe4-4c0c-8f4c-ab1ff34c88dc
vulnerability,CVE-2024-21898,vulnerability--03d31d6b-e99c-4c2b-940b-6ab14188df82
vulnerability,CVE-2024-21903,vulnerability--6aa669fd-f340-4927-af74-96ad40fe00c6
vulnerability,CVE-2024-8292,vulnerability--2ce5012f-d47f-48f6-9362-15c0bbba7bb3
vulnerability,CVE-2024-8480,vulnerability--586d390c-d002-42e8-ba38-7192504271a8
vulnerability,CVE-2024-8509,vulnerability--c184eb09-6685-471b-842c-c11933cc3baa
vulnerability,CVE-2024-8394,vulnerability--28d90fd4-af63-423d-b886-395ee607a427
vulnerability,CVE-2024-8317,vulnerability--865d47a3-5245-4403-bcf2-343bd04ad3b2
vulnerability,CVE-2024-8247,vulnerability--f85d4221-2039-4b34-a3be-5cb00bb610fa
vulnerability,CVE-2024-8427,vulnerability--de14d29d-6027-450e-be39-15f468bc562c
vulnerability,CVE-2024-8517,vulnerability--24d7dee4-4722-4105-a4e0-e98954d862e6
vulnerability,CVE-2024-8428,vulnerability--d67c4354-d8e6-45cf-9678-d8229ee4dc67
vulnerability,CVE-2024-39585,vulnerability--189a500c-3613-481f-90e7-63c2fca70974
vulnerability,CVE-2024-34158,vulnerability--2d1fd6aa-2d5a-46e6-8959-0733ba52b3d6
vulnerability,CVE-2024-34156,vulnerability--73aaebc4-5faf-43ca-b540-c3f00cb4941d
vulnerability,CVE-2024-34155,vulnerability--510441ed-c99e-429a-8636-8acc8aaa5a17
vulnerability,CVE-2024-7493,vulnerability--7594fa77-6913-4637-a3a7-6cef0baa11f8
vulnerability,CVE-2024-7349,vulnerability--528f1583-9b2f-4a7e-8f97-e706f8dc78bb
vulnerability,CVE-2024-7622,vulnerability--11c0276e-e2ad-4236-8c3a-4b58829e70a9
vulnerability,CVE-2024-7415,vulnerability--10f05508-e7ca-45d6-9533-bb3272076a04
vulnerability,CVE-2024-7652,vulnerability--d712bab4-269c-4f8b-a96b-404c83a6af1c
vulnerability,CVE-2024-7599,vulnerability--c0333377-9653-4907-b8fe-a2b4755a1e90
vulnerability,CVE-2024-7611,vulnerability--07e042b2-d82c-4e29-aecf-40ef2a90fe9e
vulnerability,CVE-2024-40865,vulnerability--f7e9b879-ad73-455d-9e28-e5a54be37ffc
vulnerability,CVE-2024-45294,vulnerability--9515e09a-aba9-4a44-b1cd-45c22f671bda
vulnerability,CVE-2024-45771,vulnerability--b64ca837-9994-4ddc-b1eb-495671ffdbba
vulnerability,CVE-2024-45300,vulnerability--6d0bda02-1a4d-4611-85b3-40e9a2eefa29
vulnerability,CVE-2024-45040,vulnerability--ec26b571-f454-4343-808a-3b7a1e728de9
vulnerability,CVE-2024-45758,vulnerability--2ba73f64-a726-4179-b6cd-7db4099c1656
vulnerability,CVE-2024-45299,vulnerability--b7add3b5-1873-4d83-918f-dde696074b29
vulnerability,CVE-2024-45405,vulnerability--ddb1f300-246b-4460-b7f1-9e41e6ded052
vulnerability,CVE-2024-45751,vulnerability--9e146c1f-02c1-43ad-a105-11476017738f
vulnerability,CVE-2024-45039,vulnerability--c0b56c53-40e1-4686-a35c-03975f591d86
vulnerability,CVE-2023-50360,vulnerability--761814fa-1a76-48a3-b0f4-9b8537c24e0c
vulnerability,CVE-2023-50366,vulnerability--479f59e5-bca2-4804-888a-b7c24221a566
vulnerability,CVE-2023-39300,vulnerability--1ff61fc1-3940-4853-9b85-23c9b37a6ac4
vulnerability,CVE-2023-39298,vulnerability--ee9cabf2-7452-4760-aa42-e007ee7973d1
vulnerability,CVE-2023-51366,vulnerability--d7a603f8-2b7f-4378-a837-c8ffe9da77b4
vulnerability,CVE-2023-51367,vulnerability--583ff26d-f1b3-43ba-8667-091a2bb8dbb6
vulnerability,CVE-2023-51368,vulnerability--629777c6-b135-421b-8374-3e0622973412
vulnerability,CVE-2023-34974,vulnerability--00d5ac02-1f05-406c-8570-e606d432a0b9
vulnerability,CVE-2023-34979,vulnerability--8bc56b5a-e52d-4e36-9a20-4c106c02480a
vulnerability,CVE-2023-52915,vulnerability--423287fc-7822-4e42-90ec-3c3742a7a461
vulnerability,CVE-2023-52916,vulnerability--5b36fb6c-c21e-48bd-8123-a04134e5cf68
vulnerability,CVE-2023-47563,vulnerability--6471c392-de04-4bb5-ba4b-6beda4f861fd
vulnerability,CVE-2023-45038,vulnerability--f3fc4c4c-3c1a-4fea-9c09-8b0ffe4cb7d2
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d62dbd9a-b44e-4d6b-b1a4-b1a474b838f8",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--00d5ac02-1f05-406c-8570-e606d432a0b9",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-07T00:19:11.604521Z",
"modified": "2024-09-07T00:19:11.604521Z",
"name": "CVE-2023-34974",
