Skip to content

Commit

Permalink
generated content from 2024-08-29
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Aug 29, 2024
1 parent 7a7c75d commit 9464268
Show file tree
Hide file tree
Showing 76 changed files with 1,725 additions and 0 deletions.
75 changes: 75 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -247698,3 +247698,78 @@ vulnerability,CVE-2024-6633,vulnerability--ebd9097a-8a4f-45d6-a730-3622640edcca
vulnerability,CVE-2024-6632,vulnerability--b947f994-db86-4cd9-a07f-6f27e0b5b579
vulnerability,CVE-2024-6789,vulnerability--06b3a8b9-e604-4b6e-bb27-64abcfb2fc16
vulnerability,CVE-2024-6688,vulnerability--e9b8a3ef-5269-43c5-a33b-5542600aee2d
vulnerability,CVE-2021-38120,vulnerability--319b1c7c-998a-4fb5-8813-9f76b1e65dd0
vulnerability,CVE-2021-38121,vulnerability--165f20da-23a4-428c-ae44-7eb93675a170
vulnerability,CVE-2021-38122,vulnerability--a22e9b51-a6c3-4768-aa76-848ba92de4e4
vulnerability,CVE-2021-22529,vulnerability--19df6409-a7a6-41bd-afa3-090b5b2ca899
vulnerability,CVE-2021-22530,vulnerability--d71317bb-bba5-484a-9222-7b115a7c0ba8
vulnerability,CVE-2021-22509,vulnerability--213aea35-812f-400d-bf90-46a30966d35c
vulnerability,CVE-2024-41565,vulnerability--f3802bd9-8b61-409b-8b23-5c692c025dbb
vulnerability,CVE-2024-41564,vulnerability--2eaac320-1fc5-464b-8d82-97832687268e
vulnerability,CVE-2024-41236,vulnerability--8176df18-f455-46df-b0d9-6f08fcbb7ff2
vulnerability,CVE-2024-44761,vulnerability--e000ebb3-7911-4612-9ee3-3c31f709fe67
vulnerability,CVE-2024-44943,vulnerability--8b9fad27-7cc7-4a19-a7e3-34750c4afc4e
vulnerability,CVE-2024-44760,vulnerability--4353b77a-1020-466f-bd8d-e493909708fc
vulnerability,CVE-2024-44913,vulnerability--e1dbc6c9-3741-40fb-aa8c-4e17952d4e46
vulnerability,CVE-2024-44915,vulnerability--9598e75c-c4c1-4b14-8ad4-afe0e1d14735
vulnerability,CVE-2024-44914,vulnerability--779a364c-7726-44b2-a56a-22054cb7fc41
vulnerability,CVE-2024-34198,vulnerability--aa3a3c9b-fe70-4df8-adeb-f37f1b935392
vulnerability,CVE-2024-34195,vulnerability--74048419-a713-42b6-8985-ccdc0e20e19b
vulnerability,CVE-2024-42900,vulnerability--f2b644d7-eb87-4ef6-933c-9f701e366464
vulnerability,CVE-2024-42905,vulnerability--d1f236cf-8e2a-472f-8321-c52ed48d3462
vulnerability,CVE-2024-42793,vulnerability--67d148bf-759b-4be8-9222-80ddea054913
vulnerability,CVE-2024-42698,vulnerability--3416c132-ef50-4a56-a332-fe856670893c
vulnerability,CVE-2024-7269,vulnerability--7616c174-8f3d-4a7d-8bb6-547c18d257d3
vulnerability,CVE-2024-7745,vulnerability--8aa509a2-a97f-4c89-a678-e40622882738
vulnerability,CVE-2024-7447,vulnerability--0a0e8477-d1af-4173-a2a9-c673060ba99c
vulnerability,CVE-2024-7573,vulnerability--86375f19-2a4f-4703-bfb0-191a9df6e162
vulnerability,CVE-2024-7744,vulnerability--ef233de4-38cd-4db8-8008-dc8487c9fede
vulnerability,CVE-2024-39584,vulnerability--0d2bd29a-79f0-463b-b478-09c9cc668636
vulnerability,CVE-2024-39771,vulnerability--ad4d50d2-1fb9-43e9-adfe-99503bdcaae6
vulnerability,CVE-2024-20284,vulnerability--ba590f1a-d1aa-4e01-b117-62e80e094561
vulnerability,CVE-2024-20478,vulnerability--0a7a183e-241e-45d8-a9e2-1e86c06d768f
vulnerability,CVE-2024-20446,vulnerability--fbaa56e9-5306-477d-b704-88824a60ad64
vulnerability,CVE-2024-20286,vulnerability--91523970-f9d9-4554-a121-cf53a7bbbddb
vulnerability,CVE-2024-20411,vulnerability--902ed854-f17f-452f-8bbb-69a4ddc2ee61
vulnerability,CVE-2024-20289,vulnerability--2f31cd98-dd54-4330-aa17-89e710657984
vulnerability,CVE-2024-20413,vulnerability--c13af437-e4da-4035-8801-949245a658b1
vulnerability,CVE-2024-20285,vulnerability--338d4fc7-eabb-451f-b08b-273dbca316e6
vulnerability,CVE-2024-20279,vulnerability--a91156e0-a3f3-4273-b353-5f4296d37d25
vulnerability,CVE-2024-43805,vulnerability--41bad68e-a96c-4e83-8294-3174dc5e767e
vulnerability,CVE-2024-5546,vulnerability--6bae15a1-d610-4fb3-88f6-fd091a98d8f4
vulnerability,CVE-2024-4556,vulnerability--bb3d0cdc-befa-4102-afdc-ab50a25e90e3
