Skip to content

Commit

Permalink
generated content from 2024-02-24
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Feb 24, 2024
1 parent 07f4428 commit 69e4356
Show file tree
Hide file tree
Showing 80 changed files with 1,817 additions and 0 deletions.
79 changes: 79 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -226231,3 +226231,82 @@ vulnerability,CVE-2024-25748,vulnerability--e2cfcddb-cc5f-41cd-ad78-f452f2487b2c
vulnerability,CVE-2024-25828,vulnerability--7cc00804-a8bc-4c8f-a1e8-93d9acf7521b
vulnerability,CVE-2024-25423,vulnerability--801dd8ec-2a48-4a38-9a50-9e16f1f1e336
vulnerability,CVE-2022-25377,vulnerability--d7ea8a48-423c-4941-b6b1-e7990d42ad15
vulnerability,CVE-2023-52462,vulnerability--849a9ca7-7fe0-4c5d-83fa-867c9ee4febc
vulnerability,CVE-2023-52463,vulnerability--b357c0a0-b481-4159-9e13-15a2ef87f042
vulnerability,CVE-2023-52453,vulnerability--b2860a6f-4118-4c40-859f-5a1746ff0abf
vulnerability,CVE-2023-52455,vulnerability--9f2d93a9-00f5-4b0e-a890-c4e22ff89a07
vulnerability,CVE-2023-52456,vulnerability--b9fc56fa-5852-4af3-8142-5f948c79ebf0
vulnerability,CVE-2023-52457,vulnerability--7bc0a404-e4f2-42fc-958e-3a56b03e36cb
vulnerability,CVE-2023-52458,vulnerability--d6cdb0b7-0a18-4c40-829a-f9b777a73ef2
vulnerability,CVE-2023-52454,vulnerability--287d7bc5-a75c-4e11-afd1-58fc80a75792
vulnerability,CVE-2023-52464,vulnerability--ceef9d52-842b-4008-9c91-a62f3569b167
vulnerability,CVE-2023-52461,vulnerability--3aa33fe1-ca57-4d3c-ab90-aabe57b6820b
vulnerability,CVE-2023-52459,vulnerability--d090964d-e924-4495-ac03-b537d2fd49bc
vulnerability,CVE-2023-52460,vulnerability--208c0b43-5a25-4754-a8c1-2cc3ca9cb7bd
vulnerability,CVE-2023-4826,vulnerability--f2e83c2b-e284-4b39-8d50-a7db0355d5af
vulnerability,CVE-2023-51392,vulnerability--cd40a56e-685a-4683-848f-3fc6e8f8ada4
vulnerability,CVE-2023-51393,vulnerability--4b10e3e3-c04a-4dc2-8628-9819b47275d1
vulnerability,CVE-2023-51394,vulnerability--9ca3ec0c-7454-4c8d-a4c1-90e947c8f0ec
vulnerability,CVE-2023-24416,vulnerability--81c944cc-5fcd-4989-a6c6-9759446ec1d4
vulnerability,CVE-2023-37540,vulnerability--bcbf23ed-c618-4ebb-a100-af589fd57921
vulnerability,CVE-2024-22776,vulnerability--20c3fd33-8a22-4265-92aa-8bc41aa3d458
vulnerability,CVE-2024-22243,vulnerability--dafac234-6e2f-462a-a8c5-5f8a1346717e
vulnerability,CVE-2024-22395,vulnerability--60916385-b25a-4f32-904f-575289b406fb
vulnerability,CVE-2024-22988,vulnerability--399590f7-4039-4047-8917-b45e605dcb7a
vulnerability,CVE-2024-1819,vulnerability--dbc63ae3-f5d6-438e-92bb-1625fcd526b2
vulnerability,CVE-2024-1590,vulnerability--26a598b7-3f38-483f-8160-4720739debee
vulnerability,CVE-2024-1828,vulnerability--f406b0c8-7b6e-4ea5-9c0b-ba9cad091530
vulnerability,CVE-2024-1783,vulnerability--312f11da-459e-47e8-bee2-29316d867b2e
vulnerability,CVE-2024-1820,vulnerability--1c0bbc1a-b54b-467b-a8a0-e96474effbb8
vulnerability,CVE-2024-1825,vulnerability--79d82391-f7ed-4cdc-af7e-cb1ad7db8624
vulnerability,CVE-2024-1822,vulnerability--406c9e5c-62df-47b2-afee-2cf2c3108e4c
vulnerability,CVE-2024-1824,vulnerability--c1d95967-7db5-4092-852e-6d16e3b6c0f2
vulnerability,CVE-2024-1826,vulnerability--a72238ec-0f0f-45ac-8c41-f7fe7dfb0f2b
vulnerability,CVE-2024-1829,vulnerability--f200bc10-4b9d-4391-b283-1c43a63ae6c2
vulnerability,CVE-2024-1831,vulnerability--2712e262-4763-46f2-b050-4812c855d925
vulnerability,CVE-2024-1777,vulnerability--8b07c704-1714-494a-b57f-fc69dfe0ae42
vulnerability,CVE-2024-1784,vulnerability--9b2ab68d-9fd8-4e24-988d-df3e21e487be
vulnerability,CVE-2024-1823,vulnerability--3547b632-ca5b-49c3-8c29-cde1eb1cac04
vulnerability,CVE-2024-1683,vulnerability--1fa06e76-a889-440b-a728-e138bcb129f9