"description": "An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network.\nQuTScloud, QVR, QES are not affected.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 4.5.4.2790 build 20240605 and later\nQuTS hero h4.5.4.2626 build 20231225 and later",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-34974"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9e65cb0c-4896-468e-ab2a-525cd0c9eaf5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--03d31d6b-e99c-4c2b-940b-6ab14188df82",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-07T00:19:03.442492Z",
"modified": "2024-09-07T00:19:03.442492Z",
"name": "CVE-2024-21898",
"description": "An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to execute commands via a network.\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.6.2722 build 20240402 and later\nQuTS hero h5.1.6.2734 build 20240414 and later",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-21898"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--bb9eefc5-042e-4bf3-87df-1b7fa2aadc93",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--07e042b2-d82c-4e29-aecf-40ef2a90fe9e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-07T00:19:04.163567Z",
"modified": "2024-09-07T00:19:04.163567Z",
"name": "CVE-2024-7611",
"description": "The Enter Addons – Ultimate Template Builder for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'tag' attribute of the Events Card widget in all versions up to, and including, 2.1.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-7611"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--18b5d64f-a5b1-4b81-8022-04cc085c3c09",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0c9a3910-4107-4db9-af0f-ec0411805ce3",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-07T00:19:02.729558Z",
"modified": "2024-09-07T00:19:02.729558Z",
"name": "CVE-2024-44082",
"description": "In OpenStack Ironic before 26.0.1 and ironic-python-agent before 9.13.1, there is a vulnerability in image processing, in which a crafted image could be used by an authenticated user to exploit undesired behaviors in qemu-img, including possible unauthorized access to potentially sensitive data. The affected/fixed version details are: Ironic: <21.4.3, >=22.0.0 <23.0.2, >=23.1.0 <24.1.2, >=25.0.0 <26.0.1; Ironic-python-agent: <9.4.2, >=9.5.0 <9.7.1, >=9.8.0 <9.11.1, >=9.12.0 <9.13.1.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-44082"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e35e71dd-261f-46ec-b9ae-02494d747978",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0d7b920f-d4ca-48aa-8c43-c93fa1d39e5a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-07T00:19:02.678919Z",
"modified": "2024-09-07T00:19:02.678919Z",
"name": "CVE-2024-32771",
"description": "An improper restriction of excessive authentication attempts vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow local network authenticated administrators to perform an arbitrary number of authentication attempts via unspecified vectors.\nQuTScloud is not affected.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.0.2782 build 20240601 and later\nQuTS hero h5.2.0.2782 build 20240601 and later",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-32771"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--92f4ce48-a196-479e-8283-ef7a42d9cad8",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--10225c4b-6237-4d6c-9795-5a26827b861d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-07T00:19:02.743956Z",
"modified": "2024-09-07T00:19:02.743956Z",
"name": "CVE-2024-44408",
"description": "D-Link DIR-823G v1.0.2B05_20181207 is vulnerable to Information Disclosure. The device allows unauthorized configuration file downloads, and the downloaded configuration files contain plaintext user passwords.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-44408"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--aef2ce5a-deca-413e-b365-682ab6dcc403",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--10f05508-e7ca-45d6-9533-bb3272076a04",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-07T00:19:04.150269Z",
