Skip to content

Commit

Permalink
generated content from 2024-09-30
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Sep 30, 2024
1 parent 7878a85 commit 4fda6f4
Show file tree
Hide file tree
Showing 9 changed files with 184 additions and 0 deletions.
8 changes: 8 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -250473,3 +250473,11 @@ vulnerability,CVE-2024-23923,vulnerability--f261d37f-c7c2-42d3-a75b-cff05942f18d
vulnerability,CVE-2024-23958,vulnerability--0e31a059-2540-402d-b710-3ce656708401
vulnerability,CVE-2024-23924,vulnerability--637585fc-6a9e-418d-9aba-63152599585c
vulnerability,CVE-2024-23935,vulnerability--09f23506-9328-41ea-a308-f3e2565a2c73
vulnerability,CVE-2024-9323,vulnerability--1541d716-4a3a-4e18-a62b-13a0ec80294f
vulnerability,CVE-2024-9321,vulnerability--f912a39f-c156-403b-9899-e717b3c3f2bb
vulnerability,CVE-2024-9322,vulnerability--69dbe293-f865-4e83-b9c6-d9404a95494f
vulnerability,CVE-2024-9328,vulnerability--e2f3122e-8828-4a67-878b-0408315950ec
vulnerability,CVE-2024-9327,vulnerability--064ea39b-59b5-4cd9-8553-9a4f565a6ec1
vulnerability,CVE-2024-9326,vulnerability--7a9bee5b-7d36-4710-88e9-fecfa54df9ad
vulnerability,CVE-2024-9324,vulnerability--aa10b9d7-48bd-47d2-8263-fd0fdde551ee
vulnerability,CVE-2024-9325,vulnerability--cdb854ec-e0d4-43d1-8760-fa82affc38d1
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e96f4b76-64d3-4f0c-89f3-b5ae1c779271",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--064ea39b-59b5-4cd9-8553-9a4f565a6ec1",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-30T00:21:23.798464Z",
"modified": "2024-09-30T00:21:23.798464Z",
"name": "CVE-2024-9327",
"description": "A vulnerability was found in code-projects Blood Bank System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /forgot.php. The manipulation of the argument useremail leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9327"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--df225738-97d4-47ac-9592-a70a0b68d55b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1541d716-4a3a-4e18-a62b-13a0ec80294f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-30T00:21:23.782522Z",
"modified": "2024-09-30T00:21:23.782522Z",
"name": "CVE-2024-9323",
"description": "A vulnerability was found in SourceCodester Inventory Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /app/action/add_staff.php. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9323"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a782b7c1-82fb-4282-b0be-46ab97201cd2",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--69dbe293-f865-4e83-b9c6-d9404a95494f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-30T00:21:23.793742Z",
"modified": "2024-09-30T00:21:23.793742Z",
"name": "CVE-2024-9322",
"description": "A vulnerability was found in code-projects Supply Chain Management 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/edit_manufacturer.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9322"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--eca89c70-fcae-4e0b-8594-595bf2dd1d9a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--7a9bee5b-7d36-4710-88e9-fecfa54df9ad",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-30T00:21:23.801226Z",
"modified": "2024-09-30T00:21:23.801226Z",
"name": "CVE-2024-9326",
"description": "A vulnerability classified as critical was found in PHPGurukul Online Shopping Portal 2.0. This vulnerability affects unknown code of the file /shopping/admin/index.php of the component Admin Panel. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9326"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--cec68c1f-fe5c-4300-a47d-794b89d7c9db",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--aa10b9d7-48bd-47d2-8263-fd0fdde551ee",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-30T00:21:23.80746Z",
"modified": "2024-09-30T00:21:23.80746Z",
"name": "CVE-2024-9324",
"description": "A vulnerability was found in Intelbras InControl up to 2.21.57. It has been rated as critical. Affected by this issue is some unknown functionality of the file /v1/operador/ of the component Relatório de Operadores Page. The manipulation of the argument fields leads to code injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was informed early on 2024-07-19 about this issue. The release of a fixed version 2.21.58 was announced for the end of August 2024 but then was postponed until 2024-09-20.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9324"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ddef2817-98c8-495b-bd30-bf93d739389a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--cdb854ec-e0d4-43d1-8760-fa82affc38d1",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-30T00:21:23.810734Z",
"modified": "2024-09-30T00:21:23.810734Z",
"name": "CVE-2024-9325",
"description": "A vulnerability classified as critical has been found in Intelbras InControl up to 2.21.56. This affects an unknown part of the file C:\\Program Files (x86)\\Intelbras\\Incontrol Cliente\\incontrol_webcam\\incontrol-service-watchdog.exe. The manipulation leads to unquoted search path. It is possible to launch the attack on the local host. The vendor was informed early on 2024-08-05 about this issue. The release of a fixed version 2.21.58 was announced for the end of August 2024 but then was postponed until 2024-09-20.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9325"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d95e639d-30c3-4d4c-9029-bc0e761a75d4",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--e2f3122e-8828-4a67-878b-0408315950ec",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-30T00:21:23.795594Z",
"modified": "2024-09-30T00:21:23.795594Z",
"name": "CVE-2024-9328",
"description": "A vulnerability was found in SourceCodester Advocate Office Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /control/edit_client.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9328"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b936942d-f285-4181-9cb4-943d59f7db20",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--f912a39f-c156-403b-9899-e717b3c3f2bb",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-30T00:21:23.792031Z",
"modified": "2024-09-30T00:21:23.792031Z",
"name": "CVE-2024-9321",
"description": "A vulnerability was found in SourceCodester Online Railway Reservation System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/inquiries/view_details.php. The manipulation of the argument id leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9321"
}
]
}
]
}

0 comments on commit 4fda6f4

Please sign in to comment.