Skip to content

Commit

Permalink
generated content from 2024-11-30
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Nov 30, 2024
1 parent aa040d9 commit 417483c
Show file tree
Hide file tree
Showing 78 changed files with 1,771 additions and 0 deletions.
77 changes: 77 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -258125,3 +258125,80 @@ vulnerability,CVE-2024-36466,vulnerability--9f940bd1-f3a9-430d-b7f0-d3b442c18e7b
vulnerability,CVE-2024-46939,vulnerability--2b0cd801-4431-436a-bb40-747a8831134e
vulnerability,CVE-2023-52922,vulnerability--d118952b-61ae-4573-b90a-2d8c3a4c456b
vulnerability,CVE-2018-9377,vulnerability--f5739db6-77e1-4b90-8d06-ba5442f29de7
vulnerability,CVE-2024-48651,vulnerability--6ff37ebe-1fc4-4f86-b687-fc83fbfda9a0
vulnerability,CVE-2024-48406,vulnerability--e6d64a75-0acf-4f52-848e-fd6a1c00e2d8
vulnerability,CVE-2024-52801,vulnerability--0ea6b8bb-4039-4349-9044-c87ac3c54140
vulnerability,CVE-2024-52780,vulnerability--2e942281-e39d-41b0-ab17-67cd97265700
vulnerability,CVE-2024-52782,vulnerability--904fa987-8208-42f4-8cc8-08730ada58a6
vulnerability,CVE-2024-52003,vulnerability--26ed780d-a52d-4c1d-9236-f8bb337be36c
vulnerability,CVE-2024-52800,vulnerability--d9d0ebd4-279b-4f7d-a8e1-014c5a2fadf0
vulnerability,CVE-2024-52809,vulnerability--0d124271-e6ea-4ac8-b5a2-ecbb44c43ab3
vulnerability,CVE-2024-52810,vulnerability--8bd93e51-9d25-4ea6-8ad5-095f92987c10
vulnerability,CVE-2024-52777,vulnerability--b168a5dc-288b-4273-86af-491248077d90
vulnerability,CVE-2024-52779,vulnerability--2d27bc5c-7a68-409d-939e-da9b863cba3b
vulnerability,CVE-2024-52781,vulnerability--e663c362-ab53-4408-a2be-887458fde104
vulnerability,CVE-2024-52778,vulnerability--b571ff46-e3a1-4b08-a19f-0c6a338c8c68
vulnerability,CVE-2024-45495,vulnerability--b1e73d84-1029-46c1-98fa-1e38a6c9a609
vulnerability,CVE-2024-10704,vulnerability--9cac511b-6803-4229-b88c-6999ff792681
vulnerability,CVE-2024-10980,vulnerability--846827bb-a325-43c0-9172-a205bf150109
vulnerability,CVE-2024-9044,vulnerability--d8576446-38e3-498d-b357-1dc165acbcc2
vulnerability,CVE-2024-39162,vulnerability--0b5a8bc3-66cc-4396-bdc2-b7d4eb3d954a
vulnerability,CVE-2024-47193,vulnerability--4267c1b6-3940-4c07-951f-5ccad18c61d2
vulnerability,CVE-2024-47094,vulnerability--50a2b9c7-2b13-4786-9ff3-9d29255bd987
vulnerability,CVE-2024-50357,vulnerability--6d9d4659-325f-42d3-a2e6-00c349a32368
vulnerability,CVE-2024-11983,vulnerability--fbaf7981-661f-4de7-9c22-c3225b333ec5
vulnerability,CVE-2024-11481,vulnerability--50532054-9ecd-462a-ace4-40fc9e25698e
vulnerability,CVE-2024-11981,vulnerability--cfcbf606-fe80-494e-b4ff-86460bbe7db6
vulnerability,CVE-2024-11978,vulnerability--c20a7be2-b607-4028-870e-72ef6c4b69bd
vulnerability,CVE-2024-11980,vulnerability--8ecee759-c537-4875-900f-04b230606198
vulnerability,CVE-2024-11990,vulnerability--b70ca3f6-8f69-4150-af9f-a8e7bc6c6769
vulnerability,CVE-2024-11992,vulnerability--fe5f3e76-e139-42c5-ab96-4f184446aaa8
vulnerability,CVE-2024-11982,vulnerability--fd8c4326-6ed9-4164-8c9b-dc75066e5ba4
vulnerability,CVE-2024-11482,vulnerability--a00ff43a-39cb-4ba3-b84a-52619d9380d4
vulnerability,CVE-2024-11979,vulnerability--1069572b-0db0-46d6-89b5-406bd6f85998
vulnerability,CVE-2024-11995,vulnerability--ea0dd874-4cb4-4295-8839-4f69720ed155
vulnerability,CVE-2024-11014,vulnerability--3523137f-fa7b-48d8-9466-6c48b4d2d57d
vulnerability,CVE-2024-11013,vulnerability--8bf0d86e-edeb-45b1-bbe4-4f3afb6625f4
vulnerability,CVE-2024-53980,vulnerability--98fa87fa-5169-496f-9d8a-467993bfb2e9
vulnerability,CVE-2024-53504,vulnerability--d2549a12-4b8e-45cb-a257-786fbb1e167a
vulnerability,CVE-2024-53865,vulnerability--dadc11c7-ef73-4a1b-a696-9751f8f7e842
vulnerability,CVE-2024-53979,vulnerability--23a2f2f2-06df-4b57-8c5e-0ffb215d454b
vulnerability,CVE-2024-53506,vulnerability--3e2490b8-f875-4203-aa7a-18843a036cb2
vulnerability,CVE-2024-53623,vulnerability--c95a1ee9-fe46-4bf7-b431-5e2d485260b7
