Skip to content

Commit

Permalink
generated content from 2024-08-28
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Aug 28, 2024
1 parent d9c37b3 commit 7a7c75d
Show file tree
Hide file tree
Showing 67 changed files with 1,518 additions and 0 deletions.
66 changes: 66 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -247632,3 +247632,69 @@ vulnerability,CVE-2024-45036,vulnerability--6c583874-8a14-40fa-a747-56f8bad3c0a7
vulnerability,CVE-2024-6879,vulnerability--023cfc77-5852-43f3-ae71-00041cfc33e1
vulnerability,CVE-2023-26315,vulnerability--d6782490-0b70-4248-b84c-5b1e9f39db8b
vulnerability,CVE-2023-49582,vulnerability--b388b486-9e4f-41ea-9e4b-1223263808ef
vulnerability,CVE-2022-39997,vulnerability--5b87eae8-78e7-4ec4-ac6b-379252bb94a6
vulnerability,CVE-2022-39996,vulnerability--d03581e9-a829-4c68-91a0-4d8e408eeff2
vulnerability,CVE-2024-41174,vulnerability--e3bbe404-42ac-4400-b63f-720efd635268
vulnerability,CVE-2024-41173,vulnerability--0712fff5-e83f-42bb-a15c-514fd2fca6af
vulnerability,CVE-2024-41175,vulnerability--dc693254-26dd-4472-85f6-874c4dc3a002
vulnerability,CVE-2024-41622,vulnerability--6c3c1dba-d131-40ad-ac1c-fbf52ffa0f23
vulnerability,CVE-2024-41176,vulnerability--b3e4b99c-81cc-4571-b404-a10c9ae2c8bc
vulnerability,CVE-2024-44340,vulnerability--a0d85cde-6157-4542-adba-539cc28fb33e
vulnerability,CVE-2024-44342,vulnerability--4c5ca100-9ba9-40ed-aa32-b7d8341abe6c
vulnerability,CVE-2024-44341,vulnerability--8cd76235-9ac1-45cf-9ab7-5ce9b3a2b5f5
vulnerability,CVE-2024-40395,vulnerability--976619e9-5885-4531-b20b-04af2a587f09
vulnerability,CVE-2024-42851,vulnerability--ddd3f0ea-ab2b-4b4d-8b0a-d3faac8dd6e2
vulnerability,CVE-2024-36068,vulnerability--2c485ffc-7550-48c5-b54b-91f420628bbc
vulnerability,CVE-2024-7791,vulnerability--4fb6d43e-3a53-4e3a-be3c-642e1860ac81
vulnerability,CVE-2024-7071,vulnerability--563c3b78-96bc-432a-b1e0-d83c088555b8
vulnerability,CVE-2024-7304,vulnerability--c6f850fc-95a4-4256-85a0-993c795a32cb
vulnerability,CVE-2024-7941,vulnerability--a6a22318-5beb-4caf-b682-46f288b3cb6b
vulnerability,CVE-2024-7720,vulnerability--d9bd835d-c5a4-4d52-986c-fa4601560c6a
vulnerability,CVE-2024-7940,vulnerability--e582470b-6838-4b52-bfce-dc112c6d6672
vulnerability,CVE-2024-7125,vulnerability--29689e82-88d3-448f-8c3a-14ba08596953
vulnerability,CVE-2024-7608,vulnerability--1d96a346-ca83-49cc-b707-62d2a745c0b0
vulnerability,CVE-2024-1544,vulnerability--968b67df-164e-4d3c-90e1-4208eec91a3c
vulnerability,CVE-2024-43783,vulnerability--59612234-aea7-44f9-9ba6-32f20ceb9dc1
vulnerability,CVE-2024-43414,vulnerability--a5eead2d-4d5d-4c95-8393-73e0a42f2060
vulnerability,CVE-2024-43788,vulnerability--b0f3c7c1-a040-4d14-b49f-715da3d574f7
vulnerability,CVE-2024-5288,vulnerability--eacf061f-9d6b-4995-ac0e-f709e9a1d0cc
vulnerability,CVE-2024-5814,vulnerability--bf2d0938-1b4a-4055-9478-6edeb7eef1d8
vulnerability,CVE-2024-5991,vulnerability--a72e7899-eca2-4211-8556-009719597655
vulnerability,CVE-2024-4872,vulnerability--e12f9bab-7167-4e5f-b831-50cacd6d02c3
vulnerability,CVE-2024-8223,vulnerability--83d0ed6d-0267-430c-acf3-1c7dc1b96112
vulnerability,CVE-2024-8226,vulnerability--4850a485-9c33-48ff-8afe-4d1cd462d253
vulnerability,CVE-2024-8216,vulnerability--058eae69-6f23-443d-b274-51512ce241d2
vulnerability,CVE-2024-8197,vulnerability--25fc460a-36be-48db-a6fd-d1f19580e8e3
vulnerability,CVE-2024-8213,vulnerability--e925f5e7-e513-4f3b-84c9-0102b04f2196
vulnerability,CVE-2024-8199,vulnerability--55972ff9-f2d6-4f1c-8c21-2da126f47129
vulnerability,CVE-2024-8200,vulnerability--65ea8bb0-ceab-44c5-b7c0-ff5d6e32266f
vulnerability,CVE-2024-8211,vulnerability--eb029678-d65e-4711-a534-3ccec85d34a4
vulnerability,CVE-2024-8046,vulnerability--4ec62894-fe58-496a-a37f-f1cae2f9060c
vulnerability,CVE-2024-8210,vulnerability--5d3898b7-4089-4679-9f67-53259890f088
vulnerability,CVE-2024-8207,vulnerability--0d5b1b06-fd8e-4246-8270-abc02e17e7b5
vulnerability,CVE-2024-8221,vulnerability--331d7a92-6f6f-4111-b217-6e716039f73e
vulnerability,CVE-2024-8182,vulnerability--d91465c9-2649-4f24-8275-116e387605b1
vulnerability,CVE-2024-8219,vulnerability--af660148-5e84-4ed9-81f3-728b17067223
vulnerability,CVE-2024-8217,vulnerability--e7da45f0-0999-4af9-beb2-adb7e9e5f3c5
vulnerability,CVE-2024-8220,vulnerability--1af57f19-1887-4024-8436-061944a57497
vulnerability,CVE-2024-8218,vulnerability--4b5a8e4d-7c1f-4685-8a7b-a5b0a3f0fad6
vulnerability,CVE-2024-8225,vulnerability--d520c3a1-b221-4213-a90d-33b698c39730
vulnerability,CVE-2024-8224,vulnerability--f874ed7b-d466-4149-b69d-ff4b8e57f578