vulnerability,CVE-2024-1361,vulnerability--4356d90c-90e1-404c-b1cc-4db50d058f6a
vulnerability,CVE-2024-1821,vulnerability--ec50eddd-2599-4d37-8f10-7980f464eeb2
vulnerability,CVE-2024-1362,vulnerability--3eff4a9d-bec5-4814-92b3-06ad70c247fb
vulnerability,CVE-2024-1833,vulnerability--a03611c4-4d6a-407a-bbf7-1604e6302e7c
vulnerability,CVE-2024-1778,vulnerability--dd93870b-0d95-4145-bcb9-ba33e0f90130
vulnerability,CVE-2024-1830,vulnerability--b5b116de-3a7f-4529-9d32-f0eb80ed781f
vulnerability,CVE-2024-1786,vulnerability--6de24247-3b1c-4f13-8ba4-1b4a856b2506
vulnerability,CVE-2024-1781,vulnerability--5040efaf-0fbc-4f41-b215-2af3924fffcb
vulnerability,CVE-2024-1817,vulnerability--0335007a-0d10-417e-b6b7-fab46c897d60
vulnerability,CVE-2024-1779,vulnerability--79eba483-a9fa-4f37-a198-33078f9865fe
vulnerability,CVE-2024-1360,vulnerability--742ced16-0973-4166-b916-fc8942a76b4e
vulnerability,CVE-2024-1832,vulnerability--13b2231f-2507-4f89-9ba5-3c661e521e93
vulnerability,CVE-2024-1834,vulnerability--44510872-f41f-4929-9133-a15e9cde5d60
vulnerability,CVE-2024-1776,vulnerability--79dbadb1-fb91-4928-868d-f64c303dc771
vulnerability,CVE-2024-1818,vulnerability--ca7ecf22-bd7c-4a1d-b9e6-c8ff84950f16
vulnerability,CVE-2024-1827,vulnerability--6c8775d4-8b12-4ab9-8382-eabfa5c30b8e
vulnerability,CVE-2024-23320,vulnerability--e1a2ca95-51c2-44db-87d7-27fa954a8e84
vulnerability,CVE-2024-26188,vulnerability--055e20b9-12a3-4ad8-ba9a-abf9b5ec3360
vulnerability,CVE-2024-26599,vulnerability--fe7f6b39-95a4-4375-9c76-915bcac4ad68
vulnerability,CVE-2024-26595,vulnerability--1923889d-fe27-4a0e-87ce-74ba4bc10bcc
vulnerability,CVE-2024-26598,vulnerability--48552711-82cf-4256-9c7b-14517fd9b056
vulnerability,CVE-2024-26192,vulnerability--3a6cf568-40c7-40d8-8e78-1c1b6fc41b59
vulnerability,CVE-2024-26150,vulnerability--e0f77025-6af2-479b-adf2-6965b0d26711
vulnerability,CVE-2024-26596,vulnerability--cd5140ff-e9d7-40f4-b7cd-7c75a4710678
vulnerability,CVE-2024-26597,vulnerability--38e4a8d5-b123-4bff-8207-67c1eb339e9a
vulnerability,CVE-2024-26593,vulnerability--9e6eb399-a801-405b-b7e9-4bde20ce5db2
vulnerability,CVE-2024-26594,vulnerability--9eac7ae2-7481-4edc-aebb-81ba8be70d92
vulnerability,CVE-2024-27319,vulnerability--8781de29-3536-42d6-9e9a-395a4eb74437
vulnerability,CVE-2024-27318,vulnerability--2bdba782-65da-4c82-883d-f57769b82b60
vulnerability,CVE-2024-27133,vulnerability--652403d1-0068-43eb-bdd3-2bb8811ef170
vulnerability,CVE-2024-27132,vulnerability--43a2f164-e95e-4361-8392-e5fcf961b071
vulnerability,CVE-2024-0563,vulnerability--870b8d4b-8277-4da0-ae90-ffa36a495e64
vulnerability,CVE-2024-24310,vulnerability--c0a40774-8e52-433f-898d-7e06b827a0dd
vulnerability,CVE-2024-24309,vulnerability--28f45076-6a17-4825-8d65-9013fe3f5269
vulnerability,CVE-2024-24681,vulnerability--c48f8a6c-f945-4620-bce7-2479d4b3f81d
vulnerability,CVE-2024-21423,vulnerability--319a268a-af28-4021-9c9a-c188bd86b03e
vulnerability,CVE-2024-25928,vulnerability--16b30ee0-2e39-4528-bfb7-3f969b04663c
vulnerability,CVE-2024-25469,vulnerability--34c884de-9495-439c-ad10-ca86c66d8fad
vulnerability,CVE-2024-25730,vulnerability--55d268b7-67b2-48a3-b24b-9f634e0ec734
vulnerability,CVE-2024-25915,vulnerability--93b1cabb-7351-405e-a1d2-b145eaac9386
vulnerability,CVE-2024-25629,vulnerability--67db61b8-a144-4b85-bb43-f4e11e6526b6
vulnerability,CVE-2022-43842,vulnerability--5ced3f73-d3fc-440e-b02f-74f795ffdf16
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--4f8a8a3d-45f2-4950-a3d5-7594841f68d8",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0335007a-0d10-417e-b6b7-fab46c897d60",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-24T00:15:17.168011Z",
"modified": "2024-02-24T00:15:17.168011Z",
"name": "CVE-2024-1817",