vulnerability,CVE-2024-53701,vulnerability--4359e24c-df52-41ef-b8da-da8807f5454d
vulnerability,CVE-2024-53848,vulnerability--81104834-3cd7-408b-852e-869789b3032c
vulnerability,CVE-2024-53861,vulnerability--29cfc905-825f-4117-a1d4-7a1c80228dbc
vulnerability,CVE-2024-53507,vulnerability--2e863119-1201-4174-b310-c3428cd5b086
vulnerability,CVE-2024-53983,vulnerability--37f38d12-f30f-4a22-8e29-8b26ba99a42d
vulnerability,CVE-2024-53864,vulnerability--13f278a1-9eef-4048-bb7b-60895071bd81
vulnerability,CVE-2024-53505,vulnerability--2890215b-68f4-44da-98c4-b024449d0005
vulnerability,CVE-2024-35368,vulnerability--edb2b1af-6189-44ec-a8bc-c62c68749c96
vulnerability,CVE-2024-35369,vulnerability--a5a236d3-5535-4601-8560-5b33b19ae337
vulnerability,CVE-2024-35366,vulnerability--bc83cb39-ea98-48d5-9997-4c72b27bf0f1
vulnerability,CVE-2024-35451,vulnerability--f213dc37-e64b-48f2-952a-a39b23df3259
vulnerability,CVE-2024-35371,vulnerability--1d248915-cbf7-4721-9ab6-cd64e685332d
vulnerability,CVE-2024-35367,vulnerability--2672b830-4465-4a9e-8bae-cde75d2a5c63
vulnerability,CVE-2024-54123,vulnerability--2965517c-ca47-4a34-862a-01029d891a3e
vulnerability,CVE-2024-54159,vulnerability--ad63b7b9-7477-4f63-91d0-4f1bc523be15
vulnerability,CVE-2024-54124,vulnerability--7b3dd4a5-2876-4312-bc68-8008b01d967a
vulnerability,CVE-2024-49806,vulnerability--eab56e0f-97bf-4311-aa38-3fc4f2b03221
vulnerability,CVE-2024-49803,vulnerability--129056a3-1224-47b7-985f-dc2dfe942cea
vulnerability,CVE-2024-49360,vulnerability--7e15aee1-9889-4b3a-a826-27b209962697
vulnerability,CVE-2024-49805,vulnerability--c8814e05-4a52-4ec8-b958-60cbe52e43f8
vulnerability,CVE-2024-49804,vulnerability--b2d1c9a1-203f-40ca-9a23-bb5cf56c6de4
vulnerability,CVE-2024-36610,vulnerability--29c554e3-4302-4b1d-9de3-915d8877000b
vulnerability,CVE-2024-36618,vulnerability--5d96a606-ef4a-4c57-ba4c-2a1022a76cca
vulnerability,CVE-2024-36622,vulnerability--50017c6a-58a3-433b-a29c-39e4bcc37b24
vulnerability,CVE-2024-36619,vulnerability--6fdac3a9-f871-40f3-90ff-074ca06d3968
vulnerability,CVE-2024-36617,vulnerability--83130805-43bb-43f6-9630-493b6996fd7d
vulnerability,CVE-2024-36621,vulnerability--ded830c8-c9fd-4e64-a387-46dc24799482
vulnerability,CVE-2024-36620,vulnerability--28c55c43-d4ef-4b12-b696-766d842238bf
vulnerability,CVE-2024-36611,vulnerability--b85e7cef-c8c4-4a55-a80c-a195c529f050
vulnerability,CVE-2024-36612,vulnerability--477039c3-2b46-45a4-908d-1cfb0d2da076
vulnerability,CVE-2024-36624,vulnerability--401c92ef-455c-4db7-9745-2f3dd97d0bc4
vulnerability,CVE-2024-36625,vulnerability--92ae733c-6344-42b5-af66-284c50dbe006
vulnerability,CVE-2024-36671,vulnerability--33b93cab-7164-40b9-997f-25f1af98b63c
vulnerability,CVE-2024-36623,vulnerability--3249dc75-a290-4460-b87a-24c022d84a27
vulnerability,CVE-2024-36615,vulnerability--da55e3a2-20e3-4198-9cf4-2195463974d3
vulnerability,CVE-2024-36616,vulnerability--9bed2215-6ead-4dd4-958c-c5c34aabb9c5
vulnerability,CVE-2024-36626,vulnerability--021ca777-9565-4b53-8564-fcd32328f5a7
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--f1d4fe25-c65d-4f24-8bdd-3d5c54d70e39",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--021ca777-9565-4b53-8564-fcd32328f5a7",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-30T00:21:24.990138Z",
"modified": "2024-11-30T00:21:24.990138Z",
"name": "CVE-2024-36626",
"description": "In prestashop 8.1.4, a NULL pointer dereference was identified in the math_round function within Tools.php.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-36626"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a4e524f1-82ad-407d-838e-39b2e4bb0439",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0b5a8bc3-66cc-4396-bdc2-b7d4eb3d954a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-30T00:21:23.399204Z",
"modified": "2024-11-30T00:21:23.399204Z",
"name": "CVE-2024-39162",
