Skip to content

Commit

Permalink
generated content from 2024-07-19
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Jul 19, 2024
1 parent be0be46 commit ac63367
Show file tree
Hide file tree
Showing 104 changed files with 2,369 additions and 0 deletions.
103 changes: 103 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -243876,3 +243876,106 @@ vulnerability,CVE-2023-4976,vulnerability--f17c11ed-906a-4ba8-9a1a-d2c806ae64a4
vulnerability,CVE-2023-42010,vulnerability--a18d239a-b355-45e6-919e-b1477a9c5d13
vulnerability,CVE-2023-43971,vulnerability--4e3df4c0-1226-40b3-9543-81f69b9a5807
vulnerability,CVE-2023-7272,vulnerability--79d0d980-7d96-4b1d-b6d6-3fec21ef5ea1
vulnerability,CVE-2024-5619,vulnerability--103c1f9e-cc9c-4a6c-8cdf-abbcdb2f6a0e
vulnerability,CVE-2024-5604,vulnerability--cba5ee5a-ec37-4cda-b48f-02c586e8b579
vulnerability,CVE-2024-5620,vulnerability--595709df-79b0-4aa7-90be-64f22aafa843
vulnerability,CVE-2024-5964,vulnerability--4de73ff5-3e77-4513-9185-e29561eb65f9
vulnerability,CVE-2024-5554,vulnerability--0000b39b-81ff-4ea8-8d38-1f5e3786fa93
vulnerability,CVE-2024-5625,vulnerability--7a848d5a-e1fc-4c95-b920-e2a6624882dd
vulnerability,CVE-2024-5555,vulnerability--e63ff1e5-dee0-4253-9f08-d6f6989d47f5
vulnerability,CVE-2024-5997,vulnerability--0bc935d8-ef76-465a-b11c-f14637dc769e
vulnerability,CVE-2024-5321,vulnerability--6636626c-a620-4ff2-adfd-fd384bab4540
vulnerability,CVE-2024-5726,vulnerability--780cd726-a3ae-486f-856a-c4b26d7a9514
vulnerability,CVE-2024-5977,vulnerability--269f7f75-b6d4-403b-a0bb-3b6c0cabfa6c
vulnerability,CVE-2024-5618,vulnerability--f88976ca-c4a4-415a-ac18-800afccf0bf5
vulnerability,CVE-2024-3242,vulnerability--a8134c2e-8c07-47af-91da-2df6054961e8
vulnerability,CVE-2024-24970,vulnerability--19fe62af-f492-49f8-83dc-755b097fe3fd
vulnerability,CVE-2024-34013,vulnerability--2aa62f4f-e1f8-4acc-88d3-7d54d6c9e607
vulnerability,CVE-2024-37066,vulnerability--c9805a31-5e4b-4909-849f-a14aacb2d9fd
vulnerability,CVE-2024-0006,vulnerability--f3d79554-f8d7-4880-8d77-ae7d8e942f77
vulnerability,CVE-2024-0857,vulnerability--53bd0c29-a646-444e-93db-4f061e1d4ca6
vulnerability,CVE-2024-41011,vulnerability--e7bab9c3-2485-4180-8963-14c83cd6f087
vulnerability,CVE-2024-41111,vulnerability--22259c8e-d3de-497b-9995-7285b000c785
vulnerability,CVE-2024-41597,vulnerability--5ea7d3a3-0798-427e-be31-1f726d52d326
vulnerability,CVE-2024-41600,vulnerability--04e566ca-8c9c-4c44-9823-e823604c7147
vulnerability,CVE-2024-41281,vulnerability--4faaf5dd-0116-41da-8bf0-5299dbdebdaa
vulnerability,CVE-2024-41121,vulnerability--811d2dd4-7250-4b5a-ae71-03d54ad9de4b
vulnerability,CVE-2024-41492,vulnerability--985202ee-cee6-4405-89e7-153597166f1b
vulnerability,CVE-2024-41124,vulnerability--889fe46f-020e-4b65-8c84-c0bda5c500f8
vulnerability,CVE-2024-41172,vulnerability--9354e1dd-9684-4c63-9594-dc092ec4ed18
vulnerability,CVE-2024-41184,vulnerability--4671d480-902d-4fe0-ad85-c210e8bf758b
vulnerability,CVE-2024-41602,vulnerability--462b9df1-563d-43a7-9979-144386f30521
vulnerability,CVE-2024-41603,vulnerability--d1526e14-97a8-41b2-a47e-cb539700de0c
vulnerability,CVE-2024-41599,vulnerability--33a392e1-276a-46d1-b2ef-0daa40ac11c3
vulnerability,CVE-2024-41122,vulnerability--79fb571a-3fc5-4acf-92d2-6dbd209ae571
vulnerability,CVE-2024-41601,vulnerability--fd0b194b-e3bf-4dae-a64b-8b54cdf25e0d
vulnerability,CVE-2024-41107,vulnerability--187d20ef-8fbb-491d-90b1-fc199cab602c
vulnerability,CVE-2024-27489,vulnerability--ef4c3534-fc3c-4000-bd04-abe032857727
vulnerability,CVE-2024-31143,vulnerability--0064fcd5-2066-4c0f-9bf1-bc1daa3986bc
vulnerability,CVE-2024-29736,vulnerability--9f9268c6-dbc1-45fe-9183-593a00c3b43c
vulnerability,CVE-2024-29178,vulnerability--97ac1949-399a-443f-b52e-0413b0764dac
vulnerability,CVE-2024-29080,vulnerability--5b2d5ba9-da41-47b2-8c8b-bc9f88d560e0
vulnerability,CVE-2024-29014,vulnerability--d822b93c-be9a-4df5-8e9c-c64ab2c175d3
vulnerability,CVE-2024-36901,vulnerability--df6b52d0-2c0e-4240-8368-7d414411e010
vulnerability,CVE-2024-38156,vulnerability--019661a6-eb4e-4a57-9c81-7a12f41ea41a