vulnerability,CVE-2024-8209,vulnerability--22282e69-9ed5-49d4-bd68-ba3cb5e17ecb
vulnerability,CVE-2024-8208,vulnerability--1d613cd9-8ce4-4922-b0f0-f3c49e44c042
vulnerability,CVE-2024-8181,vulnerability--bd8f18b1-a2aa-4907-a6ab-c198f791dccc
vulnerability,CVE-2024-8214,vulnerability--01ded183-4ad1-43ec-861b-426221dbb97f
vulnerability,CVE-2024-8212,vulnerability--79865a18-54ee-474f-bf07-35f5ec8d89b1
vulnerability,CVE-2024-8222,vulnerability--72924eaa-d771-4983-9e60-9daef8a6e031
vulnerability,CVE-2024-3982,vulnerability--d08a6d20-be41-4844-adeb-d1ed7fb0af58
vulnerability,CVE-2024-3980,vulnerability--de5fdd12-e6c7-40e4-aac1-dae863d634ef
vulnerability,CVE-2024-45037,vulnerability--7f076169-7f94-43cc-a38a-d4a09d92982b
vulnerability,CVE-2024-45049,vulnerability--393f9734-193e-46e0-b2e5-c9938d584799
vulnerability,CVE-2024-45321,vulnerability--3142a715-e32f-48af-8814-7202a1125a7d
vulnerability,CVE-2024-45264,vulnerability--ea3e7963-95c3-4de4-8a4e-a3a6f92c1b28
vulnerability,CVE-2024-45038,vulnerability--f31f6de9-8ba6-4d89-88cd-78111d039405
vulnerability,CVE-2024-6804,vulnerability--2f181b8c-4007-41a4-a8ea-6361cadf115d
vulnerability,CVE-2024-6633,vulnerability--ebd9097a-8a4f-45d6-a730-3622640edcca
vulnerability,CVE-2024-6632,vulnerability--b947f994-db86-4cd9-a07f-6f27e0b5b579
vulnerability,CVE-2024-6789,vulnerability--06b3a8b9-e604-4b6e-bb27-64abcfb2fc16
vulnerability,CVE-2024-6688,vulnerability--e9b8a3ef-5269-43c5-a33b-5542600aee2d
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5e3aa840-e965-4840-8225-0c6ad7d02b50",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--01ded183-4ad1-43ec-861b-426221dbb97f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-28T00:18:59.860857Z",
"modified": "2024-08-28T00:18:59.860857Z",
"name": "CVE-2024-8214",
"description": "** UNSUPPPORTED WHEN ASSIGNED ** A vulnerability classified as critical was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. Affected by this vulnerability is the function cgi_FMT_Std2R5_2nd_DiskMGR of the file /cgi-bin/hd_config.cgi. The manipulation of the argument f_source_dev leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8214"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b2093336-926d-48a6-bf98-be8407067548",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--058eae69-6f23-443d-b274-51512ce241d2",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-28T00:18:59.829737Z",
"modified": "2024-08-28T00:18:59.829737Z",
"name": "CVE-2024-8216",
"description": "A vulnerability, which was classified as critical, has been found in nafisulbari/itsourcecode Insurance Management System 1.0. Affected by this issue is some unknown functionality of the file editPayment.php of the component Payment Handler. The manipulation of the argument recipt_no leads to improper access controls. The attack may be launched remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8216"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--c618f0f1-4e2c-45e4-a77e-1484945840ae",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--06b3a8b9-e604-4b6e-bb27-64abcfb2fc16",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-28T00:18:59.972453Z",
"modified": "2024-08-28T00:18:59.972453Z",
"name": "CVE-2024-6789",
"description": "A path traversal issue in API endpoint in M-Files Server before version 24.8.13981.0 allows authenticated user to read files",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-6789"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--87ba617a-bad7-43ee-ab74-e1a15f7b3add",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0712fff5-e83f-42bb-a15c-514fd2fca6af",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-28T00:18:58.089677Z",
"modified": "2024-08-28T00:18:58.089677Z",
"name": "CVE-2024-41173",
"description": "The IPC-Diagnostics package included in TwinCAT/BSD is vulnerable to a local authentication bypass by a low privileged attacker.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-41173"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--da1a214f-3396-4835-a9af-8da556fe35dd",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0d5b1b06-fd8e-4246-8270-abc02e17e7b5",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-28T00:18:59.841811Z",
"modified": "2024-08-28T00:18:59.841811Z",
"name": "CVE-2024-8207",