"description": "** UNSUPPORTED WHEN ASSIGNED ** pyspider through 0.3.10 allows /update XSS. NOTE: This vulnerability only affects products that are no longer supported by the maintainer",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-39162"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--72be63f6-0472-4fff-9c0a-342ab3f24b32",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0d124271-e6ea-4ac8-b5a2-ecbb44c43ab3",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-30T00:21:23.198381Z",
"modified": "2024-11-30T00:21:23.198381Z",
"name": "CVE-2024-52809",
"description": "vue-i18n is an internationalization plugin for Vue.js. In affected versions vue-i18n can be passed locale messages to `createI18n` or `useI18n`. When locale message ASTs are generated in development mode there is a possibility of Cross-site Scripting attack. This issue has been addressed in versions 9.14.2, and 10.0.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-52809"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--2c396e44-44b1-4322-923a-270b647f3f26",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0ea6b8bb-4039-4349-9044-c87ac3c54140",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-30T00:21:23.165859Z",
"modified": "2024-11-30T00:21:23.165859Z",
"name": "CVE-2024-52801",
"description": "sftpgo is a full-featured and highly configurable event-driven file transfer solution. Server protocols: SFTP, HTTP/S, FTP/S, WebDAV. The OpenID Connect implementation allows authenticated users to brute force session cookies and thereby gain access to other users' data, since the cookies are generated predictably using the xid library and are therefore unique but not cryptographically secure. This issue was fixed in version v2.6.4, where cookies are opaque and cryptographically secure strings. All users are advised to upgrade. There are no known workarounds for this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-52801"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3bc314d7-97ee-4582-9555-3c0523982a44",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1069572b-0db0-46d6-89b5-406bd6f85998",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-30T00:21:23.782549Z",
"modified": "2024-11-30T00:21:23.782549Z",
"name": "CVE-2024-11979",
"description": "DreamMaker from Interinfo has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory, leading to arbitrary code execution by uploading webshells.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11979"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9cb4f9cd-37e3-4ace-9ca3-75d4d770e71f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--129056a3-1224-47b7-985f-dc2dfe942cea",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-30T00:21:24.699439Z",
"modified": "2024-11-30T00:21:24.699439Z",
"name": "CVE-2024-49803",
"description": "IBM Security Verify Access Appliance 10.0.0 through 10.0.8 could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-49803"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a2edf286-246a-462d-9da2-3d0e51960d1e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--13f278a1-9eef-4048-bb7b-60895071bd81",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-30T00:21:24.068637Z",
"modified": "2024-11-30T00:21:24.068637Z",
"name": "CVE-2024-53864",
"description": "Ibexa Admin UI Bundle is all the necessary parts to run the Ibexa DXP Back Office interface. The Content name pattern is used to build Content names from one or more fields. An XSS vulnerability has been found in this mechanism. Content edit permission is required to exploit it. After the fix, any existing injected XSS will not run. This issue has been patched in version 4.6.14. All users are advised to upgrade. There are no known workarounds for this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-53864"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--81be6e1f-6299-4764-aa47-c51cdfcd8568",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1d248915-cbf7-4721-9ab6-cd64e685332d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-30T00:21:24.632187Z",