vulnerability,CVE-2024-38302,vulnerability--e3522c1b-4a1f-49da-951d-b6c196f2b207
vulnerability,CVE-2024-38806,vulnerability--ea676302-8f8e-4aee-b8ab-c7a4f592733c
vulnerability,CVE-2024-21583,vulnerability--2c306d43-a718-4881-acbc-ce6ec7711ba6
vulnerability,CVE-2024-21527,vulnerability--f276d7d5-c567-41f1-9280-4a1ebb6324e9
vulnerability,CVE-2024-6903,vulnerability--a679947c-0ce7-4a1d-850b-c6b293cabdb0
vulnerability,CVE-2024-6799,vulnerability--4a5d2b5f-3920-471f-af37-72a248fba927
vulnerability,CVE-2024-6599,vulnerability--952788e4-dc06-44c2-8e02-9c39d0a8319d
vulnerability,CVE-2024-6205,vulnerability--7a58e111-87f5-4e30-ae17-99be8ecffab6
vulnerability,CVE-2024-6455,vulnerability--b122b0f6-672b-4f0f-be14-27e53675daa6
vulnerability,CVE-2024-6504,vulnerability--a04b730a-4d19-498b-9a32-d817dd6a83cc
vulnerability,CVE-2024-6175,vulnerability--6c00cd77-107f-456a-a5fa-591ae594280d
vulnerability,CVE-2024-6902,vulnerability--3bfd2ed5-4317-4b0a-b1cd-b687c41367a1
vulnerability,CVE-2024-6901,vulnerability--f9932594-d772-4d82-b7e4-95927a77bc15
vulnerability,CVE-2024-6898,vulnerability--fac160c8-0af2-4ae7-9725-bf8df763538d
vulnerability,CVE-2024-6338,vulnerability--90c00cab-39af-4918-8935-76e775467419
vulnerability,CVE-2024-6900,vulnerability--c08d5c99-97fd-4214-8693-14ca8db84ade
vulnerability,CVE-2024-6905,vulnerability--3568ea68-2c38-4111-8204-42e3f55f8170
vulnerability,CVE-2024-6705,vulnerability--f48a3cde-c569-4fbd-bcc8-927f60722ab1
vulnerability,CVE-2024-6164,vulnerability--cce27d31-466e-45e6-b719-7b59cbb01cb8
vulnerability,CVE-2024-6907,vulnerability--5baaafa3-ebb0-4fe7-be19-b78506f3a4f8
vulnerability,CVE-2024-6906,vulnerability--54cc73ec-3dda-4b55-a17f-89d9db1e5917
vulnerability,CVE-2024-6908,vulnerability--7488bde4-28f3-4e8e-ad7c-c86cbe94ed35
vulnerability,CVE-2024-6899,vulnerability--92c60409-98f0-4297-8b83-62534d57f611
vulnerability,CVE-2024-6895,vulnerability--64436b55-ac40-436b-b96f-c6fd5d0ab63c
vulnerability,CVE-2024-6916,vulnerability--5850c693-8e57-4836-9b1e-a970049c682e
vulnerability,CVE-2024-6904,vulnerability--642003df-a82e-46fa-938a-552758776e38
vulnerability,CVE-2024-35199,vulnerability--f8bfbf7a-1853-4ef8-aa8c-627b98c5b0bb
vulnerability,CVE-2024-35198,vulnerability--064c632a-1308-4d56-8d5f-1957513bcc1f
vulnerability,CVE-2024-30473,vulnerability--7d16ec2a-9da4-4be2-9cd4-42f39ea6d957
vulnerability,CVE-2024-30126,vulnerability--963eb6f6-ad70-4c7a-ac44-e18adb10803a
vulnerability,CVE-2024-30125,vulnerability--c3324059-7c76-4131-9584-9715ba80afda
vulnerability,CVE-2024-30130,vulnerability--a59234e0-9080-4388-86e5-48fbe745d164
vulnerability,CVE-2024-39906,vulnerability--e5d86f68-1cc9-4fad-9e48-d2a76732e060
vulnerability,CVE-2024-39962,vulnerability--1c540d4d-c933-42d7-bd66-a563add9fa82
vulnerability,CVE-2024-39457,vulnerability--04475c00-a2e4-41a7-944a-f1b02048283f
vulnerability,CVE-2024-39173,vulnerability--49245729-f8fe-46ee-b93c-7869bc2dd0d7
vulnerability,CVE-2024-39911,vulnerability--bd74296b-8770-43eb-8464-4722f4f1fd01
vulnerability,CVE-2024-39907,vulnerability--7f8bbe0c-85a4-4c9f-a75f-58c7c2185c4c
vulnerability,CVE-2024-39963,vulnerability--156c4181-eb1b-4353-8164-75abda8a34fb
vulnerability,CVE-2024-39123,vulnerability--a4b316b3-b9ae-4f2e-bbe9-90aa3f1659c0
vulnerability,CVE-2024-39090,vulnerability--717a388c-e747-4452-b960-65dc32ce8fe3
vulnerability,CVE-2024-40898,vulnerability--6cd1a608-71d5-497d-aa7e-228e2b46c01f
vulnerability,CVE-2024-40725,vulnerability--9c834482-562a-4b30-889b-7189dcb40fba
vulnerability,CVE-2024-40400,vulnerability--a36fe2a8-2e94-4f51-97e2-f4cbfcc30f8f
vulnerability,CVE-2024-40648,vulnerability--8f7736ee-b21e-4414-8940-414282cc8caf
vulnerability,CVE-2024-40628,vulnerability--00632f67-0c4a-4538-9640-e44e28cff8ea
vulnerability,CVE-2024-40724,vulnerability--d0fbf2c7-5e0b-4899-8d52-87c0264a890b
vulnerability,CVE-2024-40647,vulnerability--944059ec-88d6-422a-9eb1-34772e7fef52
vulnerability,CVE-2024-40764,vulnerability--c4d5f5eb-32cd-48ba-92bf-e92b51246826
vulnerability,CVE-2024-40629,vulnerability--310ccb75-5f2d-4ffa-86cd-88153d2fd46e