vulnerability,CVE-2024-4555,vulnerability--b99dc022-4399-4d7b-bba3-573b368dacb0
vulnerability,CVE-2024-4554,vulnerability--39031eea-6ac1-42bf-a8a8-2c1d7504e49e
vulnerability,CVE-2024-8227,vulnerability--d4a1a6eb-1594-48bb-b978-6c8ab53bb310
vulnerability,CVE-2024-8231,vulnerability--eabeba3c-62bf-4bcb-a883-460d9f04c6d8
vulnerability,CVE-2024-8194,vulnerability--7b0905b0-293e-44a1-ab83-e3c8eac94aae
vulnerability,CVE-2024-8250,vulnerability--648fd34b-a8b1-4374-a7a1-7298fd50bbf9
vulnerability,CVE-2024-8030,vulnerability--81bad3f0-706b-4e48-801e-9e1ee14d21c1
vulnerability,CVE-2024-8193,vulnerability--f05f9c58-a71a-402f-95c9-5779d6811006
vulnerability,CVE-2024-8228,vulnerability--326563ed-cd24-473e-be15-9506c0f3a1f8
vulnerability,CVE-2024-8198,vulnerability--9a7435a0-ff2f-42ce-b7f5-15a15b40dc46
vulnerability,CVE-2024-8229,vulnerability--36229750-470f-44fd-a382-f1d780f9efa1
vulnerability,CVE-2024-8195,vulnerability--0839717b-9547-475c-9fd9-b82bc7f20a8d
vulnerability,CVE-2024-8230,vulnerability--8011136c-ad8a-4a8b-aabb-522bcac4808c
vulnerability,CVE-2024-45346,vulnerability--f80e8401-7863-4a38-a5a6-9bd4dfdd57ae
vulnerability,CVE-2024-45048,vulnerability--f84141ce-c734-4596-bc55-fb7c52d777a6
vulnerability,CVE-2024-45232,vulnerability--2cd88ef5-e34b-4089-a8a2-a7eae7a22c10
vulnerability,CVE-2024-45057,vulnerability--2b5b2007-d3da-40aa-baa9-73c69d944a92
vulnerability,CVE-2024-45059,vulnerability--b90206b9-bf98-4833-83d5-5272ed23f96f
vulnerability,CVE-2024-45046,vulnerability--cf225e29-c592-4597-9a46-b9a5c566beb2
vulnerability,CVE-2024-45233,vulnerability--12c3d27e-794d-4dd5-9793-9c5535aa41b1
vulnerability,CVE-2024-45043,vulnerability--7ee7e72e-3625-47c8-b23c-17bd01dca8ab
vulnerability,CVE-2024-45058,vulnerability--4fa0c20e-27b4-47e9-ba0d-3a8f41affb00
vulnerability,CVE-2024-45054,vulnerability--22edb6c1-8106-4f66-9bc0-e3f71894ae9a
vulnerability,CVE-2024-6448,vulnerability--c530a8a7-9d09-437a-9770-ae421daeb987
vulnerability,CVE-2024-6450,vulnerability--13441393-c0e1-4759-9a6a-f1d7292a7c62
vulnerability,CVE-2024-6311,vulnerability--04937e3d-8661-4113-9364-608f47a844ce
vulnerability,CVE-2024-6312,vulnerability--17f38677-6d2c-4d45-8ce3-70647a0d6eee
vulnerability,CVE-2024-6053,vulnerability--89030824-d5ad-4213-8d75-dbaf27c77588
vulnerability,CVE-2024-6449,vulnerability--7734c275-d8ab-4e10-bde8-5f0b038c4633
vulnerability,CVE-2023-26323,vulnerability--bb327f31-493e-428c-9b2b-9c65ce7cf456
vulnerability,CVE-2023-26322,vulnerability--13612bfc-cdf4-4174-849c-0a719302f71a
vulnerability,CVE-2023-26321,vulnerability--d9551144-fef1-48ca-aa58-984b8884bbe5
vulnerability,CVE-2023-26324,vulnerability--a7107762-7073-454d-b8ce-3dc73991fef9
vulnerability,CVE-2023-43078,vulnerability--05b9188b-3e40-49ea-ad02-5d378c36f701
vulnerability,CVE-2023-45896,vulnerability--2d027451-9846-437f-bf4f-30bb71a36e97
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--856d3bfa-7950-4ddb-bc82-1e3fc4159c0e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--04937e3d-8661-4113-9364-608f47a844ce",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-29T00:19:17.459183Z",
"modified": "2024-08-29T00:19:17.459183Z",
"name": "CVE-2024-6311",
"description": "The Funnelforms Free plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'af2_add_font' function in all versions up to, and including, 3.7.3.2. This makes it possible for authenticated attackers, with administrator-level and above permissions, to upload arbitrary files on the affected site's server which may make remote code execution possible.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-6311"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6c3d8100-3493-4cfa-afa9-577bfb4dc771",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--05b9188b-3e40-49ea-ad02-5d378c36f701",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-29T00:19:18.892429Z",
"modified": "2024-08-29T00:19:18.892429Z",
"name": "CVE-2023-43078",