"description": "A vulnerability has been found in Demososo DM Enterprise Website Building System up to 2022.8 and classified as critical. Affected by this vulnerability is the function dmlogin of the file indexDM_load.php of the component Cookie Handler. The manipulation of the argument is_admin with the input y leads to improper authentication. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-254605 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-1817"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--701c1eaf-2cd3-4488-808e-36a9f336ebf3",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--055e20b9-12a3-4ad8-ba9a-abf9b5ec3360",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-24T00:15:17.237903Z",
"modified": "2024-02-24T00:15:17.237903Z",
"name": "CVE-2024-26188",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-26188"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9caf8731-bf12-4436-827c-262ee9e25ca9",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--13b2231f-2507-4f89-9ba5-3c661e521e93",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-24T00:15:17.174737Z",
"modified": "2024-02-24T00:15:17.174737Z",
"name": "CVE-2024-1832",
"description": "A vulnerability has been found in SourceCodester Complete File Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/ of the component Admin Login Form. The manipulation of the argument username with the input torada%27+or+%271%27+%3D+%271%27+--+- leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-254623.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-1832"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d54c2145-83aa-4999-bcd8-e1a4275a1abf",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--16b30ee0-2e39-4528-bfb7-3f969b04663c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-24T00:15:17.469849Z",
"modified": "2024-02-24T00:15:17.469849Z",
"name": "CVE-2024-25928",
"description": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Sitepact.This issue affects Sitepact: from n/a through 1.0.5.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-25928"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--821ca987-4c3c-444f-9b4d-cd9dfdb563f7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1923889d-fe27-4a0e-87ce-74ba4bc10bcc",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-24T00:15:17.24357Z",
"modified": "2024-02-24T00:15:17.24357Z",
"name": "CVE-2024-26595",
"description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path\n\nWhen calling mlxsw_sp_acl_tcam_region_destroy() from an error path after\nfailing to attach the region to an ACL group, we hit a NULL pointer\ndereference upon 'region->group->tcam' [1].\n\nFix by retrieving the 'tcam' pointer using mlxsw_sp_acl_to_tcam().\n\n[1]\nBUG: kernel NULL pointer dereference, address: 0000000000000000\n[...]\nRIP: 0010:mlxsw_sp_acl_tcam_region_destroy+0xa0/0xd0\n[...]\nCall Trace:\n mlxsw_sp_acl_tcam_vchunk_get+0x88b/0xa20\n mlxsw_sp_acl_tcam_ventry_add+0x25/0xe0\n mlxsw_sp_acl_rule_add+0x47/0x240\n mlxsw_sp_flower_replace+0x1a9/0x1d0\n tc_setup_cb_add+0xdc/0x1c0\n fl_hw_replace_filter+0x146/0x1f0\n fl_change+0xc17/0x1360\n tc_new_tfilter+0x472/0xb90\n rtnetlink_rcv_msg+0x313/0x3b0\n netlink_rcv_skb+0x58/0x100\n netlink_unicast+0x244/0x390\n netlink_sendmsg+0x1e4/0x440\n ____sys_sendmsg+0x164/0x260\n ___sys_sendmsg+0x9a/0xe0\n __sys_sendmsg+0x7a/0xc0\n do_syscall_64+0x40/0xe0\n entry_SYSCALL_64_after_hwframe+0x63/0x6b",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-26595"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--386ad226-ac99-419b-a867-7e4f07ac35e8",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1c0bbc1a-b54b-467b-a8a0-e96474effbb8",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-24T00:15:17.121598Z",