vulnerability,CVE-2024-40642,vulnerability--365dfd71-a2f9-4693-abf4-d9baacf5327f
vulnerability,CVE-2024-40644,vulnerability--a3ebde8c-2551-42b5-a593-d2701aea252c
vulnerability,CVE-2024-32007,vulnerability--4a296643-9519-4cdd-89d4-cf6c3311f0f7
vulnerability,CVE-2023-50304,vulnerability--e3269ac1-540b-45c2-aa29-798c64bf8756
vulnerability,CVE-2023-6708,vulnerability--5c9b9354-08da-4972-a4bd-6cb90934020f
vulnerability,CVE-2023-40223,vulnerability--666407ff-0fdd-4970-afbb-355e215cc042
vulnerability,CVE-2023-40159,vulnerability--95c6f3b5-dd88-4646-940c-25832e86ef95
vulnerability,CVE-2023-40704,vulnerability--0f2da548-2219-45ce-a3a0-fc2f7d2d423f
vulnerability,CVE-2023-40539,vulnerability--34b32abf-4ae7-41fa-856c-18822fe5ce7e
vulnerability,CVE-2023-7268,vulnerability--603e98c6-b5df-4aca-bc09-9456a6fc45b8
vulnerability,CVE-2023-7269,vulnerability--eacee18f-9cc6-459e-a318-21364afd02e2
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--24fded97-2708-4f02-a455-bf8fbe6aa6f8",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0000b39b-81ff-4ea8-8d38-1f5e3786fa93",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-07-19T23:00:30.781819Z",
"modified": "2024-07-19T23:00:30.781819Z",
"name": "CVE-2024-5554",
"description": "The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘onclick_event’ parameter in all versions up to, and including, 5.6.11 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-5554"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5d7838ee-244b-4b78-b317-9ae524e29f6b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--00632f67-0c4a-4538-9640-e44e28cff8ea",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-07-19T23:00:32.189312Z",
"modified": "2024-07-19T23:00:32.189312Z",
"name": "CVE-2024-40628",
"description": "JumpServer is an open-source Privileged Access Management (PAM) tool that provides DevOps and IT teams with on-demand and secure access to SSH, RDP, Kubernetes, Database and RemoteApp endpoints through a web browser. An attacker can exploit the ansible playbook to read arbitrary files in the celery container, leading to sensitive information disclosure. The Celery container runs as root and has database access, allowing the attacker to steal all secrets for hosts, create a new JumpServer account with admin privileges, or manipulate the database in other ways. This issue has been addressed in release versions 3.10.12 and 4.0.0. It is recommended to upgrade the safe versions. There is no known workarounds for this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-40628"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--629e2474-ebc5-4423-a0ef-5d03b95886a4",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0064fcd5-2066-4c0f-9bf1-bc1daa3986bc",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-07-19T23:00:31.530473Z",
"modified": "2024-07-19T23:00:31.530473Z",
"name": "CVE-2024-31143",
"description": "An optional feature of PCI MSI called \"Multiple Message\" allows a\ndevice to use multiple consecutive interrupt vectors. Unlike for MSI-X,\nthe setting up of these consecutive vectors needs to happen all in one\ngo. In this handling an error path could be taken in different\nsituations, with or without a particular lock held. This error path\nwrongly releases the lock even when it is not currently held.\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-31143"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d1f1b41e-0019-4816-9f3c-3fe91635666d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--019661a6-eb4e-4a57-9c81-7a12f41ea41a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-07-19T23:00:31.674853Z",
"modified": "2024-07-19T23:00:31.674853Z",
"name": "CVE-2024-38156",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-38156"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--f007f9e4-5ed3-4e10-a519-288afba1d953",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--04475c00-a2e4-41a7-944a-f1b02048283f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-07-19T23:00:32.078071Z",