"description": "Dell Dock Firmware and Dell Client Platform contain an Improper Link Resolution vulnerability during installation resulting in arbitrary folder deletion, which could lead to Privilege Escalation or Denial of Service.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-43078"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--28ccc5cb-4b60-4178-aad6-213e9fa05ee8",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0839717b-9547-475c-9fd9-b82bc7f20a8d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-29T00:19:17.34356Z",
"modified": "2024-08-29T00:19:17.34356Z",
"name": "CVE-2024-8195",
"description": "The Permalink Manager Lite plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'debug_data', 'debug_query', and 'debug_redirect' functions in all versions up to, and including, 2.4.4. This makes it possible for unauthenticated attackers to extract sensitive data including password, title, and content of password-protected posts.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8195"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--881fca47-817f-468c-9848-bc25b9476474",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0a0e8477-d1af-4173-a2a9-c673060ba99c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-29T00:19:16.467963Z",
"modified": "2024-08-29T00:19:16.467963Z",
"name": "CVE-2024-7447",
"description": "The Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor – Funnelforms Free plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'fnsf_af2_handel_file_upload' function in all versions up to, and including, 3.7.3.2. This makes it possible for unauthenticated attackers to upload arbitrary media to the site, even if no forms exist.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-7447"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--54a39d64-4df5-48c6-967e-ca0efa53c7dd",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0a7a183e-241e-45d8-a9e2-1e86c06d768f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-29T00:19:16.828774Z",
"modified": "2024-08-29T00:19:16.828774Z",
"name": "CVE-2024-20478",
"description": "A vulnerability in the software upgrade component of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Network Controller, formerly Cisco Cloud APIC, could allow an authenticated, remote attacker with Administrator-level privileges to install a modified software image, leading to arbitrary code injection on an affected system.\r\n\r\nThis vulnerability is due to insufficient signature validation of software images. An attacker could exploit this vulnerability by installing a modified software image. A successful exploit could allow the attacker to execute arbitrary code on the affected system and elevate their privileges to root.\r\nNote: Administrators should always validate the hash of any upgrade image before uploading it to Cisco APIC and Cisco Cloud Network Controller.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-20478"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--fc3ff146-98ed-4a52-9b8b-2a30f57687a7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0d2bd29a-79f0-463b-b478-09c9cc668636",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-29T00:19:16.569237Z",
"modified": "2024-08-29T00:19:16.569237Z",
"name": "CVE-2024-39584",
"description": "Dell Client Platform BIOS contains a Use of Default Cryptographic Key Vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Secure Boot bypass and arbitrary code execution.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-39584"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a4582a8f-7533-4e8e-a7e5-741c58b264fe",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--12c3d27e-794d-4dd5-9793-9c5535aa41b1",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-29T00:19:17.423399Z",
"modified": "2024-08-29T00:19:17.423399Z",
"name": "CVE-2024-45233",