"description": "In certain highly specific configurations of the host system and MongoDB server binary installation on Linux Operating Systems, it may be possible for a unintended actor with host-level access to cause the MongoDB Server binary to load unintended actor-controlled shared libraries when the server binary is started, potentially resulting in the unintended actor gaining full control over the MongoDB server process. This issue affects MongoDB Server v5.0 versions prior to 5.0.14 and MongoDB Server v6.0 versions prior to 6.0.3.\n\nRequired Configuration: Only environments with Linux as the underlying operating system is affected by this issue",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8207"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--13855d84-5bc1-4fa9-8f3c-031bb5c12af5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1af57f19-1887-4024-8436-061944a57497",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-28T00:18:59.849886Z",
"modified": "2024-08-28T00:18:59.849886Z",
"name": "CVE-2024-8220",
"description": "A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file staffedit.php. The manipulation of the argument id/stafftype/address/fullname/phonenumber/salary leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8220"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--26d01ef8-b774-448a-8f3b-69cbc73a589a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1d613cd9-8ce4-4922-b0f0-f3c49e44c042",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-28T00:18:59.858679Z",
"modified": "2024-08-28T00:18:59.858679Z",
"name": "CVE-2024-8208",
"description": "A vulnerability has been found in nafisulbari/itsourcecode Insurance Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file editClient.php. The manipulation of the argument AGENT ID leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8208"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3ef126dc-655f-482e-b395-143c133e58de",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1d96a346-ca83-49cc-b707-62d2a745c0b0",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-28T00:18:59.162455Z",
"modified": "2024-08-28T00:18:59.162455Z",
"name": "CVE-2024-7608",
"description": "An authenticated user can download sensitive files from Trellix products NX, EX, FX, AX, IVX, and CMS using path traversal for the URL of network anomaly download_artifact.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-7608"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3dabc8cd-14ac-4bb9-a9a7-50f6d65fe1a8",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--22282e69-9ed5-49d4-bd68-ba3cb5e17ecb",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-28T00:18:59.857589Z",
"modified": "2024-08-28T00:18:59.857589Z",
"name": "CVE-2024-8209",
"description": "A vulnerability was found in nafisulbari/itsourcecode Insurance Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file addClient.php. The manipulation of the argument CLIENT ID leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8209"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--885aa2a4-fd23-45b9-8810-248ce10a1621",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--25fc460a-36be-48db-a6fd-d1f19580e8e3",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-28T00:18:59.83201Z",
"modified": "2024-08-28T00:18:59.83201Z",
"name": "CVE-2024-8197",
"description": "The Visual Sound plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.03. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8197"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b4cba70b-ee79-4d83-8b05-451eba51d337",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--29689e82-88d3-448f-8c3a-14ba08596953",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-28T00:18:59.146322Z",
"modified": "2024-08-28T00:18:59.146322Z",
"name": "CVE-2024-7125",
"description": "Authentication Bypass vulnerability in Hitachi Ops Center Common Services.This issue affects Hitachi Ops Center Common Services: from 10.9.3-00 before 11.0.2-01.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-7125"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--c7b6b99e-01e4-4c7a-bc8c-150f7e85ad6a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2c485ffc-7550-48c5-b54b-91f420628bbc",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-28T00:18:58.952687Z",
"modified": "2024-08-28T00:18:58.952687Z",
"name": "CVE-2024-36068",
"description": "An incorrect access control vulnerability in Rubrik CDM versions prior to 9.1.2-p1, 9.0.3-p6 and 8.1.3-p12, allows an attacker with network access to execute arbitrary code.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-36068"
}
]
}
]
}
Loading

0 comments on commit 7a7c75d

Please sign in to comment.