"modified": "2024-09-07T00:19:04.150269Z",
"name": "CVE-2024-7415",
"description": "The Remember Me Controls plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 2.0.1. This is due to the plugin allowing direct access to the bootstrap.php file which has display_errors on. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-7415"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e49f8f27-9c89-4422-a791-08cb554bfdcd",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--11c0276e-e2ad-4236-8c3a-4b58829e70a9",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-07T00:19:04.137557Z",
"modified": "2024-09-07T00:19:04.137557Z",
"name": "CVE-2024-7622",
"description": "The Revision Manager TMC plugin for WordPress is vulnerable to unauthorized arbitrary email sending due to a missing capability check on the _a_ajaxQuickEmailTestCallback() function in all versions up to, and including, 2.8.19. This makes it possible for authenticated attackers, with subscriber-level access and above, to send emails with arbitrary content to any individual through the vulnerable web server.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-7622"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--90fc0b61-5d34-4608-840a-255b71a472f1",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--189a500c-3613-481f-90e7-63c2fca70974",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-07T00:19:03.783883Z",
"modified": "2024-09-07T00:19:03.783883Z",
"name": "CVE-2024-39585",
"description": "Dell SmartFabric OS10 Software, version(s) 10.5.5.4 through 10.5.5.10 and 10.5.6.x, contain(s) an Use of Hard-coded Password vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Client-side request forgery and Information disclosure.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-39585"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--315594b6-2423-4453-a1e4-6bfdbd970294",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1eadf625-cbe4-4c0c-8f4c-ab1ff34c88dc",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-07T00:19:03.440136Z",
"modified": "2024-09-07T00:19:03.440136Z",
"name": "CVE-2024-21906",
"description": "An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute commands via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.8.2823 build 20240712 and later\nQuTS hero h5.1.8.2823 build 20240712 and later",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-21906"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--95c6128a-32fb-4485-bf92-ee8ace7fd28f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1ff61fc1-3940-4853-9b85-23c9b37a6ac4",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-07T00:19:11.167768Z",
"modified": "2024-09-07T00:19:11.167768Z",
"name": "CVE-2023-39300",
"description": "An OS command injection vulnerability has been reported to affect legacy QTS. If exploited, the vulnerability could allow authenticated administrators to execute commands via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 4.3.6.2805 build 20240619 and later\nQTS 4.3.4.2814 build 20240618 and later\nQTS 4.3.3.2784 build 20240619 and later\nQTS 4.2.6 build 20240618 and later",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-39300"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a5920cc5-ee41-461f-901e-ce2dc6bf937b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--24d7dee4-4722-4105-a4e0-e98954d862e6",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-07T00:19:03.663383Z",
"modified": "2024-09-07T00:19:03.663383Z",
"name": "CVE-2024-8517",
"description": "SPIP before 4.3.2, 4.2.16, and \n4.1.18 is vulnerable to a command injection issue. A \nremote and unauthenticated attacker can execute arbitrary operating system commands by sending a crafted multipart file upload HTTP request.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8517"
}
]
}
]
}
Loading

0 comments on commit 3d935f2

Please sign in to comment.