"description": "An issue was discovered in powermail extension through 12.3.5 for TYPO3. Several actions in the OutputController can directly be called, due to missing or insufficiently implemented access checks, resulting in Broken Access Control. Depending on the configuration of the Powermail Frontend plugins, an unauthenticated attacker can exploit this to edit, update, delete, or export data of persisted forms. This can only be exploited when the Powermail Frontend plugins are used. The fixed versions are 7.5.0, 8.5.0, 10.9.0, and 12.4.0.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-45233"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--fc790d99-5577-4d75-b7ce-6864afebd0a9",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--13441393-c0e1-4759-9a6a-f1d7292a7c62",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-29T00:19:17.448778Z",
"modified": "2024-08-29T00:19:17.448778Z",
"name": "CVE-2024-6450",
"description": "HyperView Geoportal Toolkit in versions though 8.2.4 is vulnerable to Reflected Cross-Site Scripting (XSS). An unauthenticated attacker might trick somebody into using a crafted URL, which will cause a script to be run in user's browser.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-6450"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--f60863d1-0d83-4a64-ae2a-dbd9b79c9184",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--13612bfc-cdf4-4174-849c-0a719302f71a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-29T00:19:18.26024Z",
"modified": "2024-08-29T00:19:18.26024Z",
"name": "CVE-2023-26322",
"description": "A code execution vulnerability exists in the XiaomiGetApps application product. This vulnerability is caused by the verification logic being bypassed, and an attacker can exploit this vulnerability to execute malicious code.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-26322"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--350aa4c7-ea08-4e6a-b94b-41b13363082c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--165f20da-23a4-428c-ae44-7eb93675a170",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-29T00:19:14.327939Z",
"modified": "2024-08-29T00:19:14.327939Z",
"name": "CVE-2021-38121",
"description": "Insufficient or weak TLS protocol version identified in Advance authentication client server communication when specific service is accessed between devices.  This issue affects NetIQ Advance Authentication versions before 6.3.5.1",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2021-38121"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--48548231-7d56-440a-9d27-898938626338",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--17f38677-6d2c-4d45-8ce3-70647a0d6eee",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-29T00:19:17.46352Z",
"modified": "2024-08-29T00:19:17.46352Z",
"name": "CVE-2024-6312",
"description": "The Funnelforms Free plugin for WordPress is vulnerable to arbitrary file deletion in all versions up to, and including, 3.7.3.2 via the 'af2DeleteFontFile' function. This is due to the plugin not properly validating a file or its path prior to deleting it. This makes it possible for unauthenticated attackers to delete arbitrary files, including the wp-config.php file, which can make site takeover and remote code execution possible.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-6312"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--1bc50a29-6780-4844-8eb2-c999464c6fe5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--19df6409-a7a6-41bd-afa3-090b5b2ca899",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-29T00:19:15.118386Z",
"modified": "2024-08-29T00:19:15.118386Z",
"name": "CVE-2021-22529",
"description": "A vulnerability identified in NetIQ Advance Authentication that leaks sensitive server information. This issue affects NetIQ Advance Authentication version before 6.3.5.1",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2021-22529"
}
]
}
]
}
Loading

0 comments on commit 9464268

Please sign in to comment.