"modified": "2024-02-24T00:15:17.121598Z",
"name": "CVE-2024-1820",
"description": "A vulnerability was found in code-projects Crime Reporting System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file inchargelogin.php. The manipulation of the argument email/password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-254608.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-1820"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--077cdcff-c468-4492-a9b1-e8f81bb6e5fc",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1fa06e76-a889-440b-a728-e138bcb129f9",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-24T00:15:17.136361Z",
"modified": "2024-02-24T00:15:17.136361Z",
"name": "CVE-2024-1683",
"description": "\nA DLL injection vulnerability exists where an authenticated, low-privileged local attacker could modify application files on the TIE Secure Relay host, which could allow for overriding of the configuration and running of new Secure Relay services.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-1683"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--14d69db0-56db-4af6-8c15-13f49fed56be",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--208c0b43-5a25-4754-a8c1-2cc3ca9cb7bd",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-24T00:15:13.816418Z",
"modified": "2024-02-24T00:15:13.816418Z",
"name": "CVE-2023-52460",
"description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix NULL pointer dereference at hibernate\n\nDuring hibernate sequence the source context might not have a clk_mgr.\nSo don't use it to look for DML2 support.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-52460"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b7697121-0c57-4559-a325-ce6374328cfd",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--20c3fd33-8a22-4265-92aa-8bc41aa3d458",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-24T00:15:17.010933Z",
"modified": "2024-02-24T00:15:17.010933Z",
"name": "CVE-2024-22776",
"description": "Wallos 0.9 is vulnerable to Cross Site Scripting (XSS) in all text-based input fields without proper validation, excluding those requiring specific formats like date fields.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-22776"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--78b036dc-c832-4842-970e-1562467ba692",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--26a598b7-3f38-483f-8160-4720739debee",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-24T00:15:17.107108Z",
"modified": "2024-02-24T00:15:17.107108Z",
"name": "CVE-2024-1590",
"description": "The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Button Widget in all versions up to, and including, 1.8.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-1590"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--fef0009e-01a9-4053-abe0-eebbce435d5c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2712e262-4763-46f2-b050-4812c855d925",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-24T00:15:17.131319Z",
"modified": "2024-02-24T00:15:17.131319Z",
"name": "CVE-2024-1831",
"description": "A vulnerability, which was classified as critical, was found in SourceCodester Complete File Management System 1.0. Affected is an unknown function of the file users/index.php of the component Login Form. The manipulation of the argument username with the input torada%27+or+%271%27+%3D+%271%27+--+- leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-254622 is the identifier assigned to this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-1831"
}
]
}
]
}
Loading

0 comments on commit 69e4356

Please sign in to comment.