"modified": "2024-11-30T00:21:24.632187Z",
"name": "CVE-2024-35371",
"description": "Ant-Media-Serverv2.8.2 is affected by Improper Output Neutralization for Logs. The vulnerability stems from insufficient input sanitization in the logging mechanism. Without proper filtering or validation, user-controllable data, such as identifiers or other sensitive information, can be included in log entries without restrictions.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-35371"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--229a6629-95ad-4417-a297-eb21e7742cab",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--23a2f2f2-06df-4b57-8c5e-0ffb215d454b",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-30T00:21:24.029415Z",
"modified": "2024-11-30T00:21:24.029415Z",
"name": "CVE-2024-53979",
"description": "ibm.ibm_zhmc is an Ansible collection for the IBM Z HMC. The Ansible collection \"ibm.ibm_zhmc\" writes password-like properties in clear text into its log file and into the output returned by some of its Ansible module in the following cases: 1. The 'boot_ftp_password' and 'ssc_master_pw' properties are passed as input to the zhmc_partition Ansible module. 2. The 'ssc_master_pw' and 'zaware_master_pw' properties are passed as input to the zhmc_lpar Ansible module. 3. The 'password' property is passed as input to the zhmc_user Ansible module (just in log file, not in module output). 4. The 'bind_password' property is passed as input to the zhmc_ldap_server_definition Ansible module. These properties appear in the module output only when they were specified in the module input and when creating or updating the corresponding resources. They do not appear in the output when retrieving facts for the corresponding resources. These properties appear in the log file only when the \"log_file\" module input parameter is used. By default, no log file is created. This issue has been fixed in ibm.ibm_zhmc version 1.9.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-53979"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--cedf637e-2b15-43a0-a51e-f638591b9428",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2672b830-4465-4a9e-8bae-cde75d2a5c63",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-30T00:21:24.634044Z",
"modified": "2024-11-30T00:21:24.634044Z",
"name": "CVE-2024-35367",
"description": "FFmpeg n6.1.1 has an Out-of-bounds Read via libavcodec/ppc/vp8dsp_altivec.c, static const vec_s8 h_subpel_filters_outer",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-35367"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e929ac65-e5b7-46e4-a671-27ca1dfb3da5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--26ed780d-a52d-4c1d-9236-f8bb337be36c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-30T00:21:23.184649Z",
"modified": "2024-11-30T00:21:23.184649Z",
"name": "CVE-2024-52003",
"description": "Traefik (pronounced traffic) is an HTTP reverse proxy and load balancer. There is a vulnerability in Traefik that allows the client to provide the X-Forwarded-Prefix header from an untrusted source. This issue has been addressed in versions 2.11.14 and 3.2.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-52003"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9ba969a1-7b58-4ad2-b223-912cd8d636ee",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2890215b-68f4-44da-98c4-b024449d0005",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-30T00:21:24.07025Z",
"modified": "2024-11-30T00:21:24.07025Z",
"name": "CVE-2024-53505",
"description": "A SQL injection vulnerability has been identified in Siyuan 3.1.11 via the id parameter at /getAssetContent.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-53505"
}
]
}
]
}
Loading

0 comments on commit 417483c

Please sign in to comment.