Skip to content

Commit

Permalink
generated content from 2024-09-08
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Sep 8, 2024
1 parent 3d935f2 commit 541786e
Show file tree
Hide file tree
Showing 52 changed files with 1,173 additions and 0 deletions.
51 changes: 51 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -248460,3 +248460,54 @@ vulnerability,CVE-2023-52915,vulnerability--423287fc-7822-4e42-90ec-3c3742a7a461
vulnerability,CVE-2023-52916,vulnerability--5b36fb6c-c21e-48bd-8123-a04134e5cf68
vulnerability,CVE-2023-47563,vulnerability--6471c392-de04-4bb5-ba4b-6beda4f861fd
vulnerability,CVE-2023-45038,vulnerability--f3fc4c4c-3c1a-4fea-9c09-8b0ffe4cb7d2
vulnerability,CVE-2024-37068,vulnerability--4ded5a2f-8220-46d7-86be-6e415d6c4c05
vulnerability,CVE-2024-1596,vulnerability--c1a32734-7599-4ac0-a15d-91da3d55fa76
vulnerability,CVE-2024-6849,vulnerability--6ec890a7-3b1e-4052-9ab0-70cfd423c0d2
vulnerability,CVE-2024-6010,vulnerability--414460c0-83b3-43e3-b339-ac56c9a220ce
vulnerability,CVE-2024-42020,vulnerability--9556423f-8bcd-4f5d-802d-9f7a68d91081
vulnerability,CVE-2024-42022,vulnerability--34cbc456-7e48-46f4-8a8e-86983454b8b3
vulnerability,CVE-2024-42024,vulnerability--2a1dc117-a144-4c9d-b9d2-7d8156b3420e
vulnerability,CVE-2024-42019,vulnerability--c2dd9bce-9b4d-492f-9e58-1ff1f42aff85
vulnerability,CVE-2024-42021,vulnerability--60887b67-27ec-43a6-b857-bffa87c6b191
vulnerability,CVE-2024-42023,vulnerability--404ba775-9dac-402c-95af-0d450079ead8
vulnerability,CVE-2024-38651,vulnerability--57936cf9-3e4e-42a4-9395-86bbd9623169
vulnerability,CVE-2024-38650,vulnerability--a30bd0e3-291b-431e-b445-57d545fac7d8
vulnerability,CVE-2024-8523,vulnerability--d470d2cb-316d-48ee-a19c-16e9a9244474
vulnerability,CVE-2024-8560,vulnerability--6a839d9b-f68e-4939-9b68-37df20e16432
vulnerability,CVE-2024-8559,vulnerability--71c2dca9-8d87-49a2-a3e1-bba26da4892d
vulnerability,CVE-2024-8562,vulnerability--f4f26840-68aa-402a-8cd0-2f6a43a2940a
vulnerability,CVE-2024-8564,vulnerability--a1b25b65-dade-46b4-a34e-40592524efcf
vulnerability,CVE-2024-8563,vulnerability--d3b28c68-6227-4b84-a2a3-d5f81d7d9ee3
vulnerability,CVE-2024-8561,vulnerability--5149a758-a0d1-4fc8-8a2f-a2e30edcc345
vulnerability,CVE-2024-8566,vulnerability--77d75baa-76d5-4d93-bdc1-844caca53fca
vulnerability,CVE-2024-8555,vulnerability--73a26379-b63b-446f-8eb0-c2b8edfd9f0d
vulnerability,CVE-2024-8521,vulnerability--d440a831-9922-40da-b204-5d6a1b6969ce
vulnerability,CVE-2024-8538,vulnerability--d69c03f6-b992-489c-a312-881db4172dcd
vulnerability,CVE-2024-8557,vulnerability--a86fddda-71a1-4270-a8f7-01617554ced3
vulnerability,CVE-2024-8565,vulnerability--00596fbf-c550-4889-82ae-341bbae7ab0c
vulnerability,CVE-2024-8554,vulnerability--c56fbfb3-485a-49d6-a417-24c07b032b9e
vulnerability,CVE-2024-8558,vulnerability--e67ecc54-d708-4c42-82bf-4dffb8eeb133
vulnerability,CVE-2024-39714,vulnerability--d67b6607-40cb-4547-b36e-3e33495717f8
vulnerability,CVE-2024-39718,vulnerability--aaed6a32-070e-4844-866b-ae702f9c0d53
vulnerability,CVE-2024-39715,vulnerability--1e2a6589-fa89-41cb-998a-3424a297da2c
vulnerability,CVE-2024-36138,vulnerability--b9ef53ed-68cd-4172-afd1-8f6bb7143bea
vulnerability,CVE-2024-36137,vulnerability--a99dda4d-7772-433b-ac3d-0886071e729e
vulnerability,CVE-2024-7620,vulnerability--5102e53c-e690-4d9b-8c9d-896372422dfb
vulnerability,CVE-2024-7112,vulnerability--0777640f-d579-469e-aae8-94c58903896c
vulnerability,CVE-2024-40712,vulnerability--393fa7c3-eb54-43cf-90db-3dbb65f6446d
vulnerability,CVE-2024-40714,vulnerability--fd7dada8-455f-4ecc-ba97-063e194e21d5
vulnerability,CVE-2024-40710,vulnerability--9eac6112-d6e6-4cdd-be71-702590c52261
vulnerability,CVE-2024-40709,vulnerability--c97be5de-f67c-42b0-a29b-9d6b22aa24fb
vulnerability,CVE-2024-40711,vulnerability--0f99091b-f288-4a07-917a-465ccfa28da4
vulnerability,CVE-2024-40713,vulnerability--e84ffa7f-b331-4386-8c3e-01b98f69e036
vulnerability,CVE-2024-40718,vulnerability--54a5ed7e-3b78-4366-8639-6aeff0db8869
vulnerability,CVE-2024-40681,vulnerability--39ab9d76-a26e-43a8-8ffd-a864549d9a0a
vulnerability,CVE-2024-40680,vulnerability--6a2f835d-d196-4abd-b327-28dfc5d154e0
vulnerability,CVE-2024-45034,vulnerability--0efa4da2-bd07-47cc-b46f-f462043967ea
vulnerability,CVE-2024-45498,vulnerability--eea75cd4-df55-463b-9741-af2db9698392
vulnerability,CVE-2023-46809,vulnerability--af526e27-9fa5-48e2-aaa9-0babc5ab1062
vulnerability,CVE-2023-30583,vulnerability--6f4a4feb-5841-4b1c-a5b4-332f7598a36d
vulnerability,CVE-2023-30582,vulnerability--9893d947-b3f9-4579-8d63-4fa6b42ba650
vulnerability,CVE-2023-30587,vulnerability--6224293e-36ec-4199-a626-932d5acb7e33
vulnerability,CVE-2023-30584,vulnerability--82d63e2b-8741-483c-8790-beaf60e06fe3
vulnerability,CVE-2023-39333,vulnerability--298907cf-485f-4874-8989-84e1418adcb7
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--13101064-eb32-4479-8b1c-09b805407d28",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--00596fbf-c550-4889-82ae-341bbae7ab0c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-08T00:21:43.632428Z",
"modified": "2024-09-08T00:21:43.632428Z",
"name": "CVE-2024-8565",
"description": "A vulnerability was found in SourceCodesters Clinics Patient Management System 2.0. It has been rated as critical. This issue affects some unknown processing of the file /print_diseases.php. The manipulation of the argument disease/from/to leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8565"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e7970427-0487-4042-9e22-3014310ee46a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0777640f-d579-469e-aae8-94c58903896c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-08T00:21:44.116154Z",
"modified": "2024-09-08T00:21:44.116154Z",
"name": "CVE-2024-7112",
"description": "The Pinpoint Booking System – #1 WordPress Booking Plugin plugin for WordPress is vulnerable to SQL Injection via the ‘schedule’ parameter in all versions up to, and including, 2.9.9.5.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-7112"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--58b7df0e-c882-4c83-964e-970c72fa8bbf",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0efa4da2-bd07-47cc-b46f-f462043967ea",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-08T00:21:44.511313Z",
"modified": "2024-09-08T00:21:44.511313Z",
"name": "CVE-2024-45034",
"description": "Apache Airflow versions before 2.10.1 have a vulnerability that allows DAG authors to add local settings to the DAG folder and get it executed by the scheduler, where the scheduler is not supposed to execute code submitted by the DAG author. \nUsers are advised to upgrade to version 2.10.1 or later, which has fixed the vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-45034"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--2a6d14e8-e630-48d5-b982-ccab3362032e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0f99091b-f288-4a07-917a-465ccfa28da4",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-08T00:21:44.260636Z",
"modified": "2024-09-08T00:21:44.260636Z",
"name": "CVE-2024-40711",
"description": "A deserialization of untrusted data vulnerability with a malicious payload can allow an unauthenticated remote code execution (RCE).",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-40711"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--677a4e5d-c3f8-42a9-97f7-0f9f034f209f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1e2a6589-fa89-41cb-998a-3424a297da2c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-08T00:21:43.766475Z",
"modified": "2024-09-08T00:21:43.766475Z",
"name": "CVE-2024-39715",
"description": "A code injection vulnerability that allows a low-privileged user with REST API access granted to remotely upload arbitrary files to the VSPC server using REST API, leading to remote code execution on VSPC server.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-39715"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--1fb36973-92a4-4ad3-bdc2-744ab6675696",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--298907cf-485f-4874-8989-84e1418adcb7",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-08T00:21:50.910639Z",
"modified": "2024-09-08T00:21:50.910639Z",
"name": "CVE-2023-39333",
"description": "Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module.\n\nThis vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-39333"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--881c8890-ce44-4853-acf6-3e33ad038f45",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2a1dc117-a144-4c9d-b9d2-7d8156b3420e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-08T00:21:43.054329Z",
"modified": "2024-09-08T00:21:43.054329Z",
"name": "CVE-2024-42024",