"modified": "2024-07-19T23:00:32.078071Z",
"name": "CVE-2024-39457",
"description": "Cybozu Garoon 6.0.0 to 6.0.1 contains a cross-site scripting vulnerability in PDF preview. If this vulnerability is exploited, an arbitrary script may be executed on a logged-in user’s web browser.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-39457"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--01efaa94-1690-4e70-a3e8-d6f458c57144",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--04e566ca-8c9c-4c44-9823-e823604c7147",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-07-19T23:00:31.416526Z",
"modified": "2024-07-19T23:00:31.416526Z",
"name": "CVE-2024-41600",
"description": "Insecure Permissions vulnerability in lin-CMS Springboot v.0.2.1 and before allows a remote attacker to obtain sensitive information via the login method in the UserController.java component.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-41600"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--13709b1c-7470-45b4-aa85-9903ad4dad1e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--064c632a-1308-4d56-8d5f-1957513bcc1f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-07-19T23:00:31.922773Z",
"modified": "2024-07-19T23:00:31.922773Z",
"name": "CVE-2024-35198",
"description": "TorchServe is a flexible and easy-to-use tool for serving and scaling PyTorch models in production. TorchServe 's check on allowed_urls configuration can be by-passed if the URL contains characters such as \"..\" but it does not prevent the model from being downloaded into the model store. Once a file is downloaded, it can be referenced without providing a URL the second time, which effectively bypasses the allowed_urls security check. Customers using PyTorch inference Deep Learning Containers (DLC) through Amazon SageMaker and EKS are not affected. This issue in TorchServe has been fixed by validating the URL without characters such as \"..\" before downloading see PR #3082. TorchServe release 0.11.0 includes the fix to address this vulnerability. Users are advised to upgrade. There are no known workarounds for this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-35198"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--759a23ad-6940-41cf-9c1f-fc36f7d79fea",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0bc935d8-ef76-465a-b11c-f14637dc769e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-07-19T23:00:30.791092Z",
"modified": "2024-07-19T23:00:30.791092Z",
"name": "CVE-2024-5997",
"description": "The Duplica – Duplicate Posts, Pages, Custom Posts or Users plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the duplicate_user and duplicate_post functions in all versions up to, and including, 0.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create duplicates of users and posts/pages.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-5997"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6cbcdd66-873e-412d-9956-2a52cc5cfbbd",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0f2da548-2219-45ce-a3a0-fc2f7d2d423f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-07-19T23:00:42.138421Z",
"modified": "2024-07-19T23:00:42.138421Z",
"name": "CVE-2023-40704",
"description": "Philips Vue PACS uses default credentials for potentially critical functionality.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-40704"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9a07c855-ed9e-428c-a229-e4ce062720d5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--103c1f9e-cc9c-4a6c-8cdf-abbcdb2f6a0e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-07-19T23:00:30.745301Z",
"modified": "2024-07-19T23:00:30.745301Z",
"name": "CVE-2024-5619",
"description": "Authorization Bypass Through User-Controlled Key vulnerability in PruvaSoft Informatics Apinizer Management Console allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Apinizer Management Console: before 2024.05.1.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-5619"
}
]
}
]
}
Loading

0 comments on commit ac63367

Please sign in to comment.