"description": "A vulnerability that allows an attacker in possession of the Veeam ONE Agent service account credentials to perform remote code execution on the machine where the Veeam ONE Agent is installed.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-42024"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a2e4108e-2dc2-449b-9771-f355edbed322",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--34cbc456-7e48-46f4-8a8e-86983454b8b3",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-08T00:21:43.032435Z",
"modified": "2024-09-08T00:21:43.032435Z",
"name": "CVE-2024-42022",
"description": "An incorrect permission assignment vulnerability allows an attacker to modify product configuration files.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-42022"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--776a09fa-edab-4f1a-bb32-4100c27e42b1",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--393fa7c3-eb54-43cf-90db-3dbb65f6446d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-08T00:21:44.225652Z",
"modified": "2024-09-08T00:21:44.225652Z",
"name": "CVE-2024-40712",
"description": "A path traversal vulnerability allows an attacker with a low-privileged account and local access to the system to perform local privilege escalation (LPE).",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-40712"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6b3e9c46-233c-44c2-a882-1a6e68901fa1",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--39ab9d76-a26e-43a8-8ffd-a864549d9a0a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-08T00:21:44.273903Z",
"modified": "2024-09-08T00:21:44.273903Z",
"name": "CVE-2024-40681",
"description": "IBM MQ Operator 2.0.26 and 3.2.4 could allow an authenticated user in a specifically defined role, to bypass security restrictions and execute actions against the queue manager.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-40681"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--33e2cfd9-c5df-408e-9ad8-d2810de10247",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--404ba775-9dac-402c-95af-0d450079ead8",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-08T00:21:43.075282Z",
"modified": "2024-09-08T00:21:43.075282Z",
"name": "CVE-2024-42023",
"description": "An improper access control vulnerability allows low-privileged users to execute code with Administrator privileges remotely.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-42023"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b7c84b3a-e515-4e78-92b3-1abdd515bbbb",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--414460c0-83b3-43e3-b339-ac56c9a220ce",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-08T00:21:43.024068Z",
"modified": "2024-09-08T00:21:43.024068Z",
"name": "CVE-2024-6010",
"description": "The Cost Calculator Builder PRO plugin for WordPress is vulnerable to price manipulation in all versions up to, and including, 3.1.96. This is due to the plugin allowing the price field to be manipulated prior to processing via the 'create_cc_order' function, called from the Cost Calculator Builder plugin. This makes it possible for unauthenticated attackers to manipulate the price of orders submitted via the calculator. Note: this vulnerability was partially patched with the release of Cost Calculator Builder version 3.2.17.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-6010"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b078ee25-d2d3-4288-8ebc-b0ec3b77b867",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--4ded5a2f-8220-46d7-86be-6e415d6c4c05",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-08T00:21:42.613676Z",
"modified": "2024-09-08T00:21:42.613676Z",
"name": "CVE-2024-37068",
"description": "IBM Maximo Application Suite - Manage Component 8.10, 8.11, and 9.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-37068"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7cbe02a1-910b-47eb-8726-cebebf7aea03",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--5102e53c-e690-4d9b-8c9d-896372422dfb",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-08T00:21:44.091639Z",
"modified": "2024-09-08T00:21:44.091639Z",
"name": "CVE-2024-7620",
"description": "The Customizer Export/Import plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the '_import' function in all versions up to, and including, 0.9.7. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. NOTE: This vulnerability is only exploitable when used in conjunction with a race condition as the uploaded file is deleted shortly after it is created.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-7620"
}
]
}
]
}
Loading

0 comments on commit 541786e

Please sign